41st week of 2014 patent applcation highlights part 63 |
Patent application number | Title | Published |
20140304765 | Identity-Based Internet Protocol Networking - A network architecture that eliminates anonymous traffic, reduces a threat surface, and enforces policies is described herein. A method based on this network architecture includes receiving, by a processor, an IP packet entering a network, inserting, by the processor, an identity-based interne protocol (IMP) shim between a header and a body of the IP packet and incorporating, by the processor, an identity of a source and a destination of the IP packet in the shim. | 2014-10-09 |
20140304766 | METHOD AND APPARATUS FOR PROTECTING ACCESS TO CORPORATE APPLICATIONS FROM A MOBILE DEVICE - A computer-implemented method, apparatus and computer program product for providing secure consumption of applications from mobile devices, The method comprises receiving a security policy associated with usage of an application by a user using a mobile device, the security policy comprising at least one vulnerability indication; receiving at least partial code of the application; identifying at least one JavaScript instruction in the code, the at least one JavaScript instruction associated with the security vulnerability; and adding additional JavaScript instructions to the code for handling the security vulnerability. | 2014-10-09 |
20140304767 | POLICY-BASED SELECTION OF REMEDIATION - Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, information regarding a program-code-based operational state of a computer system is periodically sampled. A determination is made regarding whether the program-code-based operational state represents a violation of a security policy by evaluating the information with respect to multiple security policies each of with defines at least one parameter condition violation of which is potentially indicative of unauthorized activity on the computer system or manipulation of the computer system to make the computer system vulnerable to attack. When a violation exists then a remediation is identified and deployed to the computer system. The violation is based at least in part on one or more of: whether a particular process is running; the existence, version or status of a particular application; and a version, type or configuration of an operating system installed. | 2014-10-09 |
20140304768 | SECURITY AND PRIVACY ENHANCEMENTS FOR SECURITY DEVICES - A tamper-resistant security device, such as a subscriber identity module or equivalent, has an AKA (Authentication and Key Agreement) module for performing an AKA process with a security key stored in the device, as well as means for external communication. The tamper-resistant security device includes an application that cooperates with the AKA module and an internal interface for communications between the AKA module and the application. The application cooperating with the AKA module is preferably a security and/or privacy enhancing application. For increased security, the security device may also detect whether it is operated in its normal secure environment or a foreign less secure environment and set access rights to resident files or commands that could expose the AKA process or corresponding parameters accordingly. | 2014-10-09 |
20140304769 | DISTRIBUTED AUTHENTICATION, AUTHORIZATION AND ACCOUNTING - In some embodiments, computer systems, storage mediums, and methods are provided for controlling a connecting device's access to a plurality of computer networks. In other embodiments, the provided computer systems, storage mediums, and methods may provide for authentication, authorization, and accounting of connecting devices connecting to a plurality of computer networks. In other embodiments, the provided computer systems, storage mediums, and methods may provide for the distribution of authentication routing data and authorization policies among a plurality of computer networks. In yet other embodiments, the provided computer systems, storage mediums, and methods may provide for the distribution of accounting among a plurality of computer networks. | 2014-10-09 |
20140304770 | TERMINAL - A terminal which selects an access point (AP) and a method thereof are provided. The method for selecting the AP includes: receiving a plurality of packets from a plurality of APs which provide wireless communication services, analyzing the received plurality of packets and calculating reliability for security of the plurality of APs, and displaying the calculated reliability and identification information of the plurality of APs. | 2014-10-09 |
20140304771 | APPLICATION EXECUTION IN A RESTRICTED APPLICATION EXECUTION ENVIRONMENT - Application programming interface (API) calls made by an application are intercepted at runtime. A determination is made as to whether each intercepted API call is allowed or blocked by a restricted application execution environment. Each API call that is blocked by the restricted application execution environment is modified so that the API call is allowable such as, for instance, modifying the API call to execute against a shadow resource. Remediation code might also be executed at runtime to reformat the API call so that it is allowed to execute in the restricted application execution environment. | 2014-10-09 |
20140304772 | Systems and/or Methods for Managing Critical Digital Assets in Power Generating Plants - Systems and methods are disclosed that implement a coordinated cyber security program for a power generation plant to establish and/or maintain cyber security controls for the power generation plant through a comprehensive life cycle approach. | 2014-10-09 |
20140304773 | SYSTEMS, DEVICES, COMPONENTS AND METHODS FOR COMMUNICATING WITH AN IMD USING A PORTABLE ELECTRONIC DEVICE AND A MOBILE COMPUTING DEVICE - The present disclosure involves a method of communicating with an implantable medical device. An authentication process is performed to verify an identity of a user of a mobile computing device. A request is received from the user to access an implantable medical device via the mobile computing device. Based on the identity of the user, a first user interface suitable for the user is selected from a plurality of user interfaces that are each configured to control an implantable medical device. The plurality of user interfaces have different visual characteristics and different levels of access to the implantable medical device. The first user interface is displayed on the mobile computing device. | 2014-10-09 |
20140304774 | Controlling Access to a Website - Methods and apparatus for website access control. The methods and apparatus include, at a user terminal: accessing a plurality of training websites over a network; training the user terminal by classifying the training websites in a content category based on a user input, extracting one or more features indicative of the content category from the training websites and determining a classifier based on the extracted features; classifying further requested websites using the determined classifier; and controlling access to the further requested websites based on the classification of the websites. | 2014-10-09 |
20140304775 | EMPLOYING PHYSICAL LOCATION GEO-SPATIAL CO-ORDINATE OF COMMUNICATION DEVICE AS PART OF INTERNET PROTOCOL - A current physical location value associated is incorporated with a communication device as part of internet protocol (IP). An IP management component obtains current physical location information of a wireless communication device and modifies the IP address to incorporate the current physical location value corresponding to the current physical location of the communication device as part of the IP address of the communication device to prevent undesired intrusions by hackers, as communications associated with the communication device are routed to/from the communication device that is at the current physical location. If the communication device moves to a new location, the IP management component can perform a new IP address modification to modify the IP address to incorporate a new physical location value associated with the communication device. | 2014-10-09 |
20140304776 | METHODS AND APPARATUS FOR MANAGING NETWORK TRAFFIC - Methods, apparatus, and computer readable storage medium for authenticating assertions of a source are disclosed. In one aspect, a method for authenticating an assertion of a source in an environment of distributed control include receiving a notification of the assertion; determining an entity responsible for maintaining an authenticated list of assertions by the source based on a first trusted public record, determining an assertion authenticator for the entity based on a second trusted public record, determining one or more assertions of the source from the assertion authenticator, and authenticating the assertion based on the determined one or more assertions. | 2014-10-09 |
20140304777 | SECURING DATA COMMUNICATIONS IN A COMMUNICATIONS NETWORK - A method of securing communications between first node attached to first network and second node attached to second network. At the second node, first and second information is received on whether the respective first and second networks have a secure network layer path to the respective first and second nodes or are known to use a secure network layer path to attached nodes. Third information is received on whether the first network has a secure internal network layer path and, where the first and second networks are different, whether the first network has a secure network layer path to the second network or is known to use a secure network layer path to the second network. The information determines whether the entire path between the first node and the second node is secured at the network layer level, and whether to establish application layer security for communications. | 2014-10-09 |
20140304778 | DIGITAL CLOUD ACCESS (PDMAS PART III) - The invention is an apparatus that facilitates access to a data source to accept verification and authentication from an enabler using at least one token and at least one reference. The at least one reference could be a device serial number, a networking MAC address, or a membership ID reference from a web service. Access to the data source is also managed with a plurality of secondary enablers. | 2014-10-09 |
20140304779 | DESKTOP SHARING SYSTEM AND METHOD - A server remotely share files in a desktop to one or more clients. The server assigns a meeting desktop to a client according to the assignment request, and receives login requests from other clients for logging in the meeting desktop. The server authorizes a control privilege to a shared client that needs to share files. The server receives the files from the shared client. Then the server opens and shares the files in the meeting desktop to share with all clients in the meeting desktop. | 2014-10-09 |
20140304780 | SYSTEM AND METHOD FOR SECURE REMOTE ACCESS TO A SERVICE ON A SERVER COMPUTER - System and method for providing access to remote computing services in an application server are described, where the authentication and authorization processes are separated, excluding service access privileges from the authenticating process and transferring the privileges to the authorization process. A client device and a user are authenticated, and upon successful authentication, the authorization process is performed, including establishing an authorization connection between the client device and the server computer; at the server computer, detecting and verifying the authorization connection; and upon successful verification, allowing access of the client device to the service on the server computer. In one embodiment, upon detecting the authorization connection, a blocking process is created to block access to the service; and, upon successful verification of the authorization connection, the blocking process on the server computer is terminated, prior to the allowing the access of the client device to the service on the server computer. | 2014-10-09 |
20140304781 | INFORMATION PROCESSING APPARATUS AND METHOD, RECORDING MEDIUM AND PROGRAM - The present invention relates to an information processing apparatus allowing proper communication with a communication partner in accordance with a communication time of the communication partner. | 2014-10-09 |
20140304782 | APPLICATION PLATFORM WITH FLEXIBLE PERMISSIONING - Systems and methods are provided for an application platform with flexible permissioning according to one or more embodiments. In one embodiment, an application platform with flexible permissioning comprises: a service provider server adapted to interact with an application development server and a client device over a network, wherein the service provider server is adapted to implement at least one application programming interface (API); one or more processors; and one or more memories adapted to store a plurality of machine-readable instructions which when executed by the one or more processors are adapted to cause the application platform with flexible permissioning to: maintain, at the service provider server, a profile associated with at least one application developer using the application development server; receive an API call from the application developer; authenticate the application developer and authorize the API call; assign an access level to the application developer based on the profile associated with the application developer; and control permissions given to the application developer to perform operations available based on the assigned access level. | 2014-10-09 |
20140304783 | Monitoring Unauthorized Access Point - A monitoring system, monitoring server, method, and program that, when an unauthorized access point is installed, effectively block wireless communications performed by the unauthorized access point, a monitoring system including a monitoring server for monitoring an unauthorized access point and multiple terminals connected to the monitoring server via a network is provided. The terminals acquire radio wave information from radio waves transmitted by an access point, and transmit the radio wave information to the monitoring server. The monitoring server detects an unauthorized access point using terminal information including the radio wave information received from the terminals, designates a terminal as a pseudo-access point using intensity of radio waves transmitted by the unauthorized access point, and instructs the terminal to transmit radio waves. The terminal transmits radio waves in accordance with the instruction from the monitoring server. | 2014-10-09 |
20140304784 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR MANAGING ACCESS TO SYSTEMS, PRODUCTS, AND DATA BASED ON INFORMATION ASSOCIATED WITH A PHYSICAL LOCATION OF A USER - In accordance with embodiments, there are provided mechanisms and methods for managing access to data based on information associated with a physical location of a user. These mechanisms and methods for managing access to systems, products, or data based on information associated with a physical location of a user can enable improved data management efficiency, enhanced data management accuracy, decreased data management costs, decreased licensing costs, increased security, additional marketing opportunities, etc. | 2014-10-09 |
20140304785 | METHOD FOR SECURING NAME REGISTRIES, NETWORK ACCESS AND DATA COMMUNICATION IN ID/LOCATOR SPLIT-BASE NETWORKS - The invention provides a new system for internet security. The internet network system comprises a first Edge Network | 2014-10-09 |
20140304786 | RESILIENT AND RESTORABLE DYNAMIC DEVICE IDENTIFICATION - A computer system receives a request to access a server. The request includes a first device tag set. When the first device tag set matches a previously assigned device tag set, the computer system allows access to the server without requesting full access credentials of a user. The computer system invalidates the first device tag set, and sends a second device tag set. When the first device tag set does not match the previously assigned device tag set, the computer system requests full access credentials from the user. | 2014-10-09 |
20140304787 | BADGE NOTIFICATION SUBSCRIPTIONS - Sending alerts regarding events related to badges. A method includes receiving a subscription for an entity to receive alerts regarding one or more badges or one or more individuals as it relates to the one or more individuals receiving or maintaining badges. The one or more badges signify one or more of skills, training, attributes, or qualifications of individuals who receive them. The method further includes determining that an event has occurred with respect to the one or more badges or one or more individuals. As a result, the method further includes notifying the entity of the event. | 2014-10-09 |
20140304788 | ENABLING ACCESS TO A SECURED WIRELESS LOCAL NETWORK WITHOUT USER INPUT OF A NETWORK PASSWORD - A method includes identifying, at a security device of a secured wireless network, a wireless-enabled device that is not authorized to access the secured wireless network. The method also includes sending an access request message directed to a messaging address in response to identifying the wireless-enabled device. The access request message includes information that identifies the wireless-enabled device includes a first selectable option to allow access to the secured wireless network without requiring user input of a network password associated with the secured wireless network via the wireless-enabled device. The access request message also and includes a second selectable option to deny access to the secured wireless network. | 2014-10-09 |
20140304789 | CONVENIENT ONE-TIME PASSWORD - Authenticating a human user in a computer system by performing the following steps: (i) determining a one-time password determination algorithm (OTPDA) of one of the following types: graphical, audible, decoder key based, language-based, general knowledge based, temporal, transformative arithmetic and/or a hybrid type; and (ii) revealing the OTPDA to the human user in human-comprehensible form. Revealing OTPDA is done by: (i) communicating the OTPDA itself to the human user, and/or (ii) confirming, to the human user, that the human user's choice for an OTPDA will be used. Preferably, the OTPDA is simple to remember and can be applied by the human user without resort to a computer or similar device. | 2014-10-09 |
20140304790 | DIGITAL CONTENT DISTRIBUTION AND SUBSCRIPTION SYSTEM - Digital content distribution systems and methods are provided for distributing for digital data files, such as digital audio and video data files. In accordance with one implementation, a token-based authentication system is provided that does not require knowledge of the individual user requesting the download of digital content data or real-time access to user account information. Instead, the token-based authentication system embeds the authentication information, or token, in the download request information itself. In this way, the download or content server authenticates the download request using the token contained in the download request information and therefore does not require any additional information to carry out this authentication, such as access to user account information. | 2014-10-09 |
20140304791 | SYSTEM FOR AND METHOD OF SECURING A NETWORK UTILIZING CREDENTIALS - A system for and method of securing a network are described herein. A receiving device listens for packets with proper credentials. If a transmitting device sends the correct credentials, the receiving device will respond with an acknowledgment and further data is able to be transmitted. However, if the transmitting device does not send a packet with the proper credentials, then the receiving device will drop the packet and not respond. Thus, the transmitting device will be unaware of the presence of the receiving device, in particular when hackers are using scanning software to locate target devices. | 2014-10-09 |
20140304792 | SYSTEM AND METHOD FOR IDENTITY CONFIRMATION USING PHYSIOLOGIC BIOMETRICS TO DETERMINE A PHYSIOLOGIC FINGERPRINT - The invention provides a method for verifying a person's identity, which includes obtaining a password and/or random key from a person, and comparing the obtained password and/or random key to a plurality of known passwords and/or random keys to determine a likely identity of the person. The method further includes measuring a specific biometric of the person, the specific biometric comprising a respiratory, cardiac, or other physiologic biometric, and comparing the measured specific biometric to the known specific biometric of the person that is associated with the obtained password and/or random key to verify the likely identity of the person. | 2014-10-09 |
20140304793 | ESTABLISHING AND MAINTAINING AN IMPROVED SINGLE SIGN-ON (SSO) FACILITY - A proxy hardware system includes at least one processor configured to initiate and/or perform the following. A login page being sent to a browser executing on a client associated with a user from a back-end server is intercepted. A routine is added to the login page to generate a modified login page. The modified login page is forwarded to the browser. The browser, upon executing the routine, loads an asynchronous engine configured to execute a login process with an authentication profiling service to retrieve login information for the back-end server, and complete an authentication process with the back-end server. | 2014-10-09 |
20140304794 | ESTABLISHING AND MAINTAINING AN IMPROVED SINGLE SIGN-ON (SSO) FACILITY - A login page being sent to a browser executing on a client associated with a user from a back-end server is intercepted. A routine is added to the login page to generate a modified login page. The modified login page is forwarded to the browser. The browser, upon executing the routine, loads an asynchronous engine configured to execute a login process with an authentication profiling service to retrieve login information for the back-end server, and complete an authentication process with the back-end server. | 2014-10-09 |
20140304795 | MODULAR AUTHENTICATION DEVICE COMBINING BIOMETRIC AND RFID SENSORS - A modular identity authentication apparatus for a computer system includes at least two different authentication technologies, such as biometric fingerprint readers, NFC-RFID receivers, and BYOD sensors. Each modular apparatus provides multiple authentication sensors that are connected through a single port at a computer terminal location. System software permits terminal use when all module devices are authenticated, and shuts down the terminal whenever the module is disconnected. | 2014-10-09 |
20140304796 | PROVIDING GUEST USERS NETWORK ACCESS BASED ON INFORMATION READ FROM A CREDIT CARD OR OTHER OBJECT - Guest user are enabled to access network resources through an enterprise network using a guest user account. A guest user account may be created for a guest for a limited time. Guest account credentials of the guest account may be provided to the guest to use the guest account using any of a variety of techniques described herein, for example, by scanning a guest access card, credit card or mobile telephone of guest user, and providing the guest account credentials to the user based on the information obtained. A guest access management server may be configured to generate and maintain guest accounts, authenticate guest users, and track and log guest activity. A VLAN technology may be used to separate guest traffic from host enterprise traffic on the host enterprise network. After a guest user is authenticated, communications to and from the guest user may be routed to a guest VLAN. | 2014-10-09 |
20140304797 | METHOD AND SYSTEM FOR DISTINGUISHING HUMANS FROM MACHINES AND FOR CONTROLLING ACCESS TO NETWORK SERVICES - A method and an apparatus for distinguishing humans from computers and for controlling access to network services. One intended application of the method is a CAPTCHA technique, deployed using a shared Trusted Computing technology over a trusted network of a user terminal, a network server, and a Trusted Party, any of which may be at a Decision Point. The method distinguishes a human user making a legitimate request for network access from a programmed computer making undesired requests, by detecting unusually high network access request frequencies made by an identifiable user and/or a trusted module from the user terminal. The CAPTCHA function is further used to improve the method for controlling access to network services. The information transmitted between the members of the trusted network may be encrypted. | 2014-10-09 |
20140304798 | SYSTEMS AND METHODS FOR HTTP-BODY DOS ATTACK PREVENTION WITH ADAPTIVE TIMEOUT - The present disclosure is directed generally to systems and methods for changing an application layer transaction timeout to prevent Denial of Service attacks. A device intermediary to a client and a server may receive, via a transport layer connection between the device and the client, a packet of an application layer transaction. The device may increment an attack counter for the transport layer connection by a first predetermined amount responsive to a size of the packet being less than a predetermined fraction of a maximum segment size for the transport layer connection. The device may increment the attack counter by a second predetermined amount responsive to an inter-packet-delay between the packet and a previous packet being more than a predetermined multiplier of a round trip time. The device may change a timeout for the application layer transaction responsive to comparing the attack counter to a predetermined threshold. | 2014-10-09 |
20140304799 | System and method for operating a safety-critical device over a non-secure communication network - In a system and method for operating, at a near location, a remote safety-critical device, the system includes a first operating input device operated at the near location, providing a first barrier control signal; and a second operating input device to be operated at the near location, providing a second barrier control signal. The first barrier control signal is communicatively connected to a near end of a first secure communication tunnel, and the second barrier control signal is communicatively connected to a near end of a second secure communication tunnel, both through the non-secure communication network. Far ends of the first and second secure communication tunnels are communicatively connected to activating inputs of first and second barrier circuits, respectively. The first and second barrier circuits enable operation of the safety-critical device when both are activated. | 2014-10-09 |
20140304800 | METHODS AND APPARATUS FOR AGENT-BASED MALWARE MANAGEMENT - Methods and apparatus for providing protection against malware are disclosed. An exemplary method includes executing an agent program on a remote computer connected to a network, the agent program being configured to communicate with a base computer via the network, the agent program including a firewall arranged to block communications between the remote computer and entities on the network in accordance with predetermined rules; and configuring the firewall in accordance with rules received from the base computer. | 2014-10-09 |
20140304801 | USE OF DATA LINKS FOR AERONAUTICAL PURPOSES WITHOUT COMPROMISING SAFETY AND SECURITY - A method of ensuring secure and cost effective communication of aeronautical data to and from an aircraft is provided. The method includes uplinking air-ground aircraft data communications via an aeronautical safety data link and downlinking air-ground aircraft data communications via a consumer data link separated from the aeronautical safety data link by a one-way firewall. | 2014-10-09 |
20140304802 | LOCKED DOWN NETWORK INTERFACE - A logic device and method are provided for intercepting a data flow from a network source to a network destination. A data store holds a set of compliance rules and corresponding actions. A packet inspector is configured to inspect the intercepted data flow and identify from the data store a compliance rule associated with the inspected data flow. A packet filter is configured to, when the data flow is identified as being associated with a compliance rule, carry out an action with respect to the data flow corresponding to the compliance rule. | 2014-10-09 |
20140304803 | LOCKED DOWN NETWORK INTERFACE - A logic device and method are provided for intercepting a data flow from a network source to a network destination. A data store holds a set of compliance rules and corresponding actions wherein at least one of the set of compliance rules is a temporary compliance rule valid for a predetermined period. A packet inspector is configured to inspect the intercepted data flow and identify from the data store a temporary compliance rule associated with the inspected data flow. A packet filter is configured to when the data flow is identified as being associated with the temporary compliance rule, carry out an action with respect to the data flow corresponding to the temporary compliance rule while the temporary compliance rule is valid. | 2014-10-09 |
20140304804 | ON-PREMISE CLOUD APPLIANCE - A standalone onsite appliance designed to connect a local network and telephony infrastructure to a hosted cloud environment. The appliance acts as an extension of the cloud by creating a bridge into the local network and providing each local user a portion of the cloud infrastructure. The appliance integrates local and wide-area networking, security services, Voice over IP (VoIP) services, and a virtualized server environment. In addition, the appliance provides offline access to otherwise cloud hosted infrastructure, data, and serves as a failover solution in the event of a loss of Internet connectivity. | 2014-10-09 |
20140304805 | INFORMATION PROCESSING APPARATUS AND IMAGE FORMING APPARATUS - It is enabled to execute a setting unique to a user easily without excessively increasing storage data capacity of a storage portion. A control portion, in the case of newly permitting login of a user, compares identification information included in authentication information of the user who is permitted to log in to identification information stored in the storage portion to determine whether the user who is newly permitted to log in is the same user as the user who logged in last time, and in the case where it is determined that the user who logged in last time and the user who has newly logged in are the same, reads operation information stored in the storage portion, to restore operations performed from login to logout last time. | 2014-10-09 |
20140304806 | SECURITY MEDIA AND AUTHENTICATION SYSTEM INCLUDING THE SAME - Disclosed is a security media which can increase a user's convenience without needing for the user to directly input a security code to a touch screen. The security media includes a plate and a plurality of conductive patches adhered to the plate. The plurality of conductive patches may be arranged as a pattern, and thus, when the plurality of conductive patches touch a touch screen of a target device, the pattern may be used as a code for authentication or control of the target device. | 2014-10-09 |
20140304807 | METHOD TO ACTIVATE AND RESTRICT CONTROL OF A DEVICE - There is provided a method to activate and restict control of a device. A first step involves positioning a secondary device on a human body which generates an authorization key. A second step involves using the human body as a local transmitter to transmit the authorization key from the secondary device to the device which is to be activated and controlled. | 2014-10-09 |
20140304808 | Device-Specific Authentication Credentials - Methods and systems for providing device-specific authentication are described. One example method includes generating device-specific credentials, associating the device-specific credentials with a device, authenticating the device based on the device-specific credentials, and after authenticating the device, authenticating a user of the device based on user-specific credentials associated with the user and different than the device-specific credentials. | 2014-10-09 |
20140304809 | EMBEDDED AUTHENTICATION SYSTEMS IN AN ELECTRONIC DEVICE - An electronic device with a display and a fingerprint sensor may authenticate a user for a respective function. While a respective function of the device is in a locked state, the device displays a graphical element on the display, the graphical element indicating a first direction of finger movement that enables unlocking of the respective function. While displaying the graphical element, the device detects an input that includes movement of a finger in the first direction over the fingerprint sensor and determines whether the input meets unlock criteria based at least in part on fingerprint information of the finger detected by the fingerprint sensor during the input. In accordance with a determination that the input meets the unlock criteria, the device unlocks the respective function; and in accordance with a determination that the input does not meet the unlock criteria, the device maintains the respective function in the locked state. | 2014-10-09 |
20140304810 | SYSTEMS AND METHODS FOR PROTECTING CLUSTER SYSTEMS FROM TCP SYN ATTACK - The present solution is directed to systems and methods for synchronizing a random seed value among a plurality of multi-core nodes in a cluster of nodes for generating a cookie signature. The cookie signature may be used for protection from SYN flood attacks. A cluster of nodes comprises one master node and one or more other nodes. Each node comprises one master core and one or more other cores. A random number is generated at the master core of the master node. The random number is synchronized across every other core. The random number is used to generated a secret key value that is attached in the encoded initial sequence number of a SYN-ACK packet. If the responding ACK packet does not contain the secret key value, then the ACK packet is dropped. | 2014-10-09 |
20140304811 | MECHANISM FOR MONITORING DATA USING WATCHLIST ITEMS - Embodiments of the present invention provide a mechanism for monitoring data using a watchlist item and a watchlist item definition that includes a set of parameters for identifying a set of data items for user action and criteria for recommending or requiring user action for the set of data items to be identified. | 2014-10-09 |
20140304812 | FILE SCANNING METHOD AND SYSTEM, CLIENT AND SERVER - A file scanning method and a file scanning system, a client and a server are disclosed. The server may determine a property indicator of a file, that represents probability of the file being a malicious program. The server may make this determination based on a comprehensive consideration of attribute information of the file. The attribute information may be reported by a plurality of clients. The server may send the property indicator to the clients. The clients may determine, according to the property indicator, a scanning strategy on whether to scan the file. Alternatively, the server may determine, according to the property indicator, a scanning strategy on whether to scan the file, and may send the scanning strategy to the clients. The clients may scan the file in accordance with the scanning strategy. Accordingly, only the file with higher probability of being a malicious program may be selectively scanned. | 2014-10-09 |
20140304813 | DISTRIBUTED NETWORK ANOMALY DETECTION - A network device may include multiple interfaces, each including a local database to store, in a first group of local records, information associated with a first group of data units sent from or received by a first one of the group of interfaces; a global database to store, in a group of global records, information associated with the first group of data units and information associated with a second group of data units sent from or received by a second one of said group of interfaces. The device may include a processor, to manage the local database and the global database; broadcast at least one of the local records to the second one of the group of interfaces; and analyze each of the local records to identify potential anomalies in the first group of data units. | 2014-10-09 |
20140304814 | SYSTEM AND METHODS FOR AUTOMATICALLY DETECTING DECEPTIVE CONTENT - Systems and methods for detecting deceptive opinion spam. Certain embodiments include a classifier with improved accuracy for detecting deceptive opinion entries. A feature analysis of learned models reveals a relationship between deceptive opinions and imaginative writing. By modeling deception in a generative framework, the prevalence of deception in two popular online review communities may be determined. Deceptive opinion spam is a rapidly growing and widespread problem, especially in review communities with minimal posting requirements. | 2014-10-09 |
20140304815 | PROGRAM ANALYSIS/VERIFICATION SERVICE PROVISION SYSTEM, CONTROL METHOD FOR SAME, CONTROL PROGRAM, CONTROL PROGRAM FOR DIRECTING COMPUTER TO FUNCTION, PROGRAM ANALYSIS/VERIFICATION DEVICE, PROGRAM ANALYSIS/VERIFICATION TOOL MANAGEMENT DEVICE - A program analysis/verification service provision system ( | 2014-10-09 |
20140304816 | CLIENT BASED LOCAL MALWARE DETECTION METHOD - A method for detecting malware in a user terminal device that has been infected by malware via a browser running on the user terminal device, according to which upon detecting a predetermined a triggering event on the user terminal, a security application installed on the terminal automatically activates a transparent browser to navigate to one or more predetermined URLs. Then the security application checks the code of an inspected webpage that has been received immediately after it is opened by the transparent browser and rechecks the code after being at least partially processed by the transparent browser. If a change the code is detected, an alert is issued, indicating that the terminal has been infected by malware. | 2014-10-09 |
20140304817 | APPARATUS AND METHOD FOR DETECTING SLOW READ DoS ATTACK - A method for detecting a slow read DoS attack in a virtualized environment, the method comprising: receiving a connection request packet transmitted from a client to a server using a web protocol; checking whether the received packet is a TCP SYN packet or a packet of an HTTP GET request message; when it is checked that the received packet is the packet of the HTTP GET request message, detecting whether the received packet is a packet for the slow read DoS attack by analyzing a window size of the HTTP GET request message. | 2014-10-09 |
20140304818 | Method and Device for Multiple Engine Virus Killing - The present invention discloses a method and device for detecting and killing computer viruses using multiple antivirus engines. The method includes: receiving a request for scanning a file to be scanned; sending the information of the file to multiple antivirus engines for scanning, receiving the scanning information returned by the antivirus engines; determining the scanning result of the file, and sending the scanning result of the file, thereby supporting virus killing by using multiple antivirus engines. The present invention integrates the scanning result of multiple antivirus engines according to specific strategies, and utilizes characteristics of different antivirus engines to completely detect and kill various computer viruses based on the scanning result, thereby improving accuracy of virus killing and security of the system. | 2014-10-09 |
20140304819 | SYSTEMS, METHODS AND APPARATUSES FOR PROTECTION OF ANTIVIRUS SOFTWARE - The systems, methods and apparatuses described herein provide a computing system for executing an antivirus software program. In one aspect, a non-transitory computer-readable medium may comprise an antivirus software program to be executed in a first virtual machine by a computer processor that supports multiple virtual machines. The antivirus software program may obtain access to a memory of a second virtual machine on the computer processor that supports multiple virtual machines, and use the access to the memory of the second virtual machine to monitor the memory of the second virtual machine and take a corrective action. In a further aspect, the corrective action may be to remove any malware found on a computer operating system that is running on the second virtual machine. | 2014-10-09 |
20140304820 | Devices, Systems, and Methods for Detecting Proximity-Based Mobile Malware Propagation - Devices, systems, and methods are disclosed. An agent resides in a mobile communication device. The agent detects Proximity-based Mobile Malware Propagation. The agent injects one or more trigger network connections in the candidate connection list. These connections appear as legitimate networks and devices, but instead trigger connection to an agent server on a service provider's network. By attempting to connect through the trigger network connection, the malware reveals itself. The system helps collect the malware signature within a short period of time after the malware outbreak in local areas, though such attacks typically bypass network based security inspection in the network. | 2014-10-09 |
20140304821 | ESTIMATING ASSET SENSITIVITY USING INFORMATION ASSOCIATED WITH USERS - Automatically estimating a sensitivity level of an information technology (IT) asset in one aspect may obtain information about an asset. Characteristics of the asset assigned based on the information may be compared with stored characteristics of known sensitive assets. A sensitivity level of the asset may be determined based on the comparing. | 2014-10-09 |
20140304822 | Systems and Methods for Managing Data Incidents - Systems and methods for managing a data incident are provided herein. Exemplary methods may include receiving data breach data that comprises information corresponding to the data breach, automatically generating a risk assessment from a comparison of data breach data to privacy rules, the privacy rules comprising at least one federal rule and at least one state rule, each of the rules defining requirements associated with data breach notification laws, and providing the risk assessment to a display device that selectively couples with the risk assessment server. | 2014-10-09 |
20140304823 | Multi-dimensional rights scheme - A multi-dimensional rights scheme is described, including generating a time-based media presentation including a media track, encoding the media track for a first right of a user of the media presentation, and encoding a time-based portion of the media presentation for a second right of the user of the media presentation. | 2014-10-09 |
20140304824 | SYSTEMS AND METHODS FOR CONTEXT-SENSITIVE DATA SECURITY FOR BUSINESS APPLICATION PERFORMANCE OPTIMIZATION - Described herein are systems and methods for providing context-sensitive data security, for business application performance optimization. In accordance with an embodiment, the system can be used together with a Role Based Access Control model. Data security predicates can be made context-sensitive, by taking into account the context in which an end-user is navigating an application. By providing context-sensitive data security in this manner, the complexity of database queries can be reduced, and the underlying relational database management system can create better-optimized execution plans. | 2014-10-09 |
20140304825 | ANONYMIZATION AND FILTERING DATA - System and method of anonymising data comprising the steps of reading parameters of an anonymisation procedure from a configurable anonymisation procedure resource. Receiving data to be anonymised from a data source, wherein the data source is identified by one or more of the read parameters. Applying one or more transformations to the received data according to the anonymisation procedure, wherein the one or more transformations include transforming at least an original portion of the received data into a transformed portion. | 2014-10-09 |
20140304826 | CAPACITIVE SENSOR INTEGRATED IN AN INTEGRATED CIRCUIT PACKAGE - A system and method for disposing a capacitive proximity and touch sensor in locations where an integrated circuit package may be vulnerable to intrusion by providing electrodes in the packaging that may prevent interception of data obtained by a probe that is brought into proximity of the integrated circuit. | 2014-10-09 |
20140304827 | DATA LEAK PROTECTION - Methods and systems for Data Leak Prevention (DLP) in an enterprise network are provided. According to one embodiment a data leak protection method is provided. Information regarding a watermark filtering rule is received by a network device. The information includes a sensitivity level and an action to be applied to files observed by the network device that match the watermark filtering rule. A file attempted to be passed through the network device is received by the network device. A watermark embedded within the received file is detected by the network device. A sensitivity level associated with the watermark is compared by the network device to the sensitivity level of the watermark filtering rule after the watermark is detected. If the comparison results in a match, then the action specified by the watermark filtering rule is performed by the network device. | 2014-10-09 |
20140304828 | System and Method for Securing Information Distribution via eMail - A method facilitating secure financial transactions using email is presented comprising the steps of receiving bill data at a server implementing the method, and generating an email message to a recipient with information including at least a portion of the received bill data. The amount of bill data included in the email message is based, at least in part, on the email address of the recipient. | 2014-10-09 |
20140304829 | STATISTICAL MESSAGE CLASSIFIER - A system and method are disclosed for improving a statistical message classifier. A message may be tested with a machine classifier, wherein the machine classifier is capable of making a classification on the message. In the event the message is classifiable by the machine classifier, the statistical message classifier is updated according to the reliable classification made by the machine classifier. The message may also be tested with a first classifier. In the event that the message is not classifiable by the first classifier, it is tested with a second classifier, wherein the second classifier is capable of making a second classification. In the event that the message is classifiable by the second classifier, the statistical message classifier is updated according to the second classification. | 2014-10-09 |
20140304830 | GENERATING A DATA AUDIT TRAIL FOR CROSS PERIMETER DATA TRANSFER - A computing device is disclosed having two or more perimeters, where each perimeter is a logical separation of computing resources. A computing device and method are also disclosed for generating a data audit trail for data transfers between two perimeters. | 2014-10-09 |
20140304831 | REMOTE DATA ACCESS TECHNIQUES FOR PORTABLE DEVICES - A wide-area network (“WAN”)-based service enables remote data access transactions between participating endpoints within a group of participating endpoints that includes at least one server and at least one portable electronic device. Each participating endpoint is configured for communication via one or more communication networks and stores the same or different data items on behalf of a user. The WAN-based service maintains information about each participating endpoint in the group and its network accessibility, and also maintains one or more catalogs of available data items. The WAN-based service identifies a communication network available to both participating endpoints, and a direct or proxied communication session is established between the portable electronic device and the other participating endpoint via the communication network. Selected data items are downloaded, uploaded, accessed or synchronized via the communication session. The use of digital rights and identity management techniques in combination with the WAN-based service is also discussed. | 2014-10-09 |
20140304832 | Secure Information Access Over Network - Embodiments herein relate to accessing secure information over a network. The secure information is read and/or modified based on a request received over the network, regardless of an operating state of an operating system (OS) of the device and/or a power state of the device. | 2014-10-09 |
20140304833 | METHOD AND SYSTEM FOR PROVIDING ACCESS TO CROWDSOURCING TASKS - A method and system for enabling a secure access to data corresponding to a task on a server is disclosed. The task is accessible at a crowdsourcing platform and performable by a crowdworker. The method includes receiving an input for accepting the task on the crowdsourcing platform. The method includes initiating at least one human response test in response to the acceptance of the task by the crowdworker on a computing device. The method includes receiving a response from the crowdworker for the at least one human response test, wherein the response is sent from the computing device. The method includes communicating at least one locator to the computing device if the response is correct. The at least one locator enables the crowdworker to access the data at the server. | 2014-10-09 |
20140304834 | Personalized Secure Data Access Techniques - A technique for a user to access secure data in a PIN-like combination fashion that is substantially undetectable by a third party observer or keystroke tracking computer virus. The technique includes establishing a counter-combination of indicators that may be aligned with set indicators of a user's combination. The counter-combination indicators may be personalized indicators as an aid to the user in entering set indicators in a manner that may be largely undetectable to an observer. | 2014-10-09 |
20140304835 | MULTI-IDENTITY FOR SECURE FILE SHARING - Techniques for controlling access to shared data files such as stored in a collaborative file sharing service. Organizations want to have access to data originated by their employees and want that access to continue even when the employees leave the company. Also, organizations do not want former employees to have access to the company's files. A file storage service uses an Organization's recovery key while creating a recovery record for a file (which may be stored in a folder), and protected using a Work identity. The individual person who originally creates a file and/or shares a folder securely with others is considered the folder's owner as long as he is part of the same Organization. User's identities are validated upon access. The keys are also purged from a local key store as soon as identity changes are detected. In this way, the folder owner will not be able to decrypt files stored in a folder shared using a Work identity if the identity is canceled by the Organization. | 2014-10-09 |
20140304836 | DIGITAL RIGHTS MANAGEMENT THROUGH VIRTUAL CONTAINER PARTITIONING - In embodiments of the present invention improved capabilities are described for securely sharing documents among users within separate business entities, comprising providing a virtual container control facility, on a computing device with an operating system, and at least one virtual container where commands from the operating system for saving, copying, and printing of computer files are restricted for users other than unrestricted users; storing by a first unrestricted user of a first business entity a computer file in the virtual container; granting access permission by the first unrestricted user to view and edit the computer file by a restricted user of a second business entity; and receiving editing of the computer file by the restricted user, the editing creating an edited computer file within the virtual container that is accessible by the unrestricted user. | 2014-10-09 |
20140304837 | SYSTEM AND METHOD FOR CONTROLLING SAME, ACCESS MANAGEMENT SERVICE SYSTEM AND METHOD FOR CONTROLLING SAME, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An access management service system that manages use of a service provided by a resource service system, comprises: a holding unit which holds information of a user and information of a client system in a storage unit; a determination unit which, if an authorization request for use of the service is received from the client system due to an instruction from a user having authority to use the service, determines whether a group to which the user belongs and a group to which the client system belongs match based on the information held in the storage unit; and a presentation unit which, if the determination unit determines that the groups match, presents, to the user, a screen for instructing whether or not to permit delegation of the authority of the user to the client system. | 2014-10-09 |
20140304838 | REMOTE INSTALLATION OF DIGITAL CONTENT - Various embodiments relating to remote installation of digital content on unlicensed computing machines are provided. In one embodiment, an unlicensed computing machine at which to install a licensed digital content item is identified by a licensed computing machine, a request to transfer a license for the licensed digital content item to the unlicensed computing machine is sent from the licensed computing machine to an authorization service computing machine, and delivery of the licensed digital content item to the unlicensed computing machine is initiated. | 2014-10-09 |
20140304839 | ELECTRONIC CLIPBOARD PROTECTION - A clipboard in an electronic system protects sensitive data by copying data into a clipboard of an electronic system as an entry and selectively blocking access to the sensitive data. An entry protect status is associated with a clipboard entry that is arranged to store copied data that is sensitive. The entry protect status is changed to indicate the entry protect status is set to block access to the copied data. Access to the copied data for which the entry protect status has been changed is selectively blocked. | 2014-10-09 |
20140304840 | Deleting Information to Maintain Security Level - A method, system, mediation server, client, and computer program for deleting a copied file in which a master file is duplicated while maintaining a certain level of security. A mediation server receives and stores a copied file in which a master file stored in a server is duplicated, generates private-key information and public-key information, and transmits the generated public-key information and the copied file to a client. The client receives and stores the copied file and the public-key information. In a case where the copied file is updated, the client encrypts difference information on the difference arising in the updating using the public-key information and transmits the difference information to the mediation server. The client determines whether the condition for being secure is satisfied when a process for updating the copied file becomes possible. When determining that the condition is not satisfied, the client deletes the copied file. | 2014-10-09 |
20140304841 | ELECTRONIC DEVICE USING DATA THEFT PROTECTION - An electronic device includes a washer, a printed circuit board, and a screw. The printed circuit board includes a copper foil, a detecting unit and a processing unit. The copper foil comprises a plurality of electrical signal interfaces surrounding a first via defined in the copper foil. The washer defines a second via and includes a transmission metal. The screw combines the printed circuit board and the washer through the second via and the first via. The detecting unit stores an original logic level signal, and detects logic level signals of the electrical signal interfaces in real-time. The processing unit compares the original logic level signal and the detected logic level signal, to determine whether the electronic device is disassembled. If the electronic device is disassembled, the electronic device stops working. | 2014-10-09 |
20140304842 | RED-SHIFTED LUCIFERINS AND METHODS OF USING SAME - Novel red-shifted luciferin derivatives and uses of those compounds are provided. | 2014-10-09 |
20140304843 | METHOD FOR ASSESSMENT OF POTENTIAL FOR DEVELOPMENT OF DRAVET SYNDROME AND USE THEREOF - Provided is a method of assessing a potential for development of Dravet syndrome with high accuracy, and use thereof. The method according to the present invention of assessing a potential for development of Dravet syndrome includes, with use of a sample taken from a subject, detecting whether or not a mutation is on α-subunit type 1 of voltage-gated sodium ion channel Na | 2014-10-09 |
20140304844 | XENOGRAFT MODEL OF HUMAN BONE METASTATIC PROSTATE CANCER - The disclosure herein provides a bone metastasis-derived prostate cancer xenograft model. The disclosure also provides methods for making a bone metastasis-derived prostate cancer xenograft model. In alternative embodiments, the disclosure provides compositions and methods for testing whether a drug, compound, diet, therapy or treatment is effective or efficacious for preventing, ameliorating, slowing the progress of, stopping or slowing the metastasis of, or for causing a full or partial remission of, a cancer, or a prostate cancer, or a human prostate cancer. The disclosure provides compositions and methods whether a drug, compound, diet, therapy or treatment is effective or efficacious for modifying or effecting the structure or organization or vascularization of a tumor microenvironment; or effects the growth, survival, phenotype or histology (tissue or organ structure or microenvironments) of connective tissue, bone cells, osteoblasts, osteocytes, osteoclasts, bone marrow cells, fibroblasts or angiogenic cells. | 2014-10-09 |
20140304845 | ALZHEIMER'S DISEASE SIGNATURE MARKERS AND METHODS OF USE - Methods, biomarkers, and expression signatures are disclosed for assessing the disease progression of Alzheimer's disease (AD). In one embodiment, BioAge (biological age), NdStress (neurodegenerative stress), Alz (Alzheimer), and Inflame (inflammation) are used as biomarkers of AD progression. In another aspect, the invention comprises a gene signature for evaluating disease progression. In still another embodiment, methods for evaluating disease progression are provided. In yet another embodiment, the invention can be used to identify animal models for use in the development and evaluation of therapeutics for the treatment of AD. | 2014-10-09 |
20140304846 | GENE AND MUTATIONS THEREOF ASSOCIATED WITH SEIZURE AND MOVEMENT DISORDERS - The present invention relates to the proline rich transmembrane protein 2 (PRRT2) gene, and the identification of mutations and variations in PRRT2 that give rise to seizure and movement disorders. Accordingly, the present invention provides methods for the diagnosis or prognosis of such disorders by identifying alterations in the PRRT2 gene. Identification of alterations in the PRRT2 gene also enables the identification of subjects with an increased likelihood of having an offspring predisposed to such disorders. The present invention also provides an isolated nucleic acid molecule comprising an alteration in the PRRT2 gene, wherein said alteration produces a seizure and/or movement disorder phenotype. Also provided is an isolated PRRT2 polypeptide that comprises an alteration which produces a seizure and/or movement disorder phenotype. Furthermore, the present invention provides kit for diagnosing or prognosing a seizure and/or movement disorder in a subject, or for identifying a subject with an increased likelihood of having an offspring predisposed to a seizure and/or movement disorder, wherein the kit includes one or more components for testing for the presence of an alteration in the PRRT2 gene in the subject. | 2014-10-09 |
20140304847 | RECOMBINATION EFFICIENCY BY INHIBITION OF NHEJ DNA REPAIR - The present invention relates to a method for modifying a target sequence in the genome of a mammalian cell, the method comprising the step of introducing into a mammalian cell: a. one or more compounds that introduce double-strand breaks in said target sequence; b. one or more DNA molecules comprising a donor DNA sequence to be incorporated by homologous recombination into the genomic DNA of said mammalian cell within said target sequence, wherein said donor DNA sequence is flanked upstream by a first flanking element and downstream by a second flanking element, wherein said first and second flanking element are different and wherein each of said first and second flanking sequence are homologous to a continuous DNA sequence on either side of the double-strand break introduced by said one or more compounds of a. within said target sequence in the genome of said mammalian cell; and c. one or more compounds that decrease the activity of the non-homologous end joining (NHEJ) DNA repair complex in said mammalian cell. Further, the invention relates to a method of producing a non-human mammal carrying a modified target sequence in its genome. | 2014-10-09 |
20140304848 | Genes and uses for plant improvement - This invention provides transgenic plant cells with recombinant DNA for expression of proteins that are useful for imparting enhanced agronomic trait(s) to transgenic crop plants. This invention also provides transgenic plants and progeny seed comprising the transgenic plant cells where the plants are selected for having an enhanced trait selected from the group of traits consisting of enhanced water use efficiency, enhanced cold tolerance, increased yield, enhanced nitrogen use efficiency, enhanced seed protein and enhanced seed oil. Also disclosed are methods for manufacturing transgenic seed and plants with enhanced traits. | 2014-10-09 |
20140304849 | CORN EVENT PV-ZMGT32(NK603) AND COMPOSITIONS AND METHODS FOR DETECTION THEREOF - The present invention provides a DNA construct that confers tolerance to transgenic corn plant. Also provided are assays for detecting the presence of the PV-ZMGT32(nk603) corn event based on the DNA sequence of the recombinant construct inserted into the corn genome and of genomic sequences flanking the insertion site. | 2014-10-09 |
20140304850 | METHOD OF CREATING A SPRING BRASSICA NAPUS - Crossing a winter | 2014-10-09 |
20140304851 | OAT PLANTS HAVING INCREASED BETA-GLUCAN LEVELS - The invention provides oat seed and plants that have increased beta-glucan levels. The invention further provides seed and plants of the oat variety X8787-1 and progeny produced with at least one of these plants as a parent. The invention also relates to the plants, seeds, and tissue cultures of hybrid oat variety X8787-1. | 2014-10-09 |
20140304852 | NOVEL PPETAC1 GENE AND METHOD TO MANIPULATE TREE ARCHITECTURE - Disclosed is a novel gene that controls the branching angle of a tree wherein either silencing or overexpressing PpeTAC1 controls the architecture of transformed to the tree. | 2014-10-09 |
20140304853 | METHODS AND COMPOSITIONS FOR INTEGRATION OF AN EXOGENOUS SEQUENCE WITHIN THE GENOME OF PLANTS - Disclosed herein are methods and compositions for parallel or sequential transgene stacking in plants to produce plants with selected phenotypes. | 2014-10-09 |
20140304854 | METHODS FOR THE IDENTIFICATION OF GENES INVOLVED IN ABIOTIC STRESS TOLERANCE IN PLANTS - Methods are described for the identification of genes useful for conferring tolerance in plants to abiotic stress. Transgenic plants and seeds comprising the stress tolerant genes are also described. Methods to monitor the growth rate of the transgenic plants under stressed or non-stressed conditions are also described. | 2014-10-09 |
20140304855 | Novel Bacterial Proteins with Pesticidal Activity - Provided are pesticidal, particularly insecticidal, proteins which resemble S-layer proteins, as well as variants or mutants thereof, and DNAs encoding them. Further provided are methods and means for using said DNA or protein for controlling pests, particularly plant insect pests. | 2014-10-09 |
20140304856 | PLANT SEEDS WITH ALTERED STORAGE COMPOUND LEVELS, RELATED CONSTRUCTS AND METHODS INVOLVING GENES ENCODING PAE AND PAE-LIKE POLYPEPTIDES - This invention is in the field of plant molecular biology. More specifically, this invention pertains to isolated nucleic acid fragments encoding PAE or PAE-Like proteins in plants and seeds and the use of such fragments to modulate expression of a gene encoding PAE or PAE-Like protein activity in a transformed host cell. | 2014-10-09 |
20140304857 | MAIZE STRESS RELATED TRANSCRIPTION FACTOR 18 AND USES THEREOF - A truncated stress-responsive transcription factor can be overexpressed without causing unfavorable pleiotropic effects. The truncation may result in deletion of a nuclear localization signal. The truncation may result in deletion of one or more regulatory motifs. The truncated transcription factor may be expressed under the control of a constitutive or tissue-preferred promoter. The transcription factor may be from maize. | 2014-10-09 |
20140304858 | PLANTS HAVING ENHANCED YIELD-RELATED TRAITS AND PRODUCING METHODS THEREOF - Provided is a method for enhancing yield-related traits in plants by modulating expression in a plant of a nucleic acid encoding a HhH-GPD-related polypeptide, or a calnexin-related polypeptide. Also provided are plants having modulated expression of a nucleic acid encoding a HhH-GPD-related polypeptide, or a calnexin-related polypeptide, which plants have enhanced yield-related traits relative to control plants. | 2014-10-09 |
20140304859 | Polypeptides Having Endoglucanase Activity and Polynucleotides Encoding Same - Provided are isolated polypeptides having endoglucanase activity and polynucleotides encoding the polypeptides. Also provided are nucleic acid constructs, vectors and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides. | 2014-10-09 |
20140304860 | Molecular Markers Associated with Soybean Tolerance to Low Iron Growth Conditions - The present invention provides methods and compositions for identifying soybean plants that are tolerant or have improved tolerance, or those that are susceptible to, iron deficient growth conditions. The methods use molecular markers to identify, select, and/or introgress genetic loci modulating phenotypic expression of an iron deficiency tolerance trait in soybean plant breeding. Methods are provided for screening germplasm entries for the performance and expression of this trait. | 2014-10-09 |
20140304861 | LEVELING APPARATUS AND ATOMIC FORCE MICROSCOPE INCLUDING THE SAME - The present invention relates to a leveling apparatus that levels an object to be leveled with a surface of a substrate by measuring the force applied to the object, and an atomic force microscope including the leveling apparatus. | 2014-10-09 |
20140304862 | QUANTIFICATION METHOD AND QUANTIFICATION APPARATUS FOR ELECTRODE MATERIAL - In a quantification method for an electrode material, information regarding a distribution of a material in an electrode is obtained. Information regarding a distribution of resistance in the electrode is obtained. A scatter diagram is produced based on the information regarding the distribution of the material and the information regarding the distribution of the resistance. The scatter diagram is divided into a plurality of regions. The material constituting the electrode is quantified based on the divided regions. | 2014-10-09 |
20140304863 | Marking Paper Products - Methods of marking paper products and marked paper products are provided. Some methods include irradiating the paper product to alter the functionalization of the paper. | 2014-10-09 |
20140304864 | Peach tree named 'FA 1566' - A new and distinct variety of peach tree ‘FA 1566’ originating as the result of a cross between ‘Fayette’ (an unpatented selection) and ‘Newhaven’ (an unpatented selection). The new variety is unique from ‘Fayette’ in that it is 80% to 90% red with a background of orange-red with dark red highlights and ripens 9 days earlier and is unique from Newhaven in that it is 80% to 90% red with a background of orange-red with dark red highlights and ripens 18 days later. | 2014-10-09 |