06th week of 2009 patent applcation highlights part 66 |
Patent application number | Title | Published |
20090037975 | System and Method for Authenticating Content - A system for authenticating content and methods for making and using same. The content authentication system advantageously facilitates recognition of known content, control over use of the known content, and knowledge accumulation regarding the use of known content for monetization models. The recognition of the suspect content preferably includes an analysis of known content recognition data associated with the known content and suspect content recognition data associated with the suspect content. A correlation between the known content recognition data and the suspect content recognition data is found, and the suspect content is analyzed in light of the correlation and known content rules associated with the known content. Thereby, the content authentication system can determine whether to approve action for the suspect content. The content authentication system enables selected known content information to be shared among known content right holders and hosting websites. | 2009-02-05 |
20090037976 | System and Method for Securing a Network Session - A system comprises an end-user device including a browser and a security component capable of executing a security policy, the security policy to be downloaded from a website; and a website including a security policy downloadable to the security component. | 2009-02-05 |
20090037977 | APPARATUS AND METHOD FOR APPLYING NETWORK POLICY AT A NETWORK DEVICE - This document discusses, among other things, applying network policy at a network device. In an example embodiment fibre channel hard zoning information may be received that indicates whether a fibre channel frame is permitted to be communicated between two fibre channel ports. Some example embodiments include identifying a media access control addresses associated with the fibre channel ports. An example embodiment may include generating one or more access control entries based on the fibre channel identifications of the fibre channel ports and the zoning information. The access control entries may be distributes to an Ethernet port to be inserted into an existing access control list and used to enforce a zoning policy upon fibre channel over Ethernet frames. | 2009-02-05 |
20090037978 | SELF-ADAPTIVE MULTIMODAL BIOMETRIC AUTHENTICATION METHOD AND SYSTEM FOR PERFORMANCE THEREOF - A method for authentication of an individual based upon biometric mode and biometric instance data comprising the steps of: storing at least a first biometric data having at least one biometric data mode and at least two biometric data instances capable of identifying an individual associated with the first biometric data; creating an at least second biometric data having the at least one biometric data mode and the at least two biometric data instances capable of identifying a specific individual associated with the second biometric data; determining which of said at least one biometric data mode and said at least two biometric data instances are to be compared; in accordance with predetermined rules; and comparing the at least second biometric data to said at least first biometric data to determine whether the selected biometric data mode and selected biometric data instances of the at least first biometric data corresponds to the selected at least one of biometric data mode and selected at least two biometric data instances of the at least second biometric data. | 2009-02-05 |
20090037979 | Method and System for Recovering Authentication in a Network - Described is a system and method for recovering authentication of a mobile unit in a network. The method includes performing an attempt to authenticate a mobile unit based on a first profile; determining, if the attempt is unsuccessful, a number of attempts to authenticate based on the first profile including the attempt; performing, if the number of attempts is less than or equal to a predefined number, a further attempt to authenticate the mobile device based on the first profile; performing, if the number of attempts is greater than the predefined number, a profile roam to a second profile; and performing an additional attempt to authenticate the mobile unit based on the second profile. | 2009-02-05 |
20090037980 | DOCUMENT PROCESS SYSTEM, IMAGE FORMATION DEVICE, DOCUMENT PROCESS METHOD AND RECORDING MEDIUM STORING PROGRAM - A document process system, which includes: an authentication section that authenticates an operator of an operation target document; an extraction section that extracts specific information for setting operation restriction information of the document; a setting section that sets the operation restriction information of the document based on authentication information of the operator authenticated by the authentication section and the specific information extracted by the extraction section; and a generation section that generates a protected document to which the operation restriction information is set by the setting section based on the operation target document. | 2009-02-05 |
20090037981 | Authentication system, image forming apparatus, and authentication server - An authentication system includes an authentication information input device to which a user inputs authentication information, an authentication server, and at least one image forming apparatus, all connected via a network. The authentication server acquires the authentication information input via the authentication information input device and performs user authentication based on the authentication information. The authentication server includes a transmitter to transmit a result of the user authentication indicating whether or not the user authentication is successful and information of the user identified by the authentication information to at least one of the image forming apparatuses. The image forming apparatus includes a receiver to receive the result of the user authentication and the user information transmitted from the authentication server, and an apparatus controller to switch the image forming apparatus from an unusable state to a usable state according to the result of the user authentication and the user information. | 2009-02-05 |
20090037982 | METHOD AND SYSTEM FOR AUTHENTICATING A PARTY TO A TRANSACTION - One embodiment of the invention is directed to a method including receiving an alias identifier associated with an account associated with a presenter, determining an associated trusted party using the alias identifier, sending a verification request message to the trusted party after determining the associated trusted party, and receiving a verification response message | 2009-02-05 |
20090037983 | USER-CENTRIC AUTHENTICATION SYSTEM AND METHOD - A system for authenticating a user in a network. The authentication system includes a computer resource having secure data, an authentication computing system providing dynamic authentication of a user accessing the computer resource, and a user communication device for communicating between the user and the computer resource. The computing system presents a challenge for which a specified response is required based upon a pre-determined function. Access is then granted by the computing system upon providing the correct response to the presented challenge by the user. | 2009-02-05 |
20090037984 | AUTOMATED PASSWORD TOOL AND METHOD OF USE - A method of auto updating a password comprises opening a password file and a new password file and reading information from the password file including user ID type. The method applies the user ID type to a predetermined application type and executes password-updating logic to generate a new password for the application type. The method further updates the new password file with the new password for the predetermined application type. A system comprises at least one of a hardware component and a software component configured to read information from a password file including user ID type. The hardware component and/or software component is further configured to determine that the user ID type matches to an application type and to apply the user ID type to the matched application type. The hardware component and/or software component is further configured to generate a new password for the application type and to update the password file with the new password for the application type. | 2009-02-05 |
20090037985 | Automated Peer Authentication - An apparatus and methods are disclosed for performing peer authentication without the assistance of a human “guard.” In accordance with the illustrative embodiments, a peer is selected from a non-empty set of candidates at authentication time based on one or more of the following dynamic properties: the current geo-location of the user to be authenticated; the current geo-locations of the candidates; the current time; the contents of one or more directories (e.g., a telephone directory, an organizational chart or directory, etc.), the contents of one or more call logs; and the candidates' schedules. | 2009-02-05 |
20090037986 | Non-disclosing password entry method - A non-disclosing password entry method is achieved by displaying an ordered arrangement or matrix of characters such that an authorized user's password is predetermined from a subset of these characters. The characters in the display are associated with a randomly ordered set of patterns or colors as, for example, the character background in the display. Additionally there is provided a means for selecting each type of pattern or color. Rather than entering the password directly, the authorized user is authenticated by noting the background pattern or color associated with the first character of the password and then selecting that pattern or color. The process is repeated with each password character in sequence until all the characters have been selected. The authorized user is authenticated by verifying that the selected backgrounds are correct for each of the characters of the password. | 2009-02-05 |
20090037987 | Application Programming Interface for Implementing Directory Service Access Using Directory Service Markup Language - A set of DSML application programming interface (DSML API) functions is provided to facilitate the implementation of DSML-based directory service access. The DSML API includes a DSML document API class for building or accessing a DSML payload, and a DSML connection API class that handles connection and transport to a DSML server. To access a directory service, the client calls functions of the DSML document API class to generate a DSML request payload, and calls functions of the DSML connection API to transport a packet with the DSML request payload according to a pre-selected connection protocol, such as SOAP, to the DSML server for forwarding to the directory service. | 2009-02-05 |
20090037988 | System and method of mutual authentication with dynamic password - A method of mutual authentication with dynamic password includes: generating a dynamic password and a first validation code by using a password generator; entering the dynamic password into a user interface; and transmitting the dynamic password to a verification host to verify the correctness of the dynamic password, if the dynamic password is correct, returning a second validation code to the user interface for a user to confirm whether the first validation code and the second validation code are the same or not. A system of mutual authentication with dynamic password is also disclosed. The above-mentioned system and method of mutual authentication with dynamic password can reduce the risk of phishing attack. | 2009-02-05 |
20090037989 | METHOD FOR PRESENTING PASSWORD CODES IN MOBILE DEVICES FOR AUTHENTICATING A USER AT A PROTECTED INSTITUTION - The method of the invention allows presenting, in a friendly and intuitive form, to a user of a protected institution, access password codes arranged in the form of a table and to be individually and only once utilized for authenticating a user upon a respective operation to access said institution. The method proposed herein is particularly adequate for the representation of passwords in a mobile device, such as cell phone, PDA, and the like, utilizing a representation practically identical to the tables of printed passwords and already utilized by many users. There are additional advantages in relation to the use of printed tables, such as the possibility of highlighting a determined password, searching a determined index, protecting the tabular token application by password, and updating the passwords, and the like. | 2009-02-05 |
20090037990 | METHOD AND APPARATUS FOR DISTRIBUTED AUTHORIZATION BY ANONYMOUS FLEXIBLE CREDENTIAL - A method and apparatus for distributed authorization by anonymous flexible credential are provided. Pseudonym authority issues a root pseudonym to a user. The user may generate large amount of derived pseudonym from the root pseudonym. The user may obtain resource credentials from resource protectors by using derived pseudonyms. The user may select a set of resource credentials, generate a flexible credential from this set of resource credentials and request access to the resource corresponding to the set of resource credentials to a resource protector by using the flexible credential and a derived pseudonym. Revocation list for each resource may be maintained in the system such that any one of resource credentials of any user may be revoked without affecting other resource credentials of that user. | 2009-02-05 |
20090037991 | MANAGING TRANSFERS OF INFORMATION IN A COMMUNICATIONS NETWORK - The invention features various techniques for managing transfers of information in public packet switched communications networks. In one aspect, the invention provides a system for identifying updated items of network-based information, such as pages, to users in a network. A master server receives the data from each of a plurality of network servers and merges them into one or more master logs. The logs have entries that pertaining to creation of or changing of pages of information. Another aspect of the invention features a system for implementing security protocols. A proxy server translates links from a protocol incompatible with the network tool to a protocol compatible with the network tool and back-translates the link. Another aspect of the invention features a system for managing authenticating credentials of a user. A proxy server manages a user's authenticating credentials automatically on behalf of the user. Another aspect of the invention features a system for inducing advertisers to target advertisements to consumers. An advertising broker receives advertisements and messages indicating that users have read the advertisements, and causes an offer having monetary value to be executed. Another aspect of the invention features a system for extracting data from sources of network-based information in a communications network. An object embedding-program locates a script program and causes the script program to extract data from a page of information. | 2009-02-05 |
20090037992 | Apparatus, system, and method for generating and authenticating a computer password - An apparatus, system, and method for constructing, transmitting, and authenticating a password utilized by an authentication device to authenticate an access device. The authentication device receives the password from the access device, authenticates the access device if the password matches stored information, and returns an acknowledgment message that includes an index value associated with a stored character set. The access device constructs and transmits the password. The access device receives from a user, a plurality of predefined characters forming a User ID. The access device also receives the acknowledgment message and index value from the authentication device. The index value is used to identify a set of password modification factors from a plurality of sets stored in a lookup table. The access device utilizes the identified set to modify a password, and transmits the password to the authentication device. | 2009-02-05 |
20090037993 | Information Authentication Gateway, Information Acquisition System Using the Information Authentication Gateway, and Information Acquisition Method - It is possible to provide an information authentication gateway used when acquiring information on an object according to hierarchical position information contained in an information code attached to the object. The information authentication gateway includes: metadata storage means for storing metadata indicating an entire hierarchical structure in which basic semantic units are shown; hierarchical position information acquisition means for reading an information code attached to an object by a reader and receiving hierarchical information included therein from a user terminal capable of transmitting/receiving information to/from the reader; information comparison means for performing a comparison to decide whether the received hierarchical position information is included in the metadata stored in the metadata storage means; and ticket issuing means used when the information comparison means indicates that the information is included, for passing information required to access a server storing the information corresponding the hierarchical position information to the user terminal. | 2009-02-05 |
20090037994 | SYSTEM AND METHOD FOR ORDERED CREDENTIAL SELECTION - A system and method for assisting in ordered credential selection is disclosed. In one embodiment, the system enables ordered credential selection for credentials associated with one or more digital identities. The system comprises a plurality of security tokens, with each security token comprising a claim associated with a digital identity and where at least two of the security tokens are different from each other. The system also comprises an ordering module and manager module. The ordering module imposes a preferential ordering on the security tokens in accordance with an ordering policy to select a preferred security token. The manager module transmits at least one security token in response to a request, where at least one of the security tokens transmitted by the manager module is the preferred security token. | 2009-02-05 |
20090037995 | System and Method For Authentication Of Users In A Secure Computer System - A system and method of authenticating a user in a secure computer system in which a client computer transmits to the secure computer system a request for a sign-on page, the computer system transmits to the client computer a prompt for a first user identifier, and in response to the prompt, the client computer transmits to the computer system a request including a first identifier, a second identifier stored in an object stored at the client computer and a plurality of request header attributes. The computer system includes a server software module that authenticates the first user identifier and the second user identifier, and compares the transmitted plurality of request header attributes with a plurality of request header attributes stored at the computer system and associated with the first and second user identifiers. If the first and second user identifiers are authenticated, and if the transmitted request header attributes match stored request header attributes, the server software module transmits a success message to the client computer to be viewed by the user, and the user is allowed to access the secure computer system. In one embodiment, each transmitted request header attribute is given a numerical weighted value and the comparison of request header attributes includes adding the assigned numerical values of matching attributes to arrive at a total value, then transmitting the success message to the client computer only if the total value of matching request header attributes is at least a certain predetermined numerical total. | 2009-02-05 |
20090037996 | Multi-Domain Secure Computer System - Disclosed is a hardware based secure multi-domain computer system. The system comprises a housing enclosing multiple separate, secure computer devices. The housing is preferably the size of a standard computer tower. It is preferred that at least three computer devices are disposed within the housing. Each of the computer devices operate on significantly less power than a standard computer. Preferably, each computer operates on no more than 50 Watts of power, more preferably on less than 35 Watts of power. | 2009-02-05 |
20090037997 | METHOD FOR DETECTING DNS REDIRECTS OR FRAUDULENT LOCAL CERTIFICATES FOR SSL SITES IN PHARMING/PHISHING SCHEMES BY REMOTE VALIDATION AND USING A CREDENTIAL MANAGER AND RECORDED CERTIFICATE ATTRIBUTES - Certificate information associated with a received certificate, such as a Secure Sockets Layer (SSL) certificate is stored in a trusted local cache and/or in one or more remote trusted sources, such as a single remote trusted source and/or a trusted peer network. When a site certificate is received on a host computer system, certificate information associated with the received site certificate is obtained and compared with the stored certificate information to determine whether or not the site certificate indicates malicious activity, such as a malicious DNS redirection or a fraudulent local certificate. When a site certificate is not found indicative of malicious activity, the site certificate is released. Alternatively, when a site certificates is found indicative of malicious activity protective action is taken. In some embodiments, a user's log-in credentials are automatically obtained from a trusted local cache and automatically submitted to a web site. | 2009-02-05 |
20090037998 | Systems and Methods for Authorizing a Client in an SSL VPN Session Failover Environment - The SSL VPN session failover solution of the appliance and/or client agent described herein provides an environment for handling IP address assignment and end point re-authorization upon failover. The appliances may be deployed to provide a session failover environment in which a second appliance is a backup to a first appliance when a failover condition is detected, such as failure in operation of the first appliance. The backup appliance takes over responsibility for SSL VPN sessions provided by the first appliance. In the failover environment, the first appliance propagates SSL VPN session information including user IP address assignment and end point authorization information to the backup appliance. The backup appliance maintains this information. Upon detection of failover of the first appliance, the backup appliance activates the transferred SSL VPN session and maintains the user assigned IP addresses. The backup appliance may also re-authorize the client for the transferred SSL VPN session. | 2009-02-05 |
20090037999 | Packet filtering/classification and/or policy control support from both visited and home networks - A method of supporting access to a selected Internet Protocol (IP) multimedia application via an IP Multimedia Subsystem (IMS) is provided for a roaming mobile node (MN)—i.e., user equipment (UE) ( | 2009-02-05 |
20090038000 | System and Method for Multiple Address of Record Registration Using a Single Explicit SIP Request - One embodiment of the present invention is a method for registering multiple addresses of record. The method comprises receiving a session initiation protocol register request. The session initiation protocol register request comprises a plurality of addresses of record and a contact address for a session initiation protocol endpoint. The method further comprises associating each of the plurality of addresses of record with the contact address for the session initiation protocol endpoint. | 2009-02-05 |
20090038001 | Correlation of Log Information In A Distributed Computing Environment Using Relative Timestamps - Methods and apparatus, including computer program products, are provided for using a relative timestamp to log activity in a distributed computing system. In one aspect, there is provided a computer-implemented method. The method may include receiving a message including a first timestamp representative of when the message is sent at a first processor. A second processor may generate an entry logging receipt of the received message. The second processor may determine a second timestamp representative of a time relative to the first timestamp. The second timestamp may be included as an entry at a log at the second processor. | 2009-02-05 |
20090038002 | CONTROLLING IMAGE FORMING FUNCTION - An apparatus, method, system, computer program and product each capable of controlling addition of a printing function or controlling use of the printing function are disclosed. | 2009-02-05 |
20090038003 | SYSTEM AND PROCESS FOR SECURITY CONTROL OF A PROJECTOR - An exemplary projector crypto system includes a key storage unit, a password inputting unit, a comparing unit, and a switch module. The key unit is configured for determining and storing a secret picture for operating the projector. The password inputting unit is configured for reading a picture input by a user. The comparing unit is configured for determining whether the input picture is identical to the secret picture. The switch module activates the projector only if the input picture is identical to the secret picture. | 2009-02-05 |
20090038004 | ROLE CHANGE BASED ON COUPLING OR DOCKING OF INFORMATION HANDLING APPARATUS AND METHOD FOR SAME - An information handling system, comprising an information handling device containing memory for information specific to a particular role or function to be performed by a user of the device, having a display for displaying a portion of the information and functional portions for manipulating the information; and apparatus for coupling to the device, the apparatus being associated with a user of the device and containing information concerning identity and preferences of the user of the device. The apparatus acts a dock for receiving the device. A method comprising loading information from the apparatus to which the device is coupled so as to customize operation of the device. Information can include at least one of preferences, settings, authorization rights, security codes and programs preferred by a user of the apparatus. Role of the device may change in response to communications hardware for receiving signals indicative of location of the device, which changes roles based on the signals. | 2009-02-05 |
20090038005 | PRIVILEGE-BASED ACCESS SYSTEM - In one embodiment, an apparatus comprises a network interface system and a logic system. The network interface system comprises at least one network interface. The logic system comprises at least one logic device configured to do the following: receive, via the network interface system, task indications that a first person has completed predetermined tasks; ascertain points to award for the predetermined tasks; receive, via the network interface system, an access request to access identified content; determine a number of points required for granting the access request; determine a number of points currently available to the first person; determine whether to grant the access request; and send, via the network interface system, a message to a device indicating whether to grant the access request. | 2009-02-05 |
20090038006 | User authentication with image password - A method and apparatus authenticates a user with an image password. In one implementation, a method is provided. According to the method, a plurality of icons are displayed. The plurality of icons are arranged in a pattern. The method receives a sequence of selected inputs. Each of the inputs corresponds to one of the plurality of icons. The method further repositions the plurality of icons after each input and determines whether the user is authenticated based on the received sequence. | 2009-02-05 |
20090038007 | METHOD AND APPARATUS FOR MANAGING CLIENT REVOCATION LIST - A method and apparatus for managing a client revocation list are provided. The method includes receiving a first client revocation list from a server; and selectively discontinuing an operation of a client, based on the first client revocation list. By doing so, the method and the apparatus can securely control contents. | 2009-02-05 |
20090038008 | MALICIOUS CODE DETECTION - In a system where an indirect control flow instruction requires a CPU to consult a first memory address, in addition to what is encoded in the instruction itself, for program execution, a method is provided to determine if the first memory address contains a valid or plausible value. The first memory address is compared to an expected or predicted memory address. A difference between the expected or predicted memory address and the first memory address causes an evaluation of any program code about to be executed. The evaluation of code determines whether or not a malicious attack is occurring, or being attempted, that might affect proper operation of the system or program. | 2009-02-05 |
20090038009 | Information Processing Device That Verifies A Computer Program, And Gaming Machine - An apparatus for processing information includes a memory device and a controller. The controller is configured to: access to a memory area in the memory device in which information related to a location of data including a computer program is stored; store contents of the memory area as a first inspection code into a first memory area of the memory device; at predetermined timing, access to a memory area in the memory device in which latest information is stored; store contents of the memory area as a second inspection code into a second memory area; compare the first and the second inspection codes; if the second inspection code does not agree with the first inspection code, output an error signal indicating inconsistency between the first and the second inspection codes; and if the second inspection code agrees with the first inspection code, perform verification of the computer program. | 2009-02-05 |
20090038010 | Monitoring and controlling an automation process - Embodiments are provided to monitor aspects of a process, such as an automation process. In an embodiment, a system includes a number of components configured to monitor and validate operational aspects of a test automation process. In one embodiment, a monitoring application can be used to detect test automation issues, such as file related issues, registry related issues, network related issues, and other operational issues for example. The monitoring application can include a number of rule sets which may be tailored to identify and detect new types of exceptions and other conditions associated with an automation process or some other process. Other embodiments are available. | 2009-02-05 |
20090038011 | SYSTEM AND METHOD OF IDENTIFYING AND REMOVING MALWARE ON A COMPUTER SYSTEM - A system and accompanying method of identifying and removing malware on a computer system is disclosed. The system comprises a source file containing reference attributes and properties of components of a local computer system in a state unaffected by malware, and exact copies of the system control files. The components of the local computer system may comprise executable and script files such as operating system files, application programs, system controls, registry files and all other executable and script files and their related relevant files. Current status of executables are checked against the reference attributes. All executables on local computer system failing certain match criteria are removed from the local system, or alternatively, replaced with reference copies from source file. Thereby, the system and method identifies malware based on previous system state, method of entry into the local computer system, and intention to automatically execute either upon booting or upon launching of a computer program which a user has intentionally installed and which the user would normally believe to be free of malware. | 2009-02-05 |
20090038012 | METHOD AND SYSTEM FOR DELETING OR ISOLATING COMPUTER VIRUSES - The invention discloses a method and a system for deleting or isolating computer viruses. The method of deleting or isolating computer viruses comprises steps of: selecting a first operating system configured with a virus killing module from a plurality of operating systems in a computer, during the computer being in starting process; loading the first operating system; scanning, by the virus killing module, the storage area of at least one operating system of the plurality of operating systems, wherein the at least one operating system doesn't include the first operating system; and deleting or isolating virus found during scanning. According to the present invention, a problem that the basic operating system could not be started due to viruses may be solved, and thus the system stability is greatly improved. | 2009-02-05 |
20090038013 | WIRELESS COMMUNICATION SECURITY WHEN USING KNOWN LINK KEYS - The present system may enhance security in device having a wireless interface while it is operating in a mode that may make it more vulnerable to predatory attacks. More specifically, the advent of certain development or support operating modes supported by particular wireless communication mediums, such as debug modes that allow other wireless devices to monitor messages coming and going from a wireless device for diagnostic purposes, may leave devices overly accessible while operating in such a mode. As a result, additional security measures are required in order to determine if a vulnerable mode should be enabled on a device, and further, whether another device should be allowed to establish a communication to a device operating in this mode. | 2009-02-05 |
20090038014 | System and method for tracking remediation of security vulnerabilities - A method of tracking remediation of security vulnerabilities includes a step of providing a global list of network devices within a computer network, wherein each network device of the global list is identified with dynamically assigned identifying information. The method also includes a step of scanning each network device of the global list for at least one security vulnerability. The method also includes a step of creating a vulnerability list of network devices having the at least one security vulnerability, wherein the vulnerability list is a subset of the global list and contains fewer network devices than the global list. Each network device of the vulnerability list is identified with identifying information. The method also includes steps of updating the dynamically assigned identifying information associated with the network devices of the vulnerability list and rescanning each network device of the updated vulnerability list to determine if the vulnerability has been remediated. | 2009-02-05 |
20090038015 | Automatic detection of vulnerability exploits - An embodiment of the invention provides an apparatus and method for automatic detection of a vulnerability exploit. The apparatus and method are configured to post a security vulnerability warning indicating a vulnerability of software; provide an exploit detector; and use the exploit detector to detect an attempted exploit that targets the vulnerability. | 2009-02-05 |
20090038016 | Detecting And Reacting To Protected Content Material In A Display Or Video Drive Unit - A system and method to protect content material enforce copy protection by establishing a secure link ( | 2009-02-05 |
20090038017 | SECURE VAULT SERVICE FOR SOFTWARE COMPONENTS WITHIN AN EXECUTION ENVIRONMENT - Embodiments of apparatuses, articles, methods, and systems for secure vault service for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise compromised operating system environment. The underlying platform to lock and unlock secrets on behalf of the authenticated/authorized/verified software component provided in protected memory regions only accessible to the authenticated/authorized/verified software component. Other embodiments may be described and claimed. | 2009-02-05 |
20090038018 | INFORMATION PROCESSING APPARATUS, CLIENT DEVICE, AND LICENSE MANAGEMENT SYSTEM - A license issuing server manages information about a plurality of software applications including an installable software application and a yet uninstallable software application, such as an unreleased software application, in association with a product code. Upon receiving a request for a license file which can identify the product code from a client device, the license issuing server generates a plurality of license files corresponding to information about a plurality of software applications managed in association with the product code and collectively issues the license files to the client device. | 2009-02-05 |
20090038019 | TAMPER DETECTION MECHANISM AND CARD PROCESSING DEVICE - A tamper detection mechanism for detecting tampering when a sub system is removed from a host device may include a screw member that may include a head portion, a major diameter shaft portion and a minor diameter shaft portion. The tamper detection mechanism may also include a through hole provided in the sub system, a lever member, and a detection switch. The lever member may withdraw from said through hole as it is pushed by the major diameter shaft portion when the screw member is tightly screwed, and may advance into the through hole when the screw member is loosened. The detection switch may detect whether the screw member is tightly screwed or loosened based on withdrawal or advancement of the lever member. | 2009-02-05 |
20090038020 | HUMAN ALBUMIN ANIMAL MODELS FOR DRUG EVALUATION, TOXICOLOGY AND IMMUNOGENICITY STUDIES - An animal model is provided which is genetically engineered to express human serum albumin, and such animals may be advantageously used in assessing drugs, vaccines or other therapeutic compounds that may be used in humans. In addition, an animal model is provided which does not manufacture its own albumin and which has been injected with human serum albumin. Through the use of these animal models, drugs and other chemicals can be more accurately assessed in physiological environments that reflect the conditions to be expected in humans, and such models will be useful in assessing new drugs and evaluating toxic substances for potential dangers as carcinogens, mutagens, etc. Other applications include evaluating immunological properties of various albumin-engineered proteins which might be administered to humans as therapeutics or vaccines, and research of disease states, such as genetic diseases, to provide further insight in treating these diseases. | 2009-02-05 |
20090038021 | Novel clock gene and application of the same - It is intended to provide a novel gene encoding a new protein which interacts with BMAL2 protein. Namely, a novel gene comprising any one of the following DNAs (a) to (e): (a) a DNA comprising any one of the base sequences represented by SEQ ID NOS: 1 to 4; (b) a DNA that comprises a base sequence derived from the base sequence of the DNA (a) by deletion, substitution or addition of one to several bases and encodes a protein interacting with BMAL2 protein; (c) a DNA that comprises a base sequence derived from the base sequence of the DNA (a) by deletion, substitution or addition of one to several bases and is hybridizable with the DNA (a) under stringent conditions; (d) a DNA that comprises a base sequence derived from the base sequence of the DNA (a) by deletion, substitution or addition of one to several bases and has a homology of 90% or higher with the DNA (a); and (e) a DNA comprising a base sequence that is complementary to any one of the DNAs (a) to (d). | 2009-02-05 |
20090038022 | IGF-1 Novel peptides - The present invention relates to novel polypeptide constructs based on peptides derived from Insulin-like Growth Factor I (IGF-1). The invention also relates to novel uses for IGF-1-derived peptides, particularly for the prevention and treatment of diseases involving regulation of cellular growth or differentiation, regeneration and tissue repair. | 2009-02-05 |
20090038023 | Lyase Enzymes, Nucleic Acids Encoding Them and Methods For Making and Using Them - This invention provides polypeptides having lyase activity, polynucleotides encoding these polypeptides, and methods of making and using these polynucleotides and polypeptides. In one aspect, the invention is directed to polypeptides having ammonia lyase activity, e.g., phenylalanine ammonia lyase, tyrosine ammonia lyase and/or histidine ammonia lyase activity, including thermostable and thermotolerant activity, and polynucleotides encoding these enzymes, and making and using these polynucleotides and polypeptides. The polypeptides of the invention can be used in a variety of pharmaceutical, agricultural and industrial contexts. | 2009-02-05 |
20090038024 | CAP/SORBS1 AND DIABETES - The present invention provides methods, compositions, and kits useful for modulating insulin/glucose homeostasis in a subject by modulating CAP/SORBS1. In addition, the invention provides a variety of prescreening and screening methods aimed at identifying agents that modulate insulin/glucose homeostasis. Methods of the invention can involve assaying test agent binding to CAP/SORBS1 polypeptides or polynucleotides. Alternatively, test agents can be screened for their ability to alter the level of CAP/SORBS1 polypeptides, polynucleotides, or action. | 2009-02-05 |
20090038025 | Selection system for maize transformation - The present invention relates to improved methods for the incorporation of DNA into the genome of a | 2009-02-05 |
20090038026 | MSCA1 NUCLEOTIDE SEQUENCES IMPACTING PLANT MALE FERTILITY AND METHOD OF USING SAME - Nucleotide sequences of a Msca1 gene, critical to male fertility in plants are described, with DNA molecule and amino acid sequences set forth. Promoter sequences and their essential regions are also identified. The nucleotide sequences are useful in impacting male fertility in plants. | 2009-02-05 |
20090038027 | MSCA1 NUCLEOTIDE SEQUENCES IMPACTING PLANT MALE FERTILITY AND METHOD OF USING SAME - Nucleotide sequences of a Msca | 2009-02-05 |
20090038028 | MSCA1 NUCLEOTIDE SEQUENCES IMPACTING PLANT MALE FERTILITY AND METHOD OF USING SAME - Nucleotide sequences of a Msca1 gene, critical to male fertility in plants are described, with DNA molecule and amino acid sequences set forth. Promoter sequences and their essential regions are also identified. The nucleotide sequences are useful in impacting male fertility in plants. | 2009-02-05 |
20090038029 | Method to alleviate abiotic stress in plants - Plants can be modified to resist abiotic stress by effecting expression of PAP activity. | 2009-02-05 |
20090038030 | HOMOLOGOUS RECOMBINATION-MEDIATED TRANSGENE DELETION IN PLANT CELLS - A process to prepare a recombined transgenic | 2009-02-05 |
20090038031 | AXMI-028 AND AXMI-029, A FAMILY OF NOVEL DELTA-ENDOTOXIN GENES AND METHODS FOR THEIR USE - Compositions and methods for conferring pesticidal activity to bacteria, plants, plant cells, tissues and seeds are provided. Compositions comprising a coding sequence for a delta-endotoxin polypeptide are provided. The coding sequences can be used in DNA constructs or expression cassettes for transformation and expression in plants and bacteria. Compositions also comprise transformed bacteria, plants, plant cells, tissues, and seeds. In particular, isolated delta-endotoxin nucleic acid molecules are provided. Additionally, amino acid sequences corresponding to the polynucleotides are encompassed. In particular, the present invention provides for isolated nucleic acid molecules comprising nucleotide sequences encoding the amino acid sequence shown in SEQ ID NO:2, 4, 15, 17, or 19, or the nucleotide sequence set forth in SEQ ID NO:1, 3, 14, 16, or 18, as well as variants and fragments thereof. | 2009-02-05 |
20090038032 | METHOD FOR PRODUCING TRANSGENIC PLANTS - A method for producing transgenic plants, including treating a target tissue using plasmolying media (PM) which contains 4% to 10% of sucrose and 100 μM to 300 μM of Acetosyringone (AS) and gold particles. The target tissue is infected by a bacterial suspension using a suitable strain and a suitable transformation vector. A PM containing 4% to 10% sucrose and 100 μM to 300 μM AS is treated for a period between 1 to 3 days. Cultivation is performed in a cultivation media in a dark condition at a temperature between 25° C. to 30° C. A non-selection media with an antibiotic is introduced. A selection media containing an active ingredient phosphinothricin (PPT) is introduced in a light condition at a temperature of between 25° C. to 30° C. in a sub culture for a period of between 3 weeks to 1 month. The putative transformant is regenerated and the number of copies of the transgenes is analyzed. | 2009-02-05 |
20090038033 | WOOD AND CELL WALL GENE MICROARRAY - The invention provides polynucleotide and polypeptide sequences isolated from | 2009-02-05 |
20090038034 | Polynucleotides Encoding Stop Codons in Multiple Reading Frames and Methods of Use - Compositions having polynucleotides encoding multiple translational stop signals in more than one reading frame are provided. The compositions include isolated polynucleotides, expression cassettes, and vectors, as well as host cells, prokaryotic organisms, and eukaryotic organisms comprising the polynucleotide(s). Methods include using the polynucleotides to stop translation of an mRNA into a protein, to produce a transformed cell and/or organism comprising the polynucleotide, and to identify transformed cells or organisms of a specific lineage. | 2009-02-05 |
20090038035 | Shrub rose plant named 'KORparofe' - A new and distinct variety of rose with long lasting, novel pink flowers, and attractive foliage with good disease resistance. It exhibits bushy growth with abundant flowers. The new variety propagates well from cuttings and by grafting. This new and distinct variety has shown to be uniform and stable in the resulting generations from asexual propagation. | 2009-02-05 |
20090038036 | Rose plant named 'Emily Carr' - A new and distinct variety of rose, distinguished by its deep red flowers, disease resistance and cold tolerance. | 2009-02-05 |
20090038037 | Floribunda rose plant named 'MORabundant' - A new and distinct cultivar of rose plant of the floribunda class, of hardy, sturdy, bushy, much branched habit substantially as illustrated and described, characterized by buds and flowers, basically pink, the bud being pointed in the early stage, opening from light pink center to medium pink on outer petals, with the open flower being double and rounded with 40 or more petals; and further characterized by a plant of compact, vigorous, upright shape with main stems and shoots of less than average thorniness, the said plant being easy to propagate from soft-wood cuttings with an abundance of medium, semi-glossy foliage, the flowers being usually borne in medium clusters on medium length stems. Ralph Moore originated this new and distinct rose at his nursery located in Visalia, Calif., for the approval and subsequent sale to Cottage Hill Nursery of Irvington, Ala., who is now filing this Plant Patent document. | 2009-02-05 |
20090038038 | APPLE TREE NAMED 'ALVINA' - A new apple variety distinguished by very high level of fruit over color, with solid flush and stripes and maturing earlier than comparator Gala selections. | 2009-02-05 |
20090038039 | Strawberry plant named 'RECORD' - A new and distinct | 2009-02-05 |
20090038040 | Hibiscus 'Panama Red' - ‘Panama Red’ is an ornamental variety, crossed and cultivated in Georgia. The plants of the new | 2009-02-05 |
20090038041 | Hibiscus 'Panama Bronze' - ‘Panama Bronze’ is an ornamental variety, crossed and cultivated in Georgia. The plants of the new | 2009-02-05 |
20090038042 | Loropetalum chinense variety rubrum plant named 'shang-lo' - A new and distinct variety of | 2009-02-05 |
20090038043 | POLYGONATUM PLANT NAMED 'DOUBLE STUFF' - A new and distinct | 2009-02-05 |
20090038044 | Syzygium floribundum plant named 'DOW20' - ‘DOW20’ is a distinctive variety of | 2009-02-05 |