Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


18th week of 2014 patent applcation highlights part 76
Patent application numberTitlePublished
20140123256System and Method for Human Identity Validation via a Mobile Device - Method for establishing and maintaining a person's identity starts at the time the person registers with the system using a mobile device to validate the identity of a person in an inherently anonymous computing environment such as the internet or any other distributed network where face to face communication is not possible. The person will provide information required to establish the person's identity with an authenticator. The authenticator then submits that information to the system administration service to be validated by external databases and services. The external service provides a set of challenge/response questions unique to that person to establish positive identification. Upon successful authentication of the person's identity, the person and their device will be associated with each other and recorded in the system. Each authentication service will define a criterion, labeled as a schema, by which authentication events will be governed.2014-05-01
20140123257COMMUNICATING STATE INFORMATION TO LEGACY CLIENTS USING LEGACY PROTOCOLS - When a user account is in an alternate (fault) state, communication or sync between an application provider and a device or client application typically is interrupted. When parties do not support rich fault messaging, communication of the reason for the interruption and remediation steps has been impossible. An application server provides rich fault messaging using applications that do not provide explicit error messaging and protocols that do not provide explicit error messaging without changing either the application or the protocol by additional interactions between an identity provider and the application server. The application server uses authentication state information provided by the identity server to generate a notification sync event that appears to the application and the protocol to be a normal sync event. The notification sync event is used to provide the user with information needed to determine what the problem with the account is and how to fix it.2014-05-01
20140123258DEVICE AND METHOD FOR AUTHENTICATING A USER - Certain aspects of a device and method for authenticating a user are disclosed. The device may display a first set of images and receive a user input. The received user input may comprise a set of gestures and a selection of a plurality of images from the first set of images in a pre-determined sequence. The selected plurality of images may be modified based on the set of gestures. The device compares the modified selected plurality of images with a second set of pre-stored images. The device may authenticate the user based on the comparison.2014-05-01
20140123259System and Method for Providing Access to a Software Application - System and method configured to provide an access management system configuration that provides the benefits of single sign-on while reducing internal hardware and administration maintenance costs. The system is reconfigured to provide an access control module that directs authentication network traffic such that access management agents are not required to be installed on the application server for each protected application. The system provides a redirection of a login request from the application server to an external security gateway that authenticates the user via policy and sends authenticated user credentials on a back channel to the access control module to obtain a session cookie which is redirected back to the user so the user can establish a session with the application. The solution reduces the plethora of agents to be maintained and upgraded in order to remain compatible with the evolving hosting software, reducing both hardware and administration maintenance costs.2014-05-01
20140123260TERMINAL EQUIPMENT, SERVER, METHOD OF CONTROLLING TERMINAL EQUIPMENT, AND METHOD OF CONTROLLING SERVER - A terminal, a server, a method of controlling the terminal, and a method of controlling the server are provided. The terminal includes a communication unit which communicates with a server storing a file uploaded by a second terminal, a photographing unit which captures an image of a user of the terminal, and a controller which controls the communication unit to receive client information for client authentication from the server, authenticate a client on the basis of a facial image included in the client information and the image of the user captured by the photographing unit, and receive the uploaded file according to the authentication result when the terminal accesses the server with the same account as the second terminal.2014-05-01
20140123261SYSTEM AND METHOD FOR AUTHENTICATION OF COMMUNICATIONS - A method whereby a communication can be readily determined to be from an authorized sender or, conversely, identified as being from an imposter, wherein a digital token is created according to a set of at least two rules known to the creator and intended recipient of the communication, further wherein the digital token comprises a recognizable factor such as an image, word, or audio segment, and a system comprising means for implementing the method of the disclosure; wherein fraudulent messages may readily be identified by recognizing whether or not the digital token associated with the message complies with one or more pre-determined rules, even if the system presenting the message is unaware of the rules or even of the authentication process as a whole.2014-05-01
20140123262INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, AND METHOD - An information processing system and an information processing apparatus and method for transmitting image data from a portable terminal apparatus, to a different apparatus through a network so that the image data may be managed by the different apparatus. A camcorder image station has a folder for each user of a camcorder and has, in each of the folders, 10 sub folders of album 1 to album 10 to each of which a name is applied in advance. The user of the camcorder transmits images picked up by the user to the camcorder image station so that the images are registered into a predetermined album. The camcorder has an album list of 10 albums of album 1 to album 10 in advance and selects an album of one of the names from within the list to designate an album into which image data should be uploaded.2014-05-01
20140123263COMPUTER-IMPLEMENTED METHOD FOR MOBILE AUTHENTICATION AND CORRESPONDING COMPUTER SYSTEM - In one embodiment of the present invention a computerized method includes receiving at a personal-mobile device a first communication, which includes information for requesting user verification for logging into an account of a user, via a computing device. The account is with a service provided by an application server. The method includes starting a personal-authentication application on the personal-mobile device in response to receiving the first communication, and receiving in the personal-authentication application a user verification for confirming logging into the account. The method includes logging into the account via the computing device based on receipt of the user verification. Embodiments of the present invention provide enhanced security for logging into an account that a user may have with a service by providing that a personal-mobile device, such as a mobile telephone, which is personal to a user, is configured as a security token for login to the account.2014-05-01
20140123264DOMAIN BASED AUTHENTICATION SCHEME - In one example, a system for authenticating domains operates by authenticating a first domain and the extensions that make up the URI of an initial or primary Internet network call. Thereafter, the system can enable the owner of the first domain to make assertions or statements about additional domains and URIs that make up the rest of the web page, session or application.2014-05-01
20140123265Single Sign-On Access in an Orchestration Framework for Connected Devices - Aspects described herein allow multiple devices to function as a coherent whole, allowing each device to take on distinct functions that are complementary to one another. Aspects described herein also allow the devices function as a coherent whole when interconnected devices and their respective applications are configured to operate in various operation modes, when management policies are employed to control the operation of the interconnected devices and their respective applications, when transferring content between the interconnected devices and storing the content at those devices, when obtaining access credentials for the interconnected devices that enable the devices to access enterprise resources, when a policy agent applies management policies to control operation of and interaction between the interconnected devices, and when the interconnected devices are used to access an enterprise application store.2014-05-01
20140123266INCOMING REDIRECTION MECHANISM ON A REVERSE PROXY - A system is provided for filtering packets. The system includes: a filter for determining, by applying a set of at least one filtering rule, whether a packet is permitted to be routed towards a receiving entity. The system includes a verification element for verifying validity of an authentication token included in a request received by the filtering system and adds, to the set, after receiving an initial request, a so-called top-level filtering rule, permitting the routing, towards the verification element, of at least one packet received via a predetermined communication port of the device, in which the source address is identical to the source address of the initial request, regardless of the source communication port of the subsequent request. A routing element routes a subsequent request including a valid authentication token towards a receiving entity of the subsequent request.2014-05-01
20140123267METHOD AND SYSTEM FOR TCP TURN OPERATION BEHIND A RESTRICTIVE FIREWALL - A method at a computing client located behind a NAT and restrictive-access firewall, including establishing a control connection with a TCP TURN server utilizing a port capable of traversing the restrictive-access firewall; requesting an allocation of an client service identity from the TCP TURN server; and receiving, from the TCP TURN server, a response containing the client service identity, the client service identity being independent of any port used to communicate with the TCP TURN server. Further a method at a TCP TURN server, including listening on a first port for communications from a computing client, the computing client being behind a restrictive access firewall and the first port capable of traversing the restrictive-access firewall; establishing a control connection with the client on the first port; receiving a request for an allocation of an client service identity from the computing client; and sending a response containing the client service identity.2014-05-01
20140123268SECURE CONNECTION FOR A REMOTE DEVICE THROUGH A MOBILE APPLICATION - Virtual machines in a network may be isolated by encrypting transmissions between the virtual machines with keys possessed only by an intended recipient. Within a network, the virtual machines may be logically organized into a number of community-of-interest (COI) groups. Each COI may use an encryption key to secure communications within the COI, such that only other virtual machines in the COI may decrypt the message. Remote devices may gain access to virtual machines in a network through a virtual device relay. The virtual device relay receives data from the remote device, such as a tablet or cellular phone, and forwards the data to one of the virtual machines, when the virtual device relay shares a COI with the destination virtual machine.2014-05-01
20140123269FILTERING OF APPLICATIONS FOR ACCESS TO AN ENTERPRISE NETWORK - A computer-readable storage medium has embedded thereon non-transient computer-readable code for controlling access to a protected computer network, by intercepting packets that are being exchanged between a computer system and the protected network, and then, for each intercepted packet, identifying the associated application that is running on the computer system, determining whether the application is trusted, for example according to a white list or according to a black list, and disposing of the packet accordingly.2014-05-01
20140123270METHOD FOR VIRTUAL PRIVATE CLOUD TO ACCESS NETWORK, NETWORK SIDE DEVICE AND DATA CENTER DEVICE - The present invention provides a method for a virtual private cloud to access a network, a network side device and a data center device. When receiving a VPC configuration resource provided by a user, the network side device and the data center device exchange information, create a VPC, determine a PE interface address, a VCE uplink port address, an access tunnel and a VCE downlink port address for the VPC, and perform a corresponding configuration operation, thereby enabling the VPC to access a VPN in a basic bearer network without the need of uniform management of a control system, so as to solve a problem that the VPC cannot access the network when the basic bearer network and a data center belong to different operators, and meanwhile, save a device resource.2014-05-01
20140123271IMAGE PROCESSING APPARATUS, ACCESS CONTROL METHOD, AND STORAGE MEDIUM - An image processing apparatus includes a request determining unit receiving an operation event indicating a request to use an image processing function and determining whether the request is from a guest user based on the received operation event; a guest login processing unit generating guest login information including a guest user identifier and access right information of the guest user if the request is from the guest user and sending a login request to request a login process for the guest user based on the guest login information; an access control unit disabling access control on the image processing function in response to the login request based on the access right information in the guest login information; and a usage history recording unit recording a usage history of the image processing function in association with the guest user based on the guest user identifier in the guest login information.2014-05-01
20140123272System and Method For Accessing A Restricted Object - A system and method wherein an intermediary process provides access to a restricted object associated with a source process on behalf of a destination process. The intermediary process may be a trusted process that is available as a service to other processes on the computing platform. The intermediary process may assume one or more privileges associated with the source process whereby the restricted object may be accessed by the intermediary process on behalf of the destination process. Secure access to the restricted object and the risk of malicious exploitation are mitigated since the intermediary process is a trusted service that is known to provide specific functionality.2014-05-01
20140123273Contextual Device Locking/Unlocking - Particular embodiments of a computing device associated with a user may detect an event using a sensor of the computing device. The event may be a lock-triggering event or an unlock-triggering event. The computing device may assess a state of the device. The computing device may also access further information associated with the user. The computing device may also monitor activity on the computing device to detect further events if such further monitoring is warranted. Based on the gathered information, the computing device may update a lock status of the device to lock or unlock access interfaces of the computing device, functionality of the computing device, or content accessible from the computing device. If the event comprised the computing device detecting an attempt by a third party to use the device, the device may attempt to identify the third party to determine if they are authorized to use the device.2014-05-01
20140123274Password Setting and Verification - Methods and systems for setting and verifying a password in a password protected device. Setting a password includes receiving a configuration password entered via a keyboard, wherein the configuration password includes position information of at least one key on the keyboard, and symbol information of at least one key on the keyboard, and storing the configuration password. Verifying a password includes receiving an entered password on the keyboard, obtaining a stored configuration password, wherein the configuration password includes position information of at least one key on the keyboard and symbol information of at least one key on the keyboard, and verifying the entered password based on the configuration password. The keyboard may be a randomly arranged keyboard. Even if nearby persons can see the selection of symbols displayed on the keys for a password, they cannot determine the real content of the password, and thus cannot access the password-protected device.2014-05-01
20140123275SYSTEM AND METHOD FOR DISABLING SECURE ACCESS TO AN ELECTRONIC DEVICE USING DETECTION OF A PREDETERMINED DEVICE ORIENTATION - A system and method for providing secure authorization to an electronic device by combining two or more security features of authentication processed at substantially the same time where at least one of the factors is a “tolerant” factor. By combining two factors such as facial recognition and a screen gesture, these can be analyzed at substantially the same time except when a device is oriented in a predetermined position or a unique or individualized motion is detected.2014-05-01
20140123276AUTOMATION SYSTEM ACCESS CONTROL SYSTEM AND METHOD - An improved system and method for controlling access of components to industrial automation system resources by reference to the various operational states of the industrial automation system. A central access control system includes a processing circuitry, interface circuitry configured to receive information pertaining to the operational state of an automation system, memory circuitry, and a display and user interface. In operation, access to automation components are either allowed or denied based on the designation of an operational state of an automation system.2014-05-01
20140123277MOBILE TERMINAL APPARATUS, NON-TRANSITORY COMPUTER READABLE MEDIUMS, SIGNAL PROCESSING METHOD, DOCUMENT STORAGE SERVER, AND DOCUMENT MANAGEMENT SYSTEM - A mobile terminal apparatus includes a detection unit, a transmission unit, an acquisition unit, and a permission unit. The detection unit detects current position information at a predetermined timing. The transmission unit transmits the current position information, user information that specifies a user, and file specification information that specifies a file that is to be acquired. The acquisition unit acquires a limited-access file, which includes the file and access permission area information that defines an area from which the mobile terminal apparatus is allowed to access the file in accordance with the current position information, in a case where the user is a registered user with a right to download the file. The permission unit gives permission to access the file in a case where accessing of the file is commanded and a position specified by the current position information is included in the area.2014-05-01
20140123278DENIAL-OF-SERVICE ATTACK PROTECTION - In one embodiment, a device detects a denial-of-service attack and generates a message in response to the detection of the denial-of-service attack. The message is then virally distributed to a plurality of subscribed devices.2014-05-01
20140123279DYNAMIC QUARANTINING FOR MALWARE DETECTION - A method includes detecting a portion of data on an electronic device, determining a first representation of the malware status of the data, quarantining the data for a period of time, estimating whether the data is associated with malware by comparing the first and second representation, and, based on the estimation, releasing the data from quarantine. The first representation indicates that the malware status of the data is not certain to be safe and the malware status of the data is not certain to be malicious.2014-05-01
20140123280RUNTIME DETECTION OF SELF-REPLICATING MALWARE - A method for detecting malicious active processes and self replicating executable binary files on a computing device. The method comprises monitoring in runtime active processes running on a computing device, extracting unique identifier(s) of each of the active processes which maps the active process to executable binary file(s) containing executable code of the active process, monitoring in runtime creation and modification of data files hosted by the computing device, identifying executable binary files among the data files, monitoring concurrent operation of logical sensors which detect malicious behavioral patterns of the active processes and maintain one or more lists of malicious behavioral pattern findings, and detecting malicious active process(es) of a malware from the active processes and self-replicating executable binary file(s) of the malicious active process(es) according to a match between the respective unique identifier(s), the malicious behavioral pattern findings and at least one the executable binary files.2014-05-01
20140123281DETECTION OF RETURN ORIENTED PROGRAMMING ATTACKS - In one embodiment, a processor includes at least one execution unit and Return Oriented Programming (ROP) detection logic. The ROP detection logic may determine a ROP metric based on a plurality of control transfer events. The ROP detection logic may also determine whether the ROP metric exceeds a threshold. The ROP detection logic may also, in response to a determination that the ROP metric exceeds the threshold, provide a ROP attack notification.2014-05-01
20140123282UNPACKING FLASH EXPLOITS WITH AN ACTIONSCRIPT EMULATOR - Methods and systems for detecting an attempt to load embedded Flash are provided. According to one embodiment, an ActionScript emulator running on a computer system receives a Flash file to be tested. The ActionScript emulator implements a modified version of a class typically implemented by an ActionScript virtual machine. The ActionScript emulator reveals one or more tagged data blocks (tags) contained within the Flash file by decoding the Flash file. The ActionScript emulator determines whether the one or more tags are capable of containing ActionScript bytecode (ABC) by evaluating the one or more tags. When an affirmative determination results with respect to a tag of the one or more tags, then the ActionScript emulator interprets and executes the ABC associated with the tag. Responsive to invocation of a predetermined method of the modified class by the ABC, the ActionScript emulator reports existence of embedded Flash within the Flash file.2014-05-01
20140123283DETECTION OF HEAP SPRAYING BY FLASH WITH AN ACTIONSCRIPT EMULATOR - Methods and systems for detecting heap spraying by ActionScript bytecode (ABC) contained within a Flash file are provided. According to one embodiment, an ActionScript emulator receives a Flash file to be tested. The emulator implements a modified version of a class typically implemented by an ActionScript virtual machine. The emulator reveals one or more tagged data blocks (tags) contained within the Flash file by decoding the Flash file. The emulator determines whether the one or more tags are capable of containing ABC by evaluating the one or more tags. When an affirmative determination results with respect to a tag of the one or more tags, then the emulator interprets and executes the ABC associated with the tag. Responsive to observing one or more predetermined conditions by a detector implemented within a predetermined method of the modified class, the emulator reports existence of heap spraying functionality within the Flash file.2014-05-01
20140123284UNPACKING JAVASCRIPT WITH AN ACTIONSCRIPT EMULATOR - Methods and systems for detecting an attempt to evaluate embedded JavaScript are provided. According to one embodiment, an ActionScript emulator receives a Flash file to be tested. The emulator implements a modified version of a class typically implemented by a Flash file container. The emulator reveals one or more tagged data blocks (tags) contained within the Flash file by decoding the Flash file. The emulator determines whether the one or more tags are capable of containing ActionScript bytecode (ABC) by evaluating the one or more tags. When an affirmative determination results with respect to a tag of the one or more tags, then the emulator interprets and executes the ABC associated with the tag. Responsive to invocation of a predetermined method of the modified version of the class by the ABC and meeting one or more predetermined conditions, the emulator reports existence of embedded JavaScript within the Flash file.2014-05-01
20140123285SOFTWARE EXPLOIT DETECTION - A method may include, in a computing device including a processor, memory, an operating system, and at least one installed application, detecting an attempted exploitation of at least one known vulnerability associated with the device. The attempted exploitation may be logged. At least one remedial action may be performed on the device based on the logged attempted exploitation. The known vulnerability may be associated with the operating system and/or the at least one installed application. The at least one known vulnerability may include one or more of at least one known coding flaw in the operating system or in the at least one installed application, at least one known weakness in a protocol running on the computing device, a known family of coding flaws in the operating system or in the at least one installed application, an unauthorized triggering of premium SMS services, and/or triggering of a hostile misconfiguration.2014-05-01
20140123286Detection Of Return Oriented Programming Attacks - In one embodiment, a processor includes at least one execution unit and Return Oriented Programming (ROP) detection logic. The ROP detection logic may determine a ROP metric based on a plurality of control transfer events. The ROP detection logic may also determine whether the ROP metric exceeds a threshold. The ROP detection logic may also, in response to a determination that the ROP metric exceeds the threshold, provide a ROP attack notification.2014-05-01
20140123287SECURING THERMAL MANAGEMENT PARAMETERS IN FIRMWARE FROM CYBER ATTACK - Methods and systems may provide for identifying a thermal management setting in a computing system, and comparing the thermal management setting to valid configuration information. In addition, the thermal management setting may be modified if it does not comply with the valid configuration information, wherein the modification can cause the thermal management setting to comply with the valid configuration information. Additionally, a threat risk notification can be initiated in order to notify users of the non-compliance.2014-05-01
20140123288NETWORK INTRUSION DETECTION APPARATUS AND METHOD USING PERL COMPATIBLE REGULAR EXPRESSIONS-BASED PATTERN MATCHING TECHNIQUE - A network intrusion detection apparatus and method that perform Perl Compatible Regular Expressions (PCRE)-based pattern matching on the payloads of packets using a network processor equipped with a Deterministic Finite Automata (DFA) engine. The network intrusion detection apparatus includes a network processor core for receiving packets from a network, and transmitting payloads of the received packets to a Deterministic Finite Automata (DFA) engine. A detection rule converter converts a PCRE-based detection rule, preset to detect an attack packet, into a detection rule including a pattern to which only PCRE grammar corresponding to the DFA engine is applied. The DFA engine performs PCRE pattern matching on the payloads of the packets based on the detection rule converted by the detection rule converter.2014-05-01
20140123289Computing Device to Detect Malware - Disclosed is an apparatus and method for a computing device to determine if an application is malware. The computing device may include: a query logger to log the behavior of the application on the computing device to generate a log; a behavior analysis engine to analyze the log from the query logger to generate a behavior vector that characterizes the behavior of the application; and a classifier to classify the behavior vector for the application as benign or malware.2014-05-01
20140123290METHOD, DEVICE AND SYSTEM FOR PROCESSING COMPUTER VIRUS - A method, an apparatus and a system for processing a computer virus. The method comprises: obtaining the file type of a file which is infected with a computer virus and the process information of a process which is used by the virus when accessing the file; monitoring whether a malicious event occurs in s system, wherein the malicious event is an event which is triggered when the process corresponding to the process information accesses the file of the file type; and refusing the process to access the file of the file type when it is monitored that the malicious event occurs.2014-05-01
20140123291WEIGHTED SECURITY ANALYSIS - A method, computer program product, and system for transforming unit tests is described. A unit test associated with one or more software units is identified. A graphical representation of a portion of a computer program is built, wherein the graphical representation includes a control flow edge. A potentially vulnerable data flow associated with the control flow edge is identified. A control flow weight is assigned to the control flow edge, based upon, at least in part, identifying the potentially vulnerable data flow. A security analysis is applied to the portion of the computer program based upon, at least in part, the control flow weight.2014-05-01
20140123292TRANSIT CONTROL FOR DATA - A method for an apparatus which operates in a data cloud includes requesting trust information from a service cloud, receiving the trust information from the service cloud, performing a trust assessment of the service cloud based on the trust information, and controlling transmission of data to the service cloud according to a result of the trust assessment.2014-05-01
20140123293WEIGHTED SECURITY ANALYSIS - A method, computer program product, and system for transforming unit tests is described. A unit test associated with one or more software units is identified. A graphical representation of a portion of a computer program is built, wherein the graphical representation includes a control flow edge. A potentially vulnerable data flow associated with the control flow edge is identified. A control flow weight is assigned to the control flow edge, based upon, at least in part, identifying the potentially vulnerable data flow. A security analysis is applied to the portion of the computer program based upon, at least in part, the control flow weight.2014-05-01
20140123294INFORMATION PROCESSING APPARATUS, METHOD, AND MEDIUM - An inspection server is provided with a related-information acquisition unit which acquires program-related information related to a program installed in a node connected to a network segment, a condition determination unit which determines whether or not the program-related information satisfies a security condition, and a measure information acquisition unit which acquires, when it is determined that the program-related information does not satisfy the security condition, measure information for allowing the node to satisfy the security condition in accordance with an attribute of the program.2014-05-01
20140123295SYSTEMS AND METHODS FOR ADVANCED DYNAMIC ANALYSIS SCANNING - The field of the invention relates to systems and methods for advanced dynamic analysis scanning for vulnerabilities using a universal translator. In an embodiment, the system includes a dynamic analysis scanner subsystem communicatively coupled to a networked computing system; the scanner subsystem is configured to crawl one or more dynamic web pages of the networked computing system, generate test data for the networked computing system, transmit the generated test data to the networked computing system, and record the networked computing system's response to the generated test data. The scanner may further comprise a universal translator configured to detect vulnerabilities and generate test data for the dynamic web pages of the networked computing system. The scanner subsystem may further comprise a smart scheduler.2014-05-01
20140123296SECURITY THROUGH METADATA ORCHESTRATORS - A method of obtaining a service from a second cloud domain, the method being performed by a first cloud domain, includes identifying the second cloud domain which provides the service from among a plurality of cloud domains by analyzing metadata parameters of the plurality of cloud domains, receiving an indication of data which is requested by the second cloud domain to perform the service, and transmitting the requested data along with metadata corresponding to the requested data to the second cloud domain.2014-05-01
20140123297TERMINAL APPARATUS WITH DRM DECODING FUNCTION AND DRM DECODING METHOD IN TERMINAL APPARATUS - Provided is a terminal apparatus with a DRM decoding function and a DRM decoding method in a terminal apparatus. The terminal apparatus with a DRM decoding function comprises a native unit which is provided with a local file memory for storing DRM media content data and an application program for driving a media device player using an operating system; and a DRM decoding unit which reads the DRM media content data from the local file memory using a URL path for web server, when it is required from the application program to reproduce the DRM media content data, and decodes the read DRM media content data, and provides the decoded DRM media content data to the media device player. Therefore, it is possible to reproduce the DRM media content data in the terminal apparatus without the exclusive DRM decoding module.2014-05-01
20140123298METHODS AND SYSTEMS FOR MANAGING SERVICES AND DEVICE DATA - Computationally implemented methods and systems include acquiring property data regarding at least one property of one or more devices, generating anonymized data by altering the acquired property data to obscure one or more portions of the acquired property data that uniquely identify the one or more devices and/or one or more users of the one or more devices, presenting the anonymized data to one or more service providers configured to generate one or more services, and acquiring the generated one or more services, said generated one or more services at least partly based on the anonymized data. In addition to the foregoing, other aspects are described in the claims, drawings, and text.2014-05-01
20140123299METHODS AND SYSTEMS FOR MANAGING ONE OR MORE SERVICES AND/OR DEVICE DATA - Computationally implemented methods and systems include acquiring obscured data, said obscured data including property data regarding at least one property of one or more devices, wherein said obscured data has been obscured to avoid uniquely identifying the one or more devices, acquiring one or more services configured to be carried out on the one or more devices, said acquiring at least partly based on the acquired obscured data including the property data regarding at least one property of the one or more devices, and offering the one or more services in exchange for access to identifying data configured to uniquely identify the one or more devices associated with the property data. In addition to the foregoing, other aspects are described in the claims, drawings, and text.2014-05-01
20140123300METHODS AND SYSTEMS FOR MANAGING SERVICES AND DEVICE DATA - Computationally implemented methods and systems include acquiring property data regarding at least one property of one or more devices, generating anonymized data by altering the acquired property data to obscure one or more portions of the acquired property data that uniquely identify the one or more devices and/or one or more users of the one or more devices, presenting the anonymized data to one or more service providers configured to generate one or more services, and acquiring the generated one or more services, said generated one or more services at least partly based on the anonymized data. In addition to the foregoing, other aspects are described in the claims, drawings, and text.2014-05-01
20140123301PRIVACY PRESERVING REGISTRY BROWSING - A method, system, and computer-readable memory containing instructions include requesting a tokenizing authority to provide a tokenized string that represents a domain name, using the tokenized domain name string to perform a lookup against a database of registered tokenized domain name strings, determining whether the tokenized domain name string exists in the database, and returning results based on the existence of tokenized domain name strings and optionally variants thereof. The method, system, and computer-readable memory may further include returning an encryption key corresponding to an encrypted record of information related to the domain name corresponding to the tokenized domain name string.2014-05-01
20140123302DEVICE AND METHOD FOR CONCEALING CUSTOMER INFORMATION FROM A CUSTOMER SERVICE REPRESENTATIVE - A method of concealing customer-provided information from an operator during a telephone conversation between the operator and a customer includes receiving dual-tone-multi-frequency-encoded customer information via a telephone connection to a customer telephone and generating a request asking the customer to confirm the information. The method also includes converting the dual-tone-multi-frequency-encoded customer information into an ASCII data stream and sending the ASCII data stream to a computing device, whereby the operator is unable to discern the customer information.2014-05-01
20140123303DYNAMIC DATA MASKING - Described is a method for dynamic data masking (DDM) of sensitive data. The method for DDM comprises receiving a response output comprising sensitive data, based on a client request, from an application, and identifying a main masking specification, based on the response output, for masking of the sensitive data in the response output. Further, the response output is parsed for creating a Document Object Model (DOM) tree for the response output. Status of a masking approach indication field of the main masking specification is checked, and masking is performed on nodes in the DOM tree comprising the sensitive data, based on the status of the masking approach indication field of the main masking specification.2014-05-01
20140123304DATA ANONYMIZATION BASED ON GUESSING ANONYMITY - Privacy is defined in the context of a guessing game based on the so-called guessing inequality. The privacy of a sanitized record, i.e., guessing anonymity, is defined by the number of guesses an attacker needs to correctly guess an original record used to generate a sanitized record. Using this definition, optimization problems are formulated that optimize a second anonymization parameter (privacy or data distortion) given constraints on a first anonymization parameter (data distortion or privacy, respectively). Optimization is performed across a spectrum of possible values for at least one noise parameter within a noise model. Noise is then generated based on the noise parameter value(s) and applied to the data, which may comprise real and/or categorical data. Prior to anonymization, the data may have identifiers suppressed, whereas outlier data values in the noise perturbed data may be likewise modified to further ensure privacy.2014-05-01
20140123305METHODS AND SYSTEMS FOR MANAGING DATA - Computationally implemented methods and systems include acquiring data regarding a device having a particular protected portion for which the device is configured to selectively allow access, facilitating presentation of an offer to carry out at least one service, said at least one service at least partly related to the device, in exchange for access to the particular protected portion of the device, and facilitating performance of at least a portion of the at least one service that is at least partly related to the device, in response to a grant of access to the particular protected portion of the device. In addition to the foregoing, other aspects are described in the claims, drawings, and text.2014-05-01
20140123306METHODS AND SYSTEMS FOR MANAGING DATA - Computationally implemented methods and systems include identifying one or more services configured to be provided to a user of a device, said identifying at least partly based on data regarding one or more properties of the device, requesting access to data collected by one or more portions of the device, in exchange for providing at least a portion of one of the one or more identified services, and providing at least a portion of the one or more services after receiving access to the data collectable by one or more portions of the device. In addition to the foregoing, other aspects are described in the claims, drawings, and text.2014-05-01
20140123307METHODS AND SYSTEMS FOR MANAGING DATA - Computationally implemented methods and systems include acquiring data regarding a device having a particular protected portion for which the device is configured to selectively allow access, facilitating presentation of an offer to carry out at least one service, said at least one service at least partly related to the device, in exchange for access to the particular protected portion of the device, and facilitating performance of at least a portion of the at least one service that is at least partly related to the device, in response to a grant of access to the particular protected portion of the device. In addition to the foregoing, other aspects are described in the claims, drawings, and text.2014-05-01
20140123308METHODS AND SYSTEMS FOR MANAGING DATA AND/OR SERVICES FOR DEVICES - Computationally implemented methods and systems include determining that a device has particular data that is designated as potentially valuable wherein access to the particular data is restricted, determining one or more services configured to be carried out on the device, said one or more services using the particular data to which the access is restricted, and facilitating presentation of an offer to facilitate carrying out one or more services that use the particular data. In addition to the foregoing, other aspects are described in the claims, drawings, and text.2014-05-01
20140123309METHODS AND SYSTEMS FOR MANAGING DATA AND/OR SERVICES FOR DEVICES - Computationally implemented methods and systems include determining that a device has particular data that is designated as potentially valuable wherein access to the particular data is restricted, determining one or more services configured to be carried out on the device, said one or more services using the particular data to which the access is restricted, and facilitating presentation of an offer to facilitate carrying out one or more services that use the particular data. In addition to the foregoing, other aspects are described in the claims, drawings, and text.2014-05-01
20140123310VEHICLE BATTERY DATA STORAGE AND ACCESS SYSTEM AND METHOD - A storage battery comprises a data storage device that allows for storing and retrieving data that may be useful during the life of the battery. The device may include a radiofrequency tag applied to the surface of the battery. Data stored in the device may be accessed by various devices, such as battery analyzers that perform remaining life other analyses. Some or all of the data may be encrypted to require that approved or licensed devices only access and use the data. Some data may be encrypted in one manner, requiring a first key, and other data in a different manner, requiring a different key. The different data sets may have different purposes, such as for battery analysis (using no encryption or requiring the first key), and for warranty, manufacturing, retail tracking and other purposes (using the second key).2014-05-01
20140123311PROGRESSIVE UNLOCKING OF E-BOOK CONTENT - Approaches for progressively unlocking e-book content are provided wherein access is granted to a first set of e-books, wherein the first set is a subset of a second set of e-books to which access is restricted. Data is received indicating that one of the e-books in the first set has been read, and then it is determined whether access to an e-book in the second set should be granted. If so, access to an e-book in the second set is granted, wherein the e-book in the second set is chosen based upon an analysis of previously-read e-books in the first set.2014-05-01
20140123312TOKEN-BASED ACCESS CONTROL - Systems and methods for enabling token-based access control to data are provided. In particular, some embodiments use a token-based access management system to allow or restrict an individual's ability to access data. The access management system uses tokens to define rules (e.g., a Boolean matching rule or algorithm that results in a true/false output indicating the decision) within the access management system to determine if the token is valid and if the individual should be granted access to the requested data. Tokens may further have tool constraints for controlling access. In some cases, the tokens may expire upon completion of a task or after a pre-set amount of time. A generic workflow utilizing tokens and at least one specific workflow showing employees utilizing tokens as part of performing a task responsive to a user.2014-05-01
20140123313ACCESSING INFORMATION DURING A TELECONFERENCING EVENT - A method for accessing information during a teleconferencing event. The method includes identifying a reference to a document transmitted by a telecommunication device participating in a teleconferencing event and identifying a name of the referenced document. The method includes determining, by a computer, an identity of a user of the participating telecommunication device. The method further includes determining the user has permission to access the identified document and, in response, transmitting the identified document to the participating telecommunication device.2014-05-01
20140123314SYSTEMS AND METHODS FOR FACILITATING THE SHARING OF DIGITAL BUNDLES OF SERVICES BETWEEN USERS - Systems and methods are disclosed for allowing a primary user to share a digital service, in a bundle of services implemented by a plurality of different service providers, with a secondary user. In accordance with one implementation, a method includes receiving a request from the primary user to share a first service in the bundle of services with the secondary user. The method also includes generating, using at least one processor, a first token that associates the secondary user with the first service. The method further includes sending the first token to one of the plurality of different service providers for the first service. Additionally, the method includes modifying a status of the primary user to restrict access to the first service by the primary user while the first service is being shared with the secondary user.2014-05-01
20140123315SYSTEM AND METHOD FOR PRESENTING FLIGHT TRACKING DATA TO A USER BASED UPON THE USER'S ACCESS PERMISSIONS TO VARIOUS SOURCES - A computer-implemented system and method for the processing and presentation of flight tracking data from a number of sources, with at least one source include a user access restriction, is disclosed. Substantially real-time flight tracking data is received over a digital network from a number of different sources and is stored in at least a database. Various determined flight paths are stores for a single flight based upon the number of flight data sources contributing data regarding that flight. Upon receiving a query from a user, the user's access with respect to the available data providers in retrieved and the best flight for the selected flight which is determined only from data that the requested user is authorized to access is presented. In one form, the results may be presented to the user in the form of digital map having an aircraft image and historical flight path shown.2014-05-01
20140123316ACCESS CONTROL OF DATA IN A DISPERSED STORAGE NETWORK - A method begins by a dispersed storage (DS) processing module receiving, from a user device, a data access request and accessing hierarchical data access control information. The method continues with the DS processing module obtaining a logical memory access control file from the hierarchical data access control information and determining a data access request type of the request is within access rights of the user device. When the data access request type is within the access rights of the user device, the method continues with the DS processing module obtaining a data object access control file from the hierarchical data access control information. The method continues with the DS processing module determining, from the data object access control file, whether the data access request type is restricted. When the data access request type is not restricted, the method continues with the DS processing module processing the data access request.2014-05-01
20140123317CONFIDENTIAL INFORMATION MANAGEMENT SYSTEM - A confidential information management system includes an entry control apparatus, an information storage unit, an electronic apparatus, and an access control unit. The electronic apparatus includes a user authentication unit that decides whether a user is authorized to log in in the electronic apparatus, and a communication unit communicable with a mobile terminal of the user. The access control unit registers, when the user authentication unit permits the user to log in in the electronic apparatus, the mobile terminal to communicate with the communication unit, and decides whether the mobile terminal is permitted to access confidential information in the information storage unit. The access control unit also validates the registration of the mobile terminal of the user permitted to log in in the electronic apparatus while the entry control apparatus recognizes that the user is in the controlled area, and permits the mobile terminal to access the confidential information.2014-05-01
20140123318ACCESSING INFORMATION DURING A TELECONFERENCING EVENT - A method for accessing information during a teleconferencing event. The method includes identifying a reference to a document transmitted by a telecommunication device participating in a teleconferencing event and identifying a name of the referenced document. The method includes determining, by a computer, an identity of a user of the participating telecommunication device. The method further includes determining the user has permission to access the identified document and, in response, transmitting the identified document to the participating telecommunication device.2014-05-01
20140123319System, Method and Apparatus For Facilitating Resource Security - A method and apparatus are provided for facilitating resource security. A method may include monitoring for resource requests by one or more applications on a device. The method may further include determining, based at least in part on the monitoring, that one of the one or more applications has requested access to a resource. The method may additionally include causing the determined resource request to be logged in a log of resource requests by the one or more applications. A corresponding apparatus is also provided.2014-05-01
20140123320PROCESSOR, PROCESSOR CONTROL METHOD, AND INFORMATION PROCESSING DEVICE - According to one embodiment, a processor accesses a storage module upon a request from a processor module, which selectively switches between a secure mode and a non-secure mode and performs predetermined data processing in each mode. In this case, the access to a protected area of the storage module is permitted only when the processor module is in the secure mode based on a report indicative of an own mode, which is output from the processor module.2014-05-01
20140123321HANDSHAKE PROTOCOL TO CONTROL ACTORS AND FUNCTIONS IN A CABLE SET-TOP-BOX SYSTEM TO PROPAGATE ACCEPTANCE OF AN IP LICENSE TO SECURELY AUTHENTICATE SOFTWARE APPLICATION PROGRAM INTERFACES (APIs) - A system for securely authenticating software Application Program Interfaces (APIs) includes a handshake protocol that enables promulgation of licensing rights controlling Intellectual Property (IP) to multiple Actors. The Actors include components of a cable system that can include a Conditional Access System, Middleware, a Browser for a Set-Top-Box, a Guide and a Guide Data Provider. The handshake is a Challenge-Response protocol that includes a Challenge issued by one Actor who controls IP rights to verify a second Actor has Licensed IP rights when the second Actor Response includes a Hook IP function IPF2014-05-01
20140123322MANAGING A FAULT CONDITION BY A SECURITY MODULE - A microcontroller is awakened from a lower power state in response to a trigger indication indicative of a fault condition. After the awakening, the microcontroller performs a security action with respect to secret information in the security module in response to the fault condition.2014-05-01
20140123323METHODS AND SYSTEMS FOR MANAGING DATA - Computationally implemented methods and systems include receiving data regarding one or more properties of a device, said data not particularly identifying the device, identifying one or more services configured to be provided to a user of the device, said one or more services requiring access to particular data controlled by the device, wherein access to the particular data controlled by the device is managed by the device, and requesting access to the particular data controlled by the device, in exchange for providing one or more of the identified one or more services. In addition to the foregoing, other aspects are described in the claims, drawings, and text.2014-05-01
20140123324METHODS AND SYSTEMS FOR MANAGING DATA AND/OR SERVICES FOR DEVICES - Computationally implemented methods and systems include acquiring data regarding an application configured to access one or more protected portions of a particular device, said application configured to provide one or more services, detecting that the application has completed at least one of the one or more services and that the application maintains access to the one or more protected portions of the particular device, presenting information indicating that the one or more services are completed and that the application maintains access to the one or more protected portions of the particular device, and circuitry for facilitating presentation of an option to discontinue the access of the application to the one or more protected portions of the particular device. In addition to the foregoing, other aspects are described in the claims, drawings, and text.2014-05-01
20140123325METHODS AND SYSTEMS FOR MANAGING DATA AND/OR SERVICES FOR DEVICES - Computationally implemented methods and systems include acquiring data regarding an application configured to access one or more protected portions of a particular device, said application configured to provide one or more services, detecting that the application has completed at least one of the one or more services and that the application maintains access to the one or more protected portions of the particular device, presenting information indicating that the one or more services are completed and that the application maintains access to the one or more protected portions of the particular device, and circuitry for facilitating presentation of an option to discontinue the access of the application to the one or more protected portions of the particular device. In addition to the foregoing, other aspects are described in the claims, drawings, and text.2014-05-01
20140123326METHOD AND APPARATUS FOR TRANSMITTING RIGHTS OBJECT INFORMATION BETWEEN DEVICE AND PORTABLE STORAGE - A method and apparatus for transmitting rights object information between a device and a portable storage are provided. The method includes transmitting a predetermined request from the device to the portable storage, generating a current permission status format including information of a rights object designated by the request, using the portable storage, and transmitting the current permission status format from the portable storage to the device. According to the method and apparatus, overhead is reduced and information transmission speed is increased when the rights object information is transmitted between the device and the portable storage.2014-05-01
20140123327FLEXIBLE PRINTED CABLE AND INFORMATION PROCESSING DEVICE - It is an object of this invention to provide an FPC capable of improving tamper resistance. An FPC (2014-05-01
20140123328ALWAYS-AVAILABLE EMBEDDED THEFT REACTION SUBSYSTEM - A platform including an always-available theft protection system is described. In one embodiment, the system comprises a power management logic to selectively power elements of the system, a disarming logic to disarm the platform from an armed mode when a disarming command is received via an interface, the interface powered when the platform is in the armed and suspecting modes to detect the disarming command. The system further comprises, in one embodiment, a risk behavior logic to detect a potential problem via a interface, the interface powered when the platform is in the armed mode to detect the potential problem, and a core logic component to provide logic to analyze the potential problem, and to move the platform to a suspecting mode, when the potential problem indicates a theft suspicion, the core logic powered when the risk behavior logic detects the potential problem.2014-05-01
20140123329hnRNP A1 KNOCKOUT ANIMAL MODEL AND USE THEREOF - A nucleic acid construct comprising a genetic engineered heterogeneous nuclear ribonucleoprotein (hnRNP) A1 gene is provided. A transgenic mouse in which the expression of hnRNP A1 gene has been disrupted is also provided. The mouse is useful for studying the role of hnRNP A1 gene in normal and disease states of a developmental disorder and muscular diseases. Therefore, a method of screening a compound for potential use in prevention and/or treatment of developmental disorder and muscular diseases is further provided.2014-05-01
20140123331TRAIT IMPROVEMENT IN PLANTS EXPRESSING AP2 PROTEINS II - Polynucleotides and polypeptides incorporated into expression vectors are introduced into plants and were ectopically expressed. These polypeptides may confer at least one regulatory activity and increased photosynthetic resource use efficiency, transpiration efficiency, increased yield, greater vigor, and/or greater biomass as compared to a control plant.2014-05-01
20140123332HYBRID TOMATO VARIETY 72-240 RZ - The present invention relates to a 2014-05-01
20140123333MELON VARIETY NUN 26181 MEM - The invention relates to the field of 2014-05-01
20140123334ARABIDOPSIS NONHOST RESISTANCE GENE(S) AND USE THEREOF TO ENGINEER DISEASE RESISTANT PLANTS - The present invention relates to a method of increasing resistance against plant pathogens, particularly 2014-05-01
20140123335LETTUCE VARIETY 41-108 RZ - The present invention relates to a 2014-05-01
20140123336LETTUCE VARIETY 41-153 RZ - The present invention relates to a 2014-05-01
20140123337LETTUCE VARIETY 45-114 RZ - The present invention relates to a 2014-05-01
20140123338NUCLEOTIDE SEQUENCES MEDIATING MALE FERTILITY AND METHOD OF USING SAME - Nucleotide sequences mediating male fertility in plants are described, with DNA molecule and amino acid sequences set forth. Promoter sequences and their essential regions are also identified. The nucleotide sequences and promoter sequences are useful in methods mediating male fertility in plants, as described. Vectors, plant cells, and plants comprising the nucleotide sequences and/or promoter regions are also provided.2014-05-01
20140123339Transformed Plants Having Increased Beta-Carotene Levels, Increased Half-Life and Bioavailability and Methods of Producing Such - Compositions and methods for increasing carotenoid levels and carotenoid half-life in plants are provided. The methods involve transforming organisms with nucleic acid sequences encoding enzymes associated with carotenoid biosynthesis and tocopherol and tocotrienols. In particular, the nucleic acid sequences are useful for preparing plants and microorganisms that possess increased beta-carotene levels and half-life. Thus, transformed bacteria, plants, plant cells, plant tissues and seeds are provided. The sequences find use in the construction of expression vectors for subsequent transformation into organisms of interest including plants, particularly sorghum.2014-05-01
20140123340Plants Having Increased Tolerance to Herbicides - The present invention refers to a method for controlling undesired vegetation at a plant cultivation site, the method comprising the steps of providing, at said site, a plant that comprises at least one nucleic acid comprising a nucleotide sequence encoding a wild-type or a mutated protoporphyrinogen oxidase (PPO) which is resistant or tolerant to a benzoxazinone-derivative herbicide by applying to said site an effective amount of said herbicide. The invention further refers to plants comprising wild-type or mutated PPO enzymes, and methods of obtaining such plants.2014-05-01
20140123341METHOD FOR THE TRANSIENT EXPRESSION OF NUCLEIC ACIDS IN PLANTS - Compositions and methods for transiently expressing proteins in a plant are provided. The compositions comprise plants, seeds, plant tissues, and plant parts expressing a protein, wherein the protein is expressed transiently and the transient expression of the protein can be used as a predictive model of how said protein will be expressed in stable transgenic plants in regards to qualitative and quantitative data. The predictive model may be used but is not limited to: promoter evaluation, evaluation of expression cassette construction for best performance (e.g. addition of enhancers or gene silencing suppressors), evaluation of best ways to express heterologous genes (e.g. point mutations, targeting), fast evaluation of endogenous gene knockout, evaluation of protein expression levels, cellular targeting, tissue targeting, transcriptional enhancers, translational enhancer protein toxicity and metabolic profiling. Further provided are methods of use.2014-05-01
20140123342Regulation of Stomatal Apertures by Apyrases and Extracellular Nucleotides - The role of extracellular nucleotides and apyrase enzymes in the guard cells that border stomata in regulating stomatal aperture and the plant's resistance to drought and pathogens is disclosed herein. Expression of apyrases APY1 and APY2, in guard cell protoplasts is strongly correlated with cell growth, cell secretory activity and with conditions that favor stomatal opening. Both short-term inhibition of ectoapyrase activity and long-term suppression of APY1 and APY2 transcript levels significantly disrupt normal stomatal behavior in light. Furthermore, two punnoceptor inhibitors in mammals, pyridoxalphosphate-6-azo-phenyl-2′,4′-disulphonic acid (PPADS) and Reactive Blue 2, block ATPS- and ADPβS-induced opening and closing, and also partially block the ability of abscisic acid (ABA) to induce stomatal closure, and light-induced stomatal opening. Treatment of epidermal peels with ATPyS induces increased levels of nitric oxide and reactive oxygen species, and genetically suppressing the synthesis of these agents blocks the effects of nucleotides on stomatal aperture.2014-05-01
20140123343Plants Having Enhanced Yield-Related Traits and Method for Making the Same - Provided is a method for enhancing yield-related traits in plants by modulating expression in a plant of a nucleic acid encoding a variant synovial sarcoma translocation (SYT) polypeptide comprising or consisting of any one or more of the following domains: an SNH domain; a Met-rich domain; and a QG-rich domain. Also provided are plants having modulated expression of a nucleic acid encoding such a variant SYT polypeptide, which plants have enhanced yield-related traits compared with control plants. Constructs useful in the method are provided as well.2014-05-01
20140123344Plants Having Enhanced Yield-Related Traits and Method for Making the Same - Provided is a method for enhancing yield-related traits in plants by modulating expression of a nucleic acid encoding a PtMYB12L polypeptide in a plant. Also provided are plants having modulated expression of a nucleic acid encoding a PtMYB12L polypeptide, which plants have enhanced yield-related traits compared with control plants. Also provided are PtMYB12L-encoding nucleic acids, and constructs comprising the same, useful in enhancing yield-related traits in plants.2014-05-01
20140123345TRUNCATED GLYCERALDEHYDE-3-PHOSPHATE DEHYDROGENASE PROMOTER - The invention found that partial deletion of the glyceraldehyde-3-phosphate dehydrogenase (gpd) promoter can enhance gene expression (even heterologous gene expression) in basidiomycetous fungi. With the discovery of these gpd promoters, an expression system can be constructed for the expression of a heterologous gene in mushroom. Accordingly, the invention provides a truncated glyceraldehyde-3-phosphate dehydrogenase promoter and a construct comprising the promoter of the invention operably linked to a heterologous transcribable polynucleotide molecule and a mushroom comprising the construct.2014-05-01
20140123346GENETIC LOCI ASSOCIATED WITH IRON DEFICIENCY TOLERANCE IN SOYBEAN - The invention relates to methods and compositions for identifying soybean plants that are tolerant, have improved tolerance or are susceptible to iron deficient growth conditions. The methods use molecular genetic markers to identify, select and/or construct disease-tolerant plants or identify and counterselect disease-susceptible plants. Soybean plants that display tolerance or improved tolerance to 2014-05-01
20140123347ANALYSIS OF EX VIVO CELLS FOR DISEASE STATE DETECTION AND THERAPEUTIC AGENT SELECTION AND MONITORING - Described herein is the analysis of nanomechanical characteristics of cells. In particular, changes in certain local nanomechanical characteristics of ex vivo human cells can correlate with presence of a human disease, such as cancer, as well as a particular stage of progression of the disease. Also, for human patients that are administered with a therapeutic agent, changes in local nanomechanical characteristics of ex vivo cells collected from the patients can correlate with effectiveness of the therapeutic agent in terms of impeding or reversing progression of the disease. By exploiting this correlation, systems and related methods can be advantageously implemented for disease state detection and therapeutic agent selection and monitoring.2014-05-01
20140123348HIGH THROUGHOUT REPRODUCIBLE CANTILEVER FUNCTIONALIZATION - A method for functionalizing cantilevers is provided that includes providing a holder having a plurality of channels each having a width for accepting a cantilever probe and a plurality of probes. A plurality of cantilever probes are fastened to the plurality of channels of the holder by the spring clips. The wells of a well plate are filled with a functionalization solution, wherein adjacent wells in the well plate are separated by a dimension that is substantially equal to a dimension separating adjacent channels of the plurality of channels. Each cantilever probe that is fastened within the plurality of channels of the holder is applied to the functionalization solution that is contained in the wells of the well plate.2014-05-01
20140123349Raspberry plant named 'Double Gold' - This invention relates to a new and distinct everbearing raspberry plant designated as ‘Double Gold’ primarily adapted to growing conditions of west central New York and other regions of similar climate. The new plant is primarily characterized by golden to orange/red conical fruit that is equally long and broad, vigorous tall canes, late season primocane production and early mid-season floricane production.2014-05-01
20140123350Raspberry plant named "Crimson Night' - This invention relates to a new and distinct primocane bearing red raspberry plant designated as ‘Crimson Night’ primarily adapted to growing conditions of west central New York and other regions of similar climate. The new plant is primarily characterized by highly pigmented canes, conical fruit that is longer than broad, late mid-season primocane production and dark greyed purple fruit color.2014-05-01
20140123351Grevillea hybrid plant named 'TWD01' - ‘TWD01’ is a distinctive variety of 2014-05-01
20140123352Mandevilla lindl plant named 'SGred9' - The new and distinct Mandevilla plant named “SGred9” has upright and vining plant habit, relatively small and glossy foliage, freely branching habit, freely flowering habit, and is in full flower (bloom) around Mother's Day.2014-05-01
20140123353Mandevilla lindl plant named 'SGlightred9' - The new and distinct 2014-05-01
20140123354Rhododendron rootstock named 'Rhodunter 150' - A new and distinct 2014-05-01
20140123355Caryopteris Plant Named 'Novacaryfou' - A new and distinct 2014-05-01
20140123356Celosia plant named 'BKCELOR' - A new and distinct cultivar of 2014-05-01
Website © 2025 Advameg, Inc.