11th week of 2015 patent applcation highlights part 69 |
Patent application number | Title | Published |
20150074752 | System and Method for Secure Control of Resources of Wireless Mobile Communication Devices - Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless mobile communication device asset. When a request to perform an operation affecting at least one of the assets is received, it is determined whether the request is permitted by the domain that includes the at least one affected asset, by determining whether the entity with which the request originated has a trust relationship with the domain, for example. The operation is completed where it is permitted by the domain. Wireless mobile communication device assets include software applications, persistent data, communication pipes, and configuration data, properties or user or subscriber profiles. | 2015-03-12 |
20150074753 | INTEGRATING POLICIES FROM A PLURALITY OF DISPARATE MANAGEMENT AGENTS - Described herein are embodiments for managing policies of a mobile device. In embodiments, a mobile device receives policy containers from a plurality of disparate management agents. Each policy container has one or more policies. Each policy corresponds to a particular category that governs various aspects of the device. The policies described herein may be device wide policies corresponding to various features on the device. The policies may also be data specific policies which dictate how data is stored on and transferred to and from the device. Once the policies are received, a determination is made as to which policy in each category is the most secure policy. The most secure policy for each category is merged to create a global policy that is applied to the mobile device. | 2015-03-12 |
20150074754 | CERTIFICATE MANAGEMENT METHOD BASED ON CONNECTIVITY AND POLICY - Plural modes of operation may be established on a mobile device. Specific modes of operation of the mobile device may be associated with specific spaces in memory. By associating the existing certificate store structure and key store structure with a mode of operation, certificates and keys can be assigned to one space among plural spaces. Furthermore, management (viewing/importation/deletion) of certificates associated with specific modes of operation may be controlled based on the presence or absence of a mobile device administration server and the status (enabled/disabled) of an IT policy. | 2015-03-12 |
20150074755 | METHOD AND SYSTEM FOR MAPPING BETWEEN CONNECTIVITY REQUESTS AND A SECURITY RULE SET - A system capable of automated mapping between a connectivity request and an ordered security rule-set and a method of operating thereof. The system includes an interface operable to obtain data characterizing at least one connectivity request; a module for automated recognizing at least one rule within the rule-set, the rule controlling traffic requested in the at least one connectivity request, wherein the recognizing is provided by comparing a set of combinations specified in the connectivity request with a set of combinations specified in the rule and matching connectivity-related actions specified in the connectivity request; a module for automated evaluating relationship between traffic controlled by the recognized at least one rule and traffic requested in the at least one connectivity request; and a module for automated classifying, in accordance with evaluation results, the at least one connectivity request with respect to the at least one rules and/or vice versa. | 2015-03-12 |
20150074756 | SIGNATURE RULE PROCESSING METHOD, SERVER, AND INTRUSION PREVENTION SYSTEM - A signature rule processing method, a server, and an intrusion prevention system is provided. The method includes: performing, by a cloud server, correlation analysis on signature rule usage status information of each security device connected to the cloud server and a latest signature rule set published by the cloud server, to obtain a most active threat signature rule identification list, and sending, by the cloud server, update information to each security device to update a signature rule after generating the update information according to the most active threat signature rule identification list. The present invention is applicable to the field of network security systems. | 2015-03-12 |
20150074757 | Certisafe, a novel Credential Authentication Process and System ( CAPS ) - Certisafe is a novel Credential Authentication Process and System (CAPS), where a CertiSafe ID is generated once and only once the Issuer confirms the Authenticity of the Credential of a Candidate. This CertiSafe ID is a unique electronic ID, unique to the Candidate and also unique to the unique Credential, can be used repeatedly and endlessly in lieu of paper based copies that a Candidate usually submits to the Requestor through an application (physical I electronic). This method also purports to save precious paper and time for candidates each time they have to apply to an institution or an organization, by making redundant completely, the requirement of paper copies of the credentials and also their subsequent attestation. The verified credential, through CertiSafe ID, gives the Requesting organization the confidence of absorbing the right candidate and not a candidate with dubious credentials. | 2015-03-12 |
20150074758 | METHOD OF USING A MOBILE TERMINAL TO IMPLEMENT CLOUD SEARCHING - A method of using a mobile terminal to implement cloud searching is provided. The method includes receiving, by the mobile terminal, searching conditions inputted by a user; executing, by the mobile terminal, local searching; and detecting whether networking is executed. If networking is executed, the method includes detecting, by the mobile terminal, whether the local stores user account information; and connecting to a cloud server when the local of the mobile terminal stores the user account information. If networking is not executed, the method includes returning local searching results. The method further includes transmitting, by the mobile terminal, the searching conditions to the cloud server; and executing, by the cloud server, cloud searching according to the searching conditions; and returning searching results to the mobile terminal. | 2015-03-12 |
20150074759 | APPLICATION TRUST-LISTING SECURITY SERVICE - Provided are techniques for controlling access to computing resources comprising generating a first fingerprint corresponding to a first executable file; storing the fingerprint in a non-transitory computer-readable storage medium; receiving a request to execute a second executable file on a computing system; generating a second fingerprint corresponding to the second executable file; determining whether or not the first fingerprint matches the second fingerprint; and, in response to determining that the first and second fingerprints match, executing the executable file on the computing system; and, in response to determining that the first and second fingerprints do not match, preventing the executable file from executing on the computing system. | 2015-03-12 |
20150074760 | System and Processing Method for Electronic Authentication Client, and System and Method for Electronic Authenication - A system for an electronic authentication client and a processing method thereof, and a system for electronic authentication and a method thereof are disclosed. The system for the electronic authentication client includes an intelligence remote controller and a television controller, wherein the television controller is configured to receive data of an authentication code from an authentication server, send the data of the authentication code to the intelligence remote controller, receive an operation result of an authentication code from the intelligence remote controller, and send the operation result of the authentication code to the authentication server; and the intelligence remote controller is configured to receive the data of the authentication code from the television controller, operate on the data of the authentication code based on a built-in authentication algorithm to obtain the operation result of the authentication code, and send the operation result of the authentication code to the television controller. | 2015-03-12 |
20150074761 | METHOD, DEVICE AND COMMUNICATIONS SYSTEM FOR NETWORK CONVERGENCE - Embodiments of the present invention provide a method, a device and a communications system for network convergence, which can support a charging manner of a network to which an access user belongs. The method for network convergence includes: after authentication of an access user is successful, receiving, by a second gateway, a PDN connection establishment message corresponding to the access user, where the message carries an access user identifier and is sent by a first gateway, the first gateway is a gateway of a first network in which the access user is currently located, and a service borne by the PDN connection corresponding to the access user includes a network side service of the access user in the first network; and initiating, by the second gateway, according to the access user identifier, a charging procedure corresponding to the access user. | 2015-03-12 |
20150074762 | MOBILE DEVICE AND INFORMATION PROTECTION METHOD THEREOF - A mobile device and an information protection method are presented. The mobile device includes a sensor, a storage and a processor that is electrically connected with the sensor and the storage. The sensor is configured to sense at least one electronic device. The processor is configured to determine an authority of the at least one electronic device and define a protection state for at least one part of the information stored in the storage according to the authority. The information protection method is applied to the mobile device to implement the aforesaid operations. | 2015-03-12 |
20150074763 | PROXIMITY AND BEHAVIOR-BASED ENTERPRISE SECURITY USING A MOBILE DEVICE - A system and method for facilitating configuring software security functionality. An example method includes employing a first computing device to collect information associated with a user of enterprise software, resulting in collected information; and dynamically adjusting one or more security features of enterprise software running on or accessible via a second device based on the collected information. The software running on the second device may include or represent the enterprise software that includes software security functionality. The collected information may include contextual information. An administrator user option facilitates adjusting the one or more rules. | 2015-03-12 |
20150074764 | METHOD OF AUTHORIZING AN OPERATION TO BE PERFORMED ON A TARGETED COMPUTING DEVICE - A method of authorizing an operation to be performed on a targeted computing device is provided. The method includes generating a request to perform an operation on the targeted computing device, signing the request with a private key of a first private, public key pair, transmitting the request to an authentication server, receiving an authorization response from the authentication server that includes the request and an authorization token, and transmitting the authorization response to the targeted computing device. | 2015-03-12 |
20150074765 | REGISTRATION AND CONFIGURATION OF POINT-OF-SERVICE DEVICES - A method, apparatus, and computer readable storage medium are disclosed for registration and configuration of point-of-service (POS) devices. The method includes using a device identifier in determining whether a device is authorized to access a retail point-of-service application. In response to a determination that the device is authorized, the method includes allowing the device access to the POS application and providing the device with application profile information for the POS application. The apparatus includes a processor, a network interface configured for communication with a POS device, and a POS interface application configured to use a device identifier in determining whether a device is authorized to access a retail POS application. The non-transitory computer readable storage medium is configured to store program instructions that when executed are configured to cause a processor to perform the method. | 2015-03-12 |
20150074766 | INFORMATION PROCESSING METHOD AND APPARATUS - An information processing method and apparatus are provided. The method is applicable to a first electronic device, where information about a first preset relationship between the first electronic device and a second electronic device is recorded upon detection of the first preset relationship. If it is judged from the recorded information on the first preset relationship that the first preset relationship between the second electronic device and the first electronic device satisfies a first preset condition, then the second electronic device is authorized for a data access privilege so that the second electronic device has a privilege to access data in the first electronic device. This method can lower the complexity of the data access and improve the convenience of the data access between the electronic devices. | 2015-03-12 |
20150074767 | SYSTEM AND METHOD FOR SECURE COMMUNICATION BETWEEN - A system and method of executing secure communications between first and second domains includes a first logical unit and a second logical unit. The first logical unit periodically calculates timestamps and hashes. The first logical unit also transmits a web form to a node of a first domain responsive to a request and the web form is displayed to a user. The first logical unit receives data input to said web form by the user and enhances the data by adding one or more security services. The first logical unit translates the received data from a first network application level protocol to a target network application level protocol while preserving said data security enhancements and transmits the translated data across a public network. A second logical unit de-enhances the translated data and filters the translated data data. The second logical unit further authorizes the filtered data and transmits the filtered data to a node of the second domain for use in an application. | 2015-03-12 |
20150074768 | METHOD AND SYSTEM FOR OPERATING A WIRELESS ACCESS POINT FOR PROVIDING ACCESS TO A NETWORK - A method is described for operating a single network adapter for use on two different sub-networks of the same type, and a corresponding apparatus. The method comprises setting up a first network address and routing table in the network adapter for use in the first sub-network; setting up a second network address and routing table in the network adapter for use in the second sub-network; receiving data for one of the first and second sub networks, and re-transmitting the data to the other of the first and second sub-network, using the network addresses and routing tables. | 2015-03-12 |
20150074769 | METHOD OF ACCESSING A NETWORK SECURELY FROM A PERSONAL DEVICE, A PERSONAL DEVICE, A NETWORK SERVER AND AN ACCESS POINT - A method of accessing a network securely using a personal device which can only access the network via one or more authorized access points, the method including establishing a connection between the network and the personal device via an access point; checking in the network whether the access point is on a white list of authorized access points for use with the network; if the access point is on the white list, allowing the personal device to access the network securely via the access point; and if the access point is not on the white list, not allowing the personal device to access the network securely. | 2015-03-12 |
20150074770 | SECURE AUTHORIZATION OF MODULES RUNNING ON VIRTUALIZED HARDWARE - A method is described that includes securing authorization for a control module to conduct a test using a plurality of test modules running on a plurality of virtual machines. The method further includes registering the plurality of test modules with the control module to conduct the test. Authorization of the control module is extended to the test modules by securely communicating authorization and instructions to a first set of the registered test modules to send test stimulus to a device under test. Similarly, the authorization is extended to the test modules by securely communicating authorization to and receiving test result data from a second set of the registered test modules, wherein the test result data is responsive to the test stimulus sent to the device under test. The first and second sets of registered test modules can overlap or be the same test modules. | 2015-03-12 |
20150074771 | METHODS FOR RAPID ENROLLMENT OF USERS OF A SECURE, SHARED COMPUTER SYSTEM VIA SOCIAL NETWORKING AMONG PEOPLE ON A SELECTIVE LIST - The present invention is directed to a system for rapid enrollment of users of a secure, shared computer system comprising: (a) a secure shared computer system accessible only by approved users; (b) a plurality of approved users of the secure shared computer system; (c) a system manager that operates the secure shared computer system; (d) a plurality of member organizations, wherein the member organizations purchase a right to allow employees or members of the member organizations to be approved users of the shared computer system from the system manager; (e) at least one email system operated by each member organization which the employees or members of the member organizations use to receive and send email, where access to email sent to each individual employee or member is securely limited to that individual; (f) at least one accrediting organization, wherein the at least one accrediting organization registers member organizations and grants rights for employees or members of the member organizations, individuals holding such rights being people who are eligible to use the shared computer system; and (g) a selective list of eligible organizations and individuals; wherein an organization must be registered by the accrediting organization to be eligible to be a member organization; wherein a person must be an employee or member of a member organization and hold rights granted by at least one of the accrediting organizations to be eligible to be a user of the shared computer system; wherein the system manager organizes the shared computer system to enforce registration by an organization and holding of rights by an individual; and wherein the selective list enumerates the individuals who hold such rights and are eligible to become approved users of the shared computer system. | 2015-03-12 |
20150074772 | SYSTEM AND METHOD FOR IMPROVED COMMUNICATION ON A WIRELESS NETWORK - Systems and methods for wireless communication are disclosed. In one aspect an access point (AP) includes a processor configured to generate a frame with an information element (IE) assigning a restricted access window (RAW) and to determine whether or not to include a field in the IE indicating a group of one or more devices allowed to transmit during the RAW based on a type of the RAW. The processing system further includes an interface to output the generated frame for transmission. According to aspects, at least one option type (e.g., Omni) of the RAW type (e.g., Simplex) is accessible by devices regardless of their device type. Accordingly, the AP may not include the field in the IE indicating the group of one or more devices allowed to transmit during the RAW for the at least one option type of RAW. | 2015-03-12 |
20150074773 | Method and System for Remote Data Access Using a Mobile Device - A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and from a variety of computing and storage devices. | 2015-03-12 |
20150074774 | System, apparatus, and method for a unified identity wallet - A unified identity wallet system, for allowing a user to manage online digital authentication, authorization, and access rights in a simple and secure manner, can include a unified identity wallet server, a pass repository, a unified identity wallet app, an access authorization app, and a unified identity pass manager. The unified identify wallet app can include a processor, a non-transitory memory, an input/output component, a wallet store, a pass requester, and an access manager. A pass provides access authorization to a user and can include the identity of receiver, purpose, type of locations, usage modes, and periods of validity; and can be translated to and stored in a variety of different mobile wallet formats. Further described are a computer-implemented method for obtaining or renewing a pass, and a computer-implemented method for obtaining access to a system. | 2015-03-12 |
20150074775 | System and Method To Enhance Personal Server Security Using Personal Server Owner's Location Data - A system and method to enhance Personal Server Security using Personal Server owner's location data as derived from the Personal Server owner's mobile client computer by controlling certain aspects of the Personal Server security application and Personal Server applications for example automatically or manually disabling access to certain Personal Server applications from the Wide Area Network (Internet) based on if the Personal Server owner is at the home premises and therefore can access the Personal Server from within the trusted Local Area Network and at other times selectively enabling access to certain Personal Server applications from the Wide Area Network when the Personal Server owner is away from the home premises and the only means of accessing such application while away from the premises is via the Wide Area Network. | 2015-03-12 |
20150074776 | ONLINE SIGNATURE IDENTITY AND VERIFICATION IN COMMUNITY - Techniques for electronic signature process management are described. Some embodiments provide an electronic signature service (“ESS”) configured to manage electronic identity cards. In some embodiments, the ESS generates and manages an electronic identity card for a user, based on personal information of the user, activity information related to the user's actions with respect to the ESS, and/or social networking information related to the user. The electronic identity card of a signer may be associated with an electronic document signed via the ESS, so that users may obtain information about the signer of the document. Electronic identity cards managed by the ESS may also be shared or included in other contexts, such as via a user's profile page on a social network, a user's email signature, or the like. | 2015-03-12 |
20150074777 | DYNAMICALLY MITIGATING A NONCOMPLIANT PASSWORD - Techniques are disclosed for dynamically mitigating a noncompliant password. The method comprises obtaining a password; generating one or more quality scores for the password using a password policy for an authentication and authorization service; determining whether the password has sufficient score quality; in response to determining that the password does not have sufficient score quality, granting to the user a different level of access to the service than if the password meets the quality criteria; wherein the method is performed by one or more computing devices. | 2015-03-12 |
20150074778 | Methods, Systems, Devices, and Products for Authenticating Users - Enhanced biometric authentication combines a user's inherent biometric data with the user's password, code, or other secret glyph. For example, the user's finger makes an input on a touchpad. An image of a fingerprint is extracted from the input, along with the user's password, code, or other secret glyph. In one input, then, the user's finger serves two authentication schemes for increased security. | 2015-03-12 |
20150074779 | PEER ENROLLMENT METHOD, ROUTE UPDATING METHOD, COMMUNICATION SYSTEM, AND RELEVANT DEVICES - A peer enrollment method, a route updating method, a communication system, and relevant devices to improve security of a peer-to-peer (P2P) network. The peer enrollment method includes: receiving an enrollment request from a peer, where the enrollment request carries identity information of the peer; verifying the identity information of the peer, and if the verification succeeds, obtaining peer location information of the peer and generating a peer credential according to the peer location information; and sending the peer credential carrying the peer location information to the peer so that the peer joins the P2P network according to the peer credential. Embodiments of the present application further provide a route updating method, a communication system, and relevant devices. Embodiments of the present application may improve security of the P2P network effectively. | 2015-03-12 |
20150074780 | METHODS AND APPARATUS FOR STORAGE AND EXECUTION OF ACCESS CONTROL CLIENTS - Disclosed herein is a technique for securely provisioning access control entities (e.g., electronic Subscriber Identity Module (eSIM) components) to a user equipment (UE) device. In one embodiment, a UE device is assigned a unique key and an endorsement certificate that can be used to provide updates or new eSIMs to the UE device. The UE device can trust eSIM material delivered by an unknown third-party eSIM vendor, based on a secure certificate transmission with the unique key. In another aspect, an operating system (OS) is partitioned into various sandboxes. During operation, the UE device can activate and execute the OS in the sandbox corresponding to a current wireless network. Personalization packages received while connected to the network only apply to that sandbox. Similarly, when loading an eSIM, the OS need only load the list of software necessary for the current run-time environment. Unused software can be subsequently activated. | 2015-03-12 |
20150074781 | USER CREDENTIAL VERIFICATION INDICATION IN A VIRTUAL UNIVERSE - User credential verification indication in a virtual universe is disclosed. A method, system and program product are provided that include verifying a credential of the user of a first avatar in the virtual universe; and establishing a zone that causes an indication of the credential of the user of the first avatar to appear in response to an action being taken relative to the zone. | 2015-03-12 |
20150074782 | SECURE METHOD FOR SSO SUBSCRIBER ACCESSING SERVICE FROM OUTSIDE OF HOME NETWORK - When a UE ( | 2015-03-12 |
20150074783 | SINGLE SIGN ON FOR APPLICATIONS - Systems and method for providing single sign on access to an application executing at a client device. An API request is intercepted at the client device for signing on a user of the client device for accessing the application. The API request is sent to a remote system where user credentials are determined based on the intercepted API request. The user credentials are returned to the client device where they are used to agnostically sign on the user for accessing the application. | 2015-03-12 |
20150074784 | USING SERVICE REQUEST TICKET FOR MULTI-FACTOR AUTHENTICATION - In an environment wherein a front end system receives a service request, and a back end system responds to the request, a user of a target endpoint must be authenticated. A ticket ID is assigned to the service request, and responsive to an initiating action of the user, a virtual token is generated that has a specified relationship with the ticket ID. The virtual token is delivered to the user, and the user is prompted to present the token to a validating component associated with one of the front end or back end systems, wherein the validating component is configured to verify the token validity. If the token is found to be valid, the user is authenticated to access the specified target endpoint. | 2015-03-12 |
20150074785 | USING SERVICE REQUEST TICKET FOR MULTI-FACTOR AUTHENTICATION - In an environment wherein a front end system receives a service request, and a back end system responds to the request, a user of a target endpoint must be authenticated. A ticket ID is assigned to the service request, and responsive to an initiating action of the user, a virtual token is generated that has a specified relationship with the ticket ID. The virtual token is delivered to the user, and the user is prompted to present the token to a validating component associated with one of the front end or back end systems, wherein the validating component is configured to verify the token validity. If the token is found to be valid, the user is authenticated to access the specified target endpoint. | 2015-03-12 |
20150074786 | METHOD OF AUTOMATICALLY AUTHENTICATING A USER AND ELECTRONIC DEVICE THEREFOR - A method of operating by an electronic device is provided. The method includes displaying a user interface that requests an input of login information on a display, wherein the display is comprised in the electronic device, displaying that a login using biometric information is possible, instead of the login using the login information, on the display, receiving the biometric information associated with the login information, and performing the login in response to reception of the biometric information. | 2015-03-12 |
20150074787 | System and Method for an Asynchronous Processor with a Hierarchical Token System - Embodiments are provided for an asynchronous processor with a Hierarchical Token System. The asynchronous processor includes a set of primary processing units configured to gate and pass a set of tokens in a predefined order of a primary token system. The asynchronous processor further includes a set of secondary units configured to gate and pass a second set of tokens in a second predefined order of a secondary token system. The set of tokens of the primary token system includes a token consumed in the set of primary processing units and designated for triggering the secondary token system in the set of secondary units. | 2015-03-12 |
20150074788 | Firewall Security Between Virtual Devices - When communication from a first virtual device to a second virtual device is received, it is determined a first virtual interface associated with the first virtual device and a second virtual interface associated with the second virtual device. It is then determined a first security domain associated with the first virtual interface and a second security domain associated with the second virtual interface to implement a security policy between the first security domain and second security domain. The communication between the virtual devices is allowed or blocked. | 2015-03-12 |
20150074789 | SECURE NETWORK RESOURCE ACCESS SYSTEM - A secure network resource access system facilitates network access by network terminals to network resources located behind an enterprise firewall, and comprises a proxy server and a polling server. The proxy server is located logically outside the enterprise firewall for receiving application data from the network terminals. The polling server is located logically behind the enterprise firewall, and is configured to poll the proxy server to initiate transmission of the received application data from the proxy server to the polling server, to receive application data and associated network resource data from the proxy server in response to the poll, and to direct the application data to one of the network resources in accordance with the associated network resource data. | 2015-03-12 |
20150074790 | NETWORK RESOURCE COMMUNICATION SYSTEM - A secure network resource access system facilitates network access by network terminals to network resources located behind an enterprise firewall, and comprises a proxy server and a polling server. The proxy server is located logically outside the enterprise firewall for receiving application data from the network terminals. The polling server is located logically behind the enterprise firewall, and is configured to poll the proxy server to initiate transmission of the received application data from the proxy server to the polling server, to receive application data and associated network resource data from the proxy server in response to the poll, and to direct the application data to one of the network resources in accordance with the associated network resource data. | 2015-03-12 |
20150074791 | NETWORK RESOURCE ACCESS SYSTEM - A secure network resource access system facilitates network access by network terminals to network resources located behind an enterprise firewall, and comprises a proxy server and a polling server. The proxy server is located logically outside the enterprise firewall for receiving application data from the network terminals. The polling server is located logically behind the enterprise firewall, and is configured to poll the proxy server to initiate transmission of the received application data from the proxy server to the polling server, to receive application data and associated network resource data from the proxy server in response to the poll, and to direct the application data to one of the network resources in accordance with the associated network resource data. | 2015-03-12 |
20150074792 | LINE-RATE PACKET FILTERING TECHNIQUE FOR GENERAL PURPOSE OPERATING SYSTEMS - A method for mitigating denial of service attacks may include filtering out invalid packets from the received packets using a first filtering module, allowing the valid packets to pass through the first filtering module, and allowing some invalid packets to pass through the first filtering module. The method may also include passing the valid packets and the remaining invalid packets from the first filtering module to a second filtering module, filtering out more of the invalid packets using the second packet filtering module, allowing the valid packets to pass through the second filtering module, and allowing some invalid packets to pass through the second filtering module. The method may additionally include passing the valid packets and the remaining invalid packets to a protocol stack to filter the remaining invalid packets and pass the valid packets through to an application. | 2015-03-12 |
20150074793 | PLACING A VIRTUAL EDGE GATEWAY APPLIANCE ON A HOST COMPUTING SYSTEM - Techniques for placing a virtual edge gateway appliance on at least one host computing system are described. In one embodiment, a virtual switch assigned to a tenant for creating virtual networks is identified. Further, at least one host computing system having access to the virtual switch is identified. Furthermore, placing a virtual edge gateway appliance on the at least one identified host computing system is recommended to allow connectivity to networks created using the virtual switch assigned to the tenant. | 2015-03-12 |
20150074794 | SYSTEM FOR ACCESSING DATA OF CLOUD DATABASE USING TRANSPARENT TECHNOLOGY - Disclosed is a system for accessing data of a cloud database via transparent technology, and the system includes at least one channel server and at least one cloud database end. When a connection notice is outputted from an application end, the user channel unit detects a first server address and a first database address in a HTTP data format, and connects to a corresponding channel server via the HTTP tunnel to send a database request, so that the channel server can convert the first database address in the HTTP data format into a TCP/IP data format and then connect to a corresponding database end. Therefore, the application end can access data from the database behind the firewall via the Internet without modifying any program code. | 2015-03-12 |
20150074795 | ONE-TIME PASSWORD GENERATION APPARATUS AND METHOD USING VIRTUAL INPUT MEANS - One-time password (OTP) generation apparatus and method using virtual input means are provided. Reference information generated by a reference information generation unit is compared with identification information. When the reference information is identical to the identification information, a value corresponding to indication information is generated as an OTP. | 2015-03-12 |
20150074796 | User Verification for Changing a Setting of an Electronic Device - An electronic device can include a processing device operatively connected to a biometric sensing device. The processing device can be adapted to compare one or more captured biometric images with respective reference biometric images and change one or more settings of the electronic device or one or more settings of an application on the electronic device only when each captured biometric image matches a respective reference biometric image. | 2015-03-12 |
20150074797 | WEARABLE DEVICE PERFORMING USER AUTHENTICATION USING BIO-SIGNALS AND AUTHENTICATION METHOD OF THE SAME - A wearable device includes a first sensor configured to detect a first biosignal generated in response to a gesture performed by a user, and a second sensor configured to detect a second biosignal of the user. The device further includes a memory configured to store, with respect to at least one user, information of the first biosignal and the second biosignal, and a processor configured to initiate user authentication based on a result of determining whether the detected first biosignal corresponds to the stored information, and authenticate the user by comparing the detected second biosignal to the stored information. | 2015-03-12 |
20150074798 | Electronic Device and Method for Unlocking Screen of Electronic Device - An electronic device and a method for unlocking a screen of the electronic device are provided. The electronic device includes a screen and a storage unit. The method includes detecting, in a screen-locked state, intent of a user to unlock the screen; if it is detected that the user intends to unlock the screen, extracting contact information from the storage unit of the electronic device, where the extracted contact information includes a first attribute value and a second attribute value; displaying the first attribute value of the extracted contact information on the screen and prompting the user to input a second attribute value; and detecting an input of the user, and comparing the input of the user with the second attribute value; if the input of the user is the same as the second attribute value, unlocking the screen; and otherwise, maintaining the screen-locked state. | 2015-03-12 |
20150074799 | LOCKING AND UNLOCKING OF AN ELECTRONIC DEVICE USING A SLOPED LOCK TRACK - Securing an electronic device and associated information is facilitated. A security component facilitates display and operation of a lock track comprising a locked portion having a positive slope and an unlocked portion, including a chasm, that is adjacent to a high point of the positive-sloped unlocked portion of the lock track. A lock facilitator component (LFC) can be moved along the track between a low point of the locked portion and the unlocked portion. The LFC can be moved in response to received input, and if the input is not sufficient to move the LFC from the locked region to the unlocked region, the LFC can be moved back down the positive-sloped lock track to the low point. The security component can control information to be displayed in an overlay display region in accordance with security level(s) of the device or application. | 2015-03-12 |
20150074800 | MOBILE AUTHENTICATION USING A WEARABLE DEVICE - A method of providing a user with an option to access a protected system by satisfying a reduced security measure is disclosed. An attempt by the user to access the protected system is detected. It is detected that a first security token system is within a first proximity to the protected system. Based on the detecting of the attempt by the user to access the protected system and the detecting that the first security token system is within the first proximity, the user is provided with the option to access the protected system by satisfying the reduced security measure. | 2015-03-12 |
20150074801 | SECURITY VERIFICATION DEVICE AND A SECURITY VERIFICATION METHOD - The present invention provides a security verification device and a security verification method which are capable of verifying that elements for implementing security measures necessary for a system can be prepared without omission. The security verification device and the security verification method select a verification item on the basis of security requirement information, generate security requirement information of parts specified by the verification item on the basis of a security target model, generate information which indicates a possessed function of security of the parts included in the security target model on the basis of a function item which is extracted on the basis of an implementation method included in the verification item and output a comparison and verification result of the security requirement information of the parts and the information which indicates the possessed function. | 2015-03-12 |
20150074802 | SPAM NOTIFICATION DEVICE - A device is configured to receive triggering information including a set of conditions associated with spam. The device is configured to receive a message from a sending device, and to determine that the message is spam based on determining that the message satisfies a threshold quantity of conditions of the set of conditions. The device is configured to provide a notification indicating that the message may be spam, and receive response information, based on the notification, indicating that the sending device is to be blacklisted. The device is configured to cause, based on the response information, a future message from the sending device to be blocked prior to being presented to a user. | 2015-03-12 |
20150074803 | SYSTEM AND METHOD OF INTERLOCKING TO PROTECT SOFTWARE-MEDIATED PROGRAM AND DEVICE BEHAVIOURS - Methods and devices for thwarting code and control flow based attacks on software. The source code of a subject piece of software is automatically divided into basic blocks of logic. Selected basic blocks are amended so that their outputs are extended. Similarly, other basic blocks are amended such that their inputs are correspondingly extended. The amendments increase or create dependencies between basic blocks such that tampering with one basic block's code causes other basic blocks to malfunction when executed. | 2015-03-12 |
20150074804 | METHOD AND SYSTEM FOR TRACKING MACHINES ON A NETWORK USING FUZZY GUID TECHNOLOGY - A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality of unknown malicious host machines. In a specific embodiment, the malicious host machines are disposed throughout the network of computers, which includes a worldwide network of computers, e.g., Internet. The method includes querying a knowledge base including a plurality of known malicious hosts, which are numbered from 1 through N, where N is an integer greater than 1. In a preferred embodiment, the knowledge base is coupled to the network of computers. The method includes receiving first information associated with an unknown host from the network; identifying an unknown host and querying the knowledge base to determine if the unknown host is one of the known malicious hosts in the knowledge base. The method also includes outputting second information associated with the unknown host based upon the querying process. | 2015-03-12 |
20150074805 | METHOD FOR PREVENTING RELAY-ATTACK ON SMART KEY SYSTEM - The present invention relates to a method for preventing a relay-attack on a smart key system, and in particular, provides an advantage of preventing a vehicle and equipment stored inside the vehicle from being stolen by using predetermined information transmitted and received when the SMK UNIT of the vehicle and a FOB Key wirelessly communicate with each other and enabling a holder of the FOB Key to make the relay-attack once the holder secures visibility from the vehicle. | 2015-03-12 |
20150074806 | SYSTEMS AND METHODS FOR USING EVENT-CORRELATION GRAPHS TO DETECT ATTACKS ON COMPUTING SYSTEMS - A computer-implemented method for using event-correlation graphs to detect attacks on computing systems may include (1) detecting a suspicious event involving a first actor within a computing system, (2) constructing an event-correlation graph that includes a first node that represents the first actor, a second node that represents a second actor, and an edge that interconnects the first node and the second node and represents a suspicious event involving the first actor and the second actor, (3) calculating, based at least in part on the additional suspicious event, an attack score for the event-correlation graph, (4) determining that the attack score is greater than a predetermined threshold, and (5) determining, based at least in part on the attack score being greater than the predetermined threshold, that the suspicious event may be part of an attack on the computing system. Various other methods, systems, and computer-readable media are also disclosed. | 2015-03-12 |
20150074807 | Discovery of Suspect IP Addresses - A method of discovering suspect IP addresses, the method including, at a client computer: monitoring the computer for malware; on detection of malware, obtaining a list of IP addresses with which a connection has been made or attempted at the client computer within a preceding time frame; sending the list of IP addresses to a central server; and receiving from the central server a blacklist of suspect IP addresses to allow the client computer to block connections with IP addresses within said blacklist | 2015-03-12 |
20150074808 | Rootkit Detection in a Computer Network - Systems and methods are provided for detecting a rootkit by way of a call timing deviation anomaly in a computer. The rootkits may be embedded in the operating system (OS) kernel, an application or other system function. An object call duration baseline is established for durations of object calls (e.g., a system or application call) initiated by the computer, where each object call has an associated call-type and the timing baseline is established on an object call-type basis. Object call durations initiated by the computers are monitored. An object call duration anomaly is detected when the object call duration fails a call duration deviation measurement test, and an indication of the call duration anomaly is generated when detected. | 2015-03-12 |
20150074809 | METHOD FOR TRACKING MACHINES ON A NETWORK USING MULTIVARIABLEFINGERPRINTING OF PASSIVELY AVAILABLE INFORMATION - A method for tracking machines on a network of computers includes determining one or more assertions to be monitored by a first web site which is coupled to a network of computers. The method monitors traffic flowing to the web site through the network of computers and identifies the one or more assertions from the traffic coupled to the network of computers to determine a malicious host coupled to the network of computers. The method includes associating a first IP address and first hardware finger print to the assertions of the malicious host and storing information associated with the malicious host in one or more memories of a database. The method also includes identifying an unknown host from a second web site, determining a second IP address and second hardware finger print with the unknown host, and determining if the unknown host is the malicious host. | 2015-03-12 |
20150074810 | MALWARE AND EXPLOIT CAMPAIGN DETECTION SYSTEM AND METHOD - A malware and exploit campaign detection system and method are provided that cannot be detected by the malware or exploit campaign. The system may provide threat feed data to the vendors that produce in-line network security and end point protection (anti virus) technologies. The system may also be used as a testing platform for 3 | 2015-03-12 |
20150074811 | System and Method for Analyzing Unauthorized Intrusion Into a Computer Network - The method analyzes unauthorized intrusion into a computer network. Access is allowed to a virtualized operating system running on a hypervisor operating system hosted on a network device. A network attack is intercepted on the virtualized operating system using an introspection module with a virtual-machine-based rootkit module and its associated userland processes running on the hypervisor operating system. The network attack includes attack-identifying information. Forensic data is generated on the network attack from the attack-identifying information. | 2015-03-12 |
20150074812 | Detecting Malicious Use of Computer Resources by Tasks Running on a Computer System - A method, apparatus, and computer program product for identifying malware is disclosed. The method identifies processes in a running process list on a host computer system. The method identifies ports assigned to the processes in the running process list on the host computer system. The method determines whether any one of ports that is currently in use in the host computer system is not assigned to any of the processes in the running process list. The method then makes a record that a hidden, running process is present as a characteristic of an attack in response to a determination that one of the ports is currently in use but is not assigned to any of the processes in the running process list in the host computer system. | 2015-03-12 |
20150074813 | PROTECTION OF RESOURCES DOWNLOADED TO PORTABLE DEVICES FROM ENTERPRISE SYSTEMS - An aspect of the present invention provides for protection of resources hosted on enterprise systems. In an embodiment, an enterprise system receives a request from a portable device to download a resource, and in response formulates multiple security actions and associated conditions for the requested resource. The enterprise system sends the requested resource, the security actions and the conditions to the portable device. The portable device determines whether each condition is satisfied and performs the security actions associated with the conditions determined to have been satisfied. Due to the ability to send multiple security actions and associated conditions, better control in protection and retention of downloaded resources is obtained. | 2015-03-12 |
20150074814 | METHOD AND SYSTEM FOR EMBEDDING DATA IN A TEXT DOCUMENT - The present invention relates to a method and system of embedding data in text documents. The method includes obtaining a document having dimensions and at least a first character and a second character and determining a length between the first character and the second character to define an inter-character space. A reference length is determined, where the reference length is a function of the dimensions of the text document. A threshold length is determined, where the threshold length is a minimum length wherein information is not encoded in the inter-character space if the inter-character space is not within the threshold length. The information is encoded into an altered inter-character space wherein a length of the altered inter-character space is an integral multiple of the reference length or a non-integral multiple of the reference length. | 2015-03-12 |
20150074815 | LICENSE MANAGEMENT OF FIRMWARE-CONTROLLABLE FEATURES IN COMPUTER SYSTEMS - License management of firmware-controllable features in computer systems is described. In an example, a computer system includes: a plurality of hardware modules having a plurality of features capable of selective activation; firmware-based controllers distributed among the plurality of hardware modules having control points to control activation of the plurality of features; and a management module to obtain license data and communicate with the firmware-based controllers to configure the control points to activate at least one of the plurality of features as permitted by the license data. | 2015-03-12 |
20150074816 | METHOD FOR URL ANALYSIS AND ELECTRONIC DEVICE THEREOF - A method and apparatus for analyzing a URL included in contents and displaying the analyzed result is provided. The method includes detecting a URL from contents, analyzing the URL, and displaying the analyzed result. | 2015-03-12 |
20150074817 | Data protection method and device - An apparatus and method for encoding and decoding additional information into a digital information in an integral manner. More particularly, the invention relates to a method and device for data protection. | 2015-03-12 |
20150074818 | FAST-EXPIRING LICENSES USED TO SPECULATIVELY AUTHORIZE ACCESS TO STREAMING MEDIA CONTENT - Techniques are disclosed for improving user experience of multimedia streaming over computer networks. More specifically, techniques presented herein reduce (or eliminate) latency in playback start time for streaming digital media content resulting from digital rights management (DRM) authorizations. A streaming media client (e.g., a browser, set-top box, mobile telephone or tablet “app”) may request a “fast-expiring” license for titles the streaming media client predicts a user is likely to begin streaming. A fast-expiring license is a DRM license (and associated decryption key) which is valid for only a very limited time after being used for playback. During the validity period of such a license, the client device requests a “normal” or “regular” license to continue accessing the title after the fast-expiring license expires. | 2015-03-12 |
20150074819 | SHARING ARTIFACTS IN PERMISSION-PROTECTED ARCHIVES - Among other things, we describe techniques for receiving a list of artifacts that are stored in an archive and are responsive to a search query issued by an entity. A set of artifacts are identified that each have a permission attribute indicating that the respective artifact is accessible to the entity when the respective artifact is responsive, above a threshold responsiveness value, to the search query issued by the entity. | 2015-03-12 |
20150074820 | SECURITY ENHANCEMENT APPARATUS - A security enhancement apparatus is provided which is capable of preventing infection by malware that requires writing of important files of the OS or system, by protecting the important files from writing if data protection is implemented in units of files. The security enhancement apparatus relays IO of a PC, control device, or the like. A hard disk, USB device, display, or the like is connected via the security enhance apparatus. As for data protection in a storage, data is handled not only in units of sectors but also in units of files. The apparatus directly performs secure data transfer or display, setting/input therefor, or the like, thereby being able to correctly make an alert or inquiry to the user even in the case where a vulnerability of the OS or application program is attacked and control of the PC or control device is taken by an unauthorized program. Also, during communication, the security enhancement apparatus can authenticate a communication-partner device and encrypt communication content. | 2015-03-12 |
20150074821 | DEVICE MANAGEMENT APPARATUS, DEVICE MANAGEMENT SYSTEM AND DEVICE MANAGEMENT METHOD - A device management apparatus includes a first storage part storing license information regarding a license of an application for each of a plurality of devices and a processor executing a program to perform a license validating process and a function restricting process. The license validating process changes, when the license information includes invalidity information indicating that the license is invalid, the invalidity information into validity information indicating that the license is valid. The function restricting process restricts, when the license information includes the invalidity information, an execution of a function of the device management apparatus with respect to the application of each of the devices. | 2015-03-12 |
20150074822 | SECURE AUTHENTICATED DISTANCE MEASUREMENT - The invention relates to a method for a first communication device to perform authenticated distance measurement between the first communication device and a second communication device, wherein the first and the second communication device share a common secret and the common secret is used for performing the distance measurement between the first and the second communication device. The invention also relates to a method of determining whether data stored on a first communication device are to be accessed by a second communication device. Moreover, the invention relates to a communication device for performing authenticated distance measurement to a second communication device. The invention also relates to an apparatus for playing back multimedia content comprising a communication device. | 2015-03-12 |
20150074823 | SERVER, TERMINAL AND DIGITAL COPYRIGHT MANAGEMENT METHOD - The present invention provides a server comprising: a selection unit configured to select a target content from each digital file among a plurality of digital files according to a selection instruction received from a terminal; an extraction unit configured to extract privilege information corresponding to the target content from file key information corresponding to each digital file among the plurality of digital files, so as to obtain a plurality of privilege information; an authorization information generation unit configured to generate authorization information according to the plurality of the privilege information; and a processing unit configured to, when an authorization request is received from the terminal, transmit the authorization information to the terminal so that the terminal performs predetermined operations on the target content according to the authorization information. The present invention further provides a terminal and a digital copyright management method. | 2015-03-12 |
20150074824 | SECURE DATA STORAGE APPARATUS AND SECURE IO APPARATUS - A secure data storage apparatus capable of independently holding security information within a hardware device of the storage apparatus, and of implementing write prohibition and read prohibition of data is provided. As means for specifying security such as write prohibition/write inquiry/read prohibition/read inquiry for data of a given size or a given number of pieces of data, a storage component for holding security information is prepared in addition to a storage component for holding data. For each unit of storage of the storage component for holding data, corresponding security data is held in the storage component for holding security information. In this way, in response to occurrence of a request to access data, security information corresponding to a storage area for holding the data is referred to, and an operation is performed in accordance with the security information. | 2015-03-12 |
20150074825 | SYSTEM AND METHOD FOR CONTROLLING PRIVACY SETTINGS OF USER INTERFACE WITH INTERNET APPLICATIONS - A system and method for controlling access to a user's account has a graphical user interface for displaying content on the user interface, a display window in the user interface for displaying content from at least one content source associated with the user's account, and a plurality of profile access modes selectable by the user for determining the scope of the user's access to the account, including a limited profile access mode for limiting the scope of user's access to the account and the content visible on the account. The system also has an identifier associated with the limited access mode. When the user attempts to access the account from a source associated with the identifier associated with the limited access mode, the user's account is accessible only through the limited profile access mode. | 2015-03-12 |
20150074826 | AUTHORIZATION INFORMATION MANAGEMENT SYSTEM, ELECTRONIC DEVICE AND METHOD FOR MANAGING AUTHORIZATION INFORMATION - According to one embodiment, an authorization information management system has a first electronic device and a second electronic device. The first electronic device and the second electronic device are configured to communicate with each other. The first electronic device is configured to store first authorization information in the second electronic device and not in the first electronic device. The first authorization information the first authorization information is indicative of authorization by a user to access data used for a service provided by a server on a network and is issued to an application installed on the first electronic device by the server. | 2015-03-12 |
20150074827 | ELECTRONIC DEVICE, SYSTEM AND METHOD FOR SECURING DATA - An electronic device capable of securing data is provided. The electronic device includes a storage device for storing data and a number of securing strategies. Each of the securing strategies includes a securing condition for triggering a data securing action and one or more identifiers of the data to be secured. If the electronic device determines that a securing condition is met, the electronic device secured the data having the one or more identifiers corresponding to the met securing condition. A data securing system and method are also provided. | 2015-03-12 |
20150074828 | METHODS AND SYSTEMS FOR CONTROLLING ACCESS TO RESOURCES AND PRIVILEGES PER PROCESS - To control privileges and access to resources on a per-process basis, an administrator creates a rule that may be applied to modify a token of a process. The rule may include an application-criterion set and changes to be made to the groups and/or privileges of the token. The rule may be set as a policy within a group policy object (GPO), where a GPO is associated with one or more groups of computers or users. When a GPO containing a rule is applied to a computer, a driver installed on the computer may access the rule(s) anytime a logged-on user executes a process. If the executed process satisfies the criterion set of a rule, the changes contained within the rule are made to the process token, and the user has expanded and/or contracted access and/or privileges for only that process. | 2015-03-12 |
20150074829 | Mechanism for Facilitating Management of Data in an On-Demand Services Enviroment - In accordance with embodiments, there are provided mechanisms and methods for facilitating management of data in an on-demand services environment. In one embodiment and by way of example, a method for facilitating management of data in an on-demand services environment is provided. The method of embodiment includes detecting an attempt by a user to manipulate data via a collaboration application at a computing system, wherein the attempt includes attempted deletion of the data posted for viewing using the collaboration application. The method may further include determining whether the user is authorized to manipulate the data, and blocking the attempt if the user is not authorized to manipulate the data. | 2015-03-12 |
20150074830 | METHOD AND APPARATUS FOR IDENTIFYING INSTALLED SOFTWARE AND REGULATING ACCESS TO CONTENT - A system and method for controlling use of content in accordance with usage rights associated with the content and determined in accordance with the environment of a user device. A request is received for secure content from a user device and the integrity of the environment of the user device is verified. Appropriate usage rights are retrieved based upon the results of the verification of integrity and the content is rendered on the user device in accordance with the appropriate usage rights. | 2015-03-12 |
20150074831 | Method and System for Federated Over-the-Top Content Delivery - A method is provided for managing over-the-top delivery of content through a plurality of content delivery networks (CDN). The method provided works transparently with standard HTTP servers supporting an initial request for content from a client to a first preferred CDN. If the first CDN does not have the content, the method includes provisions for the first CDN to acquire the content from a second CDN, or for the client to request the content from a second CDN directly. A system is also specified for implementing a client and server infrastructure in accordance with the provisions of the method. | 2015-03-12 |
20150074832 | METHOD AND DEVICE FOR VERIFYING A DATA DISPLAY IN A SECURITY-CRITICAL SYSTEM - A method is described for operating a computer system comprising a computer and a display unit, wherein a reference pattern is formed based on input value fed into the computer, wherein image signals for the display unit are generated based on the input value, wherein the image signals fed to the display unit are detected, wherein the detected image signals are subjected to a pattern recognition to provide a recognized pattern, and wherein the recognized pattern is compared with the reference pattern. | 2015-03-12 |
20150074833 | DETERMINATION OF ORIGINALITY OF CONTENT - This disclosure relates, e.g., to governing distribution of content on a web-based service. One claim recites a system comprising: an input to receive a content object posted to a web-based service, for distribution by the web-based service to the public; a hardware processing unit configured for: determining fingerprint data from a received content object, and by reference to the determined fingerprint data, determining that the received content object includes content that at least partially matches controlled content, and identifying the controlled content; obtaining usage rule data relating to the controlled content, the usage rule data having earlier been established by an owner of the controlled content, wherein application of at least certain of the usage rule data is conditioned on an owner-specified extent of copying between the received content object and the controlled content; determining an extent of copying between the received content object and the controlled content; and governing distribution of the content object based on the usage rule data and on the determined extent of copying; and an interface through which different owners can specify different extent of copying requirements to govern distribution of their respective content. A great variety of other claims, features and arrangements are also detailed. | 2015-03-12 |
20150074834 | ELECTRONIC DEVICE AND PROTECTION METHOD THEREOF - The present invention is an electronic device and has a positioning module, a micro processing unit and an electronic device with a first storing device. The micro processing unit electrically connects with the positioning module and the first storing device. The electronic detects a position thereof via the positioning module and generates a positioning coordinate datum. The micro processing unit determines whether the electronic device is in a preset working area through the positioning coordinate datum. When the electronic device is not in the preset working area, the micro processing unit stops the electronic device from accessing the first storing device. | 2015-03-12 |
20150074835 | TRANSGENIC MOUSE EXPRESSING HUMAN LIPOPROTEIN (A) WITH DISABLED VITAMIN C GENE AND ITS USE AS A DISEASE TREATMENT MODEL - The invention discloses novel model of transgenic mammal, a method of crossbreeding transgenic mammal and the use of the transgenic mammal for assessing prevention and/or treatment methods for cardiovascular and other diseases related to lipoprotein(a). The transgenic mammal expresses human apolipoprotein (a) (apo(a)) and human apolipoprotein B-100 (apo B-100) genes and produces human lipoprotein (a), apo (a) and apo B-100 and produces no vitamin C. This novel dual transgenic mammal is the ideal model for testing pharmaceutical compounds for efficacy and usefulness in the prevention and/or treatment of human diseases. | 2015-03-12 |
20150074836 | MUTATIONS OF THE PARKIN GENE, COMPOSITIONS, METHODS AND USES - The invention concerns nucleic acids coding for mutated or truncated forms of the human parkin gene, or forms comprising multiplication of exons, and the corresponding proteins and antibodies. The invention also concerns methods and kits for identifying mutations of the parkin gene, and for studying compounds for therapeutic purposes. | 2015-03-12 |
20150074837 | Transgenic mouse expressing human apo(a) and human apo(B-100) with disabled vitamin C gene produces human Lp(a) - The invention discloses novel model of transgenic mammal, a method of crossbreeding transgenic mammal and the use of the transgenic mammal for assessing prevention and/or treatment methods for cardiovascular and other diseases related to lipoprotein(a). The transgenic mammal expresses human apolipoprotein (a) (apo(a)) and human apolipoprotein B-100 (apo B-100) genes and produces human lipoprotein (a), apo (a) and apo B-100 and produces no vitamin C. This novel dual transgenic mammal is the ideal model for testing pharmaceutical compounds for efficacy and usefulness in the prevention and/or treatment of human diseases. | 2015-03-12 |
20150074838 | HYBRID TOMATO 'E15B70004' - The present disclosure relates to a new and distinctive hybrid tomato designated ‘E15B70004’, to the plants of hybrid tomato ‘E15B70004’, to the plant parts of hybrid tomato ‘E15B70004’ including the fruit, and to methods for producing a hybrid tomato using ‘E15B70004’ as a parent. The disclosure further relates to methods for producing a tomato plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to the methods for producing other tomato lines derived from hybrid tomato ‘E15B70004’. | 2015-03-12 |
20150074839 | TOMATO VARIETY NUN 09015 TOF - The invention provides a new and distinct hybrid variety of tomato, NUN 09015 TOF. | 2015-03-12 |
20150074840 | MAJOR QTLS CONFERRING RESISTANCE OF CORN TO FIJIVIRUS - The invention relates to methods and compositions for identifying maize plants that have newly conferred resistance or enhanced resistance to, or are susceptible to, a Fijivirus, particularly Mal de Río Cuarto Virus (MRCV) and/or Maize Rough Dwarf Virus (MRDV). The methods use molecular genetic markers to identify, select and/or construct resistant plants or identify and counter-select susceptible plants. Maize plants that display newly conferred resistance or enhanced resistance to a Fijivirus that are generated by the methods of the invention are also a feature of the invention. | 2015-03-12 |
20150074841 | GRAY LEAF SPOT TOLERANT MAIZE AND METHODS OF PRODUCTION - The invention relates to methods and compositions for identifying maize plants that have newly conferred tolerance or enhanced tolerance to, or are susceptible to, Gray Leaf Spot (GLS). The methods use molecular genetic markers to identify, select and/or construct tolerant plants or identify and counter-select susceptible plants. Maize plants that display newly conferred tolerance or enhanced tolerance to GLS that are generated by the methods of the invention are also a feature of the invention. | 2015-03-12 |
20150074842 | Fungal Resistant Plants Expressing Hydrophobin - The present invention relates to a method of increasing resistance against fungal pathogens of the family Phacosporaceae plants and/or plant cells. This is achieved for instance by increasing the expression of a hydrophobin protein or fragment thereof in a plant, plant part and/or plant cell in comparison to wild type plants, wild type plant parts and/or wild type plant cells. In the transgenic plants hydrophobin can be expressed as a fusion protein to facilitate and/or enhance expression. Furthermore, the hydrophobin protein can be expressed including a secretion signal sequence which mediates secretion of the protein into the apoplast and/or into the cuticule. | 2015-03-12 |
20150074843 | Methods For Altering The Genome Of A Monocot Plant Cell - Methods and compositions for altering the genome of a monocot plant cell, and a monocot plant are disclosed. The methods and compositions use a double-strand break inducing agent to alter a monocot plant or plant cell genomic sequence comprising a recognition sequence for the double-strand break inducing agent. | 2015-03-12 |
20150074844 | DROUGHT TOLERANT TRANSGENIC PLANTS AND METHOD OF MAKING SAME - Embodiments of the present invention relate generally to drought tolerant transgenic plants and methods of creating the drought tolerant transgenic plants. In one embodiment, plants are transformed such that a PYL polypeptide is overexpressed in the plant. In an embodiment, the plant is transformed with a cassette or vector that comprises a polynucleotide encoding for one or more of the PYL polypeptides, which may be under the control of an inducible or constitutive promoter. In embodiments, overexpression of PYL13 results in plants having increased drought tolerance, such as a decreased transpiration rate, a decreased stomatal conductance, an increased photosynthetic rate, accelerated stress responsive gene expression, and increased water use efficiency, and/or an increased survival rate compared to a control plant. In some embodiments, other PYL proteins having the single point mutations identified in PYL13 are expressed in the plant. | 2015-03-12 |
20150074845 | TERMINATOR SEQUENCE FOR GENE EXPRESSION IN PLANTS - The present invention discloses polynucleotide sequences that can be used to regulate gene expression in plants. Terminator sequences from | 2015-03-12 |
20150074846 | METHODS AND COMPOSITIONS FOR MODIFYING PLANT FLAVONOID COMPOSITION AND DISEASE RESISTANCE - The invention provides methods, compositions and transformation systems for modifying the levels of transcription factors in plants such as | 2015-03-12 |
20150074847 | ENHANCING PROTEIN STABILITY IN TRANSGENIC PLANTS - The present invention provides compositions and methods for enhancing protein stability in transgenic plants. The compositions are nucleic acid constructs which encode fusion proteins, fusion proteins, transgenic plant cells and transgenic plants. A fusion protein in accordance with the present invention comprises a protein of interest and a UBA1 or UBA2 domain of an | 2015-03-12 |
20150074848 | PLANT SUITABLE FOR INCREASING PRODUCTION OF PHLOEM TISSUE AND USE OF SAME - The plant is cultivated by introducing, into plant cells, a promoter specifically expressed in the vascular cambium or phloem cells of a plant, and a cell growth-promoting gene encoding a protein that promotes cell growth under the control of the promoter. | 2015-03-12 |
20150074849 | GENERATION OF PLANTS WITH ALTERED PROTEIN, FIBER, OR OIL CONTENT - The present invention is directed to plants that display an improved oil quantity phenotype or an improved meal quality phenotype due to altered expression of an IMQ nucleic acid. The invention is further directed to methods of generating plants with an improved oil quantity phenotype or improved meal quality phenotype. | 2015-03-12 |
20150074850 | MOLECULAR MARKERS FOR BLACKLEG RESISTANCE GENE RLM2 IN BRASSICA NAPUS AND METHODS OF USING THE SAME - This disclosure concerns methods and compositions for identifying canola plants that have a blackleg resistant phenotype. Some embodiments concern molecular markers to identify, select, and/or construct blackleg resistant plants and germplasm, or to identify and counter-select plants that are susceptible or have low resistance to blackleg disease. Some embodiments concern molecular markers to identify, select, and/or construct blackleg resistant plants that carry the rlm2 gene. This disclosure also concerns canola plants comprising a blackleg resistant phenotype that are generated by methods utilizing at least one marker described herein. | 2015-03-12 |
20150074851 | MOLECULAR MARKERS FOR BLACKLEG RESISTANCE GENE RLM4 IN BRASSICA NUPUS AND METHODS OF USING THE SAME - This disclosure concerns methods and compositions for identifying canola plants that have a blackleg resistant phenotype. Some embodiments concern molecular markers to identify, select, and/or construct blackleg resistant plants and germplasm, or to identify and counter-select plants that are susceptible or have low resistance to blackleg disease. Some embodiments concern molecular markers to identify, select, and/or construct blackleg resistant plants that carry the rlm4 gene. This disclosure also concerns canola plants comprising a blackleg resistant phenotype that are generated by methods utilizing at least one marker described herein. | 2015-03-12 |