46th week of 2013 patent applcation highlights part 71 |
Patent application number | Title | Published |
20130305313 | AUTHENTICATION POLICY USAGE FOR AUTHENTICATING A USER - A method and system for authenticating a user. A first server of multiple servers generates an authentication policy table by inserting into the authentication policy table an authentication policy of each server and setting a relative priority of each server in the authentication policy table of the first server in order of decreasing number of users registered in an authentication system of each server. The authentication policy of each server is at least one rule of each server for authenticating users of a federated computing environment that includes the multiple servers. The first server receives an access request from the user to access the federated computing environment, receives input authentication information from the user, and determines from use of both the input authentication information and the at least one rule in the authentication policy table of the first server that the user is authorized to access the federated computing environment. | 2013-11-14 |
20130305314 | MANAGING ACCESS TO DATA BASED ON DEVICE ATTRIBUTE INFORMATION - A technique involves receiving a request for certain data to be processed by a device and determining, based on an attribute of the device, whether to allow an operation to be performed on the data; after allowing the operation to be performed on the data: sending, to the device, a request for one or more characteristics of the device; in response to the request, receiving the one or more characteristics from the device; storing, based on the one or more characteristics, a second attribute that is associated with the device; after storing the second attribute: receiving a second request for second data to be processed by the device; determining, based on the second attribute of the device, whether to allow an operation to be performed on the second data; determining to not allow the second operation to be performed, wherein the device is capable of processing the second data. | 2013-11-14 |
20130305315 | MULTI-MEDIA IDENTITY MANAGEMENT SYSTEM - A method for utilizing multi-media identities for access control to a secure area or item can begin with a multi-media identity management system providing a multi-media identity to an entity for use with an access control system. The multi-media identity can be a digital identifier defining multi-media authentication data and security privileges for the entity. The provided multi-media identity and multi-media authentication data can be received in an access request for a secure area or item. The multi-media authentication data can be verified against the multi-media data elements of the multi-media identity. The security privileges of the multi-media identity can be validated for the secure area or item. When the multi-media authentication data, multi-media identity, and security privileges are valid, the entity can be granted access and denied access when at least one item is invalid. | 2013-11-14 |
20130305316 | COMMUNICATIONS SECURITY MANAGEMENT - Implementing communications security includes creating levels of permissions for association with inbound communications. The levels of permissions are indicative of components of the communications enabled for transmission to a recipient computer. The communications security also includes creating conditions upon which currently-assigned levels of permissions are adjustable to a next level of the levels of permissions. In response to identifying an inbound communication received from a sender, the communications security evaluates content of the inbound communication, determines a trust value for the inbound communication responsive to the evaluating, applies the conditions to the inbound communication and the sender, determines an assignment of one of the levels of permissions for the inbound communication in response to applying the conditions, and transmits the inbound communication to the recipient computer, including any components enabled for transmission, based on the assignment of the level of permissions. | 2013-11-14 |
20130305317 | CREATING FEDERATED ASSOCIATE IDENTIFIERS TO POSITIVELY IDENTIFY ASSOCIATES INTERFACING ACROSS MULTIPLE BUSINESS APPLICATIONS - Methods, apparatus, systems and computer program products are described and claimed that provide for automatically and positively determining that an associate accessing a business domain/application using an application-specific associate identifier is the same associate that is accessing another business domain/application using another application-specific associate identifier. Once the positive determination of same associate is made, a federated identifier key is generated and applied to all of the platforms in which the associate can be positively identified, so as to globally identify the associates across multiple enterprise-wide domains/applications. As such, the present invention eliminates the need to manually analyze associate data to determine if an associate interfacing with one domain/application is the same associate interfacing with another domain/application. | 2013-11-14 |
20130305318 | COMMUNICATIONS SECURITY MANAGEMENT - Implementing communications security includes creating levels of permissions for association with inbound communications. The levels of permissions are indicative of components of the communications enabled for transmission to a recipient computer. The communications security also includes creating conditions upon which currently-assigned levels of permissions are adjustable to a next level of the levels of permissions. In response to identifying an inbound communication received from a sender, the communications security evaluates content of the inbound communication, determines a trust value for the inbound communication responsive to the evaluating, applies the conditions to the inbound communication and the sender, determines an assignment of one of the levels of permissions for the inbound communication in response to applying the conditions, and transmits the inbound communication to the recipient computer, including any components enabled for transmission, based on the assignment of the level of permissions. | 2013-11-14 |
20130305319 | HUB KEY SERVICE - In embodiments of a hub key service, a device includes a communication interface for communication coordination with one or more associated devices of the device, and the associated devices correspond to hub members. A hub manager is implemented to generate an electronic key that includes access permissions, which are configurable to enable controlled access for the hub members, such as to a building, vehicle, media device, or location. The hub manager can then correlate the electronic key with the device to enable access to the building, vehicle, media device, or location with the device utilized as the electronic key. | 2013-11-14 |
20130305320 | AUTOMATIC SERVICE ACTIVATION FOR USER DEVICE UPON DETECTING ITS DEVICE IDENTIFIER ON NETWORK OF HOSPITALITY ESTABLISHMENT - A service controller includes a network interface for coupling to a local area network of a hospitality establishment, and one or more processors coupled to the network interface. The one or more processors are configured to detect a device identifier of a user device on a local area network of a hospitality establishment, determine whether a guest of the hospitality establishment is associated with the device identifier, and automatically activate a service for the user device at the hospitality establishment in response to detecting the device identifier on the local area network when a guest of the hospitality establishment is determined to be associated with the device identifier. | 2013-11-14 |
20130305321 | METHODS FOR CONFIRMING USER INTERACTION IN RESPONSE TO A REQUEST FOR A COMPUTER PROVIDED SERVICE AND DEVICES THEREOF - A method, non-transitory computer readable medium, and access manager device includes providing an initial challenge to a client computing device requesting access to a service. The initial challenge includes one or more of one or more objects, one or more indicative answers, and one or more questions based on the one or more objects. At least one challenge response to the initial challenge is received from the client computing device. A determination is when there is a match between the at least one challenge response to the initial challenge and corresponding response data associated with the initial challenge. One or more actions with respect to the request to access the service are performed based on the determination. | 2013-11-14 |
20130305322 | System and Method for Providing User Notifications - A method comprising obtaining a credential associated with a first device in a device group, the device group having a shared data allocation available to the device group, the shared data allocation establishing an amount of communication over a first wireless network; determining, based on the credential, that the first device is authorized to set or change an aspect of a policy applicable when a second device in the device group is connected to the first wireless network; obtaining, from the first device, a user preference; and provisioning, based on the user preference and the determination that the first device is authorized to set or change the at least an aspect of the policy for the second device, one or more network elements to at least assist in enforcing or applying the policy when the second device is connected to the first wireless network. | 2013-11-14 |
20130305323 | METHODS AND SYSTEMS FOR AUTHENTICATING ONE OR MORE USERS OF A VEHICLE COMMUNICATIONS AND INFORMATION SYSTEM - In at least one embodiment, a system for authorizing use of a vehicle communication and information system may include one or more data processors configured to receive information associating one or more devices with a vehicle computer. The data processor(s) may be also configured to receive information identifying a user requesting authorization to command the vehicle controls from the one or more devices associated with the vehicle computer. The user(s) may be authorized to command the vehicle controls from the one or more devices associated with the vehicle computer based on performing an authentication process for authenticating the user, determining that the user is an authenticated user based on the authentication process, and enabling command of one or more vehicle controls from the one or more remote devices via the associated vehicle computer based on the user being authenticated. | 2013-11-14 |
20130305324 | Incremental Password Barriers to Prevent Malevolent Intrusions - According to one embodiment of the present invention, an approach is provided that, when an incorrect password during a sign-on attempt at a password prompt included in a sign-on barrier to a restricted resource (such as a locked mobile telephone), incrementally increases the sign-on barrier. The increased sign-on barrier includes can include additional prompts and/or a time delay. If subsequent responses match expected responses, then access to the restricted resource is provided to the user. However, if any of the subsequent responses fail to match a corresponding expected response, then access to the restricted device continues to be denied. Subsequent responses include further attempts at entering a correct password. | 2013-11-14 |
20130305325 | Methods for Thwarting Man-In-The-Middle Authentication Hacking - Methods for user authentication over unsecured networks are provided. Such methods rely on the user having one or two electronic devices, comprising two unique network addresses, and the methods seek to verify that the two network addresses are linked to geographic locations that are proximate to one another at the time of the authentication. Location information reported from user devices is not employed, rather, third-party resources are queried about each network address. A man-in-the-middle attack is suggested whenever the two geographic locations are not within a reasonable proximity of one another. | 2013-11-14 |
20130305326 | SECURE COMMUNICATION OF DISTRIBUTED RUBY REQUESTS - Various embodiments of systems and methods for providing a secure communication are described herein. A client application generates a Distributed Ruby (DRb) request based on a request received from a user. The obtained DRb request is wrapped to obtain an HTTPS request, which includes the DRb request and one or more authentication information. The generated HTTPS request is forwarded to an HTTPS server, which verifies the HTTPS request based on the authentication information. The HTTPS request is then unwrapped to obtain the DRb request, which is executed by a DRb server to obtain a result of execution of the DRb request. | 2013-11-14 |
20130305327 | METHOD AND APPARATUS TO ASSIST USER INPUT BASED ON A MOBILE TERMINAL BROWSER - The present invention discloses a method and apparatus for assisting user input based on the mobile terminal browser, including: storing login authentication information entered by a user when the user logs in a website for a first time from a mobile terminal; after determining that a current page in the mobile terminal browser is a login page and the user logs in after the first time, loading the stored authentication login information to the current login page; receiving the login authentication trigger information; encapsulating the loaded login authentication information of the current login page; and generating a login request for login authentication by a website corresponding to the current login page. By using the disclosed method and apparatus, the number of times the user is required to enter the username and password can be reduced, and the amount of time for the user to access Internet websites can be reduced. | 2013-11-14 |
20130305328 | SYSTEMS AND METHODS FOR PASSING PASSWORD INFORMATION BETWEEN USERS - Systems and methods are provided for sharing passwords from one user to another. In one embodiment, a system is provided. The system generates a password based on the phone number, resource, and an encryption method. The system then generates an encrypted resource, based on the email address, phone number, file, and the encryption method. The encrypted resource may then be decrypted using the password received from the second user, after successfully identifying the second user and the file, and allowing the second user to access the file using the web page. | 2013-11-14 |
20130305329 | ESTABLISHING ACCESS TO A SECURE NETWORK BASED ON USER-CREATED CREDENTIAL INDICIA - In various aspects, code-based indicia contain secured network access credentials. In some aspects, a computer processor receives user input that specifies secured network access credentials, and the computer processor creates or modifies credentials for establishing a secured network connection. In these aspects, the computer processor generates code-based indicia that contain at least part of the secured network access credentials. In other aspects, a computer processor scans the code-based indicia and extracts the network access credentials. In these aspects, the computer processor employs the network access credentials to establish the secured network connection. In additional aspects, a network router apparatus renders the code-based indicia to an active display. In further aspects, a network router apparatus conditions grant of network access to a device on receipt from the device of an answer to a security question included in the secured network access credentials. | 2013-11-14 |
20130305330 | SYSTEMS AND METHODS FOR REMOTE CREDENTIALS MANAGEMENT - The present application relates generally to wireless communication systems and more specifically to systems, methods, and devices for remote credentials management within wireless communication systems. In one aspect, a method of obtaining provisioning information via a service provider network, such as a cellular network, for a device is provided. The method includes transmitting an attach request via the service provider network for provisioning service, the attach request including device vendor information which includes a unique identifier for the device. The method further includes receiving provisioning information from the service provider upon authentication of the device vendor information. In other aspects, systems and methods for providing provisioning information are described. | 2013-11-14 |
20130305331 | AUTHENTICATION AND MANAGEMENT SERVICE SYSTEM FOR PROVIDING LOCATION INFORMATION AND METHOD FOR PROVIDING THE SAME - The present invention relates to an authentication and management service system for providing location information wherein in providing location information on an individual through a mobile network by using a certificate for location information sharing, the certificate for location information sharing is issued previously to a wireless terminal (mobile phone) of a designated person (parent) of a location information sharing object (child), the location information of the location information sharing object is requested and received from a mobile communication system, and the certificate for location information sharing is selectively provided and managed to other designated person and organization. | 2013-11-14 |
20130305332 | System and Method for Providing Data Link Layer and Network Layer Mobility Using Leveled Security Keys - The present disclosure discloses a network device and/or method for providing data link layer (L2) and network layer (L3) mobility using level security keys. A first network device acting as a first level security key holder in a first network receives a first level security key holder identifier corresponding to a second network device in a second network. The first level security key holder identifier is originated from a client that roams from the second network to the first network. Moreover, the first network and the second network belong to a single roaming domain. Also, the network device transmits the first level security key holder identifier to the second network device and requests for corresponding first level security key. The network device then derives a second level security key and transmits a second level security key identifier the second level key holder in the first network. | 2013-11-14 |
20130305333 | Web Server Bypass of Backend Process on Near Field Communications and Secure Element Chips - A mobile access terminal providing access to data in a secure element of the mobile access terminal is provided. The mobile access terminal comprises the secure element; a web browser; a near field communications system; an over-the-air proxy; an application programming interface layer; and a web server residing on a secure storage area of the mobile access terminal, wherein the web browser is provided with exclusive access to the web server. | 2013-11-14 |
20130305334 | SINGLE SIGN-ON FOR DISPARATE SERVERS - A system includes authentication of a user with a first server, reception of a request from the user to authenticate the user with a second server, requesting, from the first server, in response to receiving the request, user credentials to access the second server, reception of the user credentials from the first server, and transmission of the user credentials to the second server. | 2013-11-14 |
20130305335 | ELECTRONIC TRANSACTION NOTIFICATION SYSTEM AND METHOD - Systems and method are provided for delivering notifications to user regarding use of their authentication information. The delivery of notifications involves ascertaining a device identifier associated with a request received from a user device to engage in a transaction using the authentication information and comparing this device identifier associated with the request to a plurality of known device identifiers previously associated with the authentication information. Thereafter, a notification for a user associated with the authentication information can be generated and delivered, if the device identifier is not among the plurality of known device identifiers. In the systems and methods, contact information for delivering the notification is based on contact information for at least one previous transaction that meets a selection criteria and that is associated with the authentication information. | 2013-11-14 |
20130305336 | USER-BASED IDENTIFICATION SYSTEM FOR SOCIAL NETWORKS - Techniques disclosed herein provide for verifying the identity of a prospective social network member using an authentication process in which one or more existing members of the social network who are knowledgeable of the identity of the prospective member communicate with the prospective member in real time. During the real-time communication, biometric information of the prospective member can be associated with a profile for the prospective member. During or after the real-time communication, the existing member(s) can verify the identity of the prospective member. Once the prospective member's identity has been properly verified, the prospective member can be granted access to the social network. | 2013-11-14 |
20130305337 | BIOMETRIC AUTHENTICATION FOR VIDEO COMMUNICATION SESSIONS - Systems and methods for integrating biometric authentication with video conference sessions are described. An individual seeking to participate in a video conference may first be identified with a biometric parameter such as an iris scan based on a comparison of the scanned iris with a database of stored parameters. If authorized, the system may connect the individual to the video session. In addition, the system may generate dynamic tags that allow the participants to identify and locate individuals in the video conference. For example, if one of the participants is speaking and moving within the room, her tag may change color and move with her on the video screen. | 2013-11-14 |
20130305338 | COMPUTER READABLE STORAGE MEDIA FOR SELECTIVE PROXIFICATION OF APPLICATIONS AND METHOD AND SYSTEMS UTILIZING SAME - Systems and methods for selective proxification of applications are disclosed. One or more computer readable storage media may be encoded with instructions executable by one or more processing units of a computing system. The instructions encoded on the computer readable storage media may comprise authenticating a single sign-on access at a proxy server, receiving a request at the proxy server to access an application on an application server requiring authentication, accessing the application on the application server, authenticating a user to the application without additional authentication input from the user, and selectively providing a proxified session between the user and the application. | 2013-11-14 |
20130305339 | METHOD OF LOADING DATA INTO A PORTABLE SECURE TOKEN - The invention is a method for loading data into a portable secure token comprising a plurality of security domains. A first security domain comprises a first administration agent and a second security domain comprises a second administration agent. A remote application server comprises a first data to be provided to the second administration agent. A syndication server, which is distinct from the remote application server, contains a list which comprises a reference to the first data. The list is sent in response to a polling request that is sent by the first administration agent. This list is comprised in a polling response which is sent by the syndication server. | 2013-11-14 |
20130305340 | INTEGRITY MONITORING TO DETECT CHANGES AT NETWORK DEVICE FOR USE IN SECURE NETWORK ACCESS - In one embodiment, a method includes initiating integrity monitoring at a network device, continuously monitoring the network device to detect changes at the network device over a period of time, and transmitting information collected during said integrity monitoring to a security device for use in determining if the network device is allowed access to a trusted network. An apparatus and logic are also disclosed. | 2013-11-14 |
20130305341 | AUTOMATICALLY CONFIGURING COMPUTER NETWORK AT HOSPITALITY ESTABLISHMENT WITH RESERVATION-SPECIFIC SETTINGS - A system includes a storage device for storing details of a plurality of reservations of a hospitality establishment. A particular reservation includes a registered device setting for affecting behavior of a computer network at the hospitality establishment toward a user device having a specified device identifier. The system further includes a clock unit for tracking time, and a system controller coupled to the computer network and having access to the storage device and the clock unit. The system controller automatically configures one or more network components of the computer network when a start time of the particular reservation is reached in order to activate the registered device setting, and automatically configures the one or more network components when an end time of the particular reservation is reached in order to deactivate the registered device setting. | 2013-11-14 |
20130305342 | HARDWARE ENFORCED OUTPUT SECURITY SETTINGS - Generally, aspects of this disclosure are directed to copy protection techniques. Areas in memory may be secured to establish a secure memory area in the memory that is not accessible by unauthorized clients. A request to decode video content stored in the secure memory area may be received. If the video content to be decoded is stored in the secure memory area, a first MMU associated with the hardware decoder may enforce a rule that the video content is to be decoded into one or more output buffers in the secure memory area. A request to display the decoded video content stored in the secure memory area may be received. If the decoded video content is stored in the secure memory area, a second MMU associated with a hardware display processor may enforce a rule that a secure link be established between the hardware display processor and an output device. | 2013-11-14 |
20130305343 | COMPUTERIZED SYSTEM AND METHOD FOR HANDLING NETWORK TRAFFIC - Methods and systems for processing network content associated with multiple virtual domains are provided. According to one embodiment, a service daemon process is instantiated within a firewall to handle content processing of network traffic of virtual domains by aggregating communication channels associated with the virtual domains and by applying an appropriate content processing policy for the corresponding virtual domain. A connection request is received by the firewall from a virtual domain. A child process is forked by the service daemon process to handle network traffic associated with the virtual domain. A communication channel is established between a kernel of the firewall and the service daemon process to transfer a portion of the network traffic between the service daemon process and the kernel. The child process is configured to perform content processing of the network traffic in accordance with a content processing policy associated with the virtual domain. | 2013-11-14 |
20130305344 | ENTERPRISE NETWORK SERVICES OVER DISTRIBUTED CLOUDS - Various exemplary embodiments relate to a method and related network node including one or more of the following: determining that a new virtual gateway location should be created; selecting a data center of a plurality of data centers to host the new virtual gateway location; and establishing a virtual gateway at the selected data center, wherein the virtual gateway is configured to provide at least one device with connectivity to a Virtual Private Network (VPN) and connectivity to the Internet. | 2013-11-14 |
20130305345 | SYSTEM AND METHOD FOR SECURE MACHINE-TO-MACHINE COMMUNICATIONS - Embodiments of the present invention include a method for providing a secure domain name system (DNS) for machine to machine communications. In one embodiment, the method includes storing policy information for machine to machine communications in a global DNS registry database server. The method further includes communicating the policy information for machine to machine communications from the global DNS registry database server to a machine DNS registry server located in an Internet service provider (ISP) network, wherein a control signaling gateway located in the ISP network is configured to utilize the policy information for machine to machine communications to allow only registered controllers associated with a machine to communicate with the machine. | 2013-11-14 |
20130305346 | COMPUTERIZED SYSTEM AND METHOD FOR ADVANCED NETWORK CONTENT PROCESSING - A computerized system and method for processing network content in accordance with at least one content processing rule. In accordance with the inventive method, the network content is received at a first interface. The inventive system identifies a transmission protocol information of the received network content and uses the identified transmission protocol information to intercept at least a portion of the received network content formatted in accordance with a transmission protocol. The intercepted portion of the network content is redirected to a proxy, which buffers the redirected portion of network content. The buffered network content is scanned in accordance with a scanning criterion and processed in accordance with the at least one content processing rule based on the result of the scanning. The processed portion of network content may be forwarded using the second interface. | 2013-11-14 |
20130305347 | Methods, Systems, and Computer Readable Media for Adaptive Assignment of an Active Security Association Instance in a Redundant Gateway Configuration - According to one aspect, the subject matter described herein includes a method for communicating an encrypted data packet. The method includes steps occurring at a first gateway node. The method also includes receiving a data packet from a first host. The method further includes determining that a first security association (SA) instance associated with the data packet is in an inactive state. The method further includes identifying a second SA instance that is both associated with the data packet and in an active state. The method further includes forwarding the data packet to the second SA instance. | 2013-11-14 |
20130305348 | CLIENT AUTHENTICATION AND DATA MANAGEMENT SYSTEM - Methods and systems for performing an authenticated boot ( | 2013-11-14 |
20130305349 | METHOD OF PROVIDING ACCESS MANAGEMENT IN AN ELECTRONIC APPARATUS - In one embodiment of the present invention, a method of providing access management to a user is provided. This method includes running an application on a platform; linking a set of access permissions to the application by means of an apparatus; providing a user access to the application by means of an access manager; and allowing the user access to the application only after a predetermined number of access permissions from the set are satisfied. The apparatus may be a pager, a mobile phone, a feature phone, or a smart phone. The set of access permissions may comprise one or more questions that must be answered correctly. The questions may be selected to assist in the learning of an academic subject. The questions may be selected to assist in preparing the user for a standardized test. | 2013-11-14 |
20130305350 | System and Method for Enabling Seamless Transfer of a Secure Session - An information handling system includes a memory and a processor to execute instructions stored in the memory, which causes the processor to at least: send identification information to a second information handling system in response to an identification request broadcast from the second information handling system via a short-range communication; receive first authentication information for a local application and a remote service from the second information handling system; receive a copy of the local application; authenticate a user for the copy of the local application and for the remote service prior to the user logging on to the information handling system; receive second authentication information from the user to access the information handling system; authenticate the user to the information handling system; and automatically initiate a secure session between the copy of the local application and the remote service when the user is authenticated to the information handling system. | 2013-11-14 |
20130305351 | MOBILE DEVICE WITH PASSWORD PROTECTED DESKTOP SCREEN - A mobile device includes a user interface that has a plurality of non-password-protected desktop screens and at least one password protected desktop screen. The mobile device includes a touch sensitive display device that accepts gestures used to navigate between the desktop screens. Applications may be installed to password protected desktop screens. | 2013-11-14 |
20130305352 | MOBILE DEVICE WITH DESKTOP SCREEN INDICATORS - A mobile device includes a user interface that has a plurality of non-password-protected desktop screens and at least one password protected desktop screen. The mobile device includes a touch sensitive display device that accepts gestures used to navigate between the desktop screens. Applications may be installed to password protected desktop screens. | 2013-11-14 |
20130305353 | Low Power Driver System and Method for Controlling The Same - A low power driver system for controlling an electric strike of a door is provided. The low power driver system includes an input system configured to detect a user credential, a control system configured to authenticate the user credential and generate a plurality of signals based at least in part on an authentication of the user credential, a driver system configured to generate a plurality of voltage potentials during an unlocking cycle based at least in part on the plurality of signals, wherein each of the plurality of voltage potentials are difference from each other, and a locking device configured to unlock based at least in part on the plurality of voltage potentials. | 2013-11-14 |
20130305354 | RESTRICTED EXECUTION MODES - In embodiments of restricted execution modes, a mobile device can display a device lock screen on an integrated display device, and transition from the device lock screen to display a shared space user interface of a shared space. The transition to display the shared space user interface is without receiving a PIN code entered on the device lock screen. The mobile device implements a restricted execution service that is implemented to activate a restricted execution mode of the mobile device, and restrict access of a device application to device content while the restricted execution mode is activated. The restricted execution service can also allow a shared device application that is included in the shared space access to the device content while the restricted execution mode is activated. | 2013-11-14 |
20130305355 | DATA SECRECY METHOD AND ELECTRONIC DEVICE USING DATA SECRECY METHOD - A data secrecy system of an electronic device detects whether a screen unlocking interface of the electronic device is activated. The data secrecy system controls the recorder to record a phrase said by a user after the user is invited to speak. And then the data secrecy system extracts characteristics of the recorded phrase. The data secrecy system determines a privilege level for the user to access all or a part of functions of the electronic device according to the characteristics of the phrase, and controls the electronic device to work according to the determined privilege level of the user. | 2013-11-14 |
20130305356 | SYSTEM AND METHOD FOR DETERMINING A RISK ROOT CAUSE - A system and method for determining a risk root cause are provided. A first and second fraud related risk scores respectively associated with a first and second nodes may be determined. A relation strength value related to at least one relation between the first and second nodes may be determined. A relation strength value and a first and second node risk scores may be used to calculate a cluster risk score for a cluster including the first and second nodes. Other embodiments are described and claimed. | 2013-11-14 |
20130305357 | Context Aware Network Security Monitoring for Threat Detection - The disclosed method involves monitoring behavior of at least one node, associated with at least one user, in a network to generate a behavior profile for the user(s). The method further involves comparing the behavior profile for at least one user with a baseline behavior profile for the user(s). Also, the method involves determining when there is a difference between the behavior profile for at least one user and the baseline behavior profile for the user(s). Further, the method involves flagging an event associated with the difference: when the difference exceeds a baseline threshold level, does not exceed a baseline threshold level, meets at least one criterion, and/or does not meet at least one criterion. Additionally, the method involves classifying the event to an event classification. Further, the method involves transmitting the event to at least one other node in the network and/or a network operations center. | 2013-11-14 |
20130305358 | Minimizing Latency of Behavioral Analysis Using Signature Caches - The various aspects include methods, systems, and devices configured to make use of caching techniques and behavior signature caches to improve processor performance and/or reduce the amount of power consumed by the computing device by reducing analyzer latency. The signature caching system may be configured to adapt to rapid and frequent changes in behavioral specifications and models and provide a multi-fold improvement in the scalability of behavioral analysis operations performed on the mobile device. | 2013-11-14 |
20130305359 | Adaptive Observation of Behavioral Features on a Heterogeneous Platform - Methods, devices and systems for monitoring behaviors of a mobile computing device include observing in a non-master processing core a portion of a mobile device behavior that is relevant to the non-master processing core, generating a behavior signature that describes the observed portion of the mobile device behavior, and sending the generated behavior signature to a master processing core. The master processing core combines two or more behavior signatures received from the non-master processing cores to generate a global behavior vector, which may be used by an analyzer module to determine whether a distributed software application is benign or not benign. | 2013-11-14 |
20130305360 | DETECTING METHOD AND DEVICE - A detecting method includes: receiving a text information mail including text information, first verification information on the text information, first verification information of attached information which is attached to the text information, and an attached information mail including the attached information, first verification information of the text information, and first verification information of the attached information from a transmission source; generating second verification information of the text information, and second verification information of the attached information, based on shared information which is shared with the transmission source, and an algorithm; and detecting a spoof, based on a comparison result of the first verification information of the text information and the second verification information of the text information, and a comparison result of the first verification information of the attached information and the second verification information of the attached information. | 2013-11-14 |
20130305361 | PROTECTION OF A PRIME NUMBER GENERATION AGAINST SIDE-CHANNEL ATTACKS - A method for protecting the generation, by an electronic circuit, of at least one prime number by testing the primality of successive candidate numbers, including for each candidate number tests of primality with respect to prime numbers of at least one set of consecutive prime numbers, wherein the order of application of the tests is modified at least from one prime number generation to another. | 2013-11-14 |
20130305362 | Mitigating Threats in a Network - Mitigating threats in a network includes receiving a message at a network device. The message includes device-independent parameters generated in response to a threat. The network device converts the parameters into one or more device-specific operations and then performs the operations to mitigate the threat. | 2013-11-14 |
20130305363 | METHOD, SYSTEM, AND STORAGE MEDIUM FOR ADAPTIVE MONITORING AND FILTERING TRAFFIC TO AND FROM SOCIAL NETWORKING SITES - Embodiments disclosed herein provide a system, method, and computer readable storage medium storing computer instructions for implementing a Socialware architecture encompassing a suite of applications for continuously and adaptively monitoring and filtering traffic to and from social networking sites, particularly useful in an enterprise computing environment. In some embodiments, an appliance may be coupled to a proxy server for providing a plurality of Socialware services, including analyzing, logging, and reporting on traffic to and from social networking sites. Some embodiments may allow a user to report, identify, and prevent malicious and potentially malicious content and/or activity by another user. Some embodiments may encrypt outgoing traffic to and decrypt incoming traffic from social networking sites. Some embodiments may provide an enterprise user to define and restrict certain social networking activities outside of the enterprise computing environment. | 2013-11-14 |
20130305364 | Techniques for Attesting Data Processing Systems - A technique for attesting a plurality of data processing systems includes generating a logical grouping for a data processing system. The logical grouping is associated with a rule that describes a condition that must be met in order for the data processing system to be considered trusted. A list of one or more children associated with the logical grouping is retrieved. The one or more children are attested to determine whether each of the one or more children is trusted. In response to the attesting, the rule is applied to determine whether the condition has been met in order for the data processing system to be considered trusted. A plurality of logical groupings is associated to determine whether an associated plurality of data processing systems can be considered trusted. | 2013-11-14 |
20130305365 | SYSTEM AND METHOD FOR OPTIMIZATION OF SECURITY TRAFFIC MONITORING - A method and system for security processing of a network data stream. Threat-related statistics are collected and the network data stream is selectively checked based on the statistics data identifying the areas of the stream where the threats had been previously detected. A system for processing a network data stream includes at least one network Intrusion Detection System (IDS) for checking a pre-determined portion of the data stream for presence of threats. The IDS collects threat-related statistics and provides it to statistics database. A unit for determining areas of the data stream to be checked queries the statistics database for determining or changing the current checked area based on the received statistics. The information about changes in the areas of the data stream to be checked is provided to the IDS, which checks the selected areas of the data stream. | 2013-11-14 |
20130305366 | APPARATUS AND METHOD FOR DETECTING MALICIOUS FILES - An apparatus for detecting a malicious file, includes a program driving unit configured to output an execution address of a command executed by driving a program corresponding to a non-executable file; and an address storage unit configured to store normal address range information in accordance with the driving of the program. | 2013-11-14 |
20130305367 | DETECTING METHOD AND DEVICE - A method includes: generating object information that indicates an object designated from among a header item, text, and attached information of a received email, or feature amount information based on the object information and a predetermined function, when a source is an address in an internal network, decrypting verification information added to the received email using secret key information shared in the internal network, when the source is an address over an external network, decrypting the verification information using public key information shared with the source, and verifying whether or not the received email is a spoofed mail based on the object information or the feature amount information, and the decrypted verification information. | 2013-11-14 |
20130305368 | METHODS AND APPARATUS FOR IDENTIFYING AND REMOVING MALICIOUS APPLICATIONS - A system, method, and apparatus for identifying and removing malicious applications are disclosed. An example apparatus includes an analysis server configured to receive from an executable application operating on a client device a data structure including information identifying processes operating on the client device during a time period and analyze the data structure to identify a malicious application by determining which of the processes on the client device were triggered after an application server was accessed by the executable application and identifying processes associated with the malicious application by comparing the determined processes to records of processes of a device similarly configured as the client device. The apparatus also includes a remover configured to determine files on the client device that are associated with the identified malicious application and transmit instructions to the executable application causing the executable application to remove the malicious application from operation on the client device. | 2013-11-14 |
20130305369 | DETECTION OF THREATS TO NETWORKS, BASED ON GEOGRAPHIC LOCATION - A method for a wireless network. The network includes at least a server and a plurality of computer devices wirelessly connected to the server. At least one of the computer devices is under attack by an ‘attacker’ device. The method provides for detection and reporting of the attack as to the location of the attack. The method includes detecting an attack by one of the computer devices, using a zCore module and transmitting an ‘attack report’ to the server. The report includes at least the attack location. The method also includes notifying at least one of the plurality of computer devices and an external computer device that the network is compromised. | 2013-11-14 |
20130305370 | DETECTION OF INTRUSION IN A WIRELESS NETWORK - A method and associated system for detecting intrusion of a wireless network. A determination is made that a first data stream received by the wireless network does not include N1 communication protocols included in a second data stream previously determined to be valid, N1 being a positive integer. A determination is made that N1 exceeds a predetermined first tolerance, and in response, that the first data stream does not include N2 communication protocols included in a third data stream previously determined to be intrusive to the wireless network, N2 being an integer equal to or greater than zero. A determination is made that N2 is less than a predetermined second tolerance, and in response, an alert that the received data stream is potentially intrusive to the wireless network is generated. | 2013-11-14 |
20130305371 | NETWORK INTRUSION DETECTION WITH DISTRIBUTED CORRELATION - A network security system employing multiple levels of processing to identify security threats. Multiple host machines may each contain an agent that detects possibilities of security threats based on raw data sensed locally at that host. The hosts may share information obtained from local analysis and each host may use information generated at one or more other hosts, in combination with information generated locally, to identify a security concern, indicating with greater certainty that a security threat exists. Based on security concerns generated by multiple hosts, a security threat may be to indicated and protective action may be taken. | 2013-11-14 |
20130305372 | Preventing Unauthorized Data Extraction - An electronic device ( | 2013-11-14 |
20130305373 | METHOD AND APPARATUS FOR INSPECTING NON-PORTABLE EXECUTABLE FILES - An apparatus for inspecting a non-PE file includes a data loading unit configured to load candidate malicious address information related to a malicious code of the non-PE file; and a program link unit configured to acquire normal address range information of a module being loaded on a memory when an application program adapted for the non-PE file is executed and set up a candidate malicious address corresponding to the candidate malicious address information to be a breakpoint of the application program. Further, the apparatus includes a malicious code determination unit configured to determine whether a next execution address is within the normal address range information when there occurs an event derived from the breakpoint. | 2013-11-14 |
20130305374 | CONTROLLING MALICIOUS ACTIVITY DETECTION USING BEHAVIORAL MODELS - Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets. | 2013-11-14 |
20130305375 | METHOD FOR MALICIOUS ATTACKS MONITORING - A method monitors data affected by malware in a communication network. The malware detecting entity acts as a data retention source. The method includes receiving at a data retention system a query request specifying data affected by malware to be accessed. Retained data which matches the query request and received from the malware detecting entity is identified in the data retention system. The identified data is forwarded from the data retention system to an authorized organization. | 2013-11-14 |
20130305376 | SYSTEMS, METHODS AND COMPUTER READABLE MEDIA FOR CALCULATING A SECURITY INDEX OF AN APPLICATION HOSTED IN A CLOUD ENVIRONMENT - The present invention provides a method and system for calculating a security index of an application hosted in a cloud environment. The application is mapped to a cloud service provider of the cloud environment, and a set of security controls and a set of security metrics applicable for the application are identified. The set of security controls and the set of security metrics are encapsulated into a security profile object by a security control module. A set of values of the set of security metrics are retrieved from the cloud service provider, by a cloud probe module, and the security index of the application is calculated. | 2013-11-14 |
20130305377 | SDI-SCAM - A distributed multi-agent system and method is implemented and employed across at least one intranet for purposes of real time collection, monitoring, aggregation, analysis and modeling of system and network operations, communications, internal and external accesses, code execution functions, network and network resource conditions as well as other assessable criteria within the implemented environment. Analytical models are constructed and dynamically updated from the data sources so as to be able to rapidly identify and characterize conditions within the environment (such as behaviors, events, and functions) that are typically characteristic with that of a normal state and those that are of an abnormal or potentially suspicious state. The model is further able to implement statistical flagging functions, provide analytical interfaces to system administrators and estimate likely conditions that characterize the state of the system and the potential threat. The model may further recommend (or alternatively implement autonomously or semi-autonomously) optimal remedial repair and recovery strategies as well as the most appropriate countermeasures to isolate or neutralize the threat and its effects. | 2013-11-14 |
20130305378 | METHOD AND SYSTEM FOR ESTABLISHING TRUST BETWEEN A SERVICE PROVIDER AND A CLIENT OF THE SERVICE PROVIDER - Trust is established between a service provider ( | 2013-11-14 |
20130305379 | Methods and Systems for Providing a Notification of a Compliance Level of an Application With Respect to a Privacy Profile Associated With a User - An exemplary method includes an application management system 1) detecting a request provided by a user to install an application on a user device, 2) identifying a plurality of privacy attributes of the application, 3) determining, based on the identified privacy attributes, a compliance level of the application with respect to a privacy profile associated with the user, the compliance level representing a degree to which the application complies with the privacy profile associated with the user, and 4) directing, prior to the installation of the application, the user device to present a graphic that represents the determined compliance level of the application. Corresponding methods and systems are also disclosed. | 2013-11-14 |
20130305380 | METHODS AND DEVICES FOR 3D OBJECT PROTECTION USING SURFACE SUBDIVISION - A method of protecting a graphical object represented by a list of vertices and a list of surfaces, each surface being defined by a number N vertices. A device selects a surface S with N vertices; computes a new vertex d using a random or pseudo-random function; inserts the new vertex d into the list of vertices; creates N new surfaces S | 2013-11-14 |
20130305381 | ELECTRONIC COPYRIGHT LICENSE REPOSITORY - A content distribution system for transporting audio or video licenses between content players that use digital rights management (DRM) is disclosed. The content distribution system includes at least a second license repository and an authentication engine. The second license repository receives second information describing a second plurality of content licenses. A first license repository stores a first plurality of content licenses. The first plurality of content licenses enables use of a plurality of content objects with a first content player within confines of DRM. The second license repository is geographically distant from the first license repository. The authentication engine authorizes the second plurality of content licenses of the second license repository. The second plurality of content licenses enables use of the plurality of content objects with the second content player within the confines of DRM. | 2013-11-14 |
20130305382 | SYSTEMS AND METHODS PROVIDING A SEPARABLE DIGITAL RIGHTS MANAGEMENT APPLICATION - Systems and methods providing content having digital rights management (DRM) applications separable from other authorization applications are provided. A system may include a distribution service provider system in communication with a content provider system and consumer premise equipment (CPE) for the transmission of content from the content provider system to the CPE device. The distribution service provider system may: receive A/V content provided by the content provider system, wherein the A/V content includes a DRM application; apply a conditional access system (CAS) application to the A/V content that is independent of the DRM application; and transmit the A/V content including the CAS and the DRM applications to the CPE for presentation. The CPE device can perform DRM authorizations with the content provider or a third-party DRM provider. | 2013-11-14 |
20130305383 | SYSTEM AND METHOD TO PROTECT USER PRIVACY IN MULTIMEDIA UPLOADED TO INTERNET SITES - A system and method for protecting user privacy in multimedia uploaded to Internet sites. Briefly stated, the method includes receiving, by a server hosting an Internet privacy protection service, a media item of a subscriber of the service from a social networking service. The media item is encrypted using Digital Rights Management techniques. Policy determining who can view the media item is generated. The encrypted media item is securely stored in a cloud storage network. Storage information, including a URL of the secure storage location for the encrypted media item, is received by the Internet privacy protection service from the cloud storage network. The Internet privacy protection service generates a proxy image by encoding the URL into the proxy image using a bar code. The Internet privacy protection service uploads the proxy image to the subscriber's social networking service account on the social networking service. | 2013-11-14 |
20130305384 | SYSTEM AND METHOD FOR CONTROLLING ACCESS TO ELECTRONIC DEVICES - A computer implemented method for controlling access to an electronic media source is disclosed. An access control system receives achievement goals and degree of access information. Assessment information is also received by the access control system from one or more input data sources. The access control system determines whether the achievement goals are met based on the received assessment information and forwards an access signal to the electronic media source based on the access determination. The access signal, including a grant signal, is forwarded when the achievement goals are met. | 2013-11-14 |
20130305385 | STREAMING AUDIO PLAYBACK SERVICE AND METHODOLOGY - A service for streaming digital audio files to subscribing consumers is provided in a manner compliant with all applicable licenses. A method of using such service may include downloading licensed audio files onto a server configured to be managed automatically to ensure compliance, employing a playlist algorithm associated with the server that is configured to monitor and record certain attributes about the digital audio files, including the performing rights organization, the composer of the audio files, and/or the identify of the copyright owner of the audio file, and tracking the frequency of regeneration of the audio files on the server. An algorithm may be employed that constrains the streaming of the audio files so that consumers may influence the music that is streamed to them pursuant to consumer subscriptions, but limits the direct control over the specific audio files streamed to the subscribing consumers. | 2013-11-14 |
20130305386 | METHOD FOR PROTECTING SECURITY OF DATA, NETWORK ENTITY AND COMMUNICATION TERMINAL - The present invention relates to communication technologies and discloses a method and an apparatus for protecting security of data, so as to solve the problem of the prior art in which the security of data transmission between a communication terminal which has a characteristic of small data transmission and the network cannot be guaranteed. Information relevant to security context is stored if a communication terminal has a characteristic of small data transmission; current security context is obtained according to the information relevant to security context; and security protection of communication data is performed by employing the current security context. The embodiments of the present invention may be applied to a communication system having a characteristic of small data transmission, such as an MTC and the like. | 2013-11-14 |
20130305387 | AUTHORITY DELEGATION FOR BUSINESS OBJECTS - A method relates to authority checks governing user access to business object attachments in a store of business object attachments. The business object attachments are semantically associated with business objects of one or more remote computer systems. The method includes, at a content management interface layer that is communicatively coupled to the store of business object attachments, sending a request for user authority checks on a parent business object of a business object attachment to an originating computer system and receiving results of the user authority checks from the originating computer system. | 2013-11-14 |
20130305388 | LINK STATUS BASED CONTENT PROTECTION BUFFERS - Systems, methods, and devices for processing video data are disclosed. Some examples include a content receiver including an unsecure processor and an unsecure memory coupled to the unsecure processor. The example includes content protection zone hardware including a secure memory and an input for receiving content. The input coupled to the content protection zone hardware, wherein the content protection zone hardware determines if the received content is secure or unsecure and directs secure content to the secure memory and unsecure content to the unsecure memory. | 2013-11-14 |
20130305389 | SYSTEM AND METHOD FOR ACCESSING ELECTRONIC DATA VIA AN IMAGE SEARCH ENGINE - The present invention provides a system and method for accessing electronic data through entry of images as queries in search engine. The system uses various image capturing devices and communication devices to capture images and enter them into image database. Image recognition techniques encode images in a computer readable format. The processed image is then entered for comparison into at least one database populated with images and associated information. Once the newly captured image is matched with an image in the database, the information linked with that image is returned to the user. | 2013-11-14 |
20130305390 | METHOD, SYSTEM, AND DEVICE FOR LICENSE-CENTRIC CONTENT CONSUMPTION - A method, system, and device for license-centric content use or distribution, including a user interface configured to enable a user to manage content by managing a license associated with the content instead of a specific instance of the content, wherein the use or distribution of the content is granted from the license. | 2013-11-14 |
20130305391 | Common Computing Apparatus Providing Distinct Non-Certified And Certified Computing Platforms - An example apparatus includes a non-certified computing platform, a certified computing platform and a user interface. The non-certified computing platform includes first hardware and configured to host non-certified software. The certified computing platform is separate and distinct from the non-certified computing platform, and it includes second hardware and configured to host certified software in a partitioned environment. The user interface is coupled to both platforms and includes a display coupled to both the first hardware and second hardware via a controllable switch. According to this example, the non-certified computing platform and certified computing platform are configured to host the non-certified software and certified software such that both are capable of operating concurrently. | 2013-11-14 |
20130305392 | SYSTEM, DEVICE, AND METHOD OF SECURE ENTRY AND HANDLING OF PASSWORDS - Devices, system, and methods of secure entry and handling of passwords and Personal Identification Numbers (PINs), as well as for secure local storage, secure user authentication, and secure payment via mobile devices and via payment terminals. A computing device includes: a secure storage unit to securely store a confidential data item; a non-secure execution environment to execute program code, the program code to transport to a remote server a message; a secure execution environment (SEE) to securely execute code, the SEE including: a rewriter module to securely obtain the confidential data item from the secure storage, and to securely write the confidential data item into one or more fields in said message prior to its encrypted transport to the remote server. | 2013-11-14 |
20130305393 | METHOD FOR CONFIGURING ACCESS RIGHTS, CONTROL POINT, DEVICE AND COMMUNICATION SYSTEM - In a method for configuring access rights, a UPnP (Universal Plug and Play) device receives CPID information sent by a first CP without administrator rights, wherein the CPID information comprises an ID of another CP obtained by the first CP. Then the UPnP device sends a CPID list that carries the CPID information to a second CP with administrator rights. And the UPnP device receives a CP right configuration command sent by the second CP, and configures access rights for at least one CP corresponding to a CPID in the CPID list. | 2013-11-14 |
20130305394 | INFORMATION PROCESSING DEVICE PERFORMING SOFTWARE LICENSE AUTHENTICATION, COMMUNICATION SYSTEM, AND SOFTWARE LICENSE AUTHENTICATION METHOD - An information processing device performs software license authentication while sharing the license between an operational system and a standby system in a closed network. A license file and a license key are installed in the operational system. License synchronization starts between the operational system and the standby system. When the operational system fails, the operational system is separated from the closed network, and when a different device is provided, license synchronization is performed between the different device serving as a new standby system and a new operational system (old standby system). When the standby system fails, the standby system is separated from the closed network, and license synchronization is performed between a different device serving as a new standby system and the operational system. A device which retains the license monitors whether or not an unauthorized use of the license is conducted in the closed network. | 2013-11-14 |
20130305395 | COMPUTER SECURITY SYSTEM HAVING INTEGRATED GPS - A computing apparatus having a hard drive storage unit which includes a global positioning system, a non-volatile memory and a compare module. The non-volatile memory stores a permitted zone of operation of the hard drive storage unit while the compare module monitors the current location. If the compare module detects a current location of the hard drive storage unit as tracked by the global positioning system which is outside of the permitted zone of operation as stored in the non-volatile memory, the non-volatile memory contains at least one command implemented by a computer processor that may cause the hard drive storage unit to become disabled. | 2013-11-14 |
20130305396 | ENGINEERED HUMAN ENDOSIALIN-EXPRESSING RODENTS - Provided herein are rodents that express the human endosialin gene. In preferred embodiments, the rodent is a mouse. Preferably, the human endosialin gene is integrated into the native or endogenous endosialin gene locus. More preferably, the host rodent is null for the endogenous endosialin gene product. The human endosialin gene is preferably expressed in a similar development and disease response pattern as that of the native endosialin gene product in parental or wild type rodents. This feature makes these rodents useful for studying the effects of test agents to positively or negatively affect endosialin biology for therapeutic use. Use of human endosialin expressing rodents lacking native endosialin gene product (HUE rodents) is proposed as a strategy for developing agents that can positively or negatively affect the endosialin pathway and also serve as a screening tool to identify those agents that may be useful as human therapies. | 2013-11-14 |
20130305397 | GENE CAPABLE OF REGULATING OBESITY/INSULIN SENSITIVITY - This invention relates to a cell comprising a reporter gene under control of an ARIA gene promoter, the cell being used for searching for an agent for prevention or treatment of diseases attributed to reduced insulin sensitivity, for searching for an obesity-controlling substance, or for searching for an obesity-inducing substance. | 2013-11-14 |
20130305398 | Genes and uses for plant enhacement - Transgenic seed for crops with enhanced agronomic traits are provided by trait-improving recombinant DNA in the nucleus of cells of the seed where plants grown from such transgenic seed exhibit one or more enhanced traits as compared to a control plant. Of particular interest are transgenic plants that have increased yield. The present invention also provides recombinant DNA molecules for expression of a protein, and recombinant DNA molecules for suppression of a protein. | 2013-11-14 |
20130305399 | CHICOMA LETTUCE VARIETY - A new lettuce variety designated ‘Chicoma’ is described. ‘Chicoma’ is a butterhead leaf lettuce variety exhibiting stability and uniformity. | 2013-11-14 |
20130305400 | CAPULIN LETTUCE VARIETY - A new lettuce variety designated ‘Capulin’ is described. ‘Capulin’ is a leaf lettuce variety exhibiting stability and uniformity. | 2013-11-14 |
20130305401 | HYBRID CARROT VARIETY PURPLE ELITE - The present invention relates to plants of a carrot variety PURPLE ELITE and seeds and progeny thereof. The invention further relates to methods for producing a carrot plant by traditional breeding methods. The invention further relates to a method for producing a carrot plant containing in its genetic material one or more transgenes. | 2013-11-14 |
20130305402 | HYBRID CARROT VARIETY REBEL - The present invention relates to plants of a carrot variety REBEL and seeds and progeny thereof. The invention further relates to methods for producing a carrot plant by traditional breeding methods. The invention further relates to a method for producing a carrot plant containing in its genetic material one or more transgenes. | 2013-11-14 |
20130305403 | HYBRID CARROT VARIETY PURPLE SNAX - The present invention relates to plants of a carrot variety PURPLE SNAX and seeds and progeny thereof. The invention further relates to methods for producing a carrot plant by traditional breeding methods. The invention further relates to a method for producing a carrot plant containing in its genetic material one or more transgenes. | 2013-11-14 |
20130305404 | HYBRID CARROT VARIETY NUN 89141 CAC - The present invention relates to plants of a carrot variety NUN 89141 CAC and seeds and progeny thereof. The invention further relates to methods for producing a carrot plant by traditional breeding methods. The invention further relates to a method for producing a carrot plant containing in its genetic material one or more transgenes. | 2013-11-14 |
20130305405 | TOMATO HYBRID EX15567101 AND PARENT LINES THEREOF - The invention provides seed and plants of tomato hybrid EX15567101 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid EX15567101 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2013-11-14 |
20130305406 | INBRED CORN LINES CB18, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, AND MN26 - Inbred corn lines, designated CB18, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26, is disclosed. The invention relates to the seeds of inbred corn line CB18, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26, to the plants and plant parts of inbred corn line CB18, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26 and to methods for producing a corn plant, either inbred or hybrid, by crossing inbred corn line CB18, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26 with itself or another corn line. The invention also relates to products produced from the seeds, plants, or parts thereof, of inbred corn line CB18, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26 and/or of the hybrids produced using the inbred as a parent. The invention further relates to methods for producing a corn plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other inbred corn lines derived from inbred corn line CB 18, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26. | 2013-11-14 |
20130305407 | PLASMODIOPHORA BRASSICAE-RESISTANT BRASSICA PLANT, SEEDS AND PLANT PARTS THEREOF AND METHODS FOR OBTAINING THE SAME - The present invention relates to a | 2013-11-14 |
20130305408 | AUREUSIDIN-PRODUCING TRANSGENIC PLANTS - Aurone, including aureusidin-6-O-glucoside, are known to have antioxidant properties. The compounds are produced in the flowers snapdragon (e.g., | 2013-11-14 |
20130305409 | GRG23 EPSP SYNTHASES: COMPOSITIONS AND METHODS OF USE - Compositions and methods for conferring herbicide resistance or tolerance to bacteria, plants, plant cells, tissues and seeds are provided. Compositions include polynucleotides encoding herbicide resistance or tolerance polypeptides, vectors comprising those polynucleotides, and host cells comprising the vectors. The nucleotide sequences of the invention can be used in DNA constructs or expression cassettes for transformation and expression in organisms, including microorganisms and plants. Compositions also include transformed bacteria, plants, plant cells, tissues, and seeds. In particular, isolated polynucleotides encoding glyphosate resistance or tolerance polypeptides are provided. Additionally, amino acid sequences corresponding to the polynucleotides are encompassed. In particular, the present invention provides for isolated polynucleotides containing nucleotide sequences encoding the amino acid sequence shown in SEQ ID NO:9, 11, 13, 15, 17, 19, 21, 23, 25, 27, 29, 31, 33, or 35, or the nucleotide sequence set forth in SEQ ID NO:6, 8, 10, 12, 14, 16, 18, 20, 22, 24, 26, 28, 30, 32, or 34. | 2013-11-14 |
20130305410 | RHG1 MEDIATED RESISTANCE TO SOYBEAN CYST NEMATODE - Methods of increasing the resistance of plants, in particular soybeans, to nematodes, in particular soybean cyst nematodes, are provided herein. The methods include increasing the expression of Glyma18g02580, Glyma18g02590 and/or Glyma18g2610 in cells of a plant and in particular in root cells of a plant to increase the resistance of the plant and plant cells to nematodes. The methods include increasing the expression using constitutive promoters or by increasing the copy number of the polynucleotides. Constructs for expressing these polypeptides, transgenic cells, transgenic plants and methods of generating the same are also provided. Methods of screening plant cells for resistance or susceptibility to nematodes are also provided. | 2013-11-14 |
20130305411 | METHOD FOR CONFERRING DISEASE RESISTANCE TO PLANT - Disease resistance is conferred to a plant by a technique completely differing from conventional techniques. The method of the present invention comprises a step of introducing at least one of the genes belonging to the TIFY family to a plant or enhancing the expression of the gene endogenous to the plant. | 2013-11-14 |
20130305412 | TOXIN GENES AND METHODS FOR THEIR USE - Compositions and methods for conferring pesticidal activity to bacteria, plants, plant cells, tissues and seeds are provided. Compositions comprising a coding sequence for a delta-endotoxin polypeptide are provided. The coding sequences can be used in DNA constructs or expression cassettes for transformation and expression in plants and bacteria. Compositions also comprise transformed bacteria, plants, plant cells, tissues, and seeds. In particular, isolated delta-endotoxin nucleic acid molecules are provided. Additionally, amino acid sequences corresponding to the polynucleotides are encompassed, and antibodies specifically binding to those amino acid sequences. In particular, the present invention provides for isolated nucleic acid molecules comprising nucleotide sequences encoding the amino acid sequence shown in SEQ ID NO:61-121 and 133-141, or the nucleotide sequence set forth in SEQ ID NO:1-60, 124-132, and 142-283, as well as variants and fragments thereof. | 2013-11-14 |