36th week of 2014 patent applcation highlights part 51 |
Patent application number | Title | Published |
20140250522 | SYSTEMS AND METHODS USING DRAWINGS WHICH INCORPORATE BIOMETRIC DATA AS SECURITY INFORMATION - Systems and methods using drawings as security information are disclosed. According to an aspect, a computing device may include a touchscreen display configured to receive information for drawing a security picture. Further, the computing device may include a security manager configured to determine one or more characteristics associated with input of the gesture information. The security manager may also be configured to authenticate a user based on the drawn security picture and the one or more characteristics associated with input of the gesture information. | 2014-09-04 |
20140250523 | Continuous Authentication, and Methods, Systems, and Software Therefor - Controlling a registered-user session of a registered user on a device using first and second authentication processes and a handoff from the first process to the second process. In one embodiment, the first authentication process is a stronger process performed at the outset of a session, and the second authentication process is a weaker process iteratively performed during the session. The stronger authentication process may require cooperation from the user, while the weaker authentication process is preferably one that requires little or no user cooperation. In other embodiments, a strong authentication process may be iteratively performed during the session. | 2014-09-04 |
20140250524 | Deception-Based Responses to Security Attacks - Deception-based techniques for responding to security attacks are described herein. The techniques include transitioning a security attack to a monitored computing device posing as a computing device impacted by the security attack and enabling the adversary to obtain deceptive information from the monitored computing device. Also, the adversary may obtain a document configured to report identifying information of an entity opening the document, thereby identifying the adversary associated with the attack. Further, the techniques include determining that a domain specified in a domain name request is associated with malicious activity and responding to the request with a network address of a monitored computing device to cause the requesting process to communicate with the monitored computing device in place of an adversary server. Additionally, a service may monitor dormant domains names associated with malicious activity and, in response to a change, respond with an alert or a configuration update. | 2014-09-04 |
20140250525 | SYSTEMS AND METHODS FOR PREVENTING DATA REMANENCE IN MEMORY - A system for preventing data remanence in memory is provided. The system includes a computing device, a memory chip coupled to the computing device and including memory, and a heater, the heater configured to prevent data remanence in a memory by providing heat to at least a portion of the memory. The memory includes a plurality of bits configured to electronically store data. | 2014-09-04 |
20140250526 | DETECTING FRAUDULENT ACTIVITY BY ANALYSIS OF INFORMATION REQUESTS - Techniques are described for use in inhibiting attempts to fraudulently obtain access to confidential information about users. In some situations, the techniques involve automatically analyzing at least some requests for information that are received by a Web site or other electronic information service, such as to determine whether they likely reflect fraudulent activities by the request senders or other parties that initiate the requests. For example, if a request is being made to a Web site based on a user's interaction with a third-party information source (e.g., another unaffiliated Web site) that is not authorized to initiate the request, the third-party information source may be a fraudulent phishing site or engaging in other types of fraudulent activity. If fraudulent activity is suspected based on analysis of one or more information requests, one or more actions may be taken to inhibit the fraudulent activity. | 2014-09-04 |
20140250527 | METHOD AND DEVICE FOR DETERMINING PROPAGATION RELATIONSHIP OF TROJAN HORSE FILES - A method performed by a computer system determines propagation relationships of Trojan horse files. A current Trojan horse file is stored into a corresponding current level of a propagation relationship tree. A condition of the current Trojan horse file or of the propagation relationship tree is assessed. The following steps are repeated until the condition is satisfied: search Trojan horse files for a parent, child or sibling relative to the current Trojan horse file, identify one of the Trojan horse files as the current Trojan horse file, and store the current Trojan horse file into a corresponding current level of the propagation relationship tree. When the condition is satisfied, the propagation relationship tree is displayed. The storing of the current Trojan horse file may include storing an identifier of the current Trojan horse file, which may include data abstraction output, and/or a downloading address of the current Trojan horse file. | 2014-09-04 |
20140250528 | ELECTRONIC CONTROL UNIT WITH VEHICLE INTRUSION DETECTION - An electronic control unit is provided for installation in a vehicle. The electronic control unit is operable to provide intrusion detection for the vehicle electronic systems. The electronic control unit comprises: a processor; a memory; and an interface to a vehicle network bus coupled to vehicle electronic control units. The processor utilizes the interface to monitor data on the vehicle network bus. An intrusion detection program is stored in the memory and is executable by the processor. The processor utilizes the intrusion detection program to detect one or more anomalies in the monitored data. The electronic control unit generates an alert upon detection of one or more anomalies. | 2014-09-04 |
20140250529 | MOBILE ROUTER WITH VEHICLE INTRUSION DETECTION - An embodiment is provided of a mobile router for installation in a vehicle comprising a vehicle network bus coupled to a plurality of electronic control units. The mobile router comprises: a processor; a memory comprising a plurality of programs; a wireless wide area network interface; a wireless local area network interface; and an interface to the vehicle network bus coupled to vehicle electronic control units. The processor utilizes the interface to monitor data on the vehicle network bus. The plurality of programs comprises an intrusion detection program executable by the processor to detect one or more anomalies in the monitored data; and to generate an alert upon detection of one or more anomalies. | 2014-09-04 |
20140250530 | METHOD FOR VEHICLE ELECTRONIC SYSTEM INTRUSION DETECTION - An embodiment is provided of a mobile router for installation in a vehicle comprising a vehicle network bus coupled to a plurality of electronic control units. The mobile router comprises: a processor; a memory comprising a plurality of programs; a wireless wide area network interface; a wireless local area network interface; and an interface to the vehicle network bus coupled to vehicle electronic control units. The processor utilizes the interface to monitor data on the vehicle network bus. The plurality of programs comprises an intrusion detection program executable by the processor to detect one or more anomalies in the monitored data; and to generate an alert upon detection of one or more anomalies. | 2014-09-04 |
20140250531 | METHOD FOR VEHICLE INTRUSION DETECTION WITH ELECTRONIC CONTROL UNIT - A method of operating a predetermined electronic control unit is provided for a vehicle comprising: a vehicle network bus and one or more electronic control units coupled to the bus. The method comprises: providing the predetermined electronic control unit of with a processor, a memory, an interface to the vehicle network bus, and an intrusion detection program. The method further comprises: utilizing the predetermined electronic control unit to monitor data on the vehicle network bus; executing the intrusion detection program to detect one or more anomalies in the monitored data; and utilizing the predetermined electronic control unit to generate an alert upon detection of one or more anomalies. | 2014-09-04 |
20140250532 | A RENDER ENGINE, AND METHOD OF USING THE SAME, TO VERIFY DATA FOR ACCESS AND/OR PUBLICATION VIA A COMPUTER SYSTEM - A method and system to verify active content at a server system include receiving, at the server system a communication (e.g., an e-mail message or e-commerce listing) that includes active content that is to be made accessible via the server system. At the server system, the active content is rendered to generate rendered active content. The rendered active content presents a representation of information and processes to which an end user will be subject. At the server system, the rendered active content is verified as not being malicious. | 2014-09-04 |
20140250533 | MOBILE RISK ASSESSMENT - A query is received from a particular endpoint device identifying a particular wireless access point encountered by the particular endpoint device. Pre-existing risk assessment data is identified for the identified particular wireless access point and query result data is sent to the particular endpoint device characterizing pre-assessed risk associated with the particular wireless access point. In some instances, the query result data is generated based on the pre-existing risk assessment data. In some instances, pre-existing risk assessment data can be the result of an earlier risk assessment carried-out at least in part by an endpoint device interfacing with and testing the particular wireless access point. | 2014-09-04 |
20140250534 | MANAGEMENT OF DIGITAL INFORMATION - According to an embodiment of the present invention, a system provides secure access to a digital item and includes at least one processor. The system partitions the digital item into a plurality of segments each containing a portion of the digital item and associated with a corresponding sensitivity level. The portion of the digital item within each segment is encrypted in accordance with the corresponding sensitivity level, and the plurality of segments are randomly stored among a plurality of storage units. Embodiments of the present invention further include a method and computer program product for providing secure access to a digital item in substantially the same manner described above. | 2014-09-04 |
20140250535 | APPARATUS FOR PREVENTING REPLAY ATTACK AND METHOD FOR PREVENTING REPLAY ATTACK - An apparatus for preventing replay attacks and a method for preventing replay attacks are provided in this invention, wherein the apparatus for preventing replay attacks comprises: an acquisition unit for, when a request for operating a digital content is received, acquiring current location information of a set of placeholder files; a determination unit for determining whether the current location information is consistent with recorded location information of the placeholder file; a protection unit for, when inconsistent as determined by the determination unit, wherein there is a correspondence between the digital content and the set of placeholder files. | 2014-09-04 |
20140250536 | ADD-IN DIGITAL RIGHTS MANAGEMENT - The subject matter disclosed herein relates to regulating the operation of component object model add-ins associated with a user interface. | 2014-09-04 |
20140250537 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR DATA GOVERNANCE AND LICENSING - Various embodiments provide a data governance and licensing system for monitoring usage of tracking data associated with transport of a plurality of packages and for facilitating licensing arrangements in connection therewith. In certain embodiments, the system comprises: one or more memory storage areas containing a variety of data and one or more computer processors. The one or more computer processors are configured to: receive observed data associated with access of tracking data by at least one accessing party; analyze at least a portion of the observed data to determine identification data for the accessing party; compare the identification data and the authorized user data to determine whether the accessing party is an authorized party; determine whether one or more discrepancies exist between the observed data and either generic usage data or authorized user data; and if so, generate either a license proposal or a license revision request. | 2014-09-04 |
20140250538 | DISTINGUISH VALID USERS FROM BOTS, OCRs AND THIRD PARTY SOLVERS WHEN PRESENTING CAPTCHA - Embodiments of the present invention relate to a method of providing an automated public Turing test to a client display system. The method includes providing an image having a plurality of random characters, as well as providing a browser code to the client, whereby the browser code is adapted to restrict display of the image to only a predetermined portion of the image. The method further includes detecting a client response to receiving the predetermined portion of said image. | 2014-09-04 |
20140250539 | Real-Time Management System for Mobile Electronic Devices - Disclosed are a real-time management system for mobile electronic devices and its operating method. The real-time management system includes a mobile electronic device and a main system. After a web developer's management priority of the mobile electronic device is enabled and the mobile electronic device is electrically connected to the main system, the web setting and browser setting of the mobile electronic device are duplicated to the main system to form a mapping area, and the mobile electronic device and the main system turn on a communication port as a specific channel through a web debugging mode, so that the main system and the mobile electronic device constitute a proxy server for performing real-time operations in the mapping area and displaying the operation results through a touch screen of the mobile electronic device without requiring the installation of other application programs, so as to skip the complicated setup procedure. | 2014-09-04 |
20140250540 | DYNAMIC RESOURCE SHARING - Representative implementations of devices and techniques provide dynamic secure sharing of resources. A resource module can be partitioned into a plurality of functional blocks, which may be allocated to non-secure and secure applications. A security monitor can monitor processor activity and determine when secure resources may be accessed. | 2014-09-04 |
20140250541 | ANTI-TAMPER SYSTEM BASED ON DUAL RANDOM BITS GENERATORS FOR INTEGRATED CIRCUITS - An apparatus includes a mesh block, a first number generator configured to generate a first number, a second number generator configured to generate a second number, and a comparator block configured to compare the first number with the second number and generate an output signal from the mesh block. The output signal indicates an occurrence of an unauthorized activity on the mesh block. | 2014-09-04 |
20140250542 | MITOCHONDRIAL-NUCLEAR EXCHANGED CELLS, TISSUES, ORGANS AND ANIMALS - Provided herein are mitochondrial-nuclear exchanged cells and animals comprising mitochondrial DNA (mtDNA) from one subject and nuclear DNA (nDNA) from a different subject. Methods for producing a mitochondrial-nuclear exchanged animal and animals made by the methods are provided. Also provided are methods of screening for agents useful for treating a disease or disorder using mitochondrial-nuclear exchanged animals or cells, tissues or organs thereof. | 2014-09-04 |
20140250543 | ACETYL CO-ENZYME A CARBOXYLASE HERBICIDE RESISTANT PLANTS - The present invention provides for compositions and methods for producing crop plants that are resistant to herbicides. In particular, the present invention provides for wheat plants, plant tissues and plant seeds that contain altered acetyl-CoA carboxylase (ACCase) genes and proteins that are resistant to inhibition by herbicides that normally inhibit the activity of the ACCase protein. | 2014-09-04 |
20140250544 | LACTUCA SATIVA CULTIVAR PRIMA FOREST - According to the invention, there is provided a novel romaine lettuce cultivar, designated Prima Forest. ‘Prima Forest’ is described as a vigorous romaine cultivar recommended for the main lettuce growing regions of California and Arizona. It has light plant weight, small core diameter, short plant height and also has resistance to lettuce downy mildew. This invention thus relates to the seeds of lettuce cultivar Prima Forest, to the plants of lettuce cultivar Prima Forest, to plant parts of lettuce cultivar Prima Forest, to methods for producing a lettuce cultivar by crossing the lettuce cultivar Prima Forest with another lettuce cultivar, and to methods for producing a lettuce cultivar containing in its genetic material one or more backcross conversion traits or transgenes and to the backcross conversion lettuce plants and plant parts produced by those methods. | 2014-09-04 |
20140250545 | VARIETY CORN LINE FA4172 - The present invention provides an inbred corn line designated FA4172, methods for producing a corn plant by crossing plants of the inbred line FA4172 with plants of another corn plant. The invention further encompasses all parts of inbred corn line FA4172, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line FA4172, and plants produced according to these methods. | 2014-09-04 |
20140250546 | Method for Identification and Isolation of Terminator Sequences Causing Enhanced Transcription - The invention relates to efficient, high-throughput methods, systems, and DNA constructs for identification and isolation of terminator sequences causing enhanced transcription. The invention further relates to terminator sequences isolated with such methods and their use for enhancing gene expression. | 2014-09-04 |
20140250547 | PLANT EXPRESSION CONSTRUCTS COMPRISING AND USES THEREOF - Methods of expressing a molecule of interest in a plant are disclosed. One method comprises contacting roots of the plant in a solution comprising at least one Geminivirus based expression construct so as to allow the at least one Geminivirus based expression construct to be absorbed by the roots, the expression construct comprising a polynucleotide encoding the molecule of interest, and further the expression construct being capable of systemic symptomless spread in a plant host, thereby expressing a molecule of interest in a plant. Expression constructs capable of systemic symptomless spread in a host plant are also disclosed. | 2014-09-04 |
20140250548 | Plants Having Enhanced Yield-Related Traits and a Method for Making the Same - Provided is a method for enhancing yield-related traits in plants by modulating expression in a plant of a nucleic acid encoding an NEMTOP6 polypeptide. Also provided are plants having modulated expression of a nucleic acid encoding an NEMTOP6 polypeptide, which plants have enhanced yield-related traits compared with control plants. Also provided are NEMTOP6-encoding nucleic acids, and constructs comprising the same, useful in enhancing yield-related traits in plants. | 2014-09-04 |
20140250549 | PROTEIN EXPRESSION SYSTEMS - The invention is based on an expression enhancer sequence derived from the RNA-2 genome segment of a bipartite RNA virus, in which a target initiation site in the RNA-2 genome segment has been mutated. Deletion of appropriate start codons upstream of the main RNA2 translation initiation can greatly increase in foreign protein accumulation without the need for viral replication. Also provided are methods, vectors and systems, including the ‘hyper-translatable’ Cowpea Mosaic Virus (“CPMV-HT”) based protein expression system. | 2014-09-04 |
20140250550 | COMPOSITIONS AND METHODS FOR MODULATING ANTHOCYANIN ACCUMULATION AND PISTIL DEVELOPMENT - MdMYB3 nucleic acids and polypeptides are provided for use in modulating the accumulation of anthocyanins and flavonols as well as the length of styles and peduncles of transgenic flowers. | 2014-09-04 |
20140250551 | Methods for Enhancing Stress Tolerance in Plants and Compositions Thereof - Increased tolerance to abiotic stress in a plant is provided by introducing DNA expressing a cold shock protein, e.g. bacterial cold shock protein. | 2014-09-04 |
20140250552 | Compositions and methods to control insect pests - Methods and compositions are provided which employ a silencing element that, when ingested by a pest, such as a Coleopteran plant pest or a | 2014-09-04 |
20140250553 | SENSOR FOR LOW FORCE-NOISE DETECTION IN LIQUIDS - The embodiments described herein provide a sensor. In an exemplary embodiment, the sensor includes (1) a resonator, (2) a probe attached to the resonator, and (3) an encasement that encases the resonator, where the encasement includes an opening through which the probe can protrude and where the dimensions of the encasement are on the same order as the dimensions of the resonator. | 2014-09-04 |
20140250554 | Dogwood plant named 'MADI-II' - A new variety of | 2014-09-04 |