23rd week of 2014 patent applcation highlights part 73 |
Patent application number | Title | Published |
20140157362 | RECOVERING FROM UNEXPECTED FLASH DRIVE REMOVAL - Techniques for recovering from unexpected removal of (or other unexpected power loss) a flash memory device from a computer system. An interpolated device driver notes whenever the flash memory device is unexpectedly removed, or otherwise unexpectedly powers off or enters a locked state. If the flash memory device is reinserted, the interpolated device driver reinitializes the flash memory device, and satisfies any flash memory device security protocol, so the flash memory device and the computer system can be restored to their status just before unexpected removal. The interpolated device driver caches requests to the flash memory device, and when status is restored to just before removal, replays those requests to the flash memory device, so the flash memory device responds to those requests as if it had ever been removed. The computer system does not notice any break in service by the flash memory device due to removal and reinsertion. | 2014-06-05 |
20140157363 | METHODS AND SYSTEMS FOR SECURE STORAGE SEGMENTATION BASED ON SECURITY CONTEXT IN A VIRTUAL ENVIRONMENT - A computer system identifies a request to place a workload in a hypervisor-based host. The computer system identifies a security level of the workload. The computer system identifies a security level of a storage device associated with the hypervisor-based host. If the security level of the workload corresponds to the security level of the storage device, the computer system grants the request to place the workload in the hypervisor-based host. If the security level of the workload does not correspond to the security level of the storage device, the computer system denies the request to place the workload in the hypervisor-based host. | 2014-06-05 |
20140157364 | WIRELESS NETWORK SECURITY SYSTEM - A wireless network security system with a plurality of communication terminals including an Access Point (AP) and a station is provided. The wireless network security system includes a plurality of sensor devices for collecting identification information of the communication terminals, and a WIPS server communicating with the sensor devices, for transmitting a control signal to the communication terminals, wherein the WIPS server transmits the control signal to the plurality of communication terminals through the sensor devices, and when a control signal for blocking connection of two or more communication terminals among the plurality of communication terminals associated through a network is transmitted, connection blockage packets different from one another is created and sequentially and repeatedly transmitted. | 2014-06-05 |
20140157365 | ENHANCED SERIALIZATION MECHANISM - The present disclosure discloses a method and network device for an enhanced serialization mechanism. Specifically, the disclosed system receives a plurality of packets from a plurality of transport layer flows corresponding to a security association. Also, the system designates one processor of a plurality of processors to be associated with the security association. Moreover, the system assigns a sequence number to each packet, and transmits the plurality of packets from the plurality of transport layer flows such that packets within the same transport layer flow are transmitted in order of their sequence numbers. However, at least two packets from two different transport layer flows may be transmitted out of incremental order of their sequence number. | 2014-06-05 |
20140157366 | NETWORK ACCESS CONTROL SYSTEM AND METHOD - The present invention relates to a system and method for controlling a network access of a network packet on the basis of a thread which is inserted into a process through code injection. The network access control system according to the present invention comprises: a process inspecting unit for detecting a code injection-based thread included in a process; and a network monitoring unit for performing network filtering so as to detect a network packet having access to a network, and, if a communication subject of the detected network packet is the code injection-based thread, blocking the traffic of the detected network packet. | 2014-06-05 |
20140157367 | VERIFICATION METHOD AND NODE FOR BIDIRECTIONAL FORWARDING DETECTION SESSION - A verification method and node for a BFD session relate to the field of communications technologies. The method includes: adding, by an initiating node, a first random number to a first BFD control packet and sending the first BFD control packet to a remote node; obtaining and saving, by the remote node, the first random number in the received first BFD control packet; adding, by the remote node, a second random number to the received first BFD control packet and sending the first BFD control packet to the initiating node; and obtaining and saving, by the initiating node, the second random number in the received second BFD control packet. | 2014-06-05 |
20140157368 | SOFTWARE AUTHENTICATION - According to an embodiment, a computing system includes a server configured to provide an authentication indicator to least one software application for enabling the software application to provide at least one computing feature. The authentication indicator is generated based on at least two identifiers that are distinct from a hardware identifier of a device on which a software application is running | 2014-06-05 |
20140157369 | METHOD, APPARATUS AND COMPUTER PROGRAM FOR CONTROLLING ACCESS TO CONTENT IN A COMMUNICATIONS NETWORK - A method, apparatus and computer program are provided for controlling access to content in a network | 2014-06-05 |
20140157370 | Transparent Control of Access Invoking Real-time Analysis of the Query History - The invention relates to a method for granting an inquirer querying a repository access to the repository, a communication protocol between a client and a server, and a system for controlling access of at least one inquirer to a repository. The repository typically stores event data relating to traceable products. The aspects according to teaching disclosed herein may be for example implemented as security extensions for existing repositories providing a finer granularity of access rights and means to prevent an exposure of data sets considered sensitive. The security extensions disclosed herein may be implemented to protect access to any kind of client/server application wherein the server is exposing sensitive data. | 2014-06-05 |
20140157371 | Authenticated Access to Accredited Testing Services - A service control system controls access to secured online testing services, such as accredited or standardized tests, examinations in educational courses, tutoring services, and continuing professional development courses or seminars. The secured services may be published by an educational publishing platform and made available to users through online configured browser applications executing on the users' devices. Based on access conditions associated with a secured testing service and the capturing and processing of one or more images, the service control system determines how users are authorized to access the services. When users have been authorized to access a service or a subset of the service, the service may be distributed through the browser applications executing on the users' devices. | 2014-06-05 |
20140157372 | IMAGE FORMING APPARATUS, WIRELESS COMMUNICATION SYSTEM, CONTROL METHOD, AND COMPUTER-READABLE MEDIUM - The invention is concerning to an image forming apparatus connected to a mobile terminal via a wireless network includes: an authentication unit configured to perform authentication of the mobile terminal using user authentication information and identification information of the mobile terminal that are registered in advance to the image forming apparatus; a requesting unit configured to request to acquire information stored in the mobile terminal; and an acquiring unit configured to acquire the information from the mobile terminal in response to the request by the requesting unit. | 2014-06-05 |
20140157373 | AUTHENTICATION APPARATUS AND METHOD THEREOF, AND COMPUTER PROGRAM - According to one embodiment, there is provided an authentication apparatus, including: a communication unit, a verifier and a connection configuration checker. The communication unit receives a message related to network access authentication on a first communication apparatus, the message including an address of the first communication apparatus and more than zero address of an authentication relay. The verifier verifies an authenticity of the first communication apparatus in response to receipt of the message by the communication unit. The connection configuration checker identifies a first destination to which the first communication apparatus intends to connect, on the basis of the address of the first communication apparatus or the address of the authentication relay included in the message when verification succeeds, and determines whether to authorize connection by the first communication apparatus to the first destination or not. | 2014-06-05 |
20140157374 | COMMUNICATION TERMINAL, COMMUNICATION METHOD, PROGRAM, AND COMMUNICATION SYSTEM - There is provided a communication terminal including a transmission controller configured to allow transmission of, to a verification target device, authentication information for authenticating the verification target device based on first information acquired from an information processing device, and a verification unit configured to verify validity of the verification target device based on a response to the authentication information and second information acquired from the information processing device, the second information being associated with the first information. | 2014-06-05 |
20140157375 | APPLICANT SCREENING - A method comprising receiving by a screening service, an applicant profile that identifies an applicant and an authorization to provide access to screening results generated by the screening service based on the applicant profile to a screener, associating, using a computer, an identifier with the screening results, and communicating the identifier to the screener. | 2014-06-05 |
20140157376 | SYSTEM AND METHOD FOR MAINTAINING CAPTIVE PORTAL USER AUTHENTICATION - The present disclosure discloses a method and network device for maintaining captive portal user authentication. Specifically, the disclosed system determines an association status between a client and an access point in a wireless network, as well as whether to remove an entry corresponding to the client from a network layer (L3) cache based on the association status. If it is determined that the entry is to be removed, the disclosed system removes the entry corresponding to the client from the network layer (L3) cache. Note that, the association status can be determined based on one or more of an indication by a station management process at the network device, and a detection of radio link activities. | 2014-06-05 |
20140157377 | SYSTEM FOR REDUCING AN ONLINE USER'S INFORMATION BURDEN FOR ONLINE PROFILES - A method and system for managing online profiles. The method comprises receiving a plurality of online profiles of a user, the plurality of online profiles including login parameters for websites, and storing the plurality of online profiles in an account associated with the user. The method further comprises receiving a request to navigate to a given one of the plurality of online profiles associated with a given website, retrieving a webpage corresponding to the given website, and loading the given online profile to the webpage corresponding to the given website. | 2014-06-05 |
20140157378 | CLOUD BASED APPLICATION ACCOUNT MANAGEMENT - An aspect provides a method, including: receiving at a remote device a client log in to a cloud based account issued from a client device; determining the client device is not associated with the client log in; issuing an instruction to unbind at least one client device application log in credential and bind a cloud client log in credential to the at least one client device application; and providing an instruction to unbind the cloud client log in credential from the at least one client device application in response to at least one predetermined criteria being satisfied. Other aspects are described and claimed. | 2014-06-05 |
20140157379 | Social Authentication - In one embodiment, a method includes providing for presentation to a user a number of content objects. Some of the content objects are socially relevant to the user and some of the content objects are socially irrelevant to the user. The method also includes receiving input indicating a selection of one of the content objects by the user; determining whether the content object selected by the user is socially relevant to the user; authenticating the user if the content object selected by the user is socially relevant to the user; and declining to authenticate the user if the content object selected by the user is socially irrelevant to the user. | 2014-06-05 |
20140157380 | Method And System For Hybrid Software As A Service User Interfaces - A hybrid software as a service (SaaS) delivery model allows an enterprise to control sensitive data while application code and non-sensitive data are downloaded from a software provider. A client computing device of the enterprise downloads the application code, which determines an appearance and a behavior of a user interface of the application. The application code is also configured, such as with a network address of a database, to allow the client computing device to access the sensitive data which is hosted by the enterprise. The client computing device may download a file from the enterprise which accesses the application code. For example, an HTML file may access scripting code. Or, the client computing device downloads the application code directly from the software provider, in which case cross-origin resource sharing allows the client computing device to access the sensitive data hosted by the enterprise. | 2014-06-05 |
20140157381 | FRICTIONLESS MULTI-FACTOR AUTHENTICATION SYSTEM AND METHOD - A frictionless multi-factor authentication system and method (“FMFA system”) that facilitates verification of the identity of a website user, registrant or applicant. The FMFA system reduces or removes the burden on the user by eliminating the additional manual second step traditionally required by two-factor authentication methods, and replacing the second step with an automated authentication step based on the location of a mobile device that is associated with the user. The FMFA system may be utilized for authenticating users to access sensitive data on online accounts, applications and websites, download files, perform online transactions, store information through websites or data stores, or the like. The FMFA system allows registration information obtained from a previously-registered user to authenticate the user on subsequent visits or logins to the website. | 2014-06-05 |
20140157382 | OBSERVABLE AUTHENTICATION METHODS AND APPARATUS - A system, method, and apparatus for providing observable authentication are disclosed. An example method includes receiving a request from a user to access an account, the request including an identifier associated with the user, determining a secret login rule previously provided to the user, and transmitting observable information to be displayed in a login map by a client device associated with the user. The example method also includes determining a correct answer by analyzing the positioning of the displayed observable information within the login map in conjunction with the secret login rule associated with the user. The example method further includes receiving an answer from the client device and providing the user access to the account responsive to the answer matching the correct answer. | 2014-06-05 |
20140157383 | ACCESS MANAGEMENT SYSTEM AND METHOD - An access management method includes steps of prompting user to input an account and associated password based on a login request; comparing whether the input account and associated password is one of the accounts and the associated password stored in the storage unit; acquiring the plurality of objects linking to the input account and password, and the login account and associated password for each acquired object when the input account and associated password is one of the accounts and associated passwords stored in the storage unit; and logging into one of the objects when the object is accessed. | 2014-06-05 |
20140157384 | Biometric Authentication - A biometric authentication system is disclosed that provides a trusted third party biometric authentication capability for independent confirmation of identity of parties. A repository of biometric templates for registered parties is disclosed that permit a biometric authenticator to perform independent authentication services for other parties by matching received biometric information against biometric information in the repository, or by providing requested biometric information. | 2014-06-05 |
20140157385 | Method for authentication, RF chip document, RF chip reader and computer program products - An authentication method for trusted communication between a first party (A) and a second party (B) is intended to be efficient and secure. | 2014-06-05 |
20140157386 | COMMUNICATION DEVICE, COMMUNICATION METHOD AND COMPUTER PROGRAM - According to one embodiment, there is provided a communication device including a first communication layer receiving processor to perform a receiving process on a first communication layer on data received from a first communication device. The first communication layer receiving processor includes a first key identifying unit to identify, a key required to process the data; a first attribute identifying unit to identify, pursuant to key data, first attribute information that is attribute information associated with the key as identified; and a data processor to process the data using the key as identified. The data processed by the data processor and the first attribute information are passed to a second communication layer processor configured to perform a process on a second communication layer. | 2014-06-05 |
20140157387 | MANAGEMENT SERVER, DEVICE, AND METHOD OF SYNCHRONIZING APPLICATIONS OF THE SAME - A management and market server, different kinds of devices, and methods to synchronize applications between the different kinds of devices is provided. A method for application synchronization by a management server configured to communicate with a plurality of devices includes receiving, from a first device, a first application list of at least one application installed in the first device at the management server, storing the first application list in the management server, receiving, from a second device, a request for application synchronization with the first device, determining whether the second device supports an application from the first application list, generating a second application list by excluding the application from the first application list in response to the application not being supported by the second device, and including the application in response to the application being supported by the second device, and transmitting the second application list to the second device. | 2014-06-05 |
20140157388 | WIRELESS COMMUNICATION SYSTEM AND TERMINAL-DEVICE AUTHENTICATION METHOD IN WIRELESS COMMUNICATION SYSTEM - A wireless communication system includes code transmitters ( | 2014-06-05 |
20140157389 | SERVER AND/OR CLIENT DEVICE AUTHENTICATION - Embodiments of systems and methods for client and/or server authentication are provided. In one embodiment, a method includes sending information from a mobile network device to a server, wherein the information comprises a seed that is used by both the mobile network device and the server to compute a series of one time passwords. The method also includes receiving, by the mobile network device, a succession of one time passwords generated by the server throughout a session. And the method further includes comparing the received one time passwords generated by the server throughout the session to corresponding one time passwords generated at the mobile network device. In this manner, the server can be authenticated. In various embodiments, the process may be reversed to facilitate client, e.g., mobile network device, authentication | 2014-06-05 |
20140157390 | METHOD FOR FACILITATING QUICK LOGINS FROM A MOBILE DEVICE - A computer-implemented method is provided for facilitating a quick login using a mobile computing device having a space-wise limited virtual keyboard. The method includes detecting a response from a server of a website or from an application native to the computing device that includes a login form displayed on a screen of the mobile computing device for authenticating a user, activating an application on the mobile computing device configured to auto fill the login form, and displaying a quick login keyboard, which includes a plurality of boxes configured to hold credential data of the user, wherein the quick login keyboard further includes a plurality of fill buttons, each of which is associated with one of the credential data boxes. The method further includes detecting a tapping on one of the plurality of fill buttons, and populating the login form with the credential data associated with the tapped fill button. | 2014-06-05 |
20140157391 | SECURITY CERTIFICATION AND STORAGE COMBINED APPARATUS HAVING WIRELESS COMMUNICATION FUNCTION - A security certification and storage combined apparatus provides a wireless communication function in that it can provide a function of a security certification and a function of a storage device through a general terminal having an USB communication function and a mobile device, which is not equipped with an USB port, and it can exchange data with the mobile device or change the data received from the mobile device through a wireless communication module, thereby easily implementing the certificate verification interface. | 2014-06-05 |
20140157392 | SYSTEM AND METHOD FOR USING A SEPARATE DEVICE TO FACILITATE AUTHENTICATION - A system that incorporates the subject disclosure may perform, for example, operations including receiving a request from a first device to access information content of a second device. The process further includes determining that the first device is authorized to access the information content according to authorization credentials, and determining a token associated with the request in response to determining that the first device is authorized to access the information content. The token is forwarded to the first device, and it is confirmed that the token was received at the first device. Access to the information content of the second device is authorized in response to confirming that the token was received at the first device. Other embodiments are disclosed. | 2014-06-05 |
20140157393 | PROXY AUTHENTICATION NETWORK - A Proxy Authentication Network includes a server that stores credentials for subscribers, along with combinations of devices and locations from which individual subscribers want to be authenticated. Data is stored in storage: the storage can be selected by the subscriber. The data stored in the storage, which can be personally identifiable information, can be stored in an encrypted form. The key used to encrypt such data can be divided between the storage and server. In addition, third parties can store portions of the encrypting key. Subscribers can be authenticated using their credentials from recognized device/location combinations; out-of-band authentication supports authenticating subscribers from other locations. Once authenticated, a party can request that the encrypted data be released. The portions of the key are then assembled at the storage. The storage then decrypts the data, generates a new key, and re-encrypts the data for transmission to the requester. | 2014-06-05 |
20140157394 | AUTHENTICATION SYSTEM - A user device is configured to request a secure web page from a web page server. The user device is further configured to receive a certificate from the web page server, the certificate including a serial number. The user device is further configured to receive different certificates from a plurality of certificate authentication servers. The user device is further configured to compare the different certificates to the certificate received from the web page server; determine that the certificate is valid; and send information to the web page server based on determining that the certificate is valid. | 2014-06-05 |
20140157395 | METHOD AND APPARATUS FOR ESTABLISHING TUNNEL DATA SECURITY CHANNEL - Sending an authentication request message to an authentication device, receiving an authentication response message sent by the authentication device, where the authentication response message includes a trust relationship information element which is used for indicating a trust relationship of a current access, and establishing an S2c tunnel security association according to the trust relationship of the current access. The trust relationship when the non-3GPP access side accesses the EPS network may be obtained, thereby ensuring establishment of a correct S2c tunnel security data channel. | 2014-06-05 |
20140157396 | EFFICIENT PACKET HANDLING, REDIRECTION, AND INSPECTION USING OFFLOAD PROCESSORS - A method for handling packets is disclosed. The method can include providing at least one main processor connected to a plurality of offload processors by a memory bus; configuring the offload processors to provide security related services on packets prior to redirection to the main processor; and operating a virtual switch respectively connected to the main processor and the plurality of offload processors using the memory bus, with the virtual switch capable of receiving memory read/write data over the memory bus. | 2014-06-05 |
20140157397 | EFFICIENT PACKET HANDLING, REDIRECTION, AND INSPECTION USING OFFLOAD PROCESSORS - A packet handling system is disclosed that can include at least one main processor, a plurality of offload processors connected to a memory bus and configured to provide security related services on packets prior to redirection to the main processor; an arbiter connected to each of the plurality of offload processors, the arbiter capable of scheduling resource priority for instructions or data received from the memory bus; and a virtual switch respectively connected to the main processor and the plurality of offload processors using the memory bus, with the virtual switch capable of receiving memory read/write data over the memory bus, and further directing at least some memory read/write data to the arbiter. | 2014-06-05 |
20140157398 | Systems and Methods for Providing a Multiple Secure Link Architecture - Some embodiments disclosed herein include a MSL twin network address translator (NAT) that includes logic that, when executed by a processor, causes the MSL twin NAT to receive inbound datagram from MSL VPN and record a new VPN owner private IP address from a source IP address in the inbound datagram. In some embodiments the logic causes the MSL twin NAT to assign a new UPIP for the inbound datagram and client workstation and facilitate sending the inbound datagram to the client workstation. | 2014-06-05 |
20140157399 | INFORMATION PROCESSING APPARATUS, AUTHENTICATION METHOD FOR INFORMATION PROCESSING APPARATUS AND AUTHENTICATION PROGRAM FOR INFORMATION PROCESSING APPARATUS - One embodiment provides an information processing apparatus equipped with a housing having a first surface and a second surface opposite thereto and with a touch screen provided on the first surface of the housing. The information processing apparatus has a first operation receiver and an authentication processor. The first operation receiver is provided on the second surface of the housing. And, the authentication processor performs an authentication process based on operation of the first operation receiver. | 2014-06-05 |
20140157400 | DEVICE AND METHOD FOR PROVIDING SECURITY CHANNEL INTERFACE - A security channel interface providing device is provided. The device includes a sensor unit that comprises at least two sensors configured to sense a motion of a user, and a control unit that determines whether or not at least two sensing values sensed by the sensors satisfy a security channel interface activation condition, and activates or inactivates a security channel interface according to a result of the determination. When the security channel interface is activated, the control unit provides a security channel to the user. | 2014-06-05 |
20140157401 | Method of Dynamically Adjusting an Authentication Sensor - A method is disclosed herein for employing detected device context, user history, and inferred identity to cause biometric sensors identification levels to automatically adjust to reduce device access time, computational complexity, and power. | 2014-06-05 |
20140157402 | USER ACCESS CONTROL BASED ON HANDHELD DEVICE ORIENTATION - Disclosed is a novel system, computer program product, and method for allowing access to an application on a handheld device. This is also known as logging on or password entry. The method begins with detecting a change in at least one of orientation and position of a handheld device relative to a given plane. At least one of a keyboard, a touch screen, a gesture, and voice recognition engine input is received. Based on a combination of the at least one of orientation and position of the handheld and the user input received matching a previously stored value, unlocking access to an application running on the handheld device. The detecting of the change in orientation or position or both can occur simultaneously with the user input or previous to the user input or after the user input. | 2014-06-05 |
20140157403 | TRANSITIONING BETWEEN ACCESS STATES OF A COMPUTING DEVICE - Aspects of this disclosure are directed to outputting, for display at a presence-sensitive display, a first set of two or more selectable objects in a first arrangement of locations, the computing device operating in a first instance of a limited access state. At least one of the selectable objects includes an element of a predetermined passcode. The computing device may receive an indication of a first gesture to select one of the selectable objects and an indication of a second gesture to designate the selected object as an element of a candidate passcode. The computing device may transition to an access state based at least in part on a comparison between the candidate passcode and the predetermined passcode. The computing device may transition to a second instance of the limited access state, and may output a second set of two or more selectable objects in a second, different arrangement. | 2014-06-05 |
20140157404 | VIRTUALIZING A HARDWARE MONOTONIC COUNTER - Embodiments of an invention for virtualizing a hardware monotonic counter are disclosed. In one embodiment, an apparatus includes a hardware monotonic counter, virtualization logic, a first non-volatile storage location, and a second non-volatile storage location. The virtualization logic is to create a virtual monotonic counter from the hardware monotonic counter. The first non-volatile storage location is to store an indicator that the count of the hardware monotonic counter has changed. The second non-volatile storage location is to store an indicator that the count of the virtual monotonic counter has changed. | 2014-06-05 |
20140157405 | Cyber Behavior Analysis and Detection Method, System and Architecture - A scalable cyber-security system, method and architecture for the identification of malware and malicious behavior in a computer network. Host flow, host port usage, host information and network data at the application, transport and network layers are aggregated from within the network and correlated to identify a network behavior such as the presence of malicious code. | 2014-06-05 |
20140157406 | APPLICATION TESTING SYSTEM AND METHOD - A method, computer program product, and computer system for sending, by a first computing device, a payload from a plurality of payloads to a second computing device. A response from the second computing device responding to the payload is received at the first computing device. It is determined whether the payload has successfully attacked an application executing at the second computing device based upon, at least in part, the response. If not, at least a portion of the plurality of payloads that shares a structural overlap with the first payload is identified. At least a second payload of the portion is prevented from being sent to the second computing device in response to identifying that the second payload shares the structural overlap with the first payload. | 2014-06-05 |
20140157407 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR EFFICIENT COMPUTER FORENSIC ANALYSIS AND DATA ACCESS CONTROL - According to one aspect, the subject matter described herein includes a method for efficient computer forensic analysis and data access control. The method includes steps occurring from within a virtualization layer separate from a guest operating system. The steps include monitoring disk accesses by the guest operating system to a region of interest on a disk from which data is copied into memory. The steps also include tracking subsequent accesses to the memory resident data where the memory resident data is copied from its initial location to other memory locations or over a network. The steps further include linking operations made by the guest operating system associated with the disk accesses with operations made by the guest operating system associated with the memory accessed. | 2014-06-05 |
20140157408 | METHOD FOR SCANNING FILE, CLIENT AND SERVER THEREOF - A method for scanning files includes enumerating unscanned files; obtaining attributions of the unscanned files from the enumerated files one by one, and transmitting to a server the attributions; comparing the attributions with features that are stored in the server; obtaining the features that are consistent with the attributions and types that the features belong to; and generating a mapping relationship between the unscanned files, the attributions and the types according to the features that are consistent with the attributions and the types of the features, and recording the mapping relationship in a first scanning result. The above method uploads the attributions of the files to the server; and makes the safety and risky recognition of the file through comparing with the features and the corresponding types. | 2014-06-05 |
20140157409 | CLASSIFYING A MESSAGE BASED ON FRAUD INDICATORS - Systems, methods, and media for classifying messages are disclosed. A plurality of fraud indicators are identified in the message. A signature of the message is generated. The generated signature of the message is compared to a stored signature. The stored signature is based on a statistical analysis of fraud indicators in a second message associated with the stored signature. A determination as to whether the message is fraudulent is made based on the comparison. The message is processed based on the determination that the message is a fraudulent message. | 2014-06-05 |
20140157410 | Secure Environment for Graphics Processing Units - In accordance with some embodiments, a protected execution environment may be defined for a graphics processing unit. This framework not only protects the workloads from malware running on the graphics processing unit but also protects those workloads from malware running on the central processing unit. In addition, the trust framework may facilitate proof of secure execution by measuring the code and data structures used to execute the workload. If a part of the trusted computing base of this framework or protected execution environment is compromised, that part can be patched remotely and the patching can be proven remotely throughout attestation in some embodiments. | 2014-06-05 |
20140157411 | SAFETY PROTECTION METHOD AND SAFETY PROTECTION DEVICE - A safety protection method which is performed with a controller includes steps of providing an index table, calling one of the APIs (API), filtering the called API based on a predetermined condition, and blocking the API if the API confirms the predetermined condition. Furthermore, a safety protection device is also disclosed herein. | 2014-06-05 |
20140157412 | DEVICE, METHOD AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM THEREOF FOR PERFORMING ANONYMOUS TESTING ON ELECTRONIC DIGITAL - A method for performing anonymous testing on electronic digital data is provided. The method comprises the steps outlined below. At least one electronic digital data is received. A type of the electronic digital data is identified to retrieve a plurality of data fields according to the type of the electronic digital data, in which the data fields further comprises a plurality of data blocks. The data fields and the data blocks are analyzed such that they are categorized as at least one logic operation part and at least one data content part. A data-hiding process is performed on the data content part only to generate output electronic digital data and a subsequent analysis is performed on the output electronic digital data. | 2014-06-05 |
20140157413 | APPLICATION TESTING SYSTEM AND METHOD - A method, computer program product, and computer system for sending, by a first computing device, a payload from a plurality of payloads to a second computing device. A response from the second computing device responding to the payload is received at the first computing device. It is determined whether the payload has successfully attacked an application executing at the second computing device based upon, at least in part, the response. If not, at least a portion of the plurality of payloads that shares a structural overlap with the first payload is identified. At least a second payload of the portion is prevented from being sent to the second computing device in response to identifying that the second payload shares the structural overlap with the first payload. | 2014-06-05 |
20140157414 | METHOD AND SYSTEM FOR DETECTING MALICIOUS DOMAIN NAMES AT AN UPPER DNS HIERARCHY - A method and system for detecting a malicious domain name, comprising: collecting domain name statistical information from a non-recursive domain name system name server (RDNS NS); and utilizing the collected domain name statistical information to determine if a domain name is malicious or benign. | 2014-06-05 |
20140157415 | INFORMATION SECURITY ANALYSIS USING GAME THEORY AND SIMULATION - Vulnerability in security of an information system is quantitatively predicted. The information system may receive malicious actions against its security and may receive corrective actions for restoring the security. A game oriented agent based model is constructed in a simulator application. The game ABM model represents security activity in the information system. The game ABM model has two opposing participants including an attacker and a defender, probabilistic game rules and allowable game states. A specified number of simulations are run and a probabilistic number of the plurality of allowable game states are reached in each simulation run. The probability of reaching a specified game state is unknown prior to running each simulation. Data generated during the game states is collected to determine a probability of one or more aspects of security in the information system. | 2014-06-05 |
20140157416 | Determining the Likelihood of Traffic Being Legitimately Received At a Proxy Server in a Cloud-Based Proxy Service - Message(s) are received from each one of multiple proxy servers, which are anycasted to the same IP address, that indicate source IP addresses of packets that are received that are directed to that same IP address. These proxy servers receive the packets as result of domain(s) resolving to that same IP address, and a particular one of the proxy servers receives the packets as a result of an anycast protocol implementation selecting that proxy server. Based on these message(s) from each of the proxy servers, a determination of the likelihood of a packet having a particular source IP address being legitimately received at each of the proxy servers is determined. A message is transmitted to each of the proxy servers that indicates which source IP addresses of packets are not likely to be legitimately received at that proxy server. | 2014-06-05 |
20140157417 | METHODS AND SYSTEMS FOR ARCHITECTURE-CENTRIC THREAT MODELING, ANALYSIS AND VISUALIZATION - Methods and systems for use in architecture-centric threat modeling are described. One example system includes a display device, a memory device for storing a plurality of attributes for each of a plurality of network objects, and a processor communicatively coupled to the memory device. The processor is programmed to receive a user selection of at least a first network object and a second network object from the plurality of network objects; create a network architecture including the first network object and the second network object; associate the stored plurality of attributes with the selected network objects in the network architecture; display, on the display device, a graphical representation of the created network architecture; receive, from the user, at least one dataflow attribute associated with at least one of the first and second network objects; and store the at least one dataflow attribute to said memory device as an attribute of at least one of the plurality of network objects. | 2014-06-05 |
20140157418 | DETECTING SECURITY VULNERABILITIES ON COMPUTING DEVICES - Identifying security vulnerabilities on computing devices by detecting an inter-process communication on a computing device, determining whether the inter-process communication is consistent with a predefined specification of a security vulnerability, and causing a predefined action to be performed on the computing device responsive to determining that the inter-process communication is consistent with a predefined specification of a security vulnerability. | 2014-06-05 |
20140157419 | DISCOVERY OF APPLICATION VULNERABILITIES INVOLVING MULTIPLE EXECUTION FLOWS - Methods and systems for security analysis of an application are disclosed. In accordance with one method, a flow-insensitive analysis is conducted on the application to obtain a set of potential vulnerabilities in the application. For each of the potential vulnerabilities, a relevant set of control flows that include the respective vulnerability is determined. Further, for each relevant set of control flows, a flow-sensitive analysis of at least one of the control flows in the corresponding relevant set is performed by a hardware processor to assess the validity of the respective vulnerability. | 2014-06-05 |
20140157420 | DISCOVERY OF APPLICATION VULNERABILITIES INVOLVING MULTIPLE EXECUTION FLOWS - Methods and systems for security analysis of an application are disclosed. One system includes a flow-insensitive analyzer, a control flow assessment module and a flow-sensitive analyzer. The flow-insensitive analyzer is configured to conduct a flow-insensitive analysis on the application to obtain a set of potential vulnerabilities in the application. In addition, the control flow assessment module is configured to determine, for each of the potential vulnerabilities, a relevant set of control flows that include the respective vulnerability. Further, the flow-sensitive analyzer is configured to perform, by a hardware processor, for each relevant set of control flows, a flow-sensitive analysis of at least one of the control flows in the corresponding relevant set to assess the validity of the respective vulnerability. | 2014-06-05 |
20140157421 | DETECTING SECURITY VULNERABILITIES ON COMPUTING DEVICES - Identifying security vulnerabilities on computing devices by detecting an inter-process communication on a computing device, determining whether the inter-process communication is consistent with a predefined specification of a security vulnerability, and causing a predefined action to be performed on the computing device responsive to determining that the inter-process communication is consistent with a predefined specification of a security vulnerability. | 2014-06-05 |
20140157422 | COMBINING PERSONALIZATION AND PRIVACY LOCALLY ON DEVICES - A profiling service may determine, local to a device, user profile attributes associated with a device user based on interaction of the device user with the device, based on device-local monitoring of device user interactions with the device, and may store the user profile attributes in a memory. The profiling service may be configured as an augmentation to a device operating system of the device. A profile exposure component may manage exposure of information associated with the user profile attributes to applications operating locally on the device, without exposure to the applications or to third parties of information determined as sensitive to the device user. | 2014-06-05 |
20140157423 | CODE PROTECTION USING ONLINE AUTHENTICATION AND ENCRYPTED CODE EXECUTION - Methods for code protection are disclosed. A method includes using a security processing component to access an encrypted portion of an application program that is encrypted by an on-line server, after a license for use of the application program is authenticated by the on-line server. The security processing component is used to decrypt the encrypted portion of the application program using an encryption key that is stored in the security processing component. The decrypted portion of the application program is executed based on stored state data. Results are provided to the application program that is executing on a second processing component. | 2014-06-05 |
20140157424 | MOBILE DEVICE PRIVACY APPLICATION - A device is configured to determine that the device is to activate a privacy mode, obscure information displayed by a display of the device, detect a user interaction with a first portion of the display, the first portion being less than an entirety of the display, and reveal first information obscured by the first portion of the display, without revealing information obscured by a remaining portion of the display, the first portion and the remaining portion comprising the entirety of the display. | 2014-06-05 |
20140157425 | CLIENT DEVICE WITH APPLICATION STATE TRACKING AND METHODS FOR USE THEREWITH - A client device includes a network interface that is coupled to receive media content via a network, wherein the media content is protected by digital rights management data. A processing device executes a digital rights management application for validating playback of media content based on state tracker data. A memory stores the media content, the digital rights management application, the digital rights management data and the state tracker data. The digital rights management application generates the state tracker data based on digital rights management data and state data of the digital rights management application. | 2014-06-05 |
20140157426 | PERSONAL INFORMATION PROTECTION SYSTEM FOR PROVIDING SPECIALIZED FUNCTION FOR HOST TERMINAL BASED ON UNIX AND LINUX - Provided are an information protection apparatus and system. The information protection apparatus based on Windows, Unix, or Linux includes a first check unit, a second check unit, and a security measure unit. The first check unit checks whether there is a file including monitoring information among a plurality of check target files in a local storage area, according to a predetermined check policy. The second check unit checks whether there is a file including the monitoring information among the check target files in a sharing storage area of a file system that is shared in a network drive type in an NFS scheme. The security measure unit performs a security measure conforming to a predetermined security policy for the file including the monitoring information. | 2014-06-05 |
20140157427 | APPARATUS AND METHOD FOR VERIFYING INTEGRITY OF FIRMWARE OF EMBEDDED SYSTEM - An apparatus and method for verifying the integrity of firmware of an embedded system is provided. The apparatus for verifying the integrity of firmware of an embedded system includes a target integrity code obtainment unit for obtaining a target integrity code of firmware of the embedded system. A source integrity code obtainment unit obtains a source integrity code of source firmware. An integrity determination unit determines whether integrity of the firmware of the embedded system is maintained, by using the target integrity code and the source integrity code. | 2014-06-05 |
20140157428 | PREVENTING MALICIOUS OBSERVANCE OF PRIVATE INFORMATION - A technique for preventing malicious observance of private information includes receiving an instruction of entering a mode of inputting private information; determining a correspondence between actual inputs and expected inputs; receiving an actual user input; and converting the actual input into an expected input as private information inputted by the user according to the correspondence. This security technique can prevent discovery of the private information of a user through observation. | 2014-06-05 |
20140157429 | LICENSE MANAGEMENT DEVICE, LICENSE MANAGEMENT SYSTEM, LICENSE MANAGEMENT METHOD, AND PROGRAM - A license management device causes a wireless device to enter a state in which all functions are restricted by overwriting key information of the wireless device with a default key specific to the wireless device. A key generating device generates an upgrade key specific to the wireless device, and transmits the update key to the license management device. The license management device can release a restriction of a function in the wireless device by applying the upgrade key to the key information of the wireless device overwritten with the default key. | 2014-06-05 |
20140157430 | Secure Data Transmission System - A secure messaging system that requires pairing of second and receiving devices via user identification credentials and the associated media access control addresses (MAC addresses) of the paired devices. Paired devices may communicate encrypted messages and deletion parameters may be established by a sending device, including immediate deletion requests. The message and the instructions are automatically decrypted by the receiving device and interpreted to provide the data and configure the deletion parameters. The system preferably manages device pairing via a remote server that is accessed by a device application. | 2014-06-05 |
20140157431 | DYNAMIC NEGOTIATION AND AUTHORIZATION SYSTEM TO RECORD RIGHTS-MANAGED CONTENT - A content recording system comprises a digital media recording device to record content. A rights-management module is in electrical communication with the digital media recording device to detect a desired recording performed by the digital media recording device. The rights-management module further communicates digital rights information of a rights-managed content to the digital recording device. The recording of the rights-managed content is performed according to the digital rights information. | 2014-06-05 |
20140157432 | SEMICONDUCTOR DEVICE AND ACCESS RESTRICTION METHOD - The present invention prevents unauthorized functions from being installed to a predetermined storage unit in the background through a communication function that is being used for authorized communication operations and further prevents confidential information from being read out and stolen from the predetermined storage unit. A semiconductor device adopts an exclusive control unit that exclusively controls communication performed by a communication unit capable of communicating with the outside and access to a predetermined storage unit. For example, the communication status of the communication unit is determined based on whether a communication clock is active or inactive, and the exclusive control is exercised based on the determination result. | 2014-06-05 |
20140157433 | MANAGEMENT APPARATUS, MEMBERSHIP MANAGING METHOD, SERVICE PROVIDING APPARATUS, AND MEMBERSHIP MANAGING SYSTEM - A management apparatus stores a usable or non-usable state representing whether a right is usable or non-usable by a user in a facility in which a service is provided by a service provider using a service providing apparatus. And, the management apparatus updates the use usable or non-usable state to a non-usable state in a case where a use request of the right is received and transmits the use request to a terminal apparatus. And, the management apparatus permits the use of the right to the user by updating the usable or non-usable state to a usable state in a case where a notification of satisfaction is received from the terminal apparatus or the service providing apparatus, the notification of satisfaction indicating that the user, who requests the use of the right in the use request, satisfies a use requirements of the right. | 2014-06-05 |
20140157434 | SYSTEM AND METHOD FOR ACCESSING A SERVICE - According to one example of the present invention, there is provided, a method of accessing a service. The method comprising: receiving, from a requesting user, a request for a number of accessing users to have access to the service, generating service access data associated with the service, providing, to the requesting user, the generated service access data for distribution to the accessing users, receiving, from an accessing user, service access data, determining, based in part on the received service access data, whether the service can be provided, and where it is so determined, providing the service to the accessing. | 2014-06-05 |
20140157435 | SEAMLESS SECURE PRIVATE COLLABORATION ACROSS TRUST BOUNDARIES - Seamless, secure, private, collaborative file synchronization across trust boundaries, typically as a companion to a store and sync file service. Information needed to recover a file is stored within the file itself, without giving away secret data. User specific personal keys are preferably only stored on the users' device(s). A unique ID is also created for each protected file; a password is generated that depends on (a) a key value that can either be (i) the user's personal key in the case of a file that is to be private or (ii) a shared key in the case of a file that is to be shared with other users, and (b) the unique file ID. The password is then encrypted using a recovery key and also stored in the file itself. The file is secured using a format that supports password-based content encryption. | 2014-06-05 |
20140157436 | INFORMATION PROCESSING APPARATUS AND METHOD OF CONTROLLING SAME - An information processing apparatus includes a memory and a processor coupled to the memory and configured to receive an instruction to transfer a first application to an execution environment, detect a second application that shares a resource with the first application, the resource being information used upon executing the first application and the second application, provide information for causing a user to determine whether to prohibit transferring the second application to the execution environment when the second application is detected, and invalidate a state in which the second application shares the resource with the first application when instruction to prohibit transferring the second application to the execution environment is received. | 2014-06-05 |
20140157437 | Creating Distinct User Spaces Through User Identifiers - A method of, and a processing system for, creating distinct user spaces. In a platform originally intended to be a single user platform, for each of a plurality of users, a first application used by the user can be assigned a user identifier (UID) unique to the user and the first application. The first UID can be associated with user data exclusively associated with the user and the first application to create a multi-user platform. | 2014-06-05 |
20140157438 | USER DEVICE AND METHOD FOR RECEIVING DRM FUNCTION CORRESPONDING TO SPECIFIC CONTENTS - The present invention proposes a method for obtaining a digital right management (DRM) function for playing DRM contents on a user device according to need. To this end, the present invention comprises the steps of, when a user device requests a specific DRM contents or accesses a service system, a user device obtaining a rights object corresponding to a request; determining information on a current DRM function using the rights object; and when a new DRM function is required, installing a new DRM function or upgrading the standard DRM function. | 2014-06-05 |
20140157439 | METHODS, APPARATUS, AND ARTICLES OF MANUFACTURE TO ENCODE AUXILARY DATA INTO RELATIONAL DATABASE KEYS AND METHODS, APPARATUS, AND ARTICLES OF MANUFACTURE TO OBTAIN ENCODED DATA FROM RELATIONAL DATABASE KEYS - Methods, apparatus, and articles of manufacture to encode auxiliary data into relational database keys and methods, apparatus, and articles of manufacture to obtain encoded data from relational database keys are disclosed. An example method to encode auxiliary data into relational data includes generating a code comprising a plurality of groups and representative of auxiliary data, determining incremental values for the plurality of groups, generating a first key based on the code, and generating a subsequent key by modifying the first key based on the value of the first key and the incremental values. | 2014-06-05 |
20140157440 | METHODS, APPARATUS, AND ARTICLES OF MANUFACTURE TO ENCODE AUXILIARY DATA INTO NUMERIC DATA AND METHODS, APPARATUS, AND ARTICLES OF MANUFACTURE TO OBTAIN ENCODED DATA FROM NUMERIC DATA - Methods, apparatus, and articles of manufacture to encode auxiliary data into numeric data and methods, apparatus, and articles of manufacture to obtain encoded data from numeric data are disclosed. An example method to embed auxiliary information into numeric data includes assigning source data to one of a plurality of groups, the source data comprising a numeric value, identifying a symbol to be added to the source data based on an assigned group of the source data, and generating encoded data by selectively modifying the numeric value of the source data to be representative of the symbol. | 2014-06-05 |
20140157441 | METHODS, APPARATUS, AND ARTICLES OF MANUFACTURE TO ENCODE AUXILARY DATA INTO TEXT DATA AND METHODS, APPARATUS, AND ARTICLES OF MANUFACTURE TO OBTAIN ENCODED DATA FROM TEXT DATA - Methods, apparatus, and articles of manufacture to encode auxiliary data into text data and methods, apparatus, and articles of manufacture to obtain encoded data from text data are disclosed. An example method to embed auxiliary data into text data includes selecting a portion of auxiliary data to be encoded into text data, mapping the portion of auxiliary data to a first set of one or more encoded characters representative of the portion of the auxiliary data, mapping a position of the portion of auxiliary data within the auxiliary data to a second set of one or more encoded characters representative of the portion of the auxiliary data, and generating encoded data by including the first set of encoded characters and the second set of encoded characters in the text data. | 2014-06-05 |
20140157442 | DEVICE AND METHODS FOR DETECTING A CAMERA - A camera detector device for detecting the presence of an illegal camera inside a room. A camera takes multiple pictures of a room and identifies reflections in each still image. If a reflection with similar properties appears repeatedly overtime than the reflection is identified as an illegal camera positioned towards the camera detector device. | 2014-06-05 |
20140157443 | METHODS AND COMPOSITIONS FOR DETECTING AND MODULATING A NOVEL MTOR COMPLEX - Provided herein is a novel mTOR-comprising complex, mT-ORC3, which comprises mTOR and the Ets transcription factor TEL2. Specific mTORC3 binding agents and modulating agents are provided, along with kits and methods for the detection of mTORC3. Methods of modulating the activity of mTORC3 or modulating cell growth and/or survival are also provided. Further provided are methods for screening for mTORC3 binding agents and for mTORC3 modulating agents. Various methods of diagnosis and treatment are further provided. | 2014-06-05 |
20140157444 | WDR13 AS A NOVEL BIOMARKER USEFUL FOR TREATING DIABETES AND CANCER - WD-repeat proteins are very diverse, yet these are structurally related proteins that participate in a wide range of cellular functions. WDR13, a member of this family, is conserved from fishes to humans and localizes into the nucleus. To understand the in vivo function(s) of Wdr13 gene, we have created and characterized a mutant mouse strain lacking this gene. The mutant mice had higher serum insulin levels and increased pancreatic islet mass as a result of the enhanced beta cell proliferation. While a known cell cycle inhibitor, p21, was down regulated in the mutant islets overexpression of WDR13 in the pancreatic MIN6 cell line resulted in upregulation of p21, accompanied by retardation of cell proliferation. We suggest that WDR13 is a novel negative regulator of the pancreatic beta cell proliferation. Co-immunoprecipitation experiments showed that this protein interacts with estrogen receptors and various HDACs. We provide evidence to show that WDR13 can regulate estrogen receptors-mediated transcription both in HDAC-dependent and HDAC-independent manner. Given the higher insulin levels, better glucose clearance and the lack of insulin resistance in WDR13 deficient mice, we propose that this protein may be a potential candidate drug target for ameliorating impaired glucose metabolism in diabetes. | 2014-06-05 |
20140157445 | LOW AFFINITY FCGR DEFICIENT MICE - Genetically modified non-human animals and methods and compositions for making and using them are provided, wherein the genetic modification comprises a deletion of the endogenous low affinity FcγR locus, and wherein the mouse is capable of expressing a functional FcRγ-chain. Genetically modified mice are described, including mice that express low affinity human FcγR genes from the endogenous FcγR locus, and wherein the mice comprise a functional FcRγ-chain. Genetically modified mice that express up to five low affinity human FcγR genes on accessory cells of the host immune system are provided. | 2014-06-05 |
20140157446 | SQUASH HYBRID SV0104YL AND PARENTS THEREOF - The invention provides seed and plants of squash hybrid SV0104YL and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of squash hybrid SV0104YL and the parent lines thereof, and to methods for producing a squash plant produced by crossing such plants with themselves or with another squash plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2014-06-05 |
20140157447 | SQUASH HYBRID SV0153YL AND PARENTS THEREOF - The invention provides seed and plants of squash hybrid SV0153YL and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of squash hybrid SV0153YL and the parent lines thereof, and to methods for producing a squash plant produced by crossing such plants with themselves or with another squash plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2014-06-05 |
20140157448 | CICHORIUM SPP. MALE STERILE MUTANTS - The present invention relates to leaf chicory ( | 2014-06-05 |
20140157449 | SQUASH HYBRID SV0201YL AND PARENTS THEREOF - The invention provides seed and plants of squash hybrid SV0201YL and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of squash hybrid SV0201YL and the parent lines thereof, and to methods for producing a squash plant produced by crossing such plants with themselves or with another squash plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2014-06-05 |
20140157451 | Compositions and Methods for the Generation of Disease Resistant Crops - Compositions and methods for creating crops exhibiting enhanced pathogen resistance are disclosed. | 2014-06-05 |
20140157452 | Plants with Useful Traits and Related Methods - The present invention provides methods for obtaining plants that exhibit useful traits by transient suppression of the MSH1 gene of the plants. Methods for identifying genetic loci that provide for useful traits in plants and plants produced with those loci are also provided. In addition, plants that exhibit the useful traits, parts of the plants including seeds, and products of the plants are provided as well as methods of using the plants. | 2014-06-05 |
20140157453 | METHODS AND COMPOSITIONS FOR THE INTRODUCTION AND REGULATED EXPRESSION OF GENES IN PLANTS - Compositions and methods are provided for the introduction and the regulated expression of genes in plants. Compositions include promoter constructs that provide a level of activity useful for the regulated expression of site-specific recombinases, while avoiding premature excision. Further provided are isolated polynucleotides encoding novel babyboom polypeptides, expression cassettes, and plants comprising the same. Methods for the introduction of genes into plants are provided, including methods for plastid transformation and methods for the transformation of tissues from mature seeds and leaves. | 2014-06-05 |
20140157454 | Powdery Mildew Resistance Providing Genes in Cucumis Sativus - The present invention relates to powdery mildew resistance providing genes of the | 2014-06-05 |
20140157455 | GALL WASP CONTROL AGENTS - The present invention relates to the field of RNA-mediated gene silencing in insect species. The present invention is based, in part, on the inventors' sequencing of genes from | 2014-06-05 |
20140157456 | PEST RESISTANT PLANTS - The disclosure provides an isolated nucleic acid molecule encoding a 7-epizingiberene synthase, a chimeric gene comprising said nucleic acid molecule, vectors comprising the same, as well as isolated 7-epizingiberene synthase proteins themselves. In addition, transgenic plants and plant cells comprising a gene encoding a 7-epizingiberene synthase, optionally integrated in its genome, and methods for making such plants and cells, are provided. Especially Solanaceae plants and plant parts (seeds, fruit, leaves, etc.) with enhanced insect pest resistance are provided. | 2014-06-05 |
20140157457 | PLANT PROTEASE - The application relates to methods for increasing plant yield and transgenic plants with increased yield using a plant protease. | 2014-06-05 |
20140157458 | ENGINEERED ZINC FINGER PROTEINS TARGETING PLANT GENES INVOLVED IN FATTY ACID BIOSYNTHESIS - The present disclosure relates to engineered zinc finger proteins that target genes in plants involved in fatty acid biosynthesis. Methods of using such zinc finger proteins in modulating gene expression, gene inactivation, and targeted gene modification are also provided. | 2014-06-05 |
20140157459 | PESTICIDAL GENE AND USE THEREOF - Involved is pesticidal gene and use thereof, the nucleotide sequence of the pesticidal gene comprises: (a) a nucleotide sequence as shown in SEQ ID NO: 3; or (b) a nucleotide sequence as shown in SEQ ID NO: 4; or (c) an isocoding sequence of (a) or (b) which is not the nucleotide sequence as shown in SEQ ID: 22 or SEQ ID NO: 26; or (d) a nucleotide sequence which hybridizes with the nucleotide sequence as shown in (a), (b) or (c) under stringency conditions and encodes a protein having pesticidal activity. The pesticidal gene of present application is particularly suitable for expression in monocotyledonae and notably increases the expression level, stability and virulence of pesticidal protein Vip3A. At the same time, in present application, | 2014-06-05 |
20140157460 | NOVEL BRASSICA PLANTS - The present invention relates to novel | 2014-06-05 |
20140157461 | Shrub rose plant named 'PEJamore' - A new variety of Shrub rose suitable for garden decoration, having flowers of ivory with a cranberry ‘eye’ coloration. | 2014-06-05 |
20140157462 | Shrub rose plant named 'WEKRUNEFLO' - A new variety of Shrub rose suitable for garden decoration, having flowers of orangey pink with a yellow eye coloration. | 2014-06-05 |