52nd week of 2012 patent applcation highlights part 70 |
Patent application number | Title | Published |
20120331526 | MULTI-LEVEL, HASH-BASED DEVICE INTEGRITY CHECKS - In some embodiments, a non-transitory processor-readable medium stores code representing instructions configured to cause a processor to receive, from a mobile device, a first signal including a hash value. The hash value can be based at least in part on a hardware component of the mobile device and a software module stored at the mobile device. The code can further represent instructions configured to cause the processor to send, to the mobile device, a second signal when the hash value matches a stored hash value associated with the mobile device, the second signal configured to grant, to the mobile device, access to a network. | 2012-12-27 |
20120331527 | MULTI-LAYER, GEOLOCATION-BASED NETWORK RESOURCE ACCESS AND PERMISSIONS - In some embodiments, a non-transitory processor-readable medium stores code representing instructions configured to cause a processor to receive, from a mobile device, a first signal including a request to execute a command at a server. The code further represents instructions configured to cause the processor to receive, from the mobile device, a second signal including a user credential associated with a user account and determine, based on the user credential, a user role associated with the user account. The code further represents instructions configured to cause the processor to receive, from the mobile device, a third signal indicating a geolocation of the mobile device. The code further represents instructions configured to cause the processor to determine, based at least on the user role and the geolocation, whether the user account is authorized to execute the command. The code further represents instructions configured to cause the processor to, when the user account is authorized to execute the command, send a fourth signal such that the command is executed at the server. | 2012-12-27 |
20120331528 | APPARATUS, SYSTEMS AND METHODS FOR SECURE AND SELECTIVE ACCESS TO SERVICES IN HYBRID PUBLIC-PRIVATE INFRASTRUCTURES - Embodiments of apparatus, systems and methods facilitate deployment of distributed computing applications on hybrid public-private infrastructures by facilitating secure access to selected services running on private infrastructures by distributed computing applications running on public cloud infrastructures. In some embodiments, a secure tunnel may be established between proxy processes on the public and private infrastructures and communication between the distributed computing application and the selected services may occur through the proxy processes over the secure tunnel. | 2012-12-27 |
20120331529 | Persistent Key Access To Album - A method includes receiving a first request from a first user device to access a first resource that includes data for a second user account for which access to the data is restricted to authorized users, the first request including an authorization token and associated with a first user identifier that identifies a first user; determining that the first user identifier does not identify an authorized user and in response: determining that the first user identifier identifies an authorized user based on the authorization token, and provide the first resource to the first user device; receiving a second request for access to data to the second user account, the second request associated with the first user identifier; and based on the first user identifier being determined to identify authorized user, providing access to the data to the second user account in response to the second request. | 2012-12-27 |
20120331530 | AUTHENTICATION AND AUTHORIZATION IN NETWORK LAYER TWO AND NETWORK LAYER THREE - A method may include authenticating a node over layer 2 in a network based on authentication rules; sending a node authentication code to the node; and providing layer 3 network access based on the node authentication code. | 2012-12-27 |
20120331531 | CUSTOM DATA IMAGE BUILDING - A first server is configured to receive an image from a first client device. The image may include an instruction to provide a second client device with a computer file. The first server is further configured to store the image, receive a task query from the first client device, and provide a task query response to the first client device based on receiving the task query. The task query response may include an indication that the first server is storing a task associated with the second client device. The first server is further configured to receive an image request from the second client device, communicate with a second server to identify whether the second client device is authorized to receive the image, and provide, to the second client device, the computer file associated with the image based on identifying that the second client device is authorized to receive the image. | 2012-12-27 |
20120331532 | DEVICE-AGNOSTIC MOBILE DEVICE THIN CLIENT COMPUTING METHODS AND APPARATUS - In some embodiments, a non-transitory processor-readable medium stores code representing instructions configured to cause a processor to send, from a sole application stored at a mobile device, a first signal including authentication information of a user. The code can further represent instructions configured to cause the processor to receive, at the sole application, a second signal indicating a set of cloud-based applications associated with the user, the second signal being sent in response to the authentication information. The code can further represent instructions configured to cause the processor to send, to a display of the mobile device, an indicator of the set of cloud-based applications associated with the user, and receive user input including a request to initialize a first cloud-based application from the set of cloud-based applications. The code can further represent instructions configured cause the processor to send a third signal indicating a requested function associated with the first cloud-based application, and receive, in response to the third signal, a fourth signal including information associated with the requested function. | 2012-12-27 |
20120331533 | Virtualizing Storage for WPAR Clients that Share a Common Operating System of Logical Partition - Systems, methods and media for providing to a plurality of WPARs private access to physical storage connected to a server through a VIOS are disclosed. In one embodiment, a server is logically partitioned to form a working partition comprising a WPAR manager and individual WPARs. Each WPAR is assigned to a different virtual port. The virtual ports are created by using NPIV protocol, between the WPAR and VIOS. Thereby, each WPAR has private access to the physical storage-connected to the VIOS. | 2012-12-27 |
20120331534 | Systems and Methods for Managing Secure Communication Sessions with Remote Devices - According to various embodiments, a session manager generates, stores, and periodically updates the login credentials for each of a plurality of connected IEDs. An operator, possibly via an access device, may provide unique login credentials to the session manager. The session manager may determine the authorization level of the operator based on the operator's login credentials, defining with which IEDs the operator may communicate. According to various embodiments, the session manager does not facilitate a communication session between the operator and a target IED. Rather, the session manager maintains a first communication session with the operator and initiates a second communication session with the target IED. Accordingly, the session manager may forward commands transmitted by the operator to the target IED. Based on the authorization level of the operator, a session filter may restrict what may be communicated between an operator and an IED. | 2012-12-27 |
20120331535 | METHODS AND SYSTEMS FOR COMPLETING, BY A SINGLE-SIGN ON COMPONENT, AN AUTHENTICATION PROCESS IN A FEDERATED ENVIRONMENT TO A RESOURCE NOT SUPPORTING FEDERATION - A system for distributed authentication includes a client machine, in a first domain in a federation, that receives from a user a first set of authentication credentials. The system also includes an intermediate machine in a second domain in the federation, a server, also in the second domain, a password management program executing on the server and a non-federated resource. The intermediate machine authenticates the user responsive to receiving the first set of authentication credentials and identifies a second set of authentication credentials. The server in the second domain authenticates the user, responsive to the second set of authentication credentials. The password management program, executing on the server, retrieves a third set of authentication credentials associated with the user. The non-federated resource authenticates the user, responsive to receiving, from the password management program, the third set of authentication credentials. | 2012-12-27 |
20120331536 | SEAMLESS SIGN-ON COMBINED WITH AN IDENTITY CONFIRMATION PROCEDURE - A method executable by a server system confirms the identity of a user of a client device. The method receives an activation request from the client device and maintains information corresponding to a destination resource requested by the client device. In response to receiving the activation request, the server system sends a code to a registered device of the user. After sending the code, the server system receives a verification request from the client device. The verification request includes a user-entered representation of the code. In response to receiving the verification request the client device is activated as a new registered device for the user, and the server system seamlessly provides the destination resource to the client device using the maintained information. | 2012-12-27 |
20120331537 | NETWORK-AGNOSTIC CONTENT MANAGEMENT - System(s) and method(s) are provided for content management, e.g., exchange and manipulation, across devices provisioned through disparate network platforms. Devices can be mobile or stationary, and connect to provisioning network platforms through various network bearers. Through various secure protocols, a client component within a device secures access to content and provides secure delivery thereof. Directives for content manipulation are also delivered securely. Delivery of contents and directives are performed from device to device, routed via gateway nodes within a network platform that provisions the device. In addition, or alternatively, content management can be implemented through an intermediary component, which can also validate devices and secure delivery of content or directives. Alarm signaling among devices provisioned through disparate network platforms also can be securely conveyed. Intermediary component also can be exploited for content management among subscribers of disparate network providers. | 2012-12-27 |
20120331538 | METHOD AND COMMUNICATION DEVICE FOR ACCESSING TO DEVICES IN SECURITY - A method for a communication device for securely accessing a device includes obtaining accessing authentication information via an out-band channel, the accessing authentication information being used for accessing authentication between a service request device and a service providing device, the service request device and the service providing device sharing the same management device, and forming the out-band channel with the management device respectively ( | 2012-12-27 |
20120331539 | AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, AND STORAGE MEDIUM FOR REALIZING A MULTITENANT SERVICE - In order to prevent leakage of data possessed by a tenant to other tenants in multitenant service, it is necessary to control access. However, the conventional access control method is designed and developed to meet a specified request. Thus, costs for a dedicated design, development, administration, and maintenance need to be considered. Such costs can be reduced by using role information for each of a plurality of services and determining whether to allow or not allow access in a uniform manner. | 2012-12-27 |
20120331540 | Authentication and authorization method for tasking in profile-based data collection - An apparatus and a new method of authentication and authorization of tasking requests to data collection agents on wireless devices directly makes use of public key cryptography, rather than depending on domain-name-based authenticated using the standard HTTPS chain-of-trust: A set of digital credentials is stored in the device's secure credential store. These credentials include at least one “supertasking authority” credential, as well as one or more normal “tasking authority” credentials. Profiles are only accepted by the agent if they are signed by a trusted tasking authority credential. Supertasking authority credentials thus serve as credential authorities (CAs) for tasking authority credentials. | 2012-12-27 |
20120331541 | SYSTEMS, METHODS, AND MEDIA FOR FIREWALL CONTROL VIA REMOTE SYSTEM INFORMATION - A method and system for controlling a firewall for a user computer system. One or more processors of the user computer system receive a control request to control a program of the user computer system by the firewall. The control request includes a condition pertaining to at least one process of a remote computer system. The at least one process is configured to be executed on the remote computer system. The firewall protects the user computer system from external threats. The processors store a remote system condition associated with the program of the user computer system. The remote system condition includes the condition pertaining to the at least one process. The processors ascertain whether the remote system condition is satisfied. The processors direct the firewall to block or allow the transmission of data if it is ascertained that the remote system condition is not satisfied or satisfied, respectively. | 2012-12-27 |
20120331542 | PREVENTING NEIGHBOR-DISCOVERY BASED DENIAL OF SERVICE ATTACKS - A method is provided for preventing denial-of-service attacks on hosts attached to a subnet, where the attacks are initiated by a remote node over an external network. The method is performed by a router which forwards packets between the external network and the subnet. The router receives a packet for forwarding to a destination address in an address space of the subnet according to the IPv6 protocol and looks up the destination address in a Neighbor Discovery (ND) table. The ND table is populated by operations on the subnet that were completed prior to receipt of the packet. Entries in the ND table store address information of the hosts that have been verified by the router to be active. The router forwards the packet to the destination address if the destination address is stored in the ND table. Otherwise, the packet is discarded. | 2012-12-27 |
20120331543 | DETECTION OF ROGUE CLIENT-AGNOSTIC NAT DEVICE TUNNELS - Provided are techniques for the prevention of certain types of attacks on computing systems. The current disclosure, which describes one particular type of attack, is directed to the detection and prevention of an attack rather than the mechanics of the particular described attack. The claimed subject matter both detects and prevents an attack without exposing a network to denial-of-service (DoS) attacks by being too restrictive. | 2012-12-27 |
20120331544 | DETECTION OF ROGUE CLIENT-AGNOSTIC NAT DEVICE TUNNELS - Provided are techniques for the prevention of certain types of attacks on computing systems. The current disclosure, which describes one particular type of attack, is directed to the detection and prevention of an attack rather than the mechanics of the particular described attack. The claimed subject matter both detects and prevents an attack without exposing a network to denial-of-service (DoS) attacks by being too restrictive. | 2012-12-27 |
20120331545 | METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS FOR SECURITY - Methods and apparatus to configure virtual private mobile networks for security are disclosed. A disclosed example method includes identifying, in a wireless network, a communication from a user equipment that matches a security event profile, transmitting, from the wireless network, an instruction to enable the user equipment to be communicatively coupled to a virtual private mobile network, the virtual private mobile network being provisioned for security within the wireless network, and enabling the user equipment to transmit a second communication through the virtual private mobile network securely isolated from other portions of the wireless network. | 2012-12-27 |
20120331546 | INTELLIGENT STYLUS - An intelligent stylus is disclosed. The stylus can provide a stylus condition in addition to a touch input. The stylus architecture can include multiple sensors to sense information indicative of the stylus condition, a microcontroller to determine the stylus condition based on the sensed information, and a transmitter to transmit the determined condition to a corresponding touch sensitive device so as to cause some action based on the condition. | 2012-12-27 |
20120331547 | Static Analysis For Verification Of Software Program Access To Secure Resources For Computer Systems - Computer program products and apparatus are disclosed. Using a static analysis, a software program is analyzed to determine whether the software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program. In response to an access by the software program to the secure resource without verification that the secure resource can be accessed by the software program, a result is output indicative of the analyzing. An apparatus is disclosed that includes a user interface providing a security report to a user, the security report indicating a result of an analysis of whether or not a software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program. | 2012-12-27 |
20120331548 | Display Dynamic Contents on Locked Screens - In one embodiment, receiving a first action from a user of a computing device, wherein the first action causes the computing device to power up while a screen of the computing device is locked; obtaining a plurality of dynamic information items relevant to the user of the computing device; and displaying at least one of the plurality of dynamic information items on the locked screen of the computing device. | 2012-12-27 |
20120331549 | SYSTEM AND METHOD FOR A LOG-IN PROCEDURE FOR NON-READERS - A system and method for logging a non-reader into a corresponding user account is disclosed. A system can include a processor, a user interface, a display, and a camera. The processor can be programmed to display a first plurality of pictures and configure the user interface to allow the user to select a first picture corresponding to the user from the first plurality of pictures to provide a first authentication step and allow the user to select a second picture from a second plurality of pictures providing a second authentication step. The system can log the user into the corresponding user account if the second picture selected from the second authentication step corresponds to the first picture selected from the first authentication step. A system and method for logging multiple users into corresponding user accounts is also disclosed. | 2012-12-27 |
20120331550 | TRUSTED LANGUAGE RUNTIME ON A MOBILE PLATFORM - Disclosed is a trusted language runtime (TLR) architecture that provides abstractions for developing a runtime for executing trusted applications or portions thereof securely on a mobile device (e.g., a smartphone). TLR offers at least two abstractions to mobile developers: a trustbox and a trustlet. The trustbox is a runtime environment that offers code and data integrity, and confidentiality. Code and data running inside a trustbox cannot be read or modified by any code running outside the trustbox. A trustlet is the code portion of an application that runs inside a trustbox. With TLR, programmers can write applications in .NET and specify which parts of the application handle sensitive data, and thus, run inside the trustbox. With the TLR, the developer places these parts in a trustlet class, and the TLR provides all support needed to run the parts in the trustbox. | 2012-12-27 |
20120331551 | Detecting Phishing Attempt from Packets Marked by Network Nodes - A service is provided to an end-user of a first data communication device when receiving via a data network a plurality of data packets from a second data communication device. At least a particular data packet has been marked with node attribute data by one or more network nodes. The attribute data is indicative of a path of the data packet across the data network. An identifier, as declared by the second device is determined and correlated with one or more reference identifiers registered in advance. If there is a correlation, the node attribute data is correlated with reference attribute data registered in advance as associated with the reference identifier. If there is a discrepancy between the node attribute data and the reference attribute data, an alert is issued. | 2012-12-27 |
20120331552 | MALWARE AUTOMATED REMOVAL SYSTEM AND METHOD - The present invention automates the operation of multiple malware removal software products using a computerized system that systematically operates the multiple selected software products. These products are operated them in a customized “Safe Mode” using a shell that is different than the computer's other shell environments. Unlike the ordinary Safe Modes shells, the Custom Safe Mode prevents malware from functioning that ties itself to the normal shell, such as the Windows Explorer shell. In addition, the Custom Safe Mode allows the automation of tasks beyond that which is available under the standard command line shell. | 2012-12-27 |
20120331553 | DYNAMIC SIGNATURE CREATION AND ENFORCEMENT - A dynamic signature creation and enforcement system can comprise a tap configured to copy network data from a communication network, and a controller coupled to the tap. The controller is configured to receive the copy of the network data from the tap, analyze the copy of the network data with a heuristic to determine if the network data is suspicious, flag the network data as suspicious based on the heuristic determination, simulate transmission of the network data to a destination device to identify unauthorized activity, generate an unauthorized activity signature based on the identification, and transmit the unauthorized activity signature to a digital device configured to enforce the unauthorized activity signature. | 2012-12-27 |
20120331554 | Regex Compiler - A method and corresponding apparatus relate to converting a nondeterministic finite automata (NFA) graph for a given set of patterns to a deterministic finite automata (DFA) graph having a number of states. Each of the DFA states is mapped to one or more states of the NFA graph. A hash value of the one or more states of the NFA graph mapped to each DFA state is computed. A DFA states table correlates each of the number of DFA states to the hash value of the one or more states of the NFA graph for the given pattern. | 2012-12-27 |
20120331555 | Performing A Defensive Procedure In Response To Certain Path Advertisements - In certain embodiments, performing a defensive procedure involves receiving at a first speaker of a first autonomous system a path advertisement from a second speaker of a second autonomous system. The path advertisement advertises a path from the second speaker of the second autonomous system. It is determined whether the second autonomous system is a stub autonomous system and whether a path length of the path is greater than one. If the second autonomous system is a stub and the path length is greater than one, a defensive measure is performed for the path. Otherwise, a default procedure is performed for the path. | 2012-12-27 |
20120331556 | SYSTEM AND METHOD FOR PROTOCOL FINGERPRINTING AND REPUTATION CORRELATION - A method is provided in one example embodiment that includes generating a fingerprint based on properties extracted from data packets received over a network connection and requesting a reputation value based on the fingerprint. A policy action may be taken on the network connection if the reputation value received indicates the fingerprint is associated with malicious activity. The method may additionally include displaying information about protocols based on protocol fingerprints, and more particularly, based on fingerprints of unrecognized protocols. In yet other embodiments, the reputation value may also be based on network addresses associated with the network connection. | 2012-12-27 |
20120331557 | Global identity protector E-commerce payment code certified processing system - An identity theft protection system and method which employs several security features to prevent identity theft on all levels. The protection system database employs a member's address and telephone number as a numeric identity protector, security code and lock for Social Security numbers. Preventing the issuing of identity theft credit cards, and e-commerce address billing payment code numbers, and e-commerce telephone number billing payment code numbers. The locking address also prevents account hijacking, preventing checks from being mailed to identity thieves. The system employs a computer generated photo copy of the member's ID or drivers license, to prevent fraud on all big ticket items, and preventing identity theft bank fraud on checking accounts and medical records providing photo match and verify, identity theft prevention verification. The system protects its members against stolen and counterfeit checks. The G.I.P. computer database will ID the owner of the checking account at the cash register. The ID can also prevent cyber identity theft, also known as account hijacking. | 2012-12-27 |
20120331558 | Methods, Systems, & Products for Managing Digital Content - A dynamic repository (either storing digital data content or pointers to stored digital data content) works in conjunction with a plurality of interfaces to manage digital content and digital rights policies associated with one or more users. Digital rights policies are unique to each user and such policies define access to digital content in the repository. The user's digital rights policy indicates the level of access a user has to digital content in the repository (e.g., the policy could indicate that the user has authorized access to a particular file for a period of seven days). The interfaces linked with the content repository are used to access and manipulate the digital data content (based upon each user's digital rights policy) and the digital rights policies stored in the content repository. The interfaces include: (a) one or more authentication interfaces for authenticating users, (b) one or more digital rights management (DRM) interfaces allowing users to add, delete, or edit the digital rights policies, (c) one or more data access interfaces allowing users to selectively access digital data content as defined by their individual digital rights policy, (d) one or more browsing interfaces allowing users to selectively browse said digital data content, or a (e) one or more content manipulation interfaces allowing said users to add, delete, or edit said digital data content. | 2012-12-27 |
20120331559 | RESOURCE MANAGEMENT SYSTEM AND CORRESPONDING METHOD - The invention provides a secure and efficient resource management system and a corresponding method for managing resources of a product that is put on the market by a licensor via a distribution chain. In particular, the number of keys needed for managing said resources can be reduced. At the time that the product is released to the market the exact licensing conditions of the product need not be known yet. The licensing conditions and the associated configuration of resources of the product are managed via a second key which is provided to a licensee. The licensee, however, has no knowledge of the first key and the derivation function which generates said second key based on the first key. Therefore, it is ensured that the licensee cannot claim more resources of the product than the licensor allows. | 2012-12-27 |
20120331560 | Microcontroller with Secure Feature for Multiple Party Code Development - Multiple secure environments are established within a system on a chip (SoC) by defining a first secure region within a non-volatile memory in the SoC with a first set of parameters written into a predefined parameter region of the non-volatile memory. A second secure region within the non-volatile memory may be defined at a later time by a second set of parameters written into another predefined parameter region of the non-volatile memory. A security module is initialized each time the SoC is powered on by transferring the first set of parameters and the second set of parameters from the parameter region to the security module in a manner that does not expose the first set of parameters or the second set of parameters to a program being executed by the processor. The multiple secure regions of the SoC are enforced by the security module according to the parameter data. | 2012-12-27 |
20120331561 | Method of and Systems for Privacy Preserving Mobile Demographic Measurement of Individuals, Groups and Locations Over Time and Space - Disclosed are techniques for privacy preserving mobile demographic measurement of individuals, groups, and locations over time and space. A method of estimating demographic information associated with a user of a mobile device and/or a location while preserving the privacy of the user based at least in part on a location estimate of the mobile device of the user includes receiving an estimated geographical location of the mobile device of the user and receiving a time at which the mobile device was at the estimated geographical location. The method includes assigning substitute identifiers for the geographical location and the time at which the mobile device was at the estimated geographical location. The method includes associating the geographical areas substitute identifiers with demographic information and estimating demographic information associated with the user of the mobile device based on the substitute identifiers and based on the demographic information associated with substitute identifiers. | 2012-12-27 |
20120331562 | METHOD, APPARATUS AND COMPUTER PROGRAM FOR SUPPORTING DETERMINATION ON DEGREE OF CONFIDENTIALITY OF DOCUMENT - Determining confidentiality of an office document shared by multiple organizations. Each block of a document data set is stored in association with confidentiality information indicating whether the block is confidential. The document data set is dividable into blocks each being a unit including properties evaluated as having a certain characteristic. A document data set targeted for the confidentiality determination is acquired, and it is determined whether a document data set, including a block similar to each block of the acquired document data set, is stored. If the document data set including the similar block is stored, it is determined whether the confidentiality information indicating that the block is confidential is assigned to the block of the acquired document data corresponding to the similar block. If the confidentiality information indicating that the block is confidential is assigned, the acquired document data set is determined as confidential. | 2012-12-27 |
20120331563 | Retrieval of Data Across Multiple Partitions of a Storage Device Using Digital Signatures - A system and method for exchanging data among partitions of a storage device is disclosed. For example, data stored in a first partition is exchanged with an application included in the first partition or with a second application included in a second partition. In one embodiment, the second application is associated with a global certificate while the first application is associated with a different platform certificate. A verification module included in the first partition receives a request for data and determines if the request for data is received from the first application. If the request for data is not received from the first application, the verification module determines whether the request is received from the second application and whether the global certificate is an authorized certificate. For example, the verification module determines whether the global certificate is included in a listing of authorized certificates. | 2012-12-27 |
20120331564 | INFORMATION PROCESSING APPARATUS, SERVER, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM - There is provided an information processing apparatus, including a behavior information generating unit that generates behavior information, a behavior pattern analyzing unit that analyzes a behavior pattern based on the behavior information, a similarity determining unit that performs a similarity determination of the analyzed behavior pattern and a protection target behavior history pattern, a protection selecting unit that selects a protection level of the behavior information based on a result of the similarity determination, and a behavior information protecting unit that protects the behavior information based on the selected protection level. | 2012-12-27 |
20120331565 | SYSTEM AND METHOD FOR ENFORCING UTILIZATION OF CONTENT BASED ON HISTORY LISTS - Apparatus, method, and media for enforcing utilization of content. An exemplary method comprises receiving a request to utilize content, the request corresponding to a utilization of the content, determining whether the utilization corresponds to at least one usage right associated with the content, wherein the usage rights include status information relating to the state of the utilization of the content, the status information including a history list comprising information associated with events relating to the content, determining whether the request should be granted based at least in part on whether the utilization corresponds to at least one of the usage rights, and enforcing utilization of the content in accordance with the at least one of the usage rights that is determined to correspond to the utilization based at least in part on a determination that the request should be granted. | 2012-12-27 |
20120331566 | CAPTURING AND MANIPULATING CONTENT USING BIOMETRIC DATA - A method, system, and computer program product for capturing and manipulating content using biometric data are provided in the illustrative embodiments. Biometric data is received from a biometric sensor associated with the data processing system, the biometric data forming a first biometric data. The content is received, the content being captured using the data processing system by a first user associated with the first biometric data. The content is modified using information from a first profile associated with the first biometric data. | 2012-12-27 |
20120331567 | SYSTEM AND METHOD FOR CONTROLLING COMMUNICATION OF PRIVATE INFORMATION OVER A NETWORK - A system and method for controlling access to private information over a network is provided including a privacy preference repository accessible by one or more subjects of the private information and by a private access bureau. The privacy preference repository stores privacy preferences configured by the subjects to indicate conditions for disclosure of said private information. A policy repository that stores legal criteria for accessing the private information is also accessible by the private access bureau. The private access bureau is configurable to receive requests from privacy-enabled systems for privacy directives that take into account the privacy preferences and legal criteria required to release particular documents on said privacy enabled system in response to the privacy-enabled systems. | 2012-12-27 |
20120331568 | GROUP AUTHORIZATION METHOD AND SOFTWARE - A method for sharing information limited by permission comprising a user providing content to be shared, the user specifying a plurality of individuals or Groups with which to share the content, after the providing and specifying, automatically creating a new Group comprising the specified plurality, and distributing the content to the new Group. Also a method for sharing information limited by permission comprising compiling in an online service a plurality of individual members and Groups, providing content associated with the individuals and Groups, and displaying to a user a combined content view capable of being based on any combination of one or more of: types of Group content; Groups in which the user is a member; combinations of individual members in Groups in which the user is a member; content shared with the user by any of the user's contacts; content from sources external to the online service; access and permissions levels; and user selectable display settings. | 2012-12-27 |
20120331569 | SYSTEM AND METHOD FOR RENDERING DIGITAL CONTENT IN ACCORDANCE WITH USAGE RIGHTS INFORMATION - Methods, apparatus, and media for rendering digital content by at least one recipient computing device in accordance with usage rights information. An exemplary method comprises receiving the digital content by the at least one recipient computing device from at least one sending computing device only if the at least one recipient computing device has been determined to be trusted to receive the digital content from the at least one sending computing device, receiving, by the at least one recipient computing device, a request to render the digital content, determining, based on the usage rights information, whether the digital content may be rendered by the at least one recipient computing device, and rendering the digital content, by the at least one recipient computing device, only if it is determined that the content may be rendered by the at least one recipient computing device. | 2012-12-27 |
20120331570 | RULE-BASED APPLICATION ACCESS MANAGEMENT - A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and configurations that are to be managed. A rule engine, which executes the rules, may be called reactively when software accesses protected resources. The engine uses a combination of embedded and configurable rules. It may be desirable to assign and manage rules per process, per resource (e.g. file, registry, etc.), and per user. Access rules may be altitude-specific access rules. | 2012-12-27 |
20120331571 | SYSTEM AND METHOD OF MANAGING MULTIPLE LEVELS OF PRIVACY IN DOCUMENTS - There is provided a method and system to manage multiple levels of privacy in a document having a plurality of elements. In accordance with the method, a selection of a first element in the document is received. The first element is tagged with a selected first privacy level of a hierarchical privacy level list. The list includes a plurality of hierarchical levels of privacy associated with a controlling authority. A selection of a second element in the document is received. The selected second element is tagged with a selected second privacy level of the hierarchical privacy level list. | 2012-12-27 |
20120331572 | METHOD AND APPARATUS FOR IDENTIFYING AND CHARACTERIZING ERRANT ELECTRONIC FILES - A computer system includes a server having a memory connected thereto. The server is adapted to be connected to a network to permit remote storage and retrieval of data files from the memory. A file identification application is operative with the server to identify errant files stored in the memory. The file identification application provides the functions of: (1) selecting a file stored in said memory; (2) generating a unique checksum corresponding to the stored fire; (3) comparing said unique checksum to each of a plurality of previously generated checksums, wherein the plurality of previously generated checksums correspond to known errant files; and (4) marking the file for deletion from the memory if the unique checksum matches one of the plurality of previously generated checksums. | 2012-12-27 |
20120331573 | DYNACTIN SUBUNIT p62 BIOMARKER FOR NEUROLOGICAL CONDITIONS - Methods and kits for identifying neurological conditions in a patient by determining a level of expression of dynactin subunit p62 are disclosed. The neurological conditions may include, for example, Alzheimer's Disease (AD) without cerebral amyloid angiopathy (CAA). | 2012-12-27 |
20120331574 | USE OF MEGANUCLEASES FOR INDUCING HOMOLOGOUS RECOMBINATION EX VIVO AND IN TOTO IN VERTEBRATE SOMATIC TISSUES AND APPLICATION THEREOF - A monomer of an I-CreI meganuclease variant wherein said monomer when in dimeric form binds and cleaves DNA. | 2012-12-27 |
20120331575 | TRANSGENIC NON-HUMAN ANIMALS - The invention provides a non-human transgenic animal comprising a transgene encoding angiogenin and food products comprising or obtained from the non-human transgenic animal and uses thereof. | 2012-12-27 |
20120331576 | Pathogen Restriction Factors - The use of interferon induced transmembrane protein 1, 2, or 3 (IFITM1, 2, or 3) as a viral restriction factor, and methods of using the same to produce virus, transgenic animals expressing exogenous IFITM1, 2, or 3, and methods of treating or inhibiting viral infections by targeting a gene identified herein | 2012-12-27 |
20120331577 | LETTUCE VARIETY 79-163 RZ - The present invention relates to a | 2012-12-27 |
20120331578 | Method for Producing Recombinant Glycoproteins Having Beta1,2-Bound Xylose Residues - A DNA molecule is provided which comprises a sequence according to SEQ ID NO: 8 having an open reading frame from base pair 227 to base pair 1831 or having at least 50% homology to the above-indicated sequence, or hybridizing with the above-indicated sequence under stringent conditions, or comprising a sequence which has degenerated to the above-indicated DNA sequence because of the genetic code, the sequence coding for a plant protein having β1,2-xylosyltransferase activity or being complementary thereto. | 2012-12-27 |
20120331579 | TRANSGENIC PLANT MALE STERILITY - The invention relates to a reversible transgenic plant male sterility system wherein the male sterility is induced by amiRNA and a reversible transgenic plant male sterility system comprising a male sterility construct comprising an isolated nucleic acid encoding a precursor amiRNA encoding an amiRNA targeted to a gene involved in pollen development, and a male fertility restorer construct comprising an isolated nucleic acid encoding a mutated copy of the gene involved in pollen development, or multiple copies of said gene involved in pollen development, or a single copy of said gene involved in pollen development under the control of a strong promoter. | 2012-12-27 |
20120331580 | MUTANT HYDROXYPHENYLPYRUVATE DIOXYGENASE POLYPEPTIDES AND METHODS OF USE - Compositions and methods for conferring hydroxyphenyl pyruvate dioxygenase (HPPD) herbicide resistance or tolerance to plants are provided. Compositions include amino acid sequences, and variants and fragments thereof, for mutant HPPD polypeptides. Nucleic acids that encode the mutant HPPD polypeptides are also provided. Methods for conferring herbicide resistance or tolerance, particularly resistance or tolerance to certain classes of herbicides that inhibit HPPD, in plants are further provided. Methods are also provided for selectively controlling weeds in a field at a crop locus and for the assay, characterization, identification and selection of the mutant HPPDs of the current invention that provide herbicide tolerance. | 2012-12-27 |
20120331581 | POLYNUCLEOTIDES AND POLYPEPTIDES INVOLVED IN POST-TRANSCRIPTIONAL GENE SILENCING - This invention relates to isolated nucleic acid fragments encoding polypeptides involved in post-transcriptional gene silencing. The invention also relates to construction of a recombinant DNA construct encoding all or a portion of the polypeptide involved in post-transcriptional gene silencing, in sense or antisense orientation, wherein expression of the recombinant DNA construct results in production of altered levels in a transformed host cell of the polypeptide involved in post-transcriptional gene silencing. | 2012-12-27 |
20120331582 | METHOD TO CONTROL SPIDER MITES - The present invention relates to a method of controlling spider mites on plants. More specifically, the invention relates to plants expressing RNAi of one or more essential genes of the spider mite, and the use of those plants to control the spider mite proliferation into pest proportions. In a preferred embodiment, the spider mite is | 2012-12-27 |
20120331583 | MODULATING PLANT OIL LEVELS - Methods and materials for modulating (e.g., increasing or decreasing) oil levels in plants are disclosed. For example, nucleic acids encoding oil-modulating polypeptides are disclosed as well as methods for using such nucleic acids to transform plant cells. Also disclosed are plants having increased oil levels and plant products produced from plants having increased oil levels. | 2012-12-27 |
20120331584 | PLANTS HAVING ENHANCED YIELD-RELATED TRAITS AND A METHOD FOR MAKING THE SAME - The present invention relates generally to the field of molecular biology and concerns a method for enhancing various economically important yield-related traits in plants. More specifically, the present invention concerns a method for enhancing yield-related traits in plants by modulating expression in a plant of a nucleic acid encoding an POI (Protein Of Interest) polypeptide. The present invention also concerns plants having modulated expression of a nucleic acid encoding a POI polypeptide, which plants have enhanced yield-related traits relative to control plants. The invention also provides hitherto unknown POI-encoding nucleic acids, and constructs comprising the same, useful in performing the methods of the invention. | 2012-12-27 |
20120331585 | PLANTS HAVING ENHANCED YIELD-RELATED TRAITS AND A METHOD FOR MAKING THE SAME - The present invention relates generally to the field of molecular biology and concerns a method for enhancing yield-related traits in plants by modulating expression in a plant of a nucleic acid encoding a poly(A)-RRM or a Q-rich polypeptide. The present invention also concerns plants having modulated expression of a nucleic acid encoding a poly(A)-RRM or a Q-rich polypeptide, which plants have enhanced yield-related traits relative to corresponding wild type plants or other control plants. The invention also provides constructs useful in the methods of the invention. | 2012-12-27 |
20120331586 | PLANTS HAVING ENHANCED YIELD - RELATED TRAITS AND A METHOD FOR MAKING THE SAME - The present invention relates generally to the field of molecular biology and concerns a method for enhancing yield-related traits in plants by modulating expression in a plant of a nucleic acid encoding an importin or a yield-related polypeptide. The present invention also concerns plants having modulated expression of a nucleic acid encoding an importin or a yield-related polypeptide, which plants have enhanced yield-related traits relative to corresponding wild type plants or other control plants. The invention also provides constructs useful in the methods of the invention. | 2012-12-27 |
20120331587 | Polypeptides having endoglucanase activity and polynucleotides encoding same - The present invention relates to isolated polypeptides having endoglucanase activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods for producing and using the polypeptides. | 2012-12-27 |
20120331588 | Polypeptides Having Endoglucanase Activity And Polynucleotides Encoding Same - The present invention relates to isolated polypeptides having endoglucanase activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides. | 2012-12-27 |
20120331589 | COMBINED USE OF CRY1Da AND CRY1Fa PROTEINS FOR INSECT RESISTANCE MANAGEMENT - The subject invention includes methods and plants for controlling lepidopteran insects, said plants comprising Cry1Fa and Cry1Da core toxin containing proteins in combination to delay or prevent development of resistance by the insect(s). | 2012-12-27 |
20120331590 | USE OF CRY1DA IN COMBINATION WITH CRY1BE FOR MANAGEMENT OF RESISTANT INSECTS - The subject invention includes methods and plants for controlling fall army worm insects, said plants comprising a Cry1Da insecticidal protein and a Cry1Be insecticidal protein, and various combinations of other proteins comprising this pair of proteins, to delay or prevent development of resistance by the insects. | 2012-12-27 |
20120331591 | METHOD OF PRODUCING CYCLAMEN WITH MULTI-PETALED FLOWERS - A method of producing a multi-petaled cyclamen plant having an increased number of petals, including at least inhibiting the function of a transcription factor involved in morphogenesis of a floral organ of cyclamen. | 2012-12-27 |
20120331592 | Interatomic force measurements using passively drift compensated non-contact in situ calibrated atomic force microscopy - quantifying chemical bond forces between electronic orbitals by direct force measurements at subatomic lateral resolution - Interatomic forces are measured with subatomic lateral resolution by in situ calibrated non-contact and passively thermal drift compensated atomic force microscopy in aqueous or generally liquidous environment; interatomic forces acting between distinct electronic orbitals of front-most tip atom and opposing sample atom can be quantitatively measured with subatomic lateral resolution. Calibration standard is a CaCO | 2012-12-27 |
20120331593 | PRODUCTION SCALE FABRICATION METHOD FOR HIGH RESOLUTION AFM TIPS - A method of fabricating high resolution atomic force microscopy (AFM) tips including a single semiconductor nanowire grown at an apex of a semiconductor pyramid of each AFM tip is provided. The semiconductor nanowire that is grown has a controllable diameter and a high aspect ratio, without significant tapering from the tip of the semiconductor nanowire to its base. The method includes providing an AFM probe including a semiconductor cantilever having a semiconductor pyramid extending upward from a surface of said semiconductor cantilever. The semiconductor pyramid has an apex. A patterned oxide layer is formed on the AFM probe. The patterned oxide layer has an opening that exposes the apex of the semiconductor pyramid. A single semiconductor nanowire is grown on the exposed apex of the semiconductor pyramid utilizing a non-oxidized Al seed material as a catalyst for nanowire growth. | 2012-12-27 |
20120331594 | Shrub rose plant named 'Sprothrive' - A new and distinct variety of landscape shrub rose plant is provided which forms in abundance on a substantially continuous basis attractive semi-double blossoms that are dark bright red in coloration. The vegetation is vigorous and the growth habit is round and bushy. Attractive ornamental glossy dark green foliage is formed. Superior disease resistance to blackspot is exhibited. Additionally, the new variety is particularly well suited for growing as distinctive ornamentation in the landscape. | 2012-12-27 |
20120331595 | GRAPEVINE 'IFG EIGHT' - This invention is a new and distinct grapevine variety denominated ‘IFG Eight’. The new grapevine is characterized by producing crisp oval, seedless fruits which are fully black in color and ripen early in the growing season. | 2012-12-27 |
20120331596 | Grapevine 'IFG Six' - This invention is a new and distinct grapevine variety denominated ‘IFG Six’. The new grapevine is characterized by producing naturally large, extremely elongated, narrow diameter, crisp, seedless black berries having a distinct dimple on the distal end. The fruit ripen and are commercially harvestable from late August to mid-September. Berries color to full black and store well. | 2012-12-27 |
20120331597 | Grapevine 'IFG Five' - This invention is a new and distinct grapevine variety named ‘IFG Five’ which is characterized by producing extremely large purple to black, firm, elongated oval seeded grapes borne on large clusters. The fruit ripen and are harvestable in mid-August. | 2012-12-27 |
20120331598 | Grapevine 'IFG Four' - A new and distinct grapevine variety denominated ‘IFG Four’ is characterized by producing large, very crisp, dark red, uniform berries with high sugar content borne on medium to large size clusters. The fruit ripen and are commercially harvestable from mid to late August. | 2012-12-27 |
20120331599 | Hydrangea plant named 'Peppermint Twist' - A new and distinct cultivar of | 2012-12-27 |
20120331600 | Hydrangea plant named 'New Wine' - A new and distinct cultivar of | 2012-12-27 |
20120331601 | Hydrangea plant named 'Royalty' - A new and distinct cultivar of | 2012-12-27 |
20120331602 | Hydrangea plant named 'Freedom' - A new and distinct cultivar of | 2012-12-27 |
20120331603 | CENTAUREA PLANT NAMED 'BLACK SPRITE' - A new cultivar of | 2012-12-27 |
20120331604 | Callistemon viminalis plant named 'CV01' - ‘CV01 ’ is a distinctive variety of | 2012-12-27 |
20120331605 | Cordyline plant named 'CORBZR01' - A new and distinct | 2012-12-27 |