52nd week of 2013 patent applcation highlights part 70 |
Patent application number | Title | Published |
20130347048 | TRANSMISSION DEVICE, TRANSMISSION METHOD, RECEPTION DEVICE, RECEPTION METHOD, PROGRAM, AND COMMUNICATION SYSTEM - The present technique relates to a transmission device, a transmission method, a reception device, a reception method, a program, and a communication system which can realize a system capable of promptly addressing a newly-generated disturbance wave. A broadcasting device of the present disclosure includes: a reception unit which receives reception interference information notified from the reception device; a setting unit which sets a frequency of a notch to be provided in a transmission signal on the basis of the reception interference information that has been received; a modulation unit which provides the notch in accordance with the set frequency of the notch while at the same time generates a modulated signal by modulating information to be transmitted; and a send-out unit which sends out the modulated signal as the transmission signal. For example, the present disclosure can be applied to a broadcasting system which transmits a broadcasting signal conforming to DVB-C2 via a CATV network or a CATV Internet system (DOCSIS), a physical layer of which conforms to the DVB-C2 standard. | 2013-12-26 |
20130347049 | Low Distortion Signal Amplifiers Having Extended Upstream Bandwidths and Related Methods - Radio frequency (“RF”) signal amplifiers include an RF input, at least one RF output and communications paths therebetween. The communications paths include a downstream path that is configured to pass signals in a downstream frequency band, a first upstream path that is configured to pass signals in a first upstream frequency band that encompasses frequencies that are lower than the frequencies included within the downstream frequency band and a second upstream path that is configured to pass signals in a second upstream frequency band that encompasses frequencies that are between the frequencies included within the downstream frequency band and the frequencies included within the first upstream frequency band. These RF signal amplifiers further include a downstream power amplifier on the downstream path, a first upstream power amplifier on the first upstream path and a second upstream power amplifier on the second upstream path. | 2013-12-26 |
20130347050 | System And Method For Improved Optical Character Recognition For Automated Set-Top Box Testing - The present application provides a user configurable test system for set-top boxes (STB) and other consumer devices providing video output. In particular, it provides for a method of improving an Optical Character Recognition (OCR) process in such test systems. | 2013-12-26 |
20130347051 | SET TOP BOX OR SERVER HAVING SNAP-IN HEAT SINK AND SMART CARD READER - An electronic device is provided that comprises a bottom frame portion; an information card reader over the bottom frame portion; a thermal insulation layer; a circuit board over the thermal insulation layer; a top broad heat sink over the circuit board; and a top cover over the top broad heat sink. | 2013-12-26 |
20130347052 | MULTI-PART INTERNAL-EXTERNAL PROCESS SYSTEM FOR PROVIDING VIRTUALIZATION SECURITY PROTECTION - In embodiments of the present invention improved capabilities are described for a host machine that manages a plurality of virtual machines associated with an enterprise through a supervisory process, the host machine including a threat management facility coupled in a communicating relationship with the plurality of virtual machines and enforcing a security policy of the enterprise for the plurality of virtual machines; and a first virtual machine from among the plurality of virtual machines, the first virtual machine capable of operating in a first state on the host machine wherein the security policy is enforced by the threat management facility, and the first virtual machine capable of operating in a second state wherein a local security facility executable on the first virtual machine autonomously enforces the security policy in the absence of the threat management facility. | 2013-12-26 |
20130347053 | Approach For Managing Access To Data On Client Devices - A device management system is configured to manage access to electronic documents on client devices using policies. The policies specify one or more download and processing restrictions to be enforced with respect to the particular electronic document at client devices for example, particular hardware and software configurations that are required at client devices before data is permitted to be downloaded to those client devices. The policies may also specify other requirements that must be satisfied before data is permitted to be downloaded to those client devices, for example, user authentication. | 2013-12-26 |
20130347054 | Approach For Managing Access To Data On Client Devices - A device management system is configured to manage access to electronic documents on client devices using policies. The policies specify one or more download and processing restrictions to be enforced with respect to the particular electronic document at client devices for example, particular hardware and software configurations that are required at client devices before data is permitted to be downloaded to those client devices. The policies may also specify other requirements that must be satisfied before data is permitted to be downloaded to those client devices, for example, user authentication. | 2013-12-26 |
20130347055 | Approach For Managing Access To Data On Client Devices - A device management system is configured to manage access to electronic documents on client devices using policies. The policies specify one or more download and processing restrictions to be enforced with respect to the particular electronic document at client devices for example, particular hardware and software configurations that are required at client devices before data is permitted to be downloaded to those client devices. The policies may also specify other requirements that must be satisfied before data is permitted to be downloaded to those client devices, for example, user authentication. | 2013-12-26 |
20130347056 | Content Rights Protection with Arbitrary Correlation of Second Content - A disclosed content rights management system defines a content usage policy via a conditional rule set contained in metadata. The conditional rule set is correlated to at least one second content. An access control manager determines, dynamically, access rights conferrable to a user device or a server, based on the content usage policy and user history parameters. The embodiments may confer limited access rights for a first activity by a user device, or by a server, with respect to the protected content and the second content, and block a second activity with respect to the protected content and the second content, in response to determining that the request for the second content, in conjunction with the user history parameters, does not comply with the conditional rule set for the second activity. | 2013-12-26 |
20130347057 | Privacy Manager for Restricting Correlation of Meta-Content Having Protected Information Based on Privacy Rules - A method intercepts correlation instructions related to a plurality of meta-content elements associated with a primary content. The primary content or the meta-content elements may have associated privacy rules. At least one meta-content element of the group is selected as having privacy protected information specified in the privacy rules. A set of meta-content items, of meta-content element, are determined that are subject to a correlation restriction based on evaluation of the privacy rules with respect to each meta-content item contained in the meta-content element, and the privacy rules for the set of meta-content items are enforced. The privacy rule enforcement may involve preventing execution of the correlation instructions, excluding the selected at least one meta-content element from a correlation based on the correlation instructions, excluding the set of meta-content items from a correlation based on the correlation instructions, or restricting access to a correlation result based on the correlation instructions. | 2013-12-26 |
20130347058 | Providing Geographic Protection To A System - In one embodiment, a method includes determining a location of a system responsive to location information received from at least one of a location sensor and a wireless device of the system, associating the location with a key present in the system to generate an authenticated location of the system, and determining whether the authenticated location is within a geofence boundary indicated in a location portion of a launch control policy (LCP) that provides a geographic-specific policy. Other embodiments are described and claimed. | 2013-12-26 |
20130347059 | Method for Propagating Access Policies - The present disclosure describes a network appliance and associated access policy protocol (APP) that communicates and obeys access policies within a network. The network appliance (APP node) propagates access policies to other APP nodes that can utilize the policies most effectively. When an access policy reaches the network boundary, intra network bandwidth is optimized. The access policies may be distributed and executed in the cloud—e.g. proxy firewall, proxy policy execution. | 2013-12-26 |
20130347060 | SYSTEMS AND METHODS FOR COMBINED PHYSICAL AND CYBER DATA SECURITY - Methods and systems for protecting computer systems against intrusion. The disclosed techniques detect intrusions by jointly considering both cyber security events and physical security events. In some embodiments, a correlation subsystem receives information related to the computer system and its physical environment from various information sources in the cyber domain and in the physical domain. The correlation subsystem analyzes the information and identifies both cyber security events and physical security events. The correlation subsystem finds cyber security events and physical security events that are correlative with one another, and uses this correlation to detect intrusions. | 2013-12-26 |
20130347061 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PUBLISHING NON-MALICIOUS THIRD PARTY CONTENT TO A DATA FEED - In accordance with embodiments, there are provided mechanisms and methods for publishing non-malicious third party content to a data feed. These mechanisms and methods for publishing non-malicious third party content to a data feed can provide analysis of third party content requested to be published to a data feed, which can be used to safeguard against the publication of malicious content to the data feed. | 2013-12-26 |
20130347062 | SECURED NETWORK ARRANGEMENT AND METHODS THEREOF - A high density network arrangement for managing an integrated secured multiple networks arrangement is provided. The arrangement includes a power module for providing power to a circuitry of the high density network arrangement. The arrangement also includes a plurality of network interfaces, wherein each network interface of the plurality of network interfaces is configured for coupling with a network arrangement. The arrangement further includes a processor for providing processing capability to the high density network arrangement. The arrangement yet also includes logic arrangement for managing data traffic flowing through the plurality of network interfaces, wherein the data traffic is configured to traverse the high density network arrangement between the plurality of network arrangement interfaces irrespective whether the power is provided to the circuitry of the high density network arrangement. | 2013-12-26 |
20130347063 | HANDLING CLAIMS TRAVERSING SECURITY BOUNDARIES - Sharing security claims across different security contexts. A method includes, for a first security context, identifying a first set of security claims. The method further includes for the first security context identifying a second set of security claims from the first set of security claims that is allowed to be sent from the first security context. The first set of security claims is modified to create the second set of security claims. For a second security context, security claim requirements are identified. The second set of security claims is modified to satisfy the security claim requirements for the second security context. | 2013-12-26 |
20130347064 | METHOD AND APPARATUS FOR SECURE APPLICATION EXECUTION - Systems, methods, apparatuses, and computer-readable media are described for securely installing, executing and/or migrating a security sensitive application in a trusted execution environment on a mobile device. For example, techniques described herein allow a mobile device to verify the operating environment of the mobile device, the security sensitive application itself and discover a trusted execution environment on the device to install the security sensitive application. Furthermore, techniques are disclosed for verifying the state of one or more applications on the mobile device against a synchronized copy of the trusted execution environment operating in the cloud and also migrating the state of one or more applications from a trusted execution environment from a first mobile device to a second mobile device in the event that the mobile device is compromised, lost, stolen or being upgraded. | 2013-12-26 |
20130347065 | SYSTEM AND METHOD FOR CLONING A WI-FI ACCESS POINT - Systems and methods for cloning a Wi-Fi access point. A determination is made by a network monitoring device to transition communications between a Wi-Fi device and a first access point (AP) to a second AP. The SSID and the security configuration information, and, optionally, network address translation (NAT) information of the first access point are acquired and provided to a second AP. The second AP instantiates the SSID and the security configuration information and, optionally, the NAT information. The networking monitoring device directs the first AP to cease using the SSID and the security configuration information and, optionally, the NAT information in response to receipt of confirmation that the second AP has instantiated the SSID and the security configuration information and, optionally, the NAT information of the first AP. | 2013-12-26 |
20130347066 | METHODS AND SYSTEMS FOR SECURE KEY ENTRY VIA COMMUNICATION NETWORKS - According to some embodiments, a member authentication request is received at a security server from a client server. The member authentication request may be associated with, for example, a member attempting to access confidential information from the client server. A secure key associated with the member may be determined and data associated with that key may be transmitted to the member (e.g., via his or her wireless device or computer). Secure key information may be received from the member and validated. Based on the validated secure key information, it may be arranged for the member to receive the confidential information from the client server. | 2013-12-26 |
20130347067 | DYNAMIC HUMAN INTERACTIVE PROOF - In one embodiment, a human interactive proof portal | 2013-12-26 |
20130347068 | Detection And Management Of Unauthorized Use Of Cloud Computing Services - Concepts and technologies disclosed herein are for detecting and managing unauthorized use of cloud computing services from within an internal network of a business or other organization. A computer system may be configured to identify a plurality of Web resources that have been accessed by computing devices from within the internal network. The computer system may also be configured to obtain Internet protocol (“IP”) information from a network component of the internal network. The IP information may be used to determine whether each of the plurality of Web resources is a cloud computing service resource. The computer system may also be configured to block access to a cloud computing service resource of the plurality of Web resources upon determining that the IP information identifies the cloud computing service resource as being unauthorized. | 2013-12-26 |
20130347069 | REFERER VERIFICATION APPARATUS AND METHOD - A referer verification apparatus and method for controlling web traffic having malicious code are provided. In the referer verification method, whether a referer is present in a Hypertext Transfer Protocol (HTTP) packet is determined. If it is determined that the referer is present in the HTTP packet, Uniform Resource Locators (URLs) are extracted from a referer web page corresponding to the referer. The referer is verified based on a URL corresponding to a referer verification request received from a server and the extracted URLs. A Completely Automated Public Test to tell Computers and Humans Apart (CAPTCHA) verification procedure conducted by a user is performed based on results of the verification of the referer. | 2013-12-26 |
20130347070 | SYSTEM AND METHOD FOR EMBEDDING FIRST PARTY WIDGETS IN THIRD-PARTY APPLICATIONS - Methods and systems provide embeddable user interface widgets to third-party applications so that the widgets can be securely embedded in, and securely used from within, the third-party applications. An embeddable widget may be authorized to access a first-party cloud storage system from a third-party application based on the cloud storage system authenticating a request received from the widget. The authentication may be based on an application identifier, an origin identifier, and/or one or more document identifiers received from the third-party application through the embedded widget. The disclosed methods and systems may significantly mitigate security concerns caused by embedding software in third-party sites, such as clickjacking. | 2013-12-26 |
20130347071 | METHOD AND SYSTEM FOR GRANTING ACCESS TO A SECURED WEBSITE - A method and system are provided for granting access to a secured website of a content provider. The method includes: detection of a user's request for accessing secured website on a first communication device, the request indicating that at least one access code for accessing secured website is stored on an authentication server; transmission of a request for a validation to a second communication device identified with indication; and after verification of the validation received from the second communication device, forwarding the request for access to the secured website to the content provider using the stored website access code corresponding to the security code. | 2013-12-26 |
20130347072 | PRIVATE TUNNEL NETWORK - A processor-based system and method comprising a private tunnel connector operable to receive a network connection request, test the connection request for private network information, generate network connection information in response to the test, and respond to the network connection request with the network connection information. The testing may include accessing a DNS server for private network information, and receiving private domain information from a private domain server. The private tunnel connector is further operable to connect to a private domain server that is coupled to the private network connector through the Internet. The private domain server may include private cloud information such that users may create and access one or more private clouds using tunneling technologies. Domain servers and host machines may employ various encryption schemes to facilitate adding public Internet resources to the private cloud. | 2013-12-26 |
20130347073 | AUTHORIZING SECURED WIRELESS ACCESS AT HOTSPOT HAVING OPEN WIRELESS NETWORK AND SECURE WIRELESS NETWORK - A hotspot provides an open wireless network and a secure wireless network. The open wireless network has no network-level encryption and allows open association therewith. The secure wireless network employs network-level encryption and requires authentication of a received access credential from a client device before allowing association therewith. A system for authorizing the client device for secured access at the hotspot includes an access controller configured to establish an encrypted connection between the client device and a login portal of the hotspot over the open wireless network, and to store a user-specific access credential transmitted via the encrypted connection as a valid access credential in a credential database. The credential database is accessed by wireless access points of the hotspot to authenticate the received access credential from the client device in response to a request from the client device to associate with the secure wireless network. | 2013-12-26 |
20130347074 | SYSTEMS AND METHODS FOR PROVIDING A ONE-TIME AUTHORIZATION - Systems and methods for presenting a request are disclosed. The systems and methods may include one or more steps, such as receiving, by an electronic device, request information from an entity. The request information may include a request for approval by a user. The steps may further include transmitting, by the electronic device, data containing the request information to a computing device, receiving, by the electronic device, a symbology corresponding to the request information from the computing device and presenting, by the electronic device, the symbology to the user. | 2013-12-26 |
20130347075 | METHOD AND APPARATUS FOR SECURE CONSOLIDATION OF CLOUD SERVICES - Cloud services are provided to mobile devices. Applications access cloud services through a consolidator that consolidates the services. The mobile device may include a secure element and secure memory to which the consolidator may authenticate. Authenticated consolidators can control the lifecycle of applications and data in secure memory. Secure elements and secure memory may be embedded or integrated in the mobile device in non-removable add-on slots, or may be in a removable or remote add-on device. | 2013-12-26 |
20130347076 | AUTOMATIC AUTHORIZATION OF USERS AND CONFIGURATION OF SOFTWARE DEVELOPMENT ENVIRONMENT - Automatic authorization of users and configuration of a software development environment can include selecting a task defined within a project plan of a software system under development, wherein the task specifies a development tool and a user, and automatically authorizing, using a centralized data processing system, the user to access the development tool. | 2013-12-26 |
20130347077 | AUTOMATIC AUTHORIZATION OF USERS AND CONFIGURATION OF SOFTWARE DEVELOPMENT ENVIRONMENT - Automatic authorization of users and configuration of a software development environment can include selecting a task defined within a project plan of a software system under development, wherein the task specifies a development tool and a user, and automatically authorizing, using a centralized data processing system, the user to access the development tool. | 2013-12-26 |
20130347078 | Aggregating Online Activities - The disclosure includes a system and method for automatically authorizing data transfer from a third party service to a user device. The system includes a processor and a memory storing instructions that, when executed, cause the system to: receive a request for data from a user of a user device; receive information associated with the user and information associated with the user device; determine whether the user has previously provided authorization for a particular application available on the third party site; determine whether the user has previously provided authorization for the user device; and if the user has previously provided authorization for a particular application available on the third party site or has previously provided authorization for the user device, send data to the user device. | 2013-12-26 |
20130347079 | ACCESSING STORAGE NODES IN AN ON-LINE MEDIA STORAGE SYSTEM - A method begins by a dispersed storage (DS) processing module receiving data objects from a plurality of authorized users and determining a system level storage efficiency preference for a data object. The method continues with the DS processing module selecting a set of storage nodes of an on-line media storage system based on the system level storage efficiency preference and determining dispersed storage error encoding parameters. The method continues with the DS processing module encoding the data object in accordance with the dispersed storage error encoding parameters to produce encoded data slices and generating system addressing information. The method continues with the DS processing module storing the encoded data slices in the set of storage nodes using the system addressing information and updating a user profile for the authorized user to include the system addressing information. | 2013-12-26 |
20130347080 | NETWORK SYSTEM AND INFORMATION PROCESSING METHOD - A network system includes first information processing apparatus and a second information processing apparatus that are connected through a network. The first information processing apparatus includes a transmitter that transmits a setting for an application to the second information processing apparatus. The setting includes an attribute indicating whether any change in the setting in the second information processing apparatus is permitted. The second information processing apparatus includes a receiver that receives the setting; and a function executing unit that executes a function of the application in accordance with the setting. | 2013-12-26 |
20130347081 | Systems and Methods for Secured Mobile Cellular Communications - The present subject matter relates to secured mobile off-grid or optionally on-grid cellular communications, providing the ability to operationally provide secured 3G/4G (including further generational advancements in cellular communications), UMTS, HSPA, and LTE cellular communications to a private enclave within a 5-50 kilometer range of an antenna, although the exact communication antenna range is not limited. The communications to and from endpoints consisting of but not limited to smartphones, tablet computers, ruggedized computers, personal computers, etc., may be secured audio, video, text based and file transfers. | 2013-12-26 |
20130347082 | Unit-of-Use Control of a Computing Resource - A system and method for unit-of-use utilization of a computing resource is described. A user obtains utilization permissions for a computing resource which are recorded in a Unit-of Use (UoU) certificate. These permissions include temporal and/or functional use constraints that are static and/or dynamic. A UoU controller employs these permissions to control access by the user to the computing resource. The unit-of-use controller receives feedback from the computing resource in the form of utilization information regarding actual usage by the user which is recorded in the UoU certificate. The computing resource may include a cloud based service, operable on one or more cloud servers. The computing resource utilization permissions are preferably part of an electronic UoU certificate. This certificate is incorporated into an email, IM or a similar message medium and electronically delivered via communications network, typically from a first, user's device to a second, user's device. | 2013-12-26 |
20130347083 | LENGTH MODULATED OVER-THE-AIR NETWORK SETUP - A system that includes a transceiver, a memory, and a controller coupled to the memory. The transceiver is configured to receive a first plurality of packets from a wireless node. The memory is configured to store a packet length for each of the first plurality of packets. The controller is configured to determine network access credential information for a network supported by a wireless access point based on the packet length for each of the first plurality of packets. | 2013-12-26 |
20130347084 | Security Mode for Mobile Communications Devices - A system and method of implementing a security mode in a mobile communications device, including a mobile communications device comprising a processor, and a computer readable storage medium storing programming for execution by the processor, the programming including instructions to activate a security mode of the mobile communications device, and pursuant to activation of the security mode, disable a first class of features of the mobile communications device, wherein other features of the mobile communications device remain enabled after activation of the mobile security. | 2013-12-26 |
20130347085 | DATA EXFILTRATION ATTACK SIMULATION TECHNOLOGY - Novel systems and methods for testing network security are disclosed. In one example, at least one specified data message and at least one specified access credential to at least one third-party web-based service is stored on a monitoring system. At least one software agent configured with the specified data message and the specified access credential to the third-party web-based service is installed on at least on system to be tested. The software agent is executed on the testing system to send the specified data message to the third-party web-based service using the specified access credential. A monitoring system which is independent of the network, access the third-party web-based service with the access credential. The monitoring system compares, if data on the third-party web-based service is equivalent to the specified data message sent by the software agent. In another example, the software agent is configured with a custom start-logging command. | 2013-12-26 |
20130347086 | METHODS AND SYSTEMS FOR CAPTURING BIOMETRIC DATA - A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an operator of the device and is configured to cause the device to display an outline image. Moreover, the method includes displaying the outline image in a stationary position on a display of the device, positioning desired biometric data proximate the device such that the desired biometric data appears as a biometric image on the device display, and monitoring the outline and biometric images shown on the device display. Furthermore, the method includes positioning the device and the desired biometric data to better align the outline and biometric images when the outline and biometric images do not align and capturing the desired biometric data from an individual after approximately aligning the outline image with the biometric image. | 2013-12-26 |
20130347087 | Authenticating A User Of A System Via An Authentication Image Mechanism - In an embodiment, the present invention includes a method for receiving a request for user authentication of a system, displaying an authentication image on a display of the system using a set of random coordinates, receiving a plurality of gesture input values from the user, and determining whether to authenticate the user based at least in part on the plurality of gesture input values. Other embodiments are described and claimed. | 2013-12-26 |
20130347088 | Remote Direct Memory Access Authentication of a Device - An approach is provided in which a server receives a first request from a client over a command port connection. The server, in turn, sends a first phase authentication token to the client over the command port and receives a second request from the client over a management port connection. In response, the server sends a second phase authentication token to the client over the management port connection, which the server receives back from the client over the command port connection. In turn, the server authenticates the client to utilize the command port connection accordingly. | 2013-12-26 |
20130347089 | OUT-OF-BAND REMOTE AUTHENTICATION - In an embodiment a single user authentication event, performed between a trusted path hardware module and a service provider via an out of band communication, can enable a user to transparently access multiple service providers using strong credentials that are specific to each service provider. The authentication event may be based on multifactor authentication that is indicative of a user's actual physical presence. Thus, for example, a user would not need to enter a different retinal scan to gain access to each of the service providers. Other embodiments are described herein. | 2013-12-26 |
20130347090 | MORE SECURE IMAGE-BASED "CAPTCHA" TECHNIQUE - A more secure CAPTCHA makes use of a distorted alphanumeric character string or strings that include one or more glyphs, pictures or symbols foreign to a target audience. Adding at least one of a glyph, picture or symbol makes recognition of the distorted string trivial since humans who would know which of the character set to expect, but a very difficult decision for a computer already struggling to decide where a character begins and ends, let alone identifying the character as being valid. | 2013-12-26 |
20130347091 | Single-Channel Multi-Factor Authentication - Systems and methods for authenticating electronic transactions are provided. The authentication methods employ a combination of security features. These security features can be based, for example, on unique knowledge of the person being authenticated, unique personal features and attributes of the person, the ability of the person to respond, and to do so in a fashion that a machine cannot, and so forth. Methods for enrolling the person prior to authentication are also provided, as well as systems for enrollment and authentication. | 2013-12-26 |
20130347092 | Remote Direct Memory Access Authentication of a Device - An approach is provided in which a server receives a first request from a client over a command port connection. The server, in turn, sends a first phase authentication token to the client over the command port and receives a second request from the client over a management port connection. In response, the server sends a second phase authentication token to the client over the management port connection, which the server receives back from the client over the command port connection. In turn, the server authenticates the client to utilize the command port connection accordingly. | 2013-12-26 |
20130347093 | TOKEN DEVICE RE-SYNCHRONIZATION THROUGH A NETWORK SOLUTION - A system and method are illustrated as including receiving a request for a current time and transmitting the current time to a password device. The current time is used to synchronize a clock in the password device to reflect the current time of an authentication server. The synchronized clock is used to generate a first token value at the password device. A request for the first token value is received from a server of the site by the authentication server. The server of the site is provided with the first token value. The server of the site sends a list of token values including the first token value to a computing device associated with the password device. The list of token values, presented at the same time on the computing device, are compared to the first token value generated by the password device to determine a matching first token value. | 2013-12-26 |
20130347094 | IN-LINE FILTERING OF INSECURE OR UNWANTED MOBILE DEVICE SOFTWARE COMPONENTS OR COMMUNICATIONS - Techniques for in-line filtering of insecure or unwanted mobile components or communications (e.g., insecure or unwanted behaviors associated with applications for mobile devices (“apps”), updates for apps, communications to/from apps, operating system components/updates for mobile devices, etc.) for mobile devices are disclosed. In some embodiments, in-line filtering of apps for mobile devices includes intercepting a request for downloading an application to a mobile device; and modifying a response to the request for downloading the application to the mobile device. In some embodiments, the response includes a notification that the application cannot be downloaded due to an application risk policy violation. | 2013-12-26 |
20130347095 | ISOLATION AND SECURITY HARDENING AMONG WORKLOADS IN A MULTI-TENANT NETWORKED ENVIRONMENT - A method and associated systems for enhanced isolation and security hardening among multi-tenant workloads. An agent running on a processor of a networked computer system on which multicast and broadcast communications have been disabled captures an address-resolution query message from a querying tenant, converts the query message to a unicast message, and forwards the converted unicast query message to a switch. The switch forwards the converted unicast message to a redirection device and in response receives an address-resolution response message only after the redirection device verifies that the query and response messages comply with security policies. The switch forwards the address-resolution response to the querying tenant in conformance with security policies. | 2013-12-26 |
20130347096 | PERMISSION MANAGEMENT METHOD FOR APPLICATIONS, ELECTRONIC DEVICE THEREOF, AND COMPUTER READABLE MEDIUM - A permission management method for an electronic device capable of installing at least one application is illustrated. The electronic device comprises a plurality of accessible operational functions. The method prepares a management table for recording corresponding operational functions that the application needs to access while performing the application, and a permission management program for controlling the management table. The permission management program may be performed to change the permission state of each operational function corresponding to the installed application. When the application installed in the device is performed and one of the operational functions is requested, the records in the management table are referred to determine whether the application is allowed to access the requested operational function. | 2013-12-26 |
20130347097 | IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM - In an image forming apparatus, in a case where a screen of an application requiring user authentication is continuously displayed, there has been a problem that operability is low for a user who does not log in. In a case where a screen of an authentication application is displayed, and the user does not perform user authentication, processing of the user authentication of the application is skipped. | 2013-12-26 |
20130347098 | IMAGE FORMING APPARATUS - An image forming apparatus includes a control unit, a login information storage, a login information receiver, a login authenticator, a target function setter, an authorization information storage, an alternative function information storage and a target function changer. The target function changer sets a user alternative function matching a user authorized function related to an authenticated user as a target function out of functions alternative to a user prohibited function and determined by alternative function information instead of the user prohibited function different from the user authorized function related to the authenticated user out of target functions when the authenticated user is set in a login state. | 2013-12-26 |
20130347099 | KEYBOARD AS BIOMETRIC AUTHENTICATION DEVICE - Various embodiments are generally directed to use of a keyboard as a biometric authentication device. In one embodiment, for example, an apparatus comprises a processor circuit executing a sequence of instructions causing the processor circuit to receive a signal indicative of a keypress of at least one key of a keyboard communicatively coupled to the apparatus, and indicative of at least one physical characteristic associated with the keypress; compare the at least one physical characteristic to at least one stored physical characteristic associated with at least one authorized user of the apparatus; and determine if the keypress is associated with at least one authorized user of the apparatus based on the comparison. Other embodiments are described and claimed herein. | 2013-12-26 |
20130347100 | MOBILE INFORMATION TERMINAL, BEHAVIORAL FEATURE LEARNING METHOD, AND BEHAVIORAL FEATURE AUTHENTICATION METHOD - A mobile information terminal that can authenticate an authorized user by using behavioral features acquired when the user makes small movements in a limited movable range. The mobile information terminal includes a gripping feature sensor that acquires gripping features; a behavioral feature sample acquisition section that acquires time-series data of gripping features in a fiddling session as samples of behavioral features; a switch that puts the mobile information terminal into either a learning mode or an authentication mode; a template learning section that learns an authentication template by using the samples of behavioral features when in the learning mode; an authentication section that authenticates the user by comparing the samples of behavioral features with the learned authentication template when in the authentication mode; and an unlock section that unlocks all or some of the functions of the mobile information terminal when the authentication succeeds. | 2013-12-26 |
20130347101 | Terminal Authentication Method and Device - An authentication method includes sensing, pressure information through a touch screen. The pressure information includes a pressing strength value of a pressed contact when a user presses the touch screen. The sensed pressure information is compared with an authentication password by using the sensed pressure information as an authentication password. If the sensed pressure information matches the stored authentication password, it is determined that password authentication succeeds; otherwise, the password authentication fails. | 2013-12-26 |
20130347102 | Method, Apparatus and System for Access Mode Control of a Device - A method, apparatus, and system for accessing at least a portion of a device based upon an access input. An access input is received. The access input includes information for gaining access to one or more functions of the device. A user access mode of the device is changed from a first access mode to a second access mode based upon at least in part on the access input. An application is selected in the device in response to changing from the first access mode to the second access mode. At least a portion of the output of the selected application is provided. | 2013-12-26 |
20130347103 | PACKET CAPTURE FOR ERROR TRACKING - A method of tracking network traffic anomalies in a computing system, comprises receiving an ingress network packet at a configurable logic device (CLD), associating a timestamp with the packet, identifying at least one anomaly based on the contents of the packet, and storing the anomalous packet and the timestamp in a persistent memory. | 2013-12-26 |
20130347104 | ANALYZING EXECUTABLE BINARY CODE WITHOUT DETECTION - Analysis of executable binary code is performed without detection by defensive elements embedded within the executable binary code or within a system in which the executable binary code is executing. An identified suspect executable file is disassembled. Statically and dynamically analysis is performed on binary code of the disassembled executable file. An anti-anti-debugging function is implemented by executing program call functions in a manner which avoids detection of a debugging program by the defensive elements embedded within the executable binary code of the anti-debugging function of the executable binary code, thereby avoiding detection by the source of the suspect executable file. | 2013-12-26 |
20130347105 | METHOD AND DEVICE FOR COUNTERING FINGERPRINT FORGERY ATTACKS IN A COMMUNICATION SYSTEM - A method and a fingerprinting device for countering fingerprint forgery in a communication system. The fingerprinting device obtains and stores a reference fingerprint for a client device, generates and transmits decoy traffic that appears to originate from the client device, the decoy traffic having different fingerprinting properties than real traffic from the client device, generates a fingerprint for non-decoy traffic purportedly from the client device, and compares the generated fingerprint with a reference fingerprint. A forged fingerprint is detected if there is a mismatch. The decoy traffic preferably comprises frames to which no response is needed. The invention is particularly suited for 802.11 using fingerprints based on duration fields of received frames and the decoy traffic is then preferably probe request frames and null data frames. | 2013-12-26 |
20130347106 | SYSTEM AND METHOD OF FRAUD AND MISUSE DETECTION USING EVENT LOGS - A system and method are provided for detecting fraud and/or misuse of data in a computer environment through generating a rule for monitoring at least one of transactions and activities that are associated with the data. The rule can be generated based on one or more criteria related to the at least one of the transactions and the activities that is indicative of fraud or misuse of the data. The rule can be applied to the at least one of the transactions and the activities to determine if an event has occurred, where the event occurs if the at least one criteria has been met. A hit is stored if the event has occurred and a notification can be provided if the event has occurred. A compilation of hits related to the rule can be provided. | 2013-12-26 |
20130347107 | SYSTEM AND METHOD FOR AUTOMATED POLICY AUDIT AND REMEDIATION MANAGEMENT - A prevention-based network auditing system includes a central compliance server providing a user interface allowing a user to schedule and configure a network audit. The configured audit is stored in an audit repository until its scheduled time. At such a time, the compliance server automatically invokes one or more audit servers to gather information about the network. The compliance server receives the gathered information and electronically applies a network policy to the information for determining compliance with the policy. A remediation task may be generated if the policy has been violated, and the task monitored until its completion. | 2013-12-26 |
20130347108 | REPUTATION-BASED METHOD AND SYSTEM FOR DETERMINING A LIKELIHOOD THAT A MESSAGE IS UNDESIRED - A system and method for providing a reputation service for use in messaging environments employs a reputation of compiled statistics, representing whether SPAM messages have previously been received from respective a selected set of identifiers for the origin of the message, in a decision making process for newly received messages. In a preferred embodiment, the set of identifiers includes the IP address, a tuple of the domain and IP address and a tuple of the user and IP address and the set of identifiers allows for a relatively fine grained set of reputation metrics to be compiled and used when making a determination of a likelihood as to whether a received message is undesired in accordance with the invention. | 2013-12-26 |
20130347109 | Techniques for Detecting Program Modifications - Techniques are provided for detecting modifications to software instructions. At a computing apparatus configured to execute a software program comprising a plurality of instructions, at least a first check point having a first check value and a second check point having a second check value are assigned within the instructions. At least first and second portions of the instructions are identified. The first portion of the instructions comprises one or more check points other than the first check point. The second portion of the instructions comprises one or more check points other than the second check point. A first hashing operation is performed over the first portion resulting in a first equation and a second hashing operation is performed over the second portion resulting in a second equation. The first check value and the second check value are computed based on the first equation and the second equation. | 2013-12-26 |
20130347110 | EFFICIENT PACKET HANDLING, REDIRECTION, AND INSPECTION USING OFFLOAD PROCESSORS - A packet handling system is disclosed that can include at least one main processor; a plurality of offload processors connected to a memory bus and configured to provide security related services on packets prior to redirection to the main processor; and a virtual switch respectively connected to the main processor and the plurality of offload processors using the memory bus, the virtual switch configured to receive memory read/write data over the memory bus. | 2013-12-26 |
20130347111 | SYSTEM AND METHOD FOR DETECTION AND PREVENTION OF HOST INTRUSIONS AND MALICIOUS PAYLOADS - A computerized system for preventing host intrusions on a communication device. The device is wirelessly connected to a wireless communication network. The system includes a computer readable management software module configured to analyze malicious payloads. The management software module includes an asset manager module configured to assign updates to the communication device, a device database module configured to describe the communication device characteristics and a build database module configured to automate software builds of the communication device core operating system. The management software module also includes a component builder module configured to run a plurality of instruction sets to establish a build environment for the communication device according to the communication device characteristics, a configuration manager module configured to build the instruction sets and an operating system product module configured by the build database module as part of a build process triggered by the asset manager module. | 2013-12-26 |
20130347112 | METHOD FOR A FINE OPTICAL LINE MONITORING IN COMMUNICATION LINES THROUGH QKD SYSTEMS - Two ends of a QKD system are connected through a private quantum channel using a protocol based on the principles of quantum physics and a conventional channel, both channels being introduced through the same medium using multiplexing techniques, wherein a possible intrusion in the communication is detected by checking the variability of the distribution of exchanged photons between both ends of said private quantum channel and in case of detecting an intrusion due to the risk identified on the communication channel the system launches an alarm. To avoid other attacks another conventional channel different from the quantum channel is further used in order to check the error rate in the exchanges. | 2013-12-26 |
20130347113 | DETERMINING POPULATED IP ADDRESSES - A service log of a service provider is analyzed to identify IP addresses used by account holders that are populated IP addresses. Existing information about legitimate and malicious accounts of the service provider is leveraged to determine likely good and bad populated IP addresses based on the accounts that use the populated IP addresses. Features of the good and bad populated IP addresses are used to train a classifier that can identify good and bad populated IP addresses based on features of the populated IP addresses. The classifier may be used to provide security services to the same service provider or different service providers. The services include identifying malicious accounts. | 2013-12-26 |
20130347114 | SYSTEM AND METHOD FOR MALWARE DETECTION - Systems and methods for malware detection techniques, which detect malware by identifying the C&C communication between the malware and the remote host. In particular, the disclosed techniques distinguish between request-response transactions that carry C&C communication and request-response transactions of innocent traffic. Individual request-response transactions may be analyzed rather than entire flows, and fine-granularity features examined within the transactions. As such, these methods and systems are highly effective in distinguishing between malware C&C communication and innocent traffic, i.e., in detecting malware with high detection probability and few false alarms. | 2013-12-26 |
20130347115 | TAGGING OBTAINED CONTENT FOR WHITE AND BLACK LISTING - A system and method for providing enhanced security with regard to obtained files is presented. Upon obtaining a file from an external location, the obtained file is tagged with tagging information regarding the origin of the obtained file. Additionally, an operating system suitable for execution on a computing device is also presented. The operating system includes at least one application-callable function (API) for obtaining content from an external location. Each application-callable function for obtaining content from an external location is configured to associate tagging information with each obtained file, the tagging information comprising the origin of the obtained file. The origin of the obtained file can be used for subsequent security policy decisions, such as whether to allow or block execution or rendering of the content, as well as whether the content will be accessed in a constrained environment such as a “sandbox” or virtual machine. | 2013-12-26 |
20130347116 | THREAT EVALUATION SYSTEM AND METHOD - Systems and methods of evaluation of threats to elements of a client computer application having a cyber reference library, an opponent catalog and a network model. The systems and methods produce a set of analyst reports evaluating the threats to the client computer application. One embodiment of the system for evaluating at least one threat to a client computer application has a threat evaluation engine which performs a plurality of algorithms, where each algorithm of has implementation specific needs for input into the individual algorithm, a threat evaluation results data store, a statistical analysis engine, and an analysis results data store. | 2013-12-26 |
20130347117 | AUTOMATED ACCOUNTS FOR MEDIA PLAYBACK - Content stored on a server may be selected using a user device and enabled on a central device. The identity of the central device may be authenticated without transmitting user credentials corresponding to the user, user device, user account, etc. A central device identifier can be sent to the server via the user device. An encrypted version of the central device identifier may be returned to the user device and to the central device. The central device can send the encrypted and unencrypted version of the identifier to the server, and the server can transmit the desired content to the remote device based on a comparison of the encrypted and unencrypted identifier. | 2013-12-26 |
20130347118 | LICENSE VERIFICATION METHOD AND APPARATUS, AND COMPUTER READABLE STORAGE MEDIUM STORING PROGRAM THEREFOR - A method and apparatus for verifying licenses of binary files and to a computer readable storage medium storing a program realizing license verification is provided. The method includes obtaining a binary file, extracting a character string to be searched for from the obtained binary file, and comparing the extracted character string against a knowledge base created according to a license to be verified, an apparatus capable of executing the license verification method, and a computer readable storage medium storing a program realizing the license verification method. | 2013-12-26 |
20130347119 | DATA PROCESSOR, COMMUNICATION DEVICE, DATA TRANSMISSION METHOD - According to one embodiment, a data processor includes: an accepting module configured to accept selection of a transmission destination device to which data is transmitted through a public network line in accordance with a technical standard for transmitting data protected by copyright protection technology, the transmission destination device currently existing in a given environment around the data processor not through the public network line; a first transmission processor configured to transmit a request for transmission of a device registration request including identification information for identifying the transmission destination device based on the technical standard, to the transmission destination device; a receiving module configured to receive the device registration request including the identification information from the transmission destination device; and a second transmission processor configured to transmit the data protected by the copyright protection technology to the transmission destination device identified by the identification information, through the public network line. | 2013-12-26 |
20130347120 | SECURE DATA STORAGE AND RETRIEVAL - A system for secure data processing can include an electronic data storage device and a field programmable gate array coupled to the electronic data storage device. The field programmable gate array can be configured to include a data storage section for performing a data storage operation and a data retrieval section for performing a data retrieval operation. The data storage operation can include obtaining a seed value and retrieving one or more algebraic operations based on the seed value. The storage operation can also include processing input data according to the one or more algebraic operations to generate pseudorandom output data, prepending the seed value to the output data and storing the output data in the electronic data storage device. | 2013-12-26 |
20130347121 | System and Method For Providing Conditional access to Server-based Applications From Remote Access Devices - Systems and methods are provided for providing users at remote access devices with conditional access to server-based applications. Requests for access to server-based applications (e.g., requests to launch or obtain data associated with the server-based applications) by remote access devices may be prevented or allowed based on device compliance with one or more policies including whether data-retention prevention code can be downloaded to and operational on the remote access devices. The data-retention prevention code may be used to both determine whether data can be automatically deleted from a cache or file directory at the remote access device and to delete potentially retention-sensitive data once the data is downloaded to the remote access device from the server-based application. | 2013-12-26 |
20130347122 | METHOD AND ARRANGEMENT FOR PROVIDING SECURITY THROUGH NETWORK ADDRESS TRANSLATIONS USING TUNNELING AND COMPENSATIONS - This invention provides a method for providing network security services, such as those provided by the IPSEC protocol, through network address translation (NAT). The method is based on determining the transformations that occur on a packet and compensating for the transformations. Because only TCP and UDP protocols work through NATs, the IPSEC AH/ESP packets are encapsulated into UDP packets for transport. Special operations are performed to allow reliable communications in such environments. | 2013-12-26 |
20130347123 | MEDIA DATA PROCESSING METHOD AND APPARATUS - Embodiments of the present invention provide a media data processing method and apparatus. The media data processing method includes: obtaining each media segment in a coding representation; and performing content protection processing on at least a part of media segments in the coding representation. In the embodiments of the present invention, a media segment in a coding representation is used as a unit of content protection, and the content protection may be performed on at least a part of media segments in the coding representation, so that protection manners of media segments in the coding representation are differentiated, so as to improve reliability and flexibility of performing the content protection on an HTTP streaming media service. | 2013-12-26 |
20130347124 | Accessing Restricted Resources In Computer Programming - A computerized method for providing a computer code an access to a restricted resource of a computer program, comprising modifying an at least one duplicate of an at least one declaration file of the computer program by removing a restriction definition of an at least one resource of the computer program that is referred to by the computer code, thereby generating an at least one modified declaration file, and building a computer application comprising the computer code and also the computer program as being dependent on the at least one modified declaration file, thereby providing access to the at least one resource originally defined as restricted, and an apparatus for performing the same. | 2013-12-26 |
20130347125 | Secondary Asynchronous Background Authorization (SABA) - A system for identify threats to the security of an owner's electronic information by performing a secondary background authorization (SABA) that is transparent to the requester to verify or flag unauthorized access to systems, data or company offices being requested. The secondary background authorization relies on a proprietary security, big data pattern-matching, and modeling approach made possible by the creation, expansion, and analysis of new “data streams” that, together with Operating systems, applications, and devices data, uniquely allows the system to determine a security access risk and provide information to the owner. | 2013-12-26 |
20130347126 | CLIENT SERVICES FOR WEB-BASED APPLICATIONS - A system for acquiring access to a web-based application includes one or more computer-readable storage media and an application (e.g., a web browser) for accessing and retrieving over a network a plurality of resources. The system also includes a program interface embodied on the one or more computer-readable storage media. The program interface is configured to present a common set of application program interfaces (APIs) that can be used by the application to demonstrate that a user of the application is entitled to access a first resource. The system also includes programming logic configured to determine if the user of the application is authorized to access the first resource. If it is determined that authorization has not been established to access the first resource, the application is directed to communicate with a marketplace to obtain authorization to access the first resource. | 2013-12-26 |
20130347127 | DATABASE MANAGEMENT BY ANALYZING USAGE OF DATABASE FIELDS - Apparatuses, computer readable media, methods, and systems are described for accessing table layout data identifying a plurality of fields included in a table stored in a database, accessing log data identifying a number of times each of the fields of the table has been queried, ranking the fields based on the number of times each of the fields of the table has been queried, determining a first subset of the fields that have not been queried at least a predetermined number of times, and generating an update to the table by removing the first subset of the fields from the table. | 2013-12-26 |
20130347128 | METHODS AND DEVICES FOR PRESENTING EMAIL ADDRESSES - Methods and devices for data entry are disclosed. An example method includes executing an application on a mobile device, the application requiring a login to access at least a portion of data accessible via the application, accessing a store of email addresses associated with a user of the mobile device, the email addresses including at least a forwarding email address, and presenting the email addresses including the forwarding email address for selection as the login. | 2013-12-26 |
20130347129 | System and Method for Second Factor Authentication Services - A customer server receives a client request to access protected resources over the Internet. First factor authentication is performed and if it is successful a vendor authentication engine is invoked to undertake second factor authentication. The results of the second factor authentication are returned to the customer server, which grants access only if both first and second factor authentication succeeds. | 2013-12-26 |
20130347130 | METHODS AND APPARATUS FOR DYNAMICALLY PROVIDING MODIFIED VERSIONS OF ELECTRONIC DEVICE APPLICATIONS - A computer-implemented method for dynamically delivering a securitized version of an application to a mobile device in a computing system programmed to perform the method includes receiving a request for the application from a mobile device; sending the request for the application to an application server, receiving the application from the application server in response to the request for the application, determining with the computing system, a securitized version of the original requested application, and sending the securitized version of the application to the mobile device. In the invention, if the securitized version is not previously held in storage by the computing device, the computing device creates the securitized version and sends that to the mobile device. | 2013-12-26 |
20130347131 | Systems and Methods Involving Features of Hardware Virtualization Such as Separation Kernel Hypervisors, Hypervisors, Hypervisor Guest Context, Hypervisor Contest, Rootkit Detection/Prevention, and/or Other Features - Systems, methods, computer readable media and articles of manufacture consistent with innovations herein are directed to computer virtualization, computer security and/or data isolation. According to some illustrative implementations, innovations herein may utilize and/or involve a separation kernel hypervisor which may include the use of a guest operating system virtual machine protection domain, a virtualization assistance layer, and/or a rootkit defense mechanism (which may be proximate in temporal and/or spatial locality to malicious code, but isolated from it), inter alia, for detection and/or prevention of malicious code, for example, in a manner/context that is isolated and not able to be corrupted, detected, prevented, bypassed, and/or otherwise affected by the malicious code. | 2013-12-26 |
20130347132 | Consumption Based Digital Content Rental Expiration - A mechanism is provided for consumption based digital content rental. Responsive to validating a request from a user to consume the digital content, one or more discrete units of a plurality of discrete units comprised by the digital content are made available to the user. A timer associated with a selected discrete unit is started that records an agreed-to consumption time for the selected discrete unit. The selected discrete unit is presented to the user and then a determination is made as to whether the tinier indicates that the agreed-to consumption time of the selected discrete unit has expired. When the agreed-to consumption time has expired, consumption of the selected discrete unit is ended white leaving each remaining discrete units in the plurality of discrete unit with its own agreed-to consumption time for the user to consume. | 2013-12-26 |
20130347133 | Methods For Identifying Compounds That Modulate Untranslated Region-Dependent Gene Expression And Methods Of Using Same - The present invention relates to methods for identifying compounds that modulate untranslated region-dependent expression of a target gene. The invention particularly relates to using untranslated regions of a target gene or fragments thereof linked to a reporter gene to identify compounds that modulate untranslated region-dependent expression of a target gene. The methods of the present invention provide a simple, sensitive assay for high-throughput screening of libraries of compounds to identify pharmaceutical leads. | 2013-12-26 |
20130347134 | TRANSGENIC VON WILLEBRAND FACTOR ANIMALS AND USES THEREOF - The present invention provides, inter alia, transgenic non-human animals, such as transgenic mice. The animals contain in their genome a polynucleotide encoding a von Willebrand factor (VWF) polypeptide, which polypeptide forms a thrombus when in the presence of human platelets. Nucleic acid sequences and vectors for generating the transgenic non-human animals, and methods for using the transgenic non-human animals are provided as well. Chimeric VWF proteins are also provided. | 2013-12-26 |
20130347135 | ANIMAL MODEL FOR PARKINSON'S DISEASE - An animal model for Parkinson's disease has a disrupted Mfn2 gene in dopaminergic neurons. | 2013-12-26 |
20130347136 | Compositions and Methods for Characterizing and Treating Muscular Dystrophy - Compositions and methods for identifying new treatments for Facioscapulohumeral muscular dystrophy (FSHD), and uses thereof. | 2013-12-26 |
20130347137 | Stabilized Step Function Opsin Proteins and Methods of Using the Same - Provided herein are compositions comprising non-human animals comprising neurons expressing stabilized step function opsin proteins on neural plasma membranes and methods of using the same to selectively depolarize neurons residing in microcircuits of the pre-frontal cortex to affect one or more social behaviors, communications, and/or conditioned behaviors in the non-human animal. | 2013-12-26 |
20130347138 | Cells and Vertebrates for Enhanced Somatic Hypermutation and Class Switch Recombination - The invention provides improved non-human vertebrates and non-vertebrate cells capable of expressing antibodies, eg, comprising human variable region sequences. The invention provides for enhanced AID and/or AID homologue spectra, thereby providing for the increased diversity as a result of somatic hypermutation and/or class-switch recombination during in vivo antibody generation. The invention also provides methods of generating antibodies using such vertebrates, as well as the antibodies per se, therapeutic compositions thereof and uses. | 2013-12-26 |
20130347139 | BEAN VARIETY FMGC6V1007 - The invention provides seed and plants of the bean line designated FMGC6V1007. The invention thus relates to the plants, seeds and tissue cultures of bean line FMGC6V1007, and to methods for producing a bean plant produced by crossing a plant of bean line FMGC6V1007 with itself or with another bean plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of bean line FMGC6V1007, including the pods and gametes of such plants. | 2013-12-26 |
20130347140 | High Rebaudioside-A Plant and Methods of Producing the Same and Uses Thereof - A method for breeding | 2013-12-26 |
20130347141 | BACTERIAL RESISTANT TRANSGENIC PLANTS HAVING DYSFUNCTIONAL T3SS PROTEINS - A nucleic acid expression vector comprising a nucleic acid sequence encoding a dominant negative T3SS protein is disclosed. The nucleic acid expression vector further comprising a cis acting regulatory element capable of driving transcription of the nucleic acid sequence in a plant cell. Moreover, the dominant negative T3SS protein mediates assembly of a dysfunctional needle complex. | 2013-12-26 |
20130347142 | USE OF A SEED SPECIFIC PROMOTER TO DRIVE ODP1 EXPRESSION IN CRUCIFEROUS OILSEED PLANTS TO INCREASE OIL CONTENT WHILE MAINTAINING NORMAL GERMINATION - A recombinant DNA construct comprising a polynucleotide encoding an ODP1 polypeptide operably linked to a sucrose synthase 2 promoter where this construct can be used to increase oil content in the seeds of a cruciferous oilseed plant while maintaining normal germination is disclosed. A method for increasing oil content in the seeds of a cruciferous oilseed plant while maintaining normal germination using this construct is also disclosed. | 2013-12-26 |
20130347143 | METHOD FOR PRODUCING LILIES CONTAINING DELPHINIDIN IN THE PETALS THEREOF - Provided is a method for producing lilies containing a blue pigment (delphinidin) in the petals thereof by introducing a foreign gene into lilies. The method pertaining to the present invention is a method for producing lilies containing delphinidin in the petals thereof, including the following steps: introducing, into a lily, a F3′5′H gene derived from a campanula and comprising a nucleotide sequence encoding a peptide having flavonoid 3′5′-hydroxylase (F3′5′H) activity, such as a nucleotide sequence represented by SEQ ID NO: 1 or SEQ ID NO: 11; while also introducing a F3′H gene fragment derived from a lily and comprising a nucleotide sequence encoding a peptide having flavonoid 3′-hydroxylase activity, such as a nucleotide sequence represented by SEQ ID NO: 3 or SEQ ID NO: 16; and inhibiting the expression of endogenous F3′H expression, which acts on cyanidin synthesis in lily petals, while the F3′5′H gene that has been introduced acts to cause the synthesis of delphinidin. | 2013-12-26 |
20130347144 | PROMOTERS AND METHODS FOR TRANSFORMING TUBERS AND TRANSFORMED TUBERS - The present disclosure relates to a plant promoter and a method of transforming | 2013-12-26 |
20130347145 | METHOD FOR ACCUMULATING PROTEIN IN PLANT CELLS - According to the present invention, a method for stably accumulating a target protein in plant cells or a plant body, and a transgenic plant in which protein has accumulated, are provided. The method of the present invention is a method for accumulating protein in plant cells, comprising accumulating a target protein or a protein deficient in an N-terminal region of the target protein in vacuoles of myrosin cells present in a multiple mutant, in which myrosin cells deficient in intravacuolar protein are also present in a plant body at locations other than around vascular bundles, by expressing a gene that encodes a target protein having an intracellular membrane system localization signal on the N-terminal and a vacuole localization signal on the C-terminal in the multiple mutant. | 2013-12-26 |
20130347146 | GNTIII EXPRESSION IN PLANTS - The invention relates to the field of glycoprotein processing in transgenic plants used as cost efficient and contamination safe factories for the production of recombinant biopharmaceutical proteins or pharmaceutical compositions comprising these glycoproteins. The invention provides a plant comprising a functional mammalian enzyme providing mammalian GnTIII that is normally not present in plants, said plant additionally comprising at least a second mammalian protein or functional fragment thereof that is normally not present in plants. | 2013-12-26 |
20130347147 | Method and Apparatus for Nanomechanical Measurement Using an Atomic Force Microscope - A control-based approach is provided for achieving accurate indentation quantification in broadband and in-liquid nanomechanical property measurements using atomic force microscope (AFM). Accurate indentation measurement is desirable for probe-based material property characterization because the force applied and the indentation generated are the fundamental physical variables that are measured in the characterization process. Large measurement errors, however, occur when the measurement frequency range becomes large (i.e., broadband), or the indentation is measured in liquid on soft materials. Such large measurement errors are generated due to the inability of the conventional method to account for the convolution of the instrument dynamics with the viscoelastic response of the soft sample when the measurement frequency becomes large, and the random-like thermal drift and the distributive hydrodynamic force effects when measuring the indentation in liquid. | 2013-12-26 |