02nd week of 2014 patent applcation highlights part 40 |
Patent application number | Title | Published |
20140013406 | EMBEDDED SECURE ELEMENT FOR AUTHENTICATION, STORAGE AND TRANSACTION WITHIN A MOBILE TERMINAL - Various embodiments of the present invention relate to incorporating an embedded secure element into a mobile device, and more particularly, to systems, devices and methods of incorporating the embedded secure element into a mobile device for identity authentication, data storage and processing in trusted transactions. These trusted transactions require a high security level to protect sensitive data or programs in bank account management, purchasing orders, contactless payment, passport verification, and many other high-security applications. The secure element will provide a root of trust such that that applications running on the mobile device are executed in a controlled and trusted environment. In addition to conventional password or encryption protection, alternative security features are introduced from both software and hardware levels based on the embedded secure element. Therefore, the security level of the mobile device is not only enhanced, but also may potentially exceed that of the conventional POS terminals. | 2014-01-09 |
20140013407 | METHOD AND SYSTEM FOR REMOTE OPERATION OF AN INSTALLATION - The present invention relates to a method and a system for operating a device ( | 2014-01-09 |
20140013408 | METHOD FOR INPUTTING A PASSWORD INTO AN ELECTRONIC TERMINAL - The present invention relates to a method for inputting a password into an electronic terminal, wherein the method comprises: a step of saving a password character string inputted by the user through an input unit in a storage unit; a step of randomly placing adjacent characters from within the password character string into adjacent input buttons—defined as any two input buttons connected in a straight line without passing another input button—which are arranged in a two-dimensional field by a control unit, wherein the total number of input buttons is greater than the number of characters included in the password character string; a step in which the control unit places a character not included in the password character string into an input button in which a character included in the password character string has not been placed; a step in which a display unit displays each input button displaying a placed character; a step in which an input unit receives the input character string from the user; and a step in which the control unit completes the user authentication procedure when the password character string and the input character string are the same. | 2014-01-09 |
20140013409 | SINGLE SIGN ON FOR CLOUD - Systems and methods for single sign on to a cloud. The system includes a cloud service provider and a tenant. The cloud service provider has a consumer unit and a portal. The consumer unit provides an interface for a user to connect to the cloud service provider. The portal providing a cloud service to the user, the portal has a first authentication system that issues a security token request and that is connected to the consumer unit. The tenant includes the user and a second authentication system. The second authentication system signs the security token request. The consumer unit is adapted to communicate with the first authentication system using a first protocol and adapted to communicate with the second authentication system using a second protocol. | 2014-01-09 |
20140013410 | ACCESS RIGHT MANAGEMENT SYSTEM, ACCESS RIGHT MANAGEMENT METHOD, AND ACCESS RIGHT MANAGEMENT PROGRAM - An authentication includes a unit that issues right transfer information that is to be transmitted to a service providing device and a token that corresponds to the right transfer information and is to be transmitted to a service proxy access device on a basis of information about a user to whom a right is transferred and a condition under which the right is transferred, a unit that provides the token to the service proxy access device, and a unit that receives from the service providing device the token transferred from the service proxy access device and transmits to the service providing device the right transfer information that corresponds to the token and is kept by the authentication device. | 2014-01-09 |
20140013411 | SURGICALLY IMPLANTABLE DEVICES WITH A COMPUTER, A FARADAY CAGE AND AT LEAST ONE INTERNAL FLEXIBILITY SIPE - A surgically implantable device comprising at least a part of an electronic and/or electromechanical device, at least one outer chamber, compartment, or bladder, at least one inner chamber, compartment, or bladder inside said outer chamber, compartment, or bladder, at least one internal sipe separating at least a part of said outer chamber, compartment, or bladder and at least a part of said inner chamber, compartment, or bladder, at least one Faraday cage; and a computer configured to connect to at least one network of computers, said computer comprising at least a first internal hardware firewall configured to deny access to at least a first protected portion of said computer from said network. At least a portion of an outer surface of said outer chamber, compartment, or bladder is proximate to an outer surface of said surgically implantable device. | 2014-01-09 |
20140013412 | PROVIDING TELEPHONY SERVICES TO TERMINALS BEHIND A FIREWALL AND/OR A NETWORK ADDRESS TRANSLATOR - A method and apparatus for allowing telephony or other types of media communications and services to be provided for a device ( | 2014-01-09 |
20140013413 | VIDEO AND AUDIO CONFERENCE SCHEDULING - A method and system for enabling scheduling resources including associating a first client hosted on a first computer platform using a conference scheduling module, with a second client hosted on a second computer platform. The method including initiating a client software program on a first computer on a first platform for a first client, wherein the client software program including a conference scheduling module. The method further including generating a first private cloud using the client software on the first computer communicating with a first gateway module, the first gateway module being embodied on a first gateway computer not on the first platform. Further, the method includes joining the private cloud by initiating the client software on a second computer on a second platform for a second client. | 2014-01-09 |
20140013414 | USER-ROTATABLE THREE-DIMENSIONALLY RENDERED OBJECT FOR UNLOCKING A COMPUTING DEVICE - A computer-implemented method for controlling access to a computing device entails displaying a user-rotatable three-dimensionally rendered object on a display of the computing device, the object presenting a plurality of user-selectable visual indicia such that only a subset of the indicia are visible at any one angle of rotation and providing access to the computing device based on user input received in relation to at least one of the visual indicia. The object may be spherical or polyhedral or it may be composed of a plurality of independently rotatable rings that together form a generally spherical shape. The visual indicia may be letters, numbers, symbols, colours, photographs or any other visually distinctive indication. | 2014-01-09 |
20140013415 | AUTOMATIC GENERATION OF SECURITY CHECKS - The embodiments encompass an apparatus for generating security checks including a model editor configured to annotate at least one element in an architectural source model with security requirement information and countermeasure information. The security requirement information identifies the at least one element and provides a textual description of a corresponding security requirement, and the countermeasure information identifies the at least one element and indicates a countermeasure type to the corresponding security requirement. The apparatus also includes a code generation engine configured to generate a security check for the countermeasure information based on the countermeasure type. | 2014-01-09 |
20140013416 | ELECTRONIC DEVICE AND METHOD FOR RELEASING LOCK USING ELEMENT COMBINING COLOR AND SYMBOL - An electronic device and a method thereof for releasing lock using an element combining color and symbol are provided. In the method, at least two groups including at least two elements combining color and symbol are displayed. One element included in each of the at least two groups is allowed to be sequentially selected at least one time. When it is determined that a sequence of the sequentially selected elements is the same as a set sequence, a lock of the electronic device is released. | 2014-01-09 |
20140013417 | GESTURE INPUT DEVICE AND METHOD FOR CONTROLLING GESTURE INPUT DEVICE - A gesture input device that controls a control device on the basis of a gesture action of a user has a gesture detecting unit that detects a gesture from an image picked up by a camera, a first gesture determining unit that determines that the gesture detected by the gesture detecting unit includes a first gesture, a second gesture determining unit that determines that the gesture detected by the gesture detecting unit includes a second gesture, and a control signal generating unit that sets a period in which the first gesture determining unit determines that the gesture includes the first gesture as a second gesture valid period in which recognition of the second gesture is valid and generates a control signal on the basis of the second gesture when the second gesture determining unit determines that the gesture includes the second gesture in the second gesture valid period. | 2014-01-09 |
20140013418 | METHOD AND APPARATUS FOR MAKING A DECISION ON A CARD - Method and devices for making access decisions in a secure access network are provided. The access decisions are made by a portable credential using data and algorithms stored on the credential. Since access decisions are made by the portable credential non-networked hosts or local hosts can be employed that do not necessarily need to be connected to a central access controller or database thereby reducing the cost of building and maintaining the secure access network. | 2014-01-09 |
20140013419 | ELECTRONIC DEVICE FOR MULTIPLE USERS AND LOGIN METHOD THEREOF - An electronic device for multiple users includes a storage module for storing N user accounts, N being a positive integer larger than one; a touch display module; and a processing module electrically connected to the storage module and the touch display module, the processing module being used for displaying a login interface in the touch display module, the login interface including N slide paths, each of the N slide paths being corresponding to one of the N user accounts; wherein after performing a slide gesture on an i-th slide path of the N slide paths, the processing module logins the electronic device by an i-th user account of the N user accounts, which is corresponding to the i-th slide path, i is a positive integer smaller than or equal to N. | 2014-01-09 |
20140013420 | Secure portable computer and security method - A computer includes a processor, position determining means for determining the location of the computer, and control means for controlling the operation of the processor. The control means are in communication with the position determining means and control the operation of the processor in response to location information provided to the control means by the position determining means. | 2014-01-09 |
20140013421 | DEBUG ARCHITECTURE - Roughly described, a method of restricting access of a debug controller to debug architecture on an integrated circuit chip, the debug architecture comprising an access controller, a plurality of peripheral circuits, and a shared hub, the shared hub being accessible by the access controller and the plurality of peripheral circuits, the method comprising: at the access controller, authenticating the debug controller; at the access controller, following authentication, assigning to the debug controller a set of access rights, the set of access rights granting the debug controller partial access to the debug architecture; and after assigning the set of access rights, allowing the debug controller access to the debug architecture as allowed by the set of access rights. | 2014-01-09 |
20140013422 | Continuous Multi-factor Authentication - A method and computing device for continuous multi-factor authentication are included in which a plurality of valid authentication credentials may be detected. Also, an authorized user may be detected within a viewing area. Additionally, an unauthorized object may be detected in the viewing area. Furthermore, a display device may be prevented from displaying content. | 2014-01-09 |
20140013423 | SECURITY MODEL FOR NETWORK INFORMATION SERVICE - Systems and methods for providing information security in a network environment are disclosed. The method includes initiating processing, invoked by a user, of at least one of a plurality of objects in a processing unit of a hardware layer, wherein the plurality of objects is hosted for a tenant. The method further includes determining that the processing of the at least one of the plurality of objects by the processing unit is authorized by the tenant based on a security map provided by the tenant and accessible by the processing unit within the hardware layer. The method further includes allowing the processing of the object based on a result of the determining. | 2014-01-09 |
20140013424 | MOBILE TERMINAL AND APPLICATION PROGRAM LOGIN METHOD THEREOF - The present invention discloses a mobile terminal and an application program login method thereof. The method includes acquiring the to-be-authenticated fingerprint information inputted by a user when the user is required to log into an application program; determining whether the to-be-authenticated fingerprint information is the same as a correct fingerprint information which is locally preset and corresponds to the application program; if yes, then acquiring, according to the identifying fingerprint information, a user name and a password corresponding to the application program from a login information file which is locally preset; and logging into the application program according to the user name and the password. By logging into the application program via fingerprint, the present invention not only ensures the security of personal information, but also allows the user to quickly log into the application program, thereby improving user experience. | 2014-01-09 |
20140013425 | METHOD AND APPARATUS FOR DIFFERENTIAL POWER ANALYSIS PROTECTION - This disclosure provides techniques for processing an input signal while providing protection from differential power analysis. In one example, random delay units may receive the input signal, a random delay generator may generate random delay values, and the random delay units may add the random delay values to the input signal to generate delayed signals, such that each delayed signal is substantially desynchronized relative to one or more other delayed signals. Subsequently, processing units may process the delayed signals to generate delayed output signals, and random delay removal units may add additional delay values to the delayed output signals, such that each delayed output signal is substantially synchronized relative to other delayed output signals, to produce output signals. Finally, a combination unit may combine the output signals to generate a common output signal that corresponds to the input signal that is processed by any one of the processing units. | 2014-01-09 |
20140013426 | PROVIDING CONSISTENT SECURITY INFORMATION - A method for providing consistent security information between multiple applications is described herein. The method includes detecting potentially deceptive content from a communication application in a browser application. The method also includes generating consistent security information for the potentially deceptive content with the browser application. Additionally, the method includes sending the consistent security information for the potentially deceptive content to the communication application. Furthermore, the method includes providing a warning based on the consistent security information to the communication application. | 2014-01-09 |
20140013427 | System And Method Providing Dependency Networks Throughout Applications For Attack Resistance - A method and system is provided to automatically propagate dependencies from one part of a software application to another previously unrelated part. Propagation of essential code functionality and data to other parts of the program serves to augment common arithmetic functions with Mixed Boolean Arithmetic (MBA) formulae that are bound to pre-existing parts of the program. A software application is first analyzed on a compiler level to determine the program properties which hold in the program. Thereafter, conditions are constructed based on these properties and encoded in formulae that encode the condition in data and operations. Real dependencies throughout the application are therefore created such that if a dependency is broken the program will no longer function correctly. | 2014-01-09 |
20140013428 | APPARATUS AND METHOD FOR MANAGING OPERATION OF A MOBILE DEVICE - A power charger includes a first storage area to store control software, a charging circuit to send power through an interface, and a processor to generate at least one control signal based on the control software. The power to be sent through the interface is to charge a battery of a device coupled to the interface, and the at least one control signal includes information to cause a monitoring operation to be performed to determine a status of the device. | 2014-01-09 |
20140013429 | METHOD FOR PROCESSING AN OPERATING APPLICATION PROGRAM AND DEVICE FOR THE SAME - A method for processing an operating application program and device for the same is disclosed in the embodiment of the present disclosure. The method includes following steps: a step of determining a target system call of a target application program when the target application program is initiated, a step of suspending the target system call when receiving a parameter of the target application program and a step of stopping or continuing the target system call in accordance with the parameter. The device includes a determining module, a suspending module and a processing module. The embodiment of the present disclosure can stop the action before the suspected action is executed without terminating the execution of the application program. Such a method can carry out instantaneous monitor and wide ranging applicability, that it is widely used in monitoring the suspected application program and protecting the sensitive application program. | 2014-01-09 |
20140013430 | Native Code Module Security for Arm Instruction Set Architectures - Some embodiments provide a system that executes a native code module. During operation, the system obtains the native code module. Next, the system loads the native code module into a secure runtime environment. Finally, the system safely executes the native code module in the secure runtime environment by using a set of software fault isolation (SFI) mechanisms that constrain store instructions in the native code module. The SFI mechanisms also maintain control flow integrity for the native code module by dividing a code region associated with the native code module into equally sized code blocks and data blocks and starting each of the data blocks with an illegal instruction. | 2014-01-09 |
20140013431 | METHODS AND SYSTEMS FOR USE IN IDENTIFYING CYBER-SECURITY THREATS IN AN AVIATION PLATFORM - Methods and apparatus for use in identifying cyber-security threats for an aircraft are provided. The method includes storing parts information relating to each hardware and software component used on the aircraft in an aircraft parts database, receiving, by a computing device, a cyber-security threat, and determining, by the computing device, a threat is relevant to the aircraft by comparing the received threats to the stored parts information. | 2014-01-09 |
20140013432 | METHOD AND APPARATUS FOR VISUALIZING NETWORK SECURITY STATE - A network security state visualization scheme is suitable for collecting security events existing in a network, analyzing the security events, categorizing and contracting the analyzed security events into attack state information, and visualizing the attack state information as a three-dimensional (3D) screen to display the visualized information on a display panel. Unlike the related art where security events are expressed from the viewpoint of IPs, this scheme normalizes collected security event information, analyzes the normalized information, categorizes and contracts the analyzed information into the attack state information, extracts visualization target data, visualizes the visualization target data as the 3D screen, and displays the visualized 3D screen on the display panel. | 2014-01-09 |
20140013433 | Methods to dynamically establish overall national security for sensitivity classification... - A method to establish virtual security perimeters for classified electronic documents on a computer system. The security perimeters are based upon a full classification determination of all informational content of an electronic document file. The full classification determination is uniquely coded to identify a classification value, the classification regime used to classify the information as well as ownership of the electronic information of the electronic document, and is embedded in the electronic document. The classification determination code is matrixed with identification codes for elements of a file management system and used to control computer events initiated on a computer involving the electronic document. Computer events on computers are monitored for the coded full classification determination. The code scheme is also used to identify a breach of a security perimeter on a computer of an unauthorized classified electronic document and warning of the breach. | 2014-01-09 |
20140013434 | SYSTEM AND METHOD FOR STRATEGIC ANTI-MALWARE MONITORING - The system and method described herein may leverage active network scanning and passive network monitoring to provide strategic anti-malware monitoring in a network. In particular, the system and method described herein may remotely connect to managed hosts in a network to compute hashes or other signatures associated with processes running thereon and suspicious files hosted thereon, wherein the hashes may communicated to a cloud database that aggregates all known virus or malware signatures that various anti-virus vendors have catalogued to detect malware infections without requiring the hosts to have a local or resident anti-virus agent. Furthermore, running processes and file system activity may be monitored in the network to further detect malware infections. Additionally, the network scanning and network monitoring may be used to detect hosts that may potentially be participating in an active botnet or hosting botnet content and audit anti-virus strategies deployed in the network. | 2014-01-09 |
20140013435 | Social Network Protection System - A method of inhibiting the spread of malware across a network of interconnected computer terminals. The method includes detecting malware or suspicious behaviour at a first computer terminal and inspecting the first computer terminal, before and/or after said step of detecting malware or suspicious behaviour, to identify contacts forming part of a social network. Identities of the identified contacts are sent to a backend security system, and at the backend security system, said identities are received and instructions sent to one or more second computer terminals associated with respective identities to cause those second computer terminals to implement an increased level of security. | 2014-01-09 |
20140013436 | SYSTEM AND METHOD FOR ENABLING REMOTE REGISTRY SERVICE SECURITY AUDITS - The system and method for enabling remote registry service security audits described herein may include scanning a network to construct a model or topology of the network. In particular, the model or topology of the network may include characteristics describing various devices in the network, which may be analyzed to determine whether a remote registry service has been enabled on the devices. For example, the security audits may include performing one or more credentialed policy scans to enable the remote registry service for certain devices that have disabled the remote registry service, auditing the devices in response to enabling the remote registry service, and then disabling the remote registry service on the devices. Thus, the system and method described herein may enable remotely scanning information contained in device registries during a security audit without exposing the device registries to malicious activity. | 2014-01-09 |
20140013437 | METHOD AND APPARATUS FOR SECURE DISPLAY OF VISUAL CONTENT - Methods and apparatus for displaying visual content on a display such that the content is comprehensible only to an authorized user for a visual display system such as a computer, a television, a video player, a public display system (including but not limited to a movie theater), a mobile phone, an automated teller machine (ATM), voting booths, kiosks, security screening workstations, tactical displays and other systems where information is displayed for viewing. | 2014-01-09 |
20140013438 | PERMIT ISSUANCE APPARATUS AND PERMIT ISSUANCE METHOD - The present invention provides a permit issuance apparatus and a permit issuance method and program that enable a guarantee of the quality of mining results with respect to users in a case where a mining business uses disturbance attribute values to conduct data mining. The permit issuance apparatus and permit issuance method and program are configured so that in a case where a permit issuance request is received that requests the issuance of an acquisition certificate that indicates the granting of permission to acquire attributes, including at least attribute identification information for one or more attributes and disturbance information for those attributes, disturbance information corresponding to the attributes, which is a condition for granting permission to acquire those attributes, is generated on the basis of the received permit issuance request, and an acquisition certificate is transmitted that associates the attribute identification information and the disturbance information and includes the same. | 2014-01-09 |
20140013439 | SECRET SHARING SYSTEM, APPARATUS, AND STORAGE MEDIUM - According to one embodiment, a secret sharing system of an embodiment includes a secret sharing apparatus, a plurality of first storage server apparatuses, and at least one second storage server apparatus. Upon reception of a delete request transmitted from the secret sharing apparatus, each first storage server apparatus reads out, based on name information in the received delete request, storage position information associated with the name information from storage position information storing unit. Each first storage server apparatus deletes all of share information and copy information indicated by name information in the received delete request based on the readout storage position information. | 2014-01-09 |
20140013440 | USER LICENSE CALCULATION IN A SUBSCRIPTION BASED LICENSING SYSTEM - Embodiments of the present invention may provide a method of calculating a user license for a software application. The method may include compiling, by a server, user interface components associated with a business role; generating a logical set for each compiled user interface component, the logical set including at least one license type required to access the user interface component; applying an intersection process on the logical sets to generate a result set including at least one result license type that can provide access to all the compiled user interface components, and assigning at least one result license type as the user license for the business role. | 2014-01-09 |
20140013441 | Private Anonymous Electronic Messaging - Private anonymous electronic messaging between a message originator and a message recipient within an organization encourages open communication which can provide information to the organization that might otherwise be secreted from the organization, and can allow the message originator to obtain desired help (e.g., counseling). By profiling of the message originator based on current and previous electronic messaging within the system as well as external organizational information (e.g., behavioral or financial information), the system can assess concerns yet act as a gateway to protect the message originator's true identity through escalating levels of concern unless a genuine concern about the health, well-being, and/or safety of the message originator, others, or the organization is indicated, in which case the system can reveal the true identity of the message originator as appropriate. | 2014-01-09 |
20140013442 | INFORMATION MONITORING APPARATUS AND INFORMATION MONITORING METHOD - The present invention provides an information monitoring apparatus and an information monitoring method which make it possible to prevent personal information from being acquired by a disclosure requester for the purpose of an unfair use thereof. The information monitoring apparatus includes: a means for storing therein acquired attribute information corresponding to at least one acquired attribute which has already been acquired by an acquisitor, a means for, on the basis of the acquired attribute information and disclosed attribute information corresponding to a disclosed attribute targeted for disclosure to the acquisitor, determining whether or not attribute synthetic information resulting from synthesizing the acquired attribute and the disclosed attribute satisfies each of predetermined one or more determination conditions, and a means for executing predetermined protection processing on an attribute on the basis of the result of the determination. | 2014-01-09 |
20140013443 | Location Sensitive Solid State Drive - A data storage system including a SSD includes a capability to detect whether its location is acceptable for function, and a capability to self-disable in the event the location of the device is unacceptable, or to self-enable only while the location of the device is acceptable. | 2014-01-09 |
20140013444 | Authentication using a digital rights management policy - Method and apparatus are provided wherein, in one example embodiment, an authentication scheme may be defined as part of a digital rights management policy. Authentication rules are defined for a unit of digital content whose location can be anywhere. Further, the digital rights management system may support many authentication schemes while permitted schemes can be fine tuned for individual policies and therefore for individual units of digital content. According to other example embodiments, one or more preferred authentication schemes can be added to a rights management policy. They can be either requested or required for authentication. In addition, in other example embodiments, the reader application may be informed of specific authentication schemes being demanded for a document. If none of the authentication schemes are available then the user can be informed without attempting to authenticate unsuccessfully. | 2014-01-09 |
20140013445 | Controlled Resources Based on Good Behavior - Computing system resources are controlled based on the behavioral attributes associated with users of the computing system. These behavioral attributes are monitored in real time and through a historical log, and behavioral attributes that fall outside pre-determined preferred behavioral parameters are detected. Access by the computing system user to computing system resources contained in a preferred and habitually accessed computing system resource set associated with the computing system user are adjusted in response to the detection of the behavioral attribute outside the pre-determined preferred behavioral parameters. | 2014-01-09 |
20140013446 | Method and System for Providing Presence Information - A system and method for a user to send presence information to authorized contacts in her device's address book and to receive the presence information of those contacts in her device's address book that have authorized her. A user can authorize any contact in her address book. Optionally, a user can only authorize a contact and be authorized by a contact if she is in that contact's address book. A local application on the device interacts with and displays the device's address book, manages the authorization of contacts, updates the user's presence, and receives and displays the presence of contacts. The local application updates the user's presence manually, semi-automatically, or automatically. Semi-automatic updates involve synchronizing with the device's calendar. Automatic updates may involve the use of location data, the device's built-in sensors, and augmented reality. | 2014-01-09 |
20140013447 | Method for User Access Control in a Multitenant Data Management System - The invention discloses a computer executable method for managing user's access to a service adapted to access a data object in a multitenant data management system. The method is characterized in that the method comprises the steps of determining data object's association with an entity, determining the existence of a trust relationship between the user and the entity in the context of the service, determining the user's access rights to the data object, and granting the user access to the service, if the data object is determined to be associated with the entity, the trust between the entity and the user is determined to be valid in the context of the service, and the user is determined to have valid access rights to the data object. Also a computer program product is disclosed. | 2014-01-09 |
20140013448 | Method and System for Allocating Access to Digital Media Content - There is provided a method and system for allocating an entitlement to digital media content. In one implementation, the system includes a media server accessible over a communications network and configured to utilize a processor to issue the entitlement including a transferable authorization to access the digital media content to a first user, and to store an entitlement record identified with the first user and authorizing access to the digital media content by the first user in a memory of the media server. The media server is further configured to receive a communication including a data corresponding to the transferable authorization to access the digital media content from a second user and to update the entitlement record to authorize access to the digital media content by the second user. | 2014-01-09 |
20140013449 | Delayed validation for software licensing and activation - According to some embodiments, a method, an apparatus and a system perform delayed validation for software licensing and activation. In some embodiments, a method includes receiving a request to execute a software application having a license. The method also includes permitting execution of the software application. The method includes validating the license subsequent to the permitting of the execution of the software application. | 2014-01-09 |
20140013450 | METHODS AND DEVICES FOR FACILITATING A DOWNLOAD SESSION - Methods and devices for facilitating download of content, particularly data, from a third-party server using an administration server. The administration server receives a request from an electronic device to download content from the third-party server over a wireless network connection. It then generates an authorization message in response to the request based on applying one or more pre-determined rules to the request, wherein the one or more pre-determined rules are based on an estimate of wireless network traffic load and sends the authorization message to the electronic device indicating whether the electronic device is authorized to establish a download session with the third-party server. | 2014-01-09 |
20140013451 | DATA OBFUSCATION FOR OPEN DATA (ODATA) COMMUNICATIONS - Techniques and configurations for implementing data obfuscation for Representational State Transfer (RESTful) web service communications such as those communicated using an Open Data (OData) protocol are described. In one example embodiment, an obfuscation service includes an OData client, an OData server, and an OData obfuscation data server, the obfuscation service operating to intercept and process OData web service requests being transmitted from requesting clients to backend enterprise data services. The obfuscation service may include or integrate with an obfuscation engine, including a context engine, a rules engine, and a hierarchical mapping engine to determine rules for data obfuscation based on determined context and hierarchical mappings. The obfuscation service may apply the determined rules to provide specific access control and data obfuscation results of data retrieved from the backend enterprise services. | 2014-01-09 |
20140013452 | DATA PROTECTION HUB - Embodiments of the invention broadly described, introduce systems and methods for protecting data at a data protection hub using a data protection policy. One embodiment of the invention discloses a method for protecting unprotected data. The method comprises receiving a data protection request message comprising unprotected data and one or more policy parameters, determining a data protection transformation using the policy parameters, performing the data protection transformation on the unprotected data to generate protected data, and sending the protected data | 2014-01-09 |
20140013453 | DUPLICATION JUDGMENT DEVICE AND DUPLICATION MANAGEMENT SYSTEM - Each recording medium device includes a memory and a controller having controller information allocated thereto. Each recording medium device has a medium identifier allocated thereto. A duplication judgment device | 2014-01-09 |
20140013454 | ALWAYS-AVAILABLE EMBEDDED THEFT REACTION SUBSYSTEM - A system to provide an always-on embedded anti-theft protection for a platform is described. The system in one embodiment comprises an arming logic to move the platform to an armed mode when receiving an arming command, a disarming logic to move the platform to an unarmed mode when receiving a disarming command, the disarming logic active while the platform is in a low power state, and a power transition logic to move the system from the low power state to an ON state in response to a user request, the power transition logic to present a log-in screen when the platform is armed, and to move the platform to the ON state without a log-in screen when the platform is unarmed. | 2014-01-09 |
20140013455 | ALWAYS-AVAILABLE EMBEDDED THEFT REACTION SUBSYSTEM - A system comprising a platform protected by an always-on always-available security system is described. The system, in one embodiment, includes a core logic component to provide logic to move the platform to an armed mode upon receipt of an arming command, a battery access controller to prevent access to a battery of the platform, when the platform is in the armed mode, a disarming logic to receive a disarming command from a user, the disarming command causing the battery access controller to provide the access to the battery, such that when the platform is disarmed the battery can be accessed, whereby the system prevents removal of the battery when the platform is in the armed mode to ensure that the platform remains powered to perform a security action when needed. | 2014-01-09 |
20140013456 | Histidine Engineered Light Chain Antibodies and Genetically Modified Non-Human Animals for Generating the Same - A genetically modified non-human animal is provided, wherein the non-human animal expresses an antibody repertoire capable of pH dependent binding to antigens upon immunization. A genetically modified non-human animal is provided that expresses human immunoglobulin light chain variable domains derived from a limited repertoire of human immunoglobulin light chain variable gene segments that comprise histidine modifications in their germline sequence. Methods of making non-human animals that express antibodies comprising histidine residues encoded by histidine codons introduced into immunoglobulin light chain nucleotide sequences are provided. | 2014-01-09 |
20140013457 | Methods of Modifying Eukaryotic Cells - A method for engineering and utilizing large DNA vectors to target, via homologous recombination, and modify, in any desirable fashion, endogenous genes and chromosomal loci in eukaryotic cells. These large DNA targeting vectors for eukaryotic cells, termed LTVECs, are derived from fragments of cloned genomic DNA larger than those typically used by other approaches intended to perform homologous targeting in eukaryotic cells. Also provided is a rapid and convenient method of detecting eukaryotic cells in which the LTVEC has correctly targeted and modified the desired endogenous gene(s) or chromosomal locus (loci) as well as the use of these cells to generate organisms bearing the genetic modification. | 2014-01-09 |
20140013458 | BRASSICA CAMPESTRIS VAR. PEKINENSIS HONGBAECHOO AS A NEW VARIETY OF PLANT AND A METHOD FOR BREEDING THE SAME - The present invention relates to methods of breeding | 2014-01-09 |
20140013459 | SOYBEAN CULTIVAR S110129 - A soybean cultivar designated S110129 is disclosed. The invention relates to the seeds of soybean cultivar S110129, to the plants of soybean cultivar S110129, to the plant parts of soybean cultivar S110129, and to methods for producing progeny of soybean cultivar S110129. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S110129. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S110129, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S110129 with another soybean cultivar. | 2014-01-09 |
20140013460 | SOYBEAN CULTIVAR 11190435 - A soybean cultivar designated 11190435 is disclosed. The invention relates to the seeds of soybean cultivar 11190435, to the plants of soybean cultivar 11190435, to the plant parts of soybean cultivar 11190435, and to methods for producing progeny of soybean cultivar 11190435. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar 11190435. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar 11190435, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar 11190435 with another soybean cultivar. | 2014-01-09 |
20140013461 | SOYBEAN CULTIVAR 19091245 - A soybean cultivar designated 19091245 is disclosed. The invention relates to the seeds of soybean cultivar 19091245, to the plants of soybean cultivar 19091245, to the plant parts of soybean cultivar 19091245, and to methods for producing progeny of soybean cultivar 19091245. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar 19091245. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar 19091245, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar 19091245 with another soybean cultivar. | 2014-01-09 |
20140013462 | SOYBEAN CULTIVAR S110130 - A soybean cultivar designated S110130 is disclosed. The invention relates to the seeds of soybean cultivar S110130, to the plants of soybean cultivar S110130, to the plant parts of soybean cultivar S110130, and to methods for producing progeny of soybean cultivar S110130. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S110130. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S110130, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S110130 with another soybean cultivar. | 2014-01-09 |
20140013463 | LETTUCE VARIETY 41-144 RZ, "RALPH RZ" - The present invention relates to a | 2014-01-09 |
20140013464 | INCREASING THE NUMBER OF GRAIN BEARING EARS OF MAIZE - A maize plant and a method of increasing the number of grain bearing ears per plant is provided. The maize plants, irrespective of their variety, exhibit at least two adjacent shortened internodes (defined as being equal to or less than twice the largest transverse dimension of the stalk just above the ground) spacing at least two ear nodes. Preferably the internode spacing is about 70 mm or less. The maize plants are preferably selected such that the ears develop substantially synchronously; the silks start being exerted either at the same time as, or before, pollen is released by the tassels of the plants; and the maize plants are both of a dwarf maize type and a prolific plant type. | 2014-01-09 |
20140013465 | PAPAVER BRACTEATUM WITH MODIFIED ALKALOID CONTENT - The present invention relates to genetically modified plants of the species | 2014-01-09 |
20140013466 | ETP1 AND ETP2 REGULATE PLANT ETHYLENE RESPONSE - ETP1 and ETP2 bind to EIN2 and modulate plant ethylene sensitivity. | 2014-01-09 |
20140013467 | GENES FOR ENHANCING NITROGEN UTILIZATION EFFICIENCY IN CROP PLANTS - The invention provides isolated NUE (nitrogen utilization efficiency) nucleic acids and their encoded proteins. The present invention provides methods and compositions relating to altering nitrogen utilization and/or uptake in plants. The invention further provides recombinant expression cassettes, host cells and transgenic plants. | 2014-01-09 |
20140013468 | EXTENDING JUVENILITY IN GRASSES - The present invention relates to compositions and methods for modulating the juvenile to adult developmental growth transition in plants, such as grasses (e.g. maize). In particular, the invention provides methods for enhancing agronomic properties in plants by modulating expression of GRMZM2G362718, GRMZM2G096016, or homologs thereof. Modulation of expression of one or more additional genes which affect juvenile to adult developmental growth transition such as Glossy15 or Cg1, in conjunction with such modulation of expression is also contemplated. Nucleic acid constructs for down-regulation of GRMZM2G362718 and/or GRMZM2G096016 are also contemplated, as are transgenic plants and products produced there from, that demonstrate altered, such as extended juvenile growth, and display associated phenotypes such as enhanced yield, improved digestibility, and increased disease resistance. Plants described herein may be used, for example, as improved forage or feed crops or in biofuel production. | 2014-01-09 |
20140013469 | ISOLATED POLYNUCLEOTIDES EXPRESSING OR MODULATING microRNAs OR TARGETS OF SAME, TRANSGENIC PLANTS COMPRISING SAME AND USES THEREOF IN IMPROVING NITROGEN USE EFFICIENCY, ABIOTIC STRESS TOLERANCE, BIOMASS, VIGOR OR YIELD OF A PLANT - Isolated polynucleotides expressing or modulating microRNAs or targets of same are provided. Also provided are transgenic plants comprising same and uses thereof in improving nitrogen use efficiency, abiotic stress tolerance, biomass, vigor or yield of a plant. | 2014-01-09 |
20140013470 | PLANT GENES THAT CONFER RESISTANCE TO TRICHOTHECENE MYCOTOXINS AND FUSARIUM HEAD BLIGHT - Compositions and methods are disclosed for modulating disease resistance in plants. | 2014-01-09 |
20140013471 | METHODS FOR GENETIC CONTROL OF INSECT INFESTATIONS IN PLANTS AND COMPOSITIONS THEREOF - The present invention relates to control of pest infestation by inhibiting one or more biological functions. The invention provides methods and compositions for such control, By feeding one or more recombinant double stranded RNA molecules provided by the invention to the pest, a reduction in pest infestation is obtained through suppression of gene expression. The invention is also directed to methods for making transgenic plants that express the double stranded RNA molecules, and to particular combinations of transgenic pesticidal agents for use in protecting plants from pest infestation. | 2014-01-09 |
20140013472 | Application of the broccoli wound-inducible promoter of GLUCOSE INHIBITION of ROOT ELONGATION 1 gene in transgenic plants - In this study, we used a wound-inducible promoter of the broccoli ( | 2014-01-09 |
20140013473 | Columnar apple tree named 'Rosalie' - A new and distinct | 2014-01-09 |
20140013474 | Grapevine 'IFG Twelve' - This invention is a new and distinct grapevine variety denominated ‘IFG Twelve’. The new grapevine is characterized by producing very pointed narrow reddish purple grapes having small to medium sized seed traces. | 2014-01-09 |
20140013475 | Mandevilla plant named 'Patmandewi' - A new and distinct | 2014-01-09 |
20140013476 | Oenothera plant named 'UNG OEN01' | 2014-01-09 |