12th week of 2013 patent applcation highlights part 66 |
Patent application number | Title | Published |
20130074143 | SYSTEM AND METHOD FOR REAL-TIME CUSTOMIZED THREAT PROTECTION - A method is provided in one example embodiment that includes receiving event information associated with reports from sensors distributed throughout a network environment and correlating the event information to identify a threat. A customized security policy based on the threat may be sent to the sensors. | 2013-03-21 |
20130074144 | APPLICATION IDENTIFICATION - A method may include receiving a communication from a client device and identifying a port number, a protocol and a destination associated with the communication. The method may also include identifying a first application being executed by the first client device based on the port number, the protocol and the destination associated with the first communication. | 2013-03-21 |
20130074145 | SECURE KEY SELF-GENERATION - Techniques are disclosed for providing secure critical security parameter (CSP) generation in an integrated circuit (IC). Embodiments generally include determining that an ability to read the CSP externally (e.g., through a debug interface) has been disabled before the CSP is generated. Depending on the functionality of the device, embodiments can include other steps, such as determining whether software for executing a method for providing a secure CSP is being run for a first time. Among other things, the techniques provided herein for providing secure CSP generation can increase the security of the CSP and reduce manufacturing costs of the IC. | 2013-03-21 |
20130074146 | DATA SECURITY FOR A DATABASE IN A MULTI-NODAL ENVIRONMENT - A security mechanism in a database management system enforces processing restrictions stored as metadata to control how different pieces of a multi-nodal application are allowed to access database data to provide data security. The security mechanism preferably checks the data security restrictions for security violations when an execution unit attempts to access the data to insure the nodal conditions are appropriate for access. When the security mechanism determines there is a security violation by a query from an execution unit based on the security restrictions, the security mechanism may send, delay or retry to maintain data security. Nodal conditions herein include time restrictions and relationships with other columns, rows or pieces of information. For example, multiple processing units may execute together, but the security mechanism would prohibit these processing units to access specific pieces of information at the same time through the use of metadata in the database. | 2013-03-21 |
20130074147 | PACKET PROCESSING - Network devices and methods are provided for packet processing. One method includes using logic embedded in an application specific integrated circuit on a network device to dynamically adjust an access control list. According to the method, the access control list is adjusted in response to information received from a checking functionality related to packets received by the network device from a particular port. The method also includes handling packets later received from the particular port according to the adjusted access control list. | 2013-03-21 |
20130074148 | METHOD AND SYSTEM FOR COMPILING A UNIQUE SAMPLE CODE FOR SPECIFIC WEB CONTENT - Methods for compiling a unique sample code for specific web content. Methods for providing specific web content with such a unique sample code. Methods for gaining access to specific web content provided with such a unique sample code. Methods for indexing web content in a search engine. Methods of processing an Internet search query using a search engine having indexed web content, Related index repositories. Methods for gaining access to specific web content provided with a unique sample code by using a searching engine having indexed web content. | 2013-03-21 |
20130074149 | RE-AUTHENTICATION TIMER FOR USER EQUIPMENT - A device receives, from a user equipment (UE), a first request to access a first packet data network (PDN), and receives authentication information from the UE. The device also grants, based on the first request, the UE access to the first PDN when the authentication information authenticates the UE. The device further receives, from the UE, a second request to access a second PDN, and determines whether a re-authentication timer associated with the second PDN has expired before granting the UE access to the second PDN. | 2013-03-21 |
20130074150 | Presenting Visual Challenges for Verifying Human Interaction - A computing device-implemented method includes providing a presentable visual challenge for determining if access should be granted. The visual challenge includes presenting obscured text wherein the manner in which the text is obscured changes over a period of time. The method also includes determining if a received response substantially matches the text to determine if access should be granted. | 2013-03-21 |
20130074151 | Online Business Method, System and Apparatus Based on Open Application Programming Interface - The present disclosure introduces a method, a system and an apparatus of implementing online transaction according to Open API. In one aspect, a method includes: receiving a first invocation request to invoke an Open API from a third party development server according to a user's transaction request; determining an ISP server corresponding to the Open API as requested to be invoked in the invocation request; sending the first invocation request to the determined ISP server; receiving a service page returned by the ISP server according to the first invocation request; and sending the service page to the third party development server for processing the service page and sending the processed service page to the user, the processing comprising embedding the service page into a page corresponding to the transaction request. | 2013-03-21 |
20130074152 | METHOD AND DEVICES FOR SECURITY ASSOCIATION (SA) BETWEEN DEVICES - In one aspect, there is provided a method and apparatus for security association (SA) upon communication between devices. When a mobile device is connected to another mobile device without subscribing to a specific service or a private network, SA may be established. For example, the SA may be used for resource saving and secure connections of resource poor devices (for example, a medical patch) having a relatively poor resource, such as insufficient battery power or computing power. | 2013-03-21 |
20130074153 | PUBLIC NETWORK ACCESS SERVER HAVING A USER-CONFIGURABLE FIREWALL - A user-configurable firewall and method in which a user-changeable security setting for a client computer is maintained by an access server through which a user accesses the public network. The user-changeable security setting can be used to specify which outside computers or network devices may access the client computer and what type of access to the client computer is allowed. If an attempt to access the client computer is made, the user-configurable security setting is checked to determine if the attempted access is allowed by the current security setting. If the attempted access is allowed by the current security setting, access is allowed to the client computer; otherwise, access is not allowed. If the user changes the user-configurable security setting, the changes to the user-configurable security setting are provided to the access server. | 2013-03-21 |
20130074154 | PUBLIC NETWORK ACCESS SERVER HAVING A USER-CONFIGURABLE FIREWALL - A user-configurable firewall and method in which a user-changeable security setting for a client computer is maintained by an access server through which a user accesses the public network. The user-changeable security setting can be used to specify which outside computers or network devices may access the client computer and what type of access to the client computer is allowed. If an attempt to access the client computer is made, the user-configurable security setting is checked to determine if the attempted access is allowed by the current security setting. If the attempted access is allowed by the current security setting, access is allowed to the client computer; otherwise, access is not allowed. If the user changes the user-configurable security setting, the changes to the user-configurable security setting are provided to the access server. | 2013-03-21 |
20130074155 | NETWORK APPARATUS BASED ON CONTENT NAME, METHOD OF GENERATING AND AUTHENTICATING CONTENT NAME - A method of generating and authenticating a content name in content-centric networking (CCN) and a network apparatus are provided. A content name generation method includes generating authentication information using a secret key shared by network apparatuses that belong to a domain in content-centric networking (CCN); and generating a content name that includes the authentication information. | 2013-03-21 |
20130074156 | METHOD AND SYSTEM FOR EXECUTION MONITOR-BASED TRUSTED COMPUTING - A system and method to ensure trustworthiness of a remote service provided by a service provider. The method includes monitoring runtime dependencies invoked during execution of a service transaction associated with the remote service, the service transaction being requested by a service requester. The method further includes determining whether a deviation exists between the runtime dependencies and a trusted list of dependencies associated with the remote service. The method also includes blocking execution of the service transaction based on determining that the deviation between the runtime dependencies and the trusted list of dependencies exists. | 2013-03-21 |
20130074157 | IMAGE PROCESSING APPARATUS IN WHICH PROCESS TO BE EXECUTED TO IMAGE IS LIMITED, IMAGE PROCESSING PROGRAM PRODUCT EXECUTED THEREBY, MANAGEMENT SERVER EXECUTING PRESCRIBED PROCESS TO IMAGE TRANSMITTED FROM THE IMAGE PROCESSING APPARATUS, AND INFORMATION PROCESSING PROGRAM PRODUCT EXECUTED THEREBY - In order to cause a management server to execute a process desired by a user and to be shared by a plurality of users, an image processing apparatus capable of communicating with the management server includes a scanner inputting image data, an authentication information input unit inputting information necessary for authenticating a user, an authentication information send unit for transmitting the input authentication information to the management server, an additional function list receiver receiving from the management server, in response to the transmission of the authentication information, an additional function list for specifying an additional function registered in association with the user among the additional functions executed by the management server, an additional function selector accepting designation of the additional function, and an additional function select information transmitter transmitting the specified additional function and the input image data to the management server. | 2013-03-21 |
20130074158 | METHOD AND APPARATUS FOR DOMAIN-BASED DATA SECURITY - An approach is provided for a data application interface with improved security. The approach further involves processing a request for access to user data items to determine one or more associated domains and/or one or more access rules associated with the user data items. In one embodiment, the access rules specify criteria for determining one or more authorized domains and/or one or more users that have access rights to the user data items. The approach also involves determining whether to grant the access to the user data items based, at least in part, on a comparison of the determined domains against the criteria and/or access rules. | 2013-03-21 |
20130074159 | Method and System for Sharing Mobile Security Information - Methods and systems for sharing mobile security information are disclosed. According to an embodiment, a method for sharing mobile security information includes: providing to a user of the mobile device an option to share the mobile security information, extracting content from mobile security information upon receiving the user's selection, and posting the extracted content to a social network service. | 2013-03-21 |
20130074160 | METHOD OF CONTROLLING INFORMATION PROCESSING SYSTEM, COMPUTER-READABLE RECORDING MEDIUM STORING PROGRAM FOR CONTROLLING APPARATUS - A method includes generating, by a relay apparatus, association information on the basis of access information such that a plurality of pieces of code included in a received application program are associated with information on permission for executing the plurality of pieces of code, and sending the received application program and the generated association information to a client apparatus configured to execute the received application program, receiving the received application program and the association information from the relay apparatus, and executing, by a client apparatus, a piece of code that is permitted to be executed and not executing a piece of code that is not permitted to be executed with reference to the association information when the client apparatus executes the plurality of pieces of code included in the received application program. | 2013-03-21 |
20130074161 | AUTHENTICATION IN HETEROGENEOUS IP NETWORKS - The invention proposes a system for authenticating and authorizing network services comprising: a mobile device being adapted to, upon receipt of an information message indicating at least one network access type, determine the network access type, to create a start message containing at least a user identity, and to encapsulate the start message in an authentication message compatible with the access network identified in the information message, and an access controller for reading the encapsulated message from the mobile and forwarding the encapsulated message to an authentication server identified in the encapsulated message. The invention also proposes a corresponding method for authenticating and authorizing network services, and an access control device, a subscriber device and a router device. | 2013-03-21 |
20130074162 | METHOD FOR DYNAMICALLY AUTHORIZING A MOBILE COMMUNICATIONS DEVICE - Physically access-protected service access, such as a service flap having a mechanical lock, for example, are used to ensure the secure establishment of security check information. Logical access security to service functions is produced using the security check information via additional, decentralized service interfaces. For this purpose, it is not the mobile service device that is connected to the physically access-protected communications interface, but rather a second authentication module associated with the mobile service device. Security check information is provided by the authentication module for secure service access to the network via additional, decentralized communications interfaces of the network. | 2013-03-21 |
20130074163 | USER EQUIPMENT AND CONTROL METHOD THEREFOR - There is provided a User Equipment comprising: a content obtaining unit that obtains a content item that is not reproducible without permission data for enabling reproduction of the content item; a receiving unit that receives the permission data; a detecting unit that detects that the permission data indicates that a subscriber of a predetermined network operator is entitled to reproduce the content item using the permission data; a key obtaining unit that obtains key data from a module managing subscription information for the predetermined network operator by sending, to the module, information representing the predetermined network operator and information representing an authentication server for determining validity of the key data; a determining unit that determines whether or not the key data is valid by communicating with the authentication server; and a reproducing unit that reproduces the content item using the permission data if it is determined that the key data is valid. | 2013-03-21 |
20130074164 | METHOD AND SYSTEM OF SECURING ACCOUNTS - A method and system of securing account is provided. When a client computer requests access to an account accessible via a server, the server determines a MAC address associated with the client computer and compares it to a MAC address associated with the account. If the MAC address of the client computer is not the same as the MAC address associated with the account, the server initially denies access to the client computer, but may allow access after verification of the client computer by the user associated with the account. | 2013-03-21 |
20130074165 | Trusted Content Distribution System - A trusted content distribution system is described comprising a trustworthy enduser device and a network management infrastructure, the enduser device being adapted for communications between the enduser device and the networked infrastructure via a secure tunnel; the end user device comprising a host processor and memory; secure non-volatile memory for storing an operating system, a trusted boot process executed by the host processor to boot the end user device into a known state, means for communicating with a visualisation device. | 2013-03-21 |
20130074166 | SYSTEMS AND METHODS FOR SECURE AND EFFICIENT ENROLLMENT INTO A FEDERATION WHICH UTILIZES A BIOMETRIC REPOSITORY - A method includes receiving data related to an individual, the data comprising a plurality of elements of personally-identifying information (PII). The method further includes building, via the plurality of elements of the PII, a compositional key for the individual. In addition, the method includes storing the compositional key and a biometric print for the individual as a biometric record in a biometric repository. The method also includes, via the compositional key, providing a plurality of federated entity (FE) computer systems with access to the biometric repository. | 2013-03-21 |
20130074167 | Authenticating Linked Accounts - Embodiments of authenticating linked accounts are presented herein. In an implementation, an authentication service provides functionality to form links between a plurality of user accounts. A client may then authenticate by providing credentials for one account in a group of linked accounts, and is permitted access to each account in the group of linked accounts based upon the linking. Thus, a single sign-in of a client to one account may permit the client to obtain services for service providers corresponding to multiple linked accounts, without an individual sign-in to each account. | 2013-03-21 |
20130074168 | STREAMING VIDEO AUTHENTICATION - One or more devices transmit, to a user device, an application for secure mobile streaming, and receive, from the user device, a registration request for the application. The registration request includes a user ID and a unique device identifier (UDID) for the user device. The one or more devices initiate a validation procedure for the user ID or UDID. When the user ID or UDID is validated, the one or more devices generate a device-token for the user device. The device-token includes a hash value based on information in the registration request and an expiration date for the device-token. The one or more devices send the device-token to the user device via a private network. The device-token is required to permit the user device to receive a secure content stream via a public network. | 2013-03-21 |
20130074169 | Restrictive Access of a Digital Object Based on Location - The present disclosure involves a method including: receiving a request to access an object from a user; prompting the user to go to a target location; receiving feedback from the user with respect to the user's location; determining, electronically by a processor, whether the user has reached the target location; granting access of the object to the user in response to the determining. The present disclosure involves a system including: a storage storing an electronic item; an electronic communications interface that: detects a request to access the item from an entity and prompts the entity to go to a target location in response to the request; a computer processor that: analyzes feedback from the entity with respect to the entity's location, determines whether the entity's location is sufficiently close to the target location, and grants or denies access of the item to the entity based on the determination. | 2013-03-21 |
20130074170 | AUTHENTICATING A USER OF A SYSTEM USING NEAR FIELD COMMUNICATION - A system and machine-implemented method for providing a username and password to a system using a device, via establishing a near field communication link with the system; retrieving a username and password from storage on the device; and transmitting the username and password to the system via the near field communication link, wherein the username and password are configured to be used by the system to authenticate the user on the system. | 2013-03-21 |
20130074171 | AUTOMATED LOGIN INITIALIZATION ON DETECTION OF IDENTIFYING INFORMATION - A system for automating a data device login procedure having a network, a system backend communicable with the network having a backend processor configured to control a simplified login procedure and a database of login information accessible by the backend processor, a data reader communicable with the system backend configured to receive a credential data from an identification device, and a fungible portable data device communicable with the backend configured to receive a login information from the system backend for completing a login procedure. The data reader is configured to initiate the login procedure upon receipt of the credential data from the identification device and communicate the credential data to the backend. The backend is configured to determine the login information associated with the credential data comprising personalization information for the fungible portable data device and the system backend completes the login procedure to the fungible portable data device. | 2013-03-21 |
20130074172 | METHOD AND SYSTEM FOR ESTABLISHING AND MAINTAINING AN IMPROVED SINGLE SIGN-ON (SSO) FACILITY - A method for establishing and maintaining a Single Sign-on between a reverse proxy and a back-end server can include instigating an authentication process through a browser for a user to obtain access to the back-end server, intercepting a login page from the back-end server at the reverse proxy and adding a routine thereto, thereby loading an asynchronous engine on the browser executing a login process with an authentication profiling service, in order to retrieve the login information for the back-end server, and completing the authentication process with the back-end to allow the user access the back-end server through the asynchronous engine. | 2013-03-21 |
20130074173 | Control of Security Application in a LAN from Outside the LAN - A method and a system are disclosed that enable an address at the edge router to be used to establish a multi-pipe virtual private network (MVPN) connecting controllers to multiple web enabled end user devices (EUDs) inside a security protected local area network (LAN). The EUDs connect to a central server (CS) outside the LAN during configuration establishing registration and identity (ID) for each EUD. Once the EUDs establish connection from inside the LAN, the CS is enabled to communicate with the EUDs using the address and ID provided during registration. The CS then acts as a facilitator establishing secure VPN connection between controllers in the cloud and the EUDs inside the LAN. CS further acts as a pass through for those LANs that do not allow direct connections to controllers outside the LAN. The CS continues to monitor the health of the overall system once connectivity is established. | 2013-03-21 |
20130074174 | FIREWALL ACCESS CONTROL WITH BORDER GATEWAY PROTOCOL ATTRIBUTES - Packets are routed from at least one internet protocol (IP) address in accordance with border gateway protocol (BGP); while carrying out the routing in accordance with the border gateway protocol (BGP), at least one border gateway protocol (BGP) attribute associated with the at least one internet protocol (IP) address is noted. A firewall policy is applied to the packets from the at least one internet protocol (IP) address based on the at least one border gateway protocol (BGP) attribute associated with the at least one internet protocol (IP) address. Techniques may be implemented, for example, on a router or on a separate firewall device coupled to a router. | 2013-03-21 |
20130074175 | Methods, Systems, and Computer Program Products for Protecting Against IP Prefix Hijacking - A communication network is operated by identifying at least one potential hijack autonomous system (AS) that can be used to generate a corrupt routing path from a source AS to a destination AS. For each of the at least one potential hijack AS the following operations are performed: identifying at least one regional AS that is configured to adopt the corrupt routing path from the source AS to the destination AS and determining a reflector AS set such that, for each reflector AS in the set, a source AS to reflector AS routing path and a reflector AS to destination AS routing path do not comprise any of the at least one regional AS. A reflector AS is then identified that is common among the at least one reflector AS set responsive to performing the identifying and determining operations for each, of the at least one potential hijack AS. | 2013-03-21 |
20130074176 | CONFIDENTIAL COMMUNICATION METHOD USING VPN, SYSTEM THEREOF, PROGRAM THEREOF, AND RECORDING MEDIUM FOR THE PROGRAM - In a confidential-communication system that uses a first-communication network that is Internet capable of confidential communication using VPN, and a second communication network that is an audio-circuit network, a method is implemented wherein a send/receive-processing portion | 2013-03-21 |
20130074177 | ROUTING DEVICE HAVING INTEGRATED MPLS-AWARE FIREWALL - An MPLS-aware firewall allows firewall security policies to be applied to MPLS traffic. The firewall, which may be integrated within a routing device, can be configured into multiple virtual security systems. The routing device provides a user interface by which a user specifies one or more zones to be recognized by the integrated firewall when applying stateful firewall services to the packets. The user interface allows the user to define different zones and policies for different ones of the virtual security systems. In addition, the user interface supports a syntax that allows the user to define the zones for the firewall by specifying the customer VPNs as interfaces associated with the zones. The routing device generates mapping information for the integrated firewall to map the customer VPNs to specific MPLS labels for the MPLS tunnels carrying the customer's traffic. | 2013-03-21 |
20130074178 | PREVENTING ACCESS OF A HOST DEVICE TO MALICIOUS DATA IN A PORTABLE DEVICE - A storage device comprising a memory, a controller, and a host interface operative to connect with a host. The memory contains data locations that are controllable by a protection application which is executable on a host. When the host interface is operatively coupled to a host, data locations in the memory are accessible to an operating system of the host under permission from the protection application. The controller communicates with the protection application running on the host for allowing the protection application access to data locations in the memory. Upon a host request for access to a data location, the controller determines if permission to access the requested data location is acquired from the protection application. The permission is based on a determination by the protection application that the data location does not contain malicious data. | 2013-03-21 |
20130074179 | SINGLE SIGN-ON FOR REMOTE DESKTOPS - A mechanism is provided for automatically logging into a cloud based system that does not accept token log-on credentials generated by a single sign-on service. In an embodiment, a one-time password is automatically generated and persisted. The generated password is used to log in automatically to a cloud based system that does not accept tokens generated by the web-ID providers and for connecting to other services. Examples of such systems may include Windows, Linux, and iOS. | 2013-03-21 |
20130074180 | USER CERTIFICATION IN A STRUCTURE DESIGN, ANALYSIS, AND IMPLEMENTATION SYSTEM - A computer-implemented subsystem and method is disclosed for receiving user qualification data, comparing that data to certification criteria, and providing user certification according thereto, in the context of a system for designing a structure. A variety of users may be certified, including architects, designers, component and service providers, permitting authorities, builders, financers, future tenants, etc. A wide variety of certifications may be provided including by trade, by attributes of the structure, by intended use of the design system, etc. Certification may be based on general experience, references, time spent with the design system, training completed, examination passed, other certifications, etc. Certification may be stand-alone or may be part of an ongoing continuing education process. The design system may limit actions a user may perform on a design based on certification and certification level. Certified users may be connected with clients and other opportunities through the design system or otherwise. | 2013-03-21 |
20130074181 | Auto Migration of Services Within a Virtual Data Center - Techniques are provided herein for detecting that virtual data center services provided to one of at least two customers are being subjected to an attack, wherein the virtual data center services are provided to the least two customers using a same first set of physical servers via a first network element such as a physical access switch, and responsive to detecting that virtual data center services provided to the one of the at least two customers are being subjected to an attack (e.g., a virus or denial of service attack), the technique causes the virtual data center services provided to the one of the at least two customers to be migrated to, e.g., instantiated on, a second set of physical servers that is not accessible via the first network element. | 2013-03-21 |
20130074182 | INFORMATION PROCESSING APPARATUS AND CONTROL METHOD OF THE SAME - A device function to be used by an application is specified, a risk level of the specified device function is acquired, and a risk level of the application is calculated based on the acquired risk level of the device function. | 2013-03-21 |
20130074183 | METHOD AND APPARATUS FOR DEFENDING DISTRIBUTED DENIAL-OF-SERVICE (DDOS) ATTACK THROUGH ABNORMALLY TERMINATED SESSION - There are provided a method and apparatus for defending a Distributed Denial-of-Service (DDoS) attack through abnormally terminated sessions. The DDoS attack defending apparatus includes: a session tracing unit configured to parse collected packets, to extract header information from the collected packets, to trace one or more abnormally terminated sessions corresponding to one of pre-defined abnormally terminated session cases, based on the header information, and then to count the number of the abnormally terminated sessions; and an attack detector configured to compare the number of the abnormally terminated sessions to a predetermined threshold value, and to determine whether a DDoS attack has occurred, according to the results of the comparison. Therefore, it is possible to significantly reduce a false-positive rate of detection of a DDoS attack and the amount of computation for detection of a DDoS attack. | 2013-03-21 |
20130074184 | PACKET PROCESSING IN A MULTIPLE PROCESSOR SYSTEM - Packet processing is provided in a multiple processor system including a first processor to processing a packet and to create a tag associated with the packet. The tag includes information about the processing of the packet. A second processor receives the packet subsequent to the first processor and processes the packet using the tag information. | 2013-03-21 |
20130074185 | Providing a Network-Accessible Malware Analysis - In certain embodiments, a computer-implemented method comprises receiving, via a computer network and from a first computer system, a first malware analysis request. The first malware analysis request comprises a file to be analyzed for malware by a malware analysis system. The method includes initiating a malware analysis by the malware analysis system of the first file for malware. The method includes communicating to the first computer system a response for the first file determined by the malware analysis system to the first computer system. The response comprises an indication of whether the first file comprises malware. | 2013-03-21 |
20130074186 | DEVICE-TAILORED WHITELISTS - A particular set of attributes of a particular computing device is identified. A first plurality of whitelisted objects is identified in a global whitelist corresponding to the particular set of attributes. A particular whitelist is generated to include the identified set of whitelisted objects, the particular whitelist tailored to the particular computing device. In some aspects, device-tailored updates to the particular whitelist are also generated. | 2013-03-21 |
20130074187 | HACKER VIRUS SECURITY-INTEGRATED CONTROL DEVICE - A hacker virus security-integrated control device separately operated by implementing existing security programs for viruses, malicious spyware and cloaker programs as an embedded device that is integrated hardware. The hacker virus security-integrated control device can protect computers and external storage devices from malicious programs that may infect data transmitted from Internet, data transmitted between the computers and data in the external storage devices by implementing, as integrated hardware, a protection and disinfection program for various malicious programs, a protection and disinfection program for spyware, a defense programs for cloaker's intrusion and a program for actively coping with new malicious programs, etc., so as to defend intrusion of existing malicious programs and perform disinfection on the existing malicious program, to actively cope with newly generated malicious programs, to defend cloakers' malicious access to the computers, and to warn the cloakers of their malicious actions. | 2013-03-21 |
20130074188 | METHODS AND SYSTEMS FOR IMPROVED RISK SCORING OF VULNERABILITIES - A security tool can identify vulnerabilities in a computing system and determine a risk level of the vulnerabilities based on base and optional CVSS vectors and additional factors that represent the evolving nature of vulnerabilities. Likewise, the security tool can determine an overall risk for vulnerabilities, an asset, and/or a collection of assets that encompasses a global view of an asset's risk and/or collection of assets' risk, business considerations of an entity that own and controls the asset and/or the collection of assets, and the entity's associations. | 2013-03-21 |
20130074189 | SOFTWARE LICENSE RECONCILIATION WITHIN A CLOUD COMPUTING INFRASTRUCTURE - A method, system, and computer program product for managing software program installations in a cloud computing environment. An example method includes calculating, by a computer processor, a maximum number of software licenses that could be required according to a software license rule from a software license agreement to run a set of software program instances on a set of servers configured as a computing cloud. Each software program instance is an installation of the software program on a different logical partition, and at least two of the servers from the set of servers are capable of requiring a different number of software licenses according to the software license rule. The method also includes determining if the maximum number of software licenses exceeds an allowed number of software licenses granted in the software license agreement. | 2013-03-21 |
20130074190 | APPARATUS AND METHOD FOR PROVIDING SECURITY FUNCTIONS IN COMPUTING SYSTEM - An apparatus for providing security functions in a computing system includes: at least one normal service domain executing service; a secure service domain performing integrity verification on a service execution environment of at least one normal service domain, and performing the security service function for the service in accordance with the result of the integrity verification; and a virtual machine monitor separating service execution environments of at least one normal service domain and the secure service domain, respectively, based on the same hardware device. According to the present invention, it is possible to enhance the security for execution environments of the computing system and the data stored in the system, by allowing the corresponding services, which need security service functions in the normal service domain, to be executed necessarily only when integrity verification of the execution environment succeeds by linking the secure service domain. | 2013-03-21 |
20130074191 | METHOD FOR CONTROLLING CONTENT UPLOADED TO A PUBLIC CONTENT SITE - A method allowing members of an organization to share content on a public content site without violating the organization's security policy. Instead of sharing an original content at a public content site in violation of the security policy, the originator shares a shared content which is included in a document provided at the public content site. The receiver's client transforms the document received from the public content site and replaces the shared content with a representation of the original content. | 2013-03-21 |
20130074192 | DATA SECURITY IN A MULTI-NODAL ENVIRONMENT - A data security manager in a multi-nodal environment enforces processing constraints stored as security relationships that control how different pieces of a multi-nodal application (called execution units) are allowed to execute to insure data security. The security manager preferably checks the security relationships for security violations when new execution units start execution, when data moves to or from an execution unit, and when an execution unit requests external services. Where the security manager determines there is a security violation based on the security relationships, the security manager may move, delay or kill an execution unit to maintain data security. | 2013-03-21 |
20130074193 | METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR EXCEPTION HANDLING - Methods, apparatuses, and computer program products are provided for exception handling. A method may include detecting attempted performance of a prohibited action involving protected data. The method may further include determining based at least in part on a role associated with a user associated with the prohibited action whether the user has elevated rights permitting performance of the prohibited action. The method may additionally include permitting an exception allowing performance of the prohibited action only in an instance in which it is determined that the user does have elevated rights permitting performance of the prohibited action. The method may also include prohibiting performance of the prohibited action in an instance in which it is determined that the user does not have elevated rights permitting performance of the prohibited action. Corresponding apparatuses and computer program products are also provided. | 2013-03-21 |
20130074194 | METHODS AND SYSTEMS FOR INCREASING THE SECURITY OF ELECTRONIC MESSAGES - A method for generating e-mail messages with increased security includes receiving an e-mail message at a control system. The e-mail message has recipients, a security level, control attributes, and e-mail message contents. Moreover, the method includes verifying the recipients at the control system, and storing the recipients, security level, control attributes, and e-mail message contents in the control system when each of the recipients is verified. Furthermore, the method includes generating modified e-mail messages from the e-mail message, transmitting each of the modified e-mail messages to a respective recipient, and capturing authentication data from one of the recipients when the one recipient indicates a desire to view the e-mail message contents with a communications device operated by the one recipient. When the one recipient is successfully authenticated, the method includes permitting the one recipient to view the e-mail message contents in accordance with the control attributes. | 2013-03-21 |
20130074195 | METHODS AND SYSTEMS FOR INCREASING THE SECURITY OF ELECTRONIC MESSAGES - A method for accessing e-mail messages from a control system includes requesting access to e-mail message contents of a user stored in the control system, determining whether the user is enrolled in and activated by the control system, and authenticating the user when the user is enrolled in and activated by the control system. Moreover, the method includes permitting the user to view a list of e-mail messages when the user is successfully authenticated. The e-mail messages included in the list are associated with the user. Furthermore, the method includes permitting the user to access the contents of e-mail messages in the list having a security level equal to or less than a security level associated with the successful authentication. | 2013-03-21 |
20130074196 | Signature Methods For Scientific Data Information Systems - A computer-implemented method that includes providing an authorized user with an option to define one more levels of a signature method, and providing the authorized user with an option to assign at least one user whose signature is required for each of the defined levels. | 2013-03-21 |
20130074197 | RIGHTS MANAGED DISTRIBUTABLE SOFTWARE - A method of distributing rights-managed software makes use of binary portable application components and associated rights components. The application component includes un-encrypted execution code which causes the application component to execute in a restricted mode if either the rights component is missing or if the rights component determines that the relevant licensing conditions are not satisfied. Such an approach allows application components such as games for mobile phones to be distributed freely between users, and to be available for immediate use in a restricted mode without any need for the recipient to contact the rights issuer. | 2013-03-21 |
20130074198 | METHODS AND SYSTEMS TO FINGERPRINT TEXTUAL INFORMATION USING WORD RUNS - The present invention provides methods and systems to enable fast, efficient, and scalable means for fingerprinting textual information using word runs. The present system receives textual information and provides algorithms to convert the information into representative fingerprints. In one embodiment, the fingerprints are recorded in a repository to maintain a database of an organization's secure data. In another embodiment, textual information entered by a user is verified against the repository of fingerprints to prevent unauthorized disclosure of secure data. This invention provides approaches to allow derivative works (e.g., different ordering of words, substitution of words with synonyms, etc.) of the original information to be detected at the sentence level or even at the paragraph level. This invention also provides methods and systems for enhancing storage and resource efficiencies by providing approaches to optimize the number of fingerprints generated for the textual information. | 2013-03-21 |
20130074199 | Compositions and Methods for Brown Fat Induction and Activity Using FNDC5 - The invention provides compositions and methods for brown fat induction and activity through modulation of Fndc5 activity and/or expression. Also provided are methods for preventing or treating metabolic disorders in a subject through modulation of Fndc5 activity and/or expression. Further provided are methods for identifying compounds that are capable of modulating Fndc5 activity and/or expression. | 2013-03-21 |
20130074200 | INBRED C57BL/6 ES CELLS WITH HIGH DEVELOPMENTAL CAPACITY - Described herein are inbred B6 ES cell lines that exhibit high developmental capacities and have a number of advantages over ES cell lines already available. First, they can be used for gene targeting and have a high percentage of germline transmission when injected into diploid host blastocysts (˜50-80%). Second, these ES cell lines can successfully be used to generate live pups by tetraploid blastocyst complementation, producing a high percentage (15-20%) of mice that are entirely inbred B6 ES cell derived. Third, these ES cells lines can be used to rapidly generate mice that are homozygous for a gene of interest. These advantages indicate that the inbred B6 ES cells provided here facilitate the rapid generation of inbred B6 mouse models in a cost-effective and efficient manner. | 2013-03-21 |
20130074201 | CANCER-SPECIFIC GENETIC REARRANGEMENTS - The present invention relates to the field of cancer. More specifically, the present invention provides compositions and methods useful for treating cancer characterized by the expression of mutant FAM190A proteins. In a specific embodiment, a method for treating a patient having a cancer characterized by a FAM190A intragenic rearrangement comprises the step of administering to the patient an agent that inhibits a biological function or reduces the level or expression of the FAM190A protein. | 2013-03-21 |
20130074202 | GENE SEQUENCES AND USES THEREOF IN PLANTS - This invention provides transgenic plant cells with recombinant DNA for expression of proteins that are useful for imparting enhanced agronomic trait(s) to transgenic crop plants. This invention also provides transgenic plants and progeny seed comprising the transgenic plant cells where the plants are selected for having an enhanced trait selected from the group of traits consisting of enhanced water use efficiency, enhanced cold tolerance, increased yield, enhanced nitrogen use efficiency, enhanced seed protein and enhanced seed oil. Also disclosed are methods for manufacturing transgenic seed and plants with enhanced traits. | 2013-03-21 |
20130074203 | CUCUMBER VARIETY NUN 5545 CUP - The invention relates to the field of | 2013-03-21 |
20130074204 | HIGH LYCOPENE CONTENT TOMATO PLANTS AND MARKERS FOR USE IN BREEDING FOR SAME - plants which are exceptionally high in fruit lycopene content (˜300-390 μg lycopene/g fresh fruit) are disclosed herein, which may be used in plant breeding to make the tomato plants of the present invention. The invention also discloses genetic markers, which are associated with the trait which may be used in marker-assisted selection for development of plants, lines, or varieties with the trait. | 2013-03-21 |
20130074205 | TRANSGENIC PLANTS WITH ENHANCED AGRONOMIC TRAITS - This invention provides transgenic plant cells with recombinant DNA for expression of proteins that are useful for imparting enhanced agronomic trait(s) to transgenic crop plants. This invention also provides transgenic plants and progeny seed comprising the transgenic plant cells where the plants are selected for having an enhanced trait selected from the group of traits consisting of enhanced water use efficiency, enhanced cold tolerance, increased yield, enhanced nitrogen use efficiency, enhanced seed protein and enhanced seed oil. Also disclosed are methods for manufacturing transgenic seed and plants with enhanced traits. | 2013-03-21 |
20130074206 | SOYBEAN CULTIVAR S090160 - A soybean cultivar designated S090160 is disclosed. The invention relates to the seeds of soybean cultivar S090160, to the plants of soybean cultivar S090160, to the plant parts of soybean cultivar S090160, and to methods for producing progeny of soybean cultivar S090160. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S090160. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S090160, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S090160 with another soybean cultivar. | 2013-03-21 |
20130074207 | SOYBEAN CULTIVAR S100289 - A soybean cultivar designated S100289 is disclosed. The invention relates to the seeds of soybean cultivar S100289, to the plants of soybean cultivar S100289, to the plant parts of soybean cultivar S100289, and to methods for producing progeny of soybean cultivar S100289. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S100289. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S100289, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S100289 with another soybean cultivar. | 2013-03-21 |
20130074208 | SOYBEAN CULTIVAR 94L71 - A soybean cultivar designated 94L71 is disclosed. The invention relates to the seeds of soybean cultivar 94L71, to the plants of soybean cultivar 94L71, to the plant parts of soybean cultivar 94L71, and to methods for producing progeny of soybean cultivar 94L71. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar 94L71. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar 94L71, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar 94L71 with another soybean cultivar. | 2013-03-21 |
20130074209 | SOYBEAN CULTIVAR S100211 - A soybean cultivar designated S100211 is disclosed. The invention relates to the seeds of soybean cultivar S100211, to the plants of soybean cultivar S100211, to the plant parts of soybean cultivar S100211, and to methods for producing progeny of soybean cultivar S100211. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S100211. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S100211, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S100211 with another soybean cultivar. | 2013-03-21 |
20130074210 | SOYBEAN CULTIVAR S100277 - A soybean cultivar designated S100277 is disclosed. The invention relates to the seeds of soybean cultivar S100277, to the plants of soybean cultivar S100277, to the plant parts of soybean cultivar S100277, and to methods for producing progeny of soybean cultivar S100277. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S100277. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S100277, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S100277 with another soybean cultivar. | 2013-03-21 |
20130074211 | SOYBEAN CULTIVAR CL0911610 - The present invention is in the field of soybean variety CL0911610 breeding and development. The present invention particularly relates to the soybean variety CL0911610 and its progeny, and methods of making CL0911610. | 2013-03-21 |
20130074212 | SOYBEAN CULTIVAR CL1013663 - The present invention is in the field of soybean variety CL1013663 breeding and development. The present invention particularly relates to the soybean variety CL1013663 and its progeny, and methods of making CL1013663. | 2013-03-21 |
20130074213 | METHODS FOR PRODUCING HYBRID SEED - This invention provides methods for producing a non-natural hybrid seed. Also disclosed are specific miRNAs and miRNA recognition sites useful for conferring inducible sterility on a crop plant, and recombinant DNA construct including such exogenous miRNA recognition sites. | 2013-03-21 |
20130074214 | Nitrogen Responsive Early Nodulin Gene - Isolated nucleic acids and proteins and plants expressing the same for improved nitrogen utilization, increased yield, and increased stress tolerance. | 2013-03-21 |
20130074215 | MODULATION OF GALACTOMANNAN CONTENT IN COFFEE - Disclosed herein are nucleic acid molecules isolated from coffee ( | 2013-03-21 |
20130074216 | TOMATO CATECHOL-O-METHYLTRANSFERASE SEQUENCES AND METHODS OF USE - The present disclosure provides isolated DNA molecules encoding tomato O-methyltransferases (OMT); tomato OMT proteins; OMT antisense molecules; vectors, plant cells and plants including tomato OMT DNA molecules or OMT antisense molecules; genetic markers for tomato OMT genes; and methods of increasing or decreasing the amount of guaiacol produced by a plant. | 2013-03-21 |
20130074217 | TRANSGENIC SOYBEAN PLANTS EXHIBITING IMPROVED INNATE IMMUNITY - This disclosure provides for compositions and methods to increase the innate immunity of soybean plants. | 2013-03-21 |
20130074218 | METHOD FOR OPTIMISING GENE EXPRESSION USING SYNONYMOUS CODON OPTIMISATION - The present invention discloses a method for modulating the quality of a selected phenotype that is displayed by an organism or part thereof and that results from the expression of a polypeptide-encoding polynucleotide by replacing at least one codon of that polynucleotide with a synonymous codon that has a higher or lower preference of usage by the organism or part thereof to produce the selected phenotype than the codon it replaces. The present invention is also directed to the use of a codon-modified polynucleotide so constructed for modulating the quality of a selected phenotype displayed by an organism or part thereof. | 2013-03-21 |
20130074219 | PROMOTERS AND METHODS THEREOF - A promoter, which may be used to transform a plant and/or express a gene substantially uniformly in substantially all organs and/or tissues of a plant, and which may include a constitutive expression promoter for transforming a monocot plant. A vector including a promoter, which may include a recombinant plant expression vector. A method of producing a target protein using a vector, and a method of producing a transformed cell and/or plant using a vector. A transformed plant, a transformed seed and a transformed cell are included, which may be formed by the method of producing the same using a vector. | 2013-03-21 |
20130074220 | METHOD FOR PRODUCING GENETICALLY MODIFIED PLANT CELL - It has been found that the use of a plant cell in which a function of a protein involved in repair by nonhomologous end joining is artificially suppressed dramatically increases the efficiency of introductions of non-silent mutations in a repairing process by nonhomologous end joining which occurs after induction of a DNA double-strand break with a zinc finger nuclease. | 2013-03-21 |
20130074221 | AUTOLUMINESCENT PLANTS INCLUDING THE BACTERIAL LUX OPERON AND METHODS OF MAKING SAME - In one aspect, the invention relates to a transgenic autoluminescent plant including an expressible heterologous nucleotide sequence comprising a bacterial LUX operon, which includes LUX A. LUX B. LUX C. LUX D. LUX b. And LUX G genes, wherein the heterologous nucleotide sequence is expressed to render the plant autonomously luminescent. | 2013-03-21 |
20130074222 | PRECISE BREEDING - The present invention relates to a method for identifying and isolating native plant nucleic acid sequences that may function as T-DNAs or T-DNA border-like sequences, effecting the transfer of one polynucleotide into another polynucleotide. The present invention also provides a modified tuber, such as a genetically modified mature tuber, that comprises at least one trait that is not exhibited by a non-modified tuber of the same species. | 2013-03-21 |
20130074223 | RESISTANCE TO POST HARVEST DETERIORATION IN CUCUMBER - The invention relates to a cucumber ( | 2013-03-21 |
20130074224 | Soybean Transgenic Event MON87705 and Methods for Detection Thereof - The present invention provides a transgenic soybean event MON87705, and cells, seeds, and plants comprising DNA diagnostic for the soybean event. The invention also provides compositions comprising nucleotide sequences that are diagnostic for said soybean event in a sample, methods for detecting the presence of said soybean event nucleotide sequences in a sample, probes and primers for use in detecting nucleotide sequences that are diagnostic for the presence of said soybean event in a sample, growing the seeds of such soybean event into soybean plants, and breeding to produce soybean plants comprising DNA diagnostic for the soybean event. | 2013-03-21 |
20130074225 | Apple Tree Named 'PremA96' - A new and distinct apple tree named ‘PremA96’ is disclosed. The new apple is notable for its attractive appearance, superb texture, improved flavor and long shelf life. | 2013-03-21 |
20130074226 | Nectarine Tree Named 'NJN101' - A new and distinct nectarine variety of | 2013-03-21 |
20130074227 | Peach Tree Named 'NJ354' - A new and distinct peach variety of | 2013-03-21 |
20130074228 | Peach Tree Named 'NJ355' - A new and distinct peach variety of | 2013-03-21 |
20130074229 | Peach Tree Named 'NJ356' - A new and distinct peach variety of | 2013-03-21 |
20130074230 | Avocado variety named 'Uzi' - A new and distinct | 2013-03-21 |
20130074231 | Avocado rootstock named 'Zentmyer' - A new and distinct variety of | 2013-03-21 |
20130074232 | Avocado rootstock named 'Steddom' - A new and distinct | 2013-03-21 |
20130074233 | Echeveria plant named 'Red Velvet' - A plant variety of the | 2013-03-21 |
20130074234 | Leucanthemum plant named "Bridal Bouquet' - A new and distinct | 2013-03-21 |
20130074235 | Ornithogalum plant named 'Lourdes' - A new and distinct cultivar of | 2013-03-21 |
20130074236 | Echinacea plant named 'Leilani' - A new and distinct | 2013-03-21 |
20130074237 | Gaillardia plant named 'DGAL906' - A new and distinct | 2013-03-21 |
20130074238 | Gaillardia plant named 'TNSF' - A new and distinct | 2013-03-21 |