12th week of 2015 patent applcation highlights part 76 |
Patent application number | Title | Published |
20150082376 | SENDING OUT-OF-BAND NOTIFICATIONS - Out-of-band notifications are used to inform users of clients of security policy enforcement actions, such as enforcement of a data loss prevention (DLP) policy. Code for instantiating a notification agent at a client used by a user is inserted into network traffic inbound to the client. Outbound network traffic sent from the client to a server is monitored for compliance with one or more security policies. If it is determined that the network traffic violates a security policy, an enforcement action is taken. An out-of-band notification message describing the enforcement action is inserted into a response to the outbound network traffic and sent to the client. The notification agent at the client receives the notification message and presents the message to the user. | 2015-03-19 |
20150082377 | GENERATION OF ATTRIBUTE BASED ACCESS CONTROL POLICY FROM EXISTING AUTHORIZATION SYSTEM - Attributes relevant to at least one existing authorization system are identified. Noise removal from identified attributes of the at least one existing authorization system is performed. An attribute based access control (ABAC) policy is generated from remaining identified attributes to derive logical rules that grant or deny access. | 2015-03-19 |
20150082378 | SYSTEM AND METHOD FOR ENABLING SCALABLE ISOLATION CONTEXTS IN A PLATFORM - A system and method for operating a computing platform that includes distributing a job within an isolation context to a computing platform, which includes receiving a deployment request that includes a set of isolation context rules; transferring a job instance update as specified by the deployment request to a machine of the computing platform; and at the machine, instantiating the job instance within an isolation context and configuring the set of isolation context rules as a set of resource quotas and networking rules of the isolation context; and enforcing the set of resource quotas and networking rules during operation of the job instance within the computing platform. | 2015-03-19 |
20150082379 | PAGE DISPLAY METHOD, APPARATUS AND TERMINAL - The embodiments of the disclosure provide a page display method and apparatus, belonging to the field of terminals. The method comprises monitoring the page browsing mode of a browser while running the browser; determining a changed page browsing mode, if the page browsing mode of the browser is changed; and displaying a tips button on the current page of the browser, if the changed page browsing mode is a specified mode. The apparatus comprises a monitoring module, a determining module, and a displaying module. Thereby, the tips-making process while switching modes is simplified. The tips button is displayed on a specific location to remind users, without breaking the continuous browsing via the browser, so that non-trace switch can be achieved when the browser changes its page browsing mode. | 2015-03-19 |
20150082380 | METHODS AND APPARATUS FOR SECURE COMMUNICATION IN A VEHICLE-BASED DATA COMMUNICATION SYSTEM - A method provides secure communication between a first module and a second module within a vehicle communication network. A first anti-replay counter is provided within the first module, and a second anti-replay counter is provided within the second module. A message is transmitted from the first module to the second module over the vehicle communication network. The message includes a partial counter including only a portion of the contents of the first anti-replay counter, and the message is authenticated based on the partial counter. | 2015-03-19 |
20150082381 | METHOD AND APPARATUS FOR PROVIDING A DYNAMIC TOOL MENU BASED UPON A DOCUMENT - A method, non-transitory computer readable medium, and apparatus for providing a tool menu based upon a document displayed on an endpoint device are disclosed. For example, the method opens the document requested by a user in the endpoint device, detects one or more portions of the document that require data entry, determines a type of data entry that is required for the one or more portions of the document that are detected to require data entry, detects one or more configuration settings of the endpoint device and displays one or more tools selected from a plurality of tools on the tool menu based upon the type of data entry that is required for the one or more portions of the document and the one or more configuration settings of the endpoint device. | 2015-03-19 |
20150082382 | TECHNIQUES FOR MULTI-STANDARD PEER-TO-PEER CONNECTION - Techniques for multi-protocol peer-to-peer connection are described. An apparatus may comprise a discovery component to discover a remote device using a first protocol, and receive discovery information from the remote device, the discovery information including protocol information. The apparatus may comprise an authentication component to authenticate the remote device. The apparatus may comprise a connection component to establish a peer-to-peer connection with the remote device using a second protocol based on the protocol information. Other embodiments are described and claimed. | 2015-03-19 |
20150082383 | System and Method for Controlling Access to an Electronic Message Recipient - A system for, and method of, generating a plurality of proxy identities to a given originator identity as a means of providing controlled access to the originator identity in electronic communications media such as e-mail and instant messaging. | 2015-03-19 |
20150082384 | Mobile-Device-Based Trust Computing - In one embodiment, a method includes receiving a request to access a shared device. The request may include data uniquely identifying a first user of the social-networking system. The first user may be represented by a first user node in a social graph associated with the social-networking system, and wherein the social graph comprises a plurality of user nodes and a plurality of edges connecting the user nodes. The method may further include determining that a social-networking account for each of one or more second users of the social-networking system was compromised, wherein each of the second users previously accessed the shared device. Each of the second users may be respectively associated with second user nodes in the social graph. The method may further include sending, to the shared device, a message indicating that the social-networking accounts for the second users were compromised. | 2015-03-19 |
20150082385 | Communication Gateway for Facilitating Communications With a Supervisory Control and Data Aquisition System - Transfer of data between at least one supervisory control and data acquisition (SCADA) device and an advanced metering infrastructure (AMI) device via a wireless communication network is facilitated. The data is used for monitoring and/or controlling the AMI device. A protocol conversion of the data is performed to facilitate transfer of the data between the SCADA device and the AMI device as data packets via a packet data network gateway and a wireless communications network. | 2015-03-19 |
20150082386 | METHOD AND SYSTEM FOR SHARING CONTENT FILES USING A COMPUTER SYSTEM AND DATA NETWORK - A system for distributing digital content obtained from a variety of sources in a variety of formats is described that utilizes a content distribution system configured to receive and store the content files, convert the content file both into a standardized format file and into a thumbnail file, and associate the content with one or more tags that can signify characteristics or relevant facts about the content file. Users of the system select one or more tags on their remote devices in order that the content distribution system automatically transmit to the remote device thumbnail images of those content files that match the selected tags. Users can then select the thumbnail image in order to cause the system to transmit to the remote device the standardized format version of the content. | 2015-03-19 |
20150082387 | SYSTEM AND METHOD FOR SECURE DISTRIBUTION OF COMMUNICATIONS - A method for building and managing send jobs with restricted information, the method comprising constructing at least one email with at least one reference to a restricted information and injecting each of the at least one emails to one or more send centers, wherein each of the one or more send centers is authorized to receive the restricted information, | 2015-03-19 |
20150082388 | SERVICE ACCESS CONTROL - Embodiments of the present invention provide a service access control system having a service object ( | 2015-03-19 |
20150082389 | INFORMATION PROCESSING SYSTEM, DEVICE, AND INFORMATION PROCESSING METHOD - A first obtaining unit obtains authentication information. A first sending unit sends the authentication information. A generating unit generates an execution request. A second sending unit sends the execution request. A device includes a first holding unit holding authentication information registered in advance; an authenticating unit performing an authentication operation by determining whether one or more sets of authentication information held by the first holding unit include authentication information matching with authentication information received by a first receiving unit; a second holding unit holding identification information of the authenticated user; and a control unit performing, when identification information included in the execution request received by a second receiving unit matches with identification information held by the second holding unit, control to perform operations based on the execution request, and, when the two sets of identification information do not match, control to request the information processing terminal for the authentication information. | 2015-03-19 |
20150082390 | METHOD AND A SYSTEM FOR SECURE LOGIN TO A COMPUTER, COMPUTER NETWORK, AND COMPUTER WEBSITE USING BIOMETRICS AND A MOBILE COMPUTING WIRELESS ELECTRONIC COMMUNICATION DEVICE - A method of authenticating and certifying that the conducting party that is conducting at least one of: (i) secure login to a computer; (ii) secure login to a computer network; (iii) secure login to a computer website, is (i) the authorized conducting party authorized to login and (ii) using the conducting party's authorized mobile computing wireless electronic communication device to login. More particularly, the conducting party that conducts a login is not required to know or type in the conducting party's User Names and Passwords or required to remember or know a Username or Password. The authentication and certification of a conducting party is performed by using biometric technology means and a mobile computing wireless electronic communication device. | 2015-03-19 |
20150082391 | Secure Messaging - Systems and methods are disclosed for secure messaging and content sharing. In one implementation, a processor receives a message associated with a recipient, provides, to the recipient, a notification pertaining to the message, and, based on a determination of a performance of one or more authentication actions with respect to the message, provides the recipient with access to the message. In another implementation, a processor receives a message including one or more content segments, receives inputs in relation to at least one of the content segments, processes the inputs to determine that an authentication action is being performed with respect to the one of the one or more content segments, and based on a determination that the authentication action is being performed with respect to the one of the one or more content segments, presents the at least one of the one or more content segments. | 2015-03-19 |
20150082392 | METHOD FOR MANAGING ACCESS TO PROTECTED COMPUTER RESOURCES - A system for securing and tracking usage of transaction services or computer resources by a client computer from a first server computer, which includes clearinghouse means for storing identity data of the first server computer and the client computer(s); server software means and client software means adapted to forward its identity data and identity data of the client computer(s) to the clearinghouse means at the beginning of an operating session; and a hardware key connected to the client computer, the key being adapted to generate a digital identification as part of the identity data; wherein the hardware key is implemented using a hardware token access system, a magnetic card access system, a smart card access system, a biometric identification access system or a central processing unit with a unique embedded digital identification. | 2015-03-19 |
20150082393 | SECURE ESTABLISHMENT METHOD, SYSTEM AND DEVICE OF WIRELESS LOCAL AREA NETWORK - The embodiments of the present invention provide a secure establishment method, system and device of a wireless local area network. The method includes: acquiring, by a UE, a first key; the first key is a shared key of the UE and a network element equipment in a mobile communication network to which the UE is accessed when implementing air interface security, or is derived according to the shared key; deriving, by the UE, according to the first key and a derivation parameter to acquire a derivation key; establishing, by the UE, according to the derivation key, secure connection with a WLAN node acquiring a derivation key, wherein the derivation key acquired by the WLAN node is the same as the derivation key acquired by the UE. | 2015-03-19 |
20150082394 | TELECOMMUNICATIONS APPARATUS AND METHOD, STORAGE MEDIUM, AND PROGRAM - The present invention relates to a telecommunications apparatus and a method, a storage medium, and a program for determining whether or not an other side communicating apparatus is near in a network. In a transmitting apparatus, a transmitting unit transmits a sending-message, and a control unit receives a response message to the sending-message, which includes acknowledgement information based on shared data and transmission information in the sending-message. The transmitting apparatus also includes a first judging unit that judges whether a response time of the acknowledgement message is less than a predetermined time. A receiving apparatus includes a generating unit that generates the acknowledgment information and transmits the response message to the transmitting apparatus. | 2015-03-19 |
20150082395 | Method and Apparatus for Media Information Access Control, and Digital Home Multimedia System - The present invention is applicable to the field of digital home networks and provides a method and apparatus for media information access control, and a digital home multimedia system. The method includes aggregating media information and access rights information of the media information on a first media server. The method also includes returning, to a control device that sends a media access request, a media information list which the control device has rights to access. The media information list is returned according to the aggregated media information and the aggregated access rights information of the media information. The present invention ensures security of the media information in the digital home multimedia system when the media information in the digital home multimedia system is aggregated for browsing. | 2015-03-19 |
20150082396 | PRIVILEGED ACCOUNT PLUG-IN FRAMEWORK - NETWORK - CONNECTED OBJECTS - Techniques for managing network-connected objects are provided. In some examples, code for accessing a network-connected object may be received. The code may be configured to enable generation of an application programming interface method. In some aspects, account information associated with a user may be stored. A particular method call corresponding to the application programming interface method may be received from a computer device of the user. The particular method call may include a request to access the network-connected object. In some examples, the request to access the network-connected object may be authenticated based at least in part on the account information. Additionally, in some examples, an instruction to the network-connected object may be provided over a network if the request is authenticated. | 2015-03-19 |
20150082397 | Processing Method of Wireless Network Device, Wireless Network Device, and Processor of Wireless Network Device - An authentication processing method, a processor of a wireless network device, and the wireless network device. The method includes receiving, by a wireless network device, a network access request sent by a user equipment; and if the wireless network device determines, according to the network access request, that the user equipment meets a set condition, performing authentication on the user equipment using a password-free authentication manner, or assigning permission, which is corresponding to the set condition, on a Web administrator page to the user equipment. In embodiments of the present invention, if it is determined that a user equipment meets a set condition, authentication is performed on the user equipment using a password-free authentication manner, and corresponding authentication manners are used according to different user requirements, so that an authentication manner of the wireless network device is more flexible, and network access experience of a user is improved. | 2015-03-19 |
20150082398 | COMMUNICATION BETWEEN AUTHENTICATION PLUG-INS OF A SINGLE-POINT AUTHENTICATION MANAGER AND CLIENT SYSTEMS - Various arrangements for providing authentication information to a user are presented. A single-point authentication manager executed by a computer system may receive a request to access a resource from a remote client computer system. The single-point authentication manager may manage access to a plurality of resources including the resource. The single-point authentication manager may communicate with an authentication plug-in application that performs a type of authentication. Authentication of the user may be performed. In response to performing authentication of the user, the authentication plug-in application may generate a message to be transmitted to the remote client computer system. The message may include an indication that the message is to be passed to the remote client computer system and information regarding the authentication of the user. In response to receiving the message from the authentication plug-in application, the message may be transmitted to the remote client computer system. | 2015-03-19 |
20150082399 | SPACE-TIME SEPARATED AND JOINTLY EVOLVING RELATIONSHIP-BASED NETWORK ACCESS AND DATA PROTECTION SYSTEM - A network security system that employs space-time separated and jointly-evolving relationships to provide fast network access control, efficient real-time forensics capabilities, and enhanced protection for at-rest data in the event of a network breach. The network security system allows, in part, functionality by which the system accepts a request by a user to access the data stored in the database, identifies a sequence of security agents to participate in authenticating and protecting the access of the data by the user, generates a sequence of pseudorandom IDs and space-time varying credentials, checks at each one of the security agents a corresponding one of the credentials, determines that the user is permitted to access the data using access control logs if all the security agents accept the corresponding credentials, and varies the credentials based on a space-time relationship. | 2015-03-19 |
20150082400 | METHOD AND SYSTEM FOR IMPROVED SECURITY - An improved authentication method and system is provided where a user securely accesses a variety of target servers for online email, online banking, credit card purchases, ecommerce, brokerage services, corporate databases, and online content (movies, music and software). The method involves a bridge server performing authentication tasks that allow a user to access a server or a group of servers with multiple security levels. The method eliminates the need for the user to remember multiple usernames/passwords for each target server. The method also allows one bridge server and one set of security devices to be used to authenticate the user for multiple servers, thereby reducing security costs and increasing user convenience. A location-based password-ID generating device is also described for secure location-based access. | 2015-03-19 |
20150082401 | METHOD AND DEVICE FOR FACILITATING MUTUAL AUTHENTICATION BETWEEN A SERVER AND A USER USING HAPTIC FEEDBACK - A method is provided for facilitating mutual authenticating between a server and a user of a haptic enabled device. The method comprises providing identity information of a user to a server, and in response, providing a haptic feedback output to the user corresponding to the identity information. Further, the user compares the haptic feedback output received from the server to a haptic feedback pattern as predefined by the user, to determine whether the server is authenticated or not. | 2015-03-19 |
20150082402 | SYSTEM AND METHOD FOR AUTOMATED AUTHENTICATION - In example embodiments, a system and method for automated authentication are provided. A service provider system receives a message triggered by an application operating on a user device of a user. A contact identifier corresponding to the user device is determined from the message. A reply message that includes a token is transmitted to the contact identifier. A return token is received from the application that intercepted the reply message and extracted the token without user intervention. The return token is compared to the token sent in the reply message. Based on the return token matching the sent token, the contact identifier is verified as corresponding to the user device. | 2015-03-19 |
20150082403 | USER TERMINAL FOR PASSWORD-BASED AUTHENTICATION, AND PASSWORD-BASED TRADING TERMINAL, SYSTEM, AND METHOD - A user terminal, a password-based trading terminal, a system and a method for password-based authentication are provided. Wherein, the user terminal comprises a password generation module and a first near field communication module. The password generation module is configured to generate a password. The first near field communication module is configured to convert the generated password into near field communication label data, and then send the data to a password-based trading terminal through near field communication. The present application effectively ensures password security during the password-based authentication. | 2015-03-19 |
20150082404 | METHODS AND SYSTEMS FOR VOICE AUTHENTICATION SERVICE LEVERAGING NETWORKING - A method and system for persona authentication includes obtaining from a server a presence list of devices at a location, refining the presence list according to a user profile of the devices thereby forming a dynamic presence list, capturing at least one biometric input from at least one of the devices, authenticating a persona of an individual at the location according to the biometric input and the user profiles in the dynamic presence list, and presenting at least one descriptor of the persona of the individual. In one embodiment, voice authentication uses a centralized voice id database service in conjunction with a Bluetooth 4.0 UUID service to obtain multi-modal biometric user data. Other embodiments are disclosed | 2015-03-19 |
20150082405 | AUTHENTICATION METHOD, AUTHENTICATION DEVICE, AND SYSTEM - An authentication method executed by a computer includes: receiving input data which is a target of authentication; specifying registration data, from among a plurality of registration data stored in a storage device, having a second feature value within a threshold value relative to a first feature value of the input data, the first feature value representing a distance between the input data and a reference, the second feature value representing another distance between the registration data and the reference, and the threshold value being used when a determination as to whether the authentication has been successfully performed; and executing a process of comparing the registration data with the input data. | 2015-03-19 |
20150082406 | METHOD AND APPARATUS FOR CONTROLLING ACCESS TO ELECTRONIC DEVICES - According to an aspect of the present disclosure, a method for controlling access to a plurality of electronic devices is disclosed. The method includes detecting whether a first device is in contact with a user, adjusting a security level of the first device to activate the first device when the first device is in contact with the user, detecting at least one second device within a communication range of the first device, and adjusting a security level of the at least one second device to control access to the at least one second device based on a distance between the first device and the at least one second device. | 2015-03-19 |
20150082407 | CONFIRMING THE IDENTITY OF INTEGRATOR APPLICATIONS - An application service system receives, from a merchant service system, an application program code comprising identifying information. The identifying information is extracted and the application is distributed for operation on a user device. A user interacts with the application, creating an access request that is transmitted to the application service system along with the extracted identifying information. The application service system transmits an access token to the user device comprising the received identifying information. The user device transmits the access token with a service request to the application service system. The application service system compares the identifying information from the access token to the identifying information extracted from the application program code received from the merchant services system. If the identifying information matches, the service request is processed. If the identifying information does not match, the service request is denied and an error message is transmitted to the user device. | 2015-03-19 |
20150082408 | QUICK LOGIN TO USER PROFILE ON EXERCISE MACHINE - A personal mobile device such as a music player or mobile telephone is equipped with the capability to easily authenticate users into a public gym and into individual exercise equipment at the gym. | 2015-03-19 |
20150082409 | AUTHORIZED REMOTE ACCESS TO AN OPERATING SYSTEM HOSTED BY A VIRTUAL MACHINE - Proposed is a concept for providing authorized remote access to an operating system hosted by a virtual machine. first and second authentication tokens are generated at a client system and communication to a server system providing the virtual machine. the validity of the first and second authentication tokens is verified at the server system. if the validity of the first authentication token is verified, the operating system is shut-down. then, if the validity of the second authentication token is verified, the operating system is re-started. | 2015-03-19 |
20150082410 | SYSTEMS AND METHODS FOR DEVICE DATA TRANSFER - There is provided a method and system for securely coupling and transferring data between devices. In a preferred embodiment, the devices may comprise two devices, a transferring device and a receiving device, and both devices are mobile devices. Embodiments of the present invention allow the wireless transfer of data such as contacts, photo images, video files, or other data from one device to another device, without need for special hardware or cabling. | 2015-03-19 |
20150082411 | METHOD OF ENABLING A USER TO ACCESS A WEBSITE USING OVERLAY AUTHENTICATION - A method of enabling a user to access a website using overlay authentication. The method comprises initiating a login to a website by a user, the website providing a login page having a front end agent. The front end agent enables the user to logon to an authentication server using certificate based credentials. The authentication server communicates to a back-end agent to provide a user with a temporary website credential. The temporary website provides a credential to the front-end agent to facilitate the login to the website. | 2015-03-19 |
20150082412 | APPLICATION STATE SHARING IN A FIREWALL CLUSTER - A firewall cluster system comprises a first node operable to receive a connection in a firewall cluster having three or more nodes, monitor packets of the received connection and determining application state data associated with the connection from the monitored packets in the first node, and share application state data with at least another node in the firewall cluster. | 2015-03-19 |
20150082413 | NETWORK RESOURCE CONTROL SYSTEM - A secure network resource access system facilitates network access by network terminals to network resources located behind an enterprise firewall, and comprises a proxy server and a polling server. The proxy server is located logically outside the enterprise firewall for receiving application data from the network terminals. The polling server is located logically behind the enterprise firewall, and is configured to poll the proxy server to initiate transmission of the received application data from the proxy server to the polling server, to receive application data and associated network resource data from the proxy server in response to the poll, and to direct the application data to one of the network resources in accordance with the associated network resource data. | 2015-03-19 |
20150082414 | CONTROLLING DATA ROUTING AMONG NETWORKS - An integrated security system integrates broadband and mobile access and control with conventional security systems and premise devices to provide a tri-mode security network having remote connectivity and access. The integrated security system delivers remote premise monitoring and control functionality to conventional monitored premise protection and complements existing premise protection equipment. The integrated security system integrates into the premise network and couples wirelessly with the conventional security panel, enabling broadband access to premise security systems. Automation devices can be added, enabling users to remotely see live video or pictures and control home devices via a personal web portal or other client device. Camera management enables automatic configuration and management of cameras in the premise network. The camera management extends to remote control and monitoring from outside the firewall of the premise network to include routing of images or video from a streaming source device to a requesting client device. | 2015-03-19 |
20150082415 | METHOD AND SYSTEM FOR PROVIDING SECURE TRANSACTIONS VIA A BROADBAND GATEWAY - A broadband gateway may be used to authorize transactions associated with one or more accounts, which may be associated with a user of the broadband gateway. The transaction may be handled by the broadband gateway. The authorizations may be performed based on information associated with the accounts, whose storage may be controlled by the broadband gateway. The broadband gateway may block and/or terminate transactions failing authentication and/or validation, which may be performed based on the stored information. The transactions may be initiated within a network serviced by the broadband gateway. The transactions may also be initiated outside the serviced network. The stored information may comprise a user profile, which may comprise a plurality of settings for controlling and/or managing authorization performed by the broadband gateway. The user profiles may be configurable by users, wherein configuration may comprise initializing and/or modifying one or more of the transaction related settings. | 2015-03-19 |
20150082416 | SECURING USER DATA IN CLOUD COMPUTING ENVIRONMENTS - Systems and methods for obfuscating user data in a remote web-based application are disclosed. According to one method, user inputs to a displayed web page of the remote web-based application are received at a first web browser that is used by the user, wherein at least a portion of the user inputs comprise user-inputted data intended to be stored at the web-based application. The user inputs are transmitted to a management component that is configured to interact with a second web browser that communicates with the web-based application. The management component obfuscates at least a portion of the user-inputted data and forwards the obfuscated and un-obfuscated portions of the user inputs to the second web browser, which correspondingly transmits the obfuscated and un-obfuscated portions of the user inputs to the remote web-based application. | 2015-03-19 |
20150082417 | FIREWALL CONFIGURED WITH DYNAMIC COLLABORATION FROM NETWORK SERVICES IN A VIRTUAL NETWORK ENVIRONMENT - Techniques for automatic firewall configuration in a virtual network environment are described. In one example embodiment, firewall rules are configured using virtual machine (VM) inventory objects. The firewall rules are then transformed by replacing the VM inventory objects in the configured firewall rules with associated Internet protocol (IP) addresses using an IP address management table (IPAM) table and a network address translation (NAT) table. The transformed firewall rules are then sent to a firewall engine for filtering communication from and to VMs running on a first machine on one or more computing networks and communication from and to VMs running on a second machine on one or more computing networks at a firewall according to the transformed firewall rules. | 2015-03-19 |
20150082418 | Method and system for realizing virtual network - A virtual network (VN) realization method and system are provided. The method includes setting a VN-AP in a data center network and/or a broadband network. A service deployment and management function entity receives a VN service request from a user to generate feature information of the VN; a PC/VM automatically discovers the VN-AP, the automatically discovered VN-AP generates the VN forwarding table entry of the PC/VM after the PC/VM passes the identity authentication of the VN, and performs tunnel encapsulation according to the VN forwarding table entry to forward a packet from the PC/VM. By discovering a VN-AP for processing a VN automatically, the disclosure realizes the automatic and rapid deployment of the VN. | 2015-03-19 |
20150082419 | FORCING ALL MOBILE NETWORK TRAFFIC OVER A SECURE TUNNEL CONNECTION - A process is disclosed in which all network traffic between a mobile device and an untrusted network arriving before the establishment of a VPN tunnel are dropped in response to rules imposed by the mobile device's operating system. Once a VPN tunnel is established all communication from the mobile device is secured, without an intervention on the part of the user of the device. A device supporting such a process is also disclosed. | 2015-03-19 |
20150082420 | Security Certificates For System-On-Chip Security - A SoC includes multiple hardware modules that are implemented on a substrate. The hardware modules include a plurality of hardware and software security features and the SoC provides one or more external interfaces for accessing the security features. A validation module, implemented in the boot code of the SoC for example, manages security certificates to control access to the plurality of security features. Each security certificate includes one or more unique identifiers corresponding to one or more hardware modules in the SoC and access control settings for one or more security features of the one or more hardware modules. The security certificate additionally includes a certificate signature signed by a secure key. | 2015-03-19 |
20150082421 | Method and Apparatus for Extending an Authentication Timeout Period - A method and apparatus for extending an authentication timeout period for an electronic device includes a primary processor of the electronic device initiating an authentication timeout period at a timeout initiation time and putting the primary processor into a sleep mode. The method also includes awakening the primary processor from the sleep mode at an expiration time, upon expiration of the authentication timeout period, and determining whether an authentication timeout extending input was detected by an adjunct processor of the electronic device at an input detection time that occurred during the authentication timeout period. The method further includes extending the authentication timeout period to expire at an extended expiration time, which is based on the input detection time, when the authentication timeout extending input was detected by the adjunct processor or locking the electronic device when the authentication timeout extending input was not detected by the adjunct processor. | 2015-03-19 |
20150082422 | SECURITY SWITCH - System and method for securing a personal device that includes a device core and a peripheral device from unauthorized access or operation. The system comprises an isolated switch, included fully or partially within an envelope of the personal device. The isolated switch cannot be affected in its operation by either the device core or the peripheral device. The switch may be operated by an authorized user of the personal device either preemptively or in response to a detected threat. In some embodiments, the isolated switch includes an isolated controller which can send one or more signals to the peripheral device and/or part of peripheral device. In some embodiments, the isolated switch includes an isolated internal component and an isolated external component, both required to work together to trigger the isolated switch operation. In some embodiments, the isolated switch includes an isolated disconnector for connecting and disconnecting the device core from part of the peripheral device. | 2015-03-19 |
20150082423 | INFORMATION PROCESSING SYSTEM, TERMINAL, AND AUTHENTICATION METHOD - An information processing system establishes connection between an information storage apparatus and an application installed in a terminal including a storage device for storing authentication information. The information processing system includes a setting information acquisition unit configured to acquire setting information from the information storage apparatus when the terminal receives an execution request to execute the application, the setting information indicating whether to prompt input of the authentication information. The information processing system also includes an authentication process unit configured to display a screen for inputting the authentication information on a display device of the terminal when the setting information acquired by the setting information acquisition unit calls for prompting input of the authentication information, and determine executability of the application when the authentication information that is input via the screen displayed on the display device matches the authentication information that is stored in the storage device. | 2015-03-19 |
20150082424 | Active Web Content Whitelisting - The disclosed invention is a new method and apparatus for using a white-list to authenticate active contents in web pages and removing all unauthorized active content received in the web pages. A computer system receives plurality of web pages from a web server. Web pages are scanned for plurality of active contents. A database includes attributes of plurality of active content that are permitted on the web page. A web page filtering components compares active content in web pages with the entries in the database. Any unauthorized active content in the page is removed. The modified web page is sent to the intended destination. | 2015-03-19 |
20150082425 | SECURING ACCESSIBLE SYSTEMS USING BASE FUNCTION ENCODING - Systems and techniques for securing accessible computer-executable program code and systems are provided. One or more base functions may be generated and blended with existing program code, such that it may be difficult or impossible for a potential attacker to distinguish the base functions from the existing code. The systems and code also may be protected using a variety of other blending and protection techniques, such as fractures, variable dependent coding, dynamic data mangling, and cross-linking, which may be used individually or in combination, and/or may be blended with the base functions. | 2015-03-19 |
20150082426 | Method and System for Inferring Risk of Data Leakage from Third-Party Tags - A method and system for assessing the data leakage threat associated with third-party tags on a particular website, such as a content publisher site, is assessed by mimicking a standard web browser. Each third-party tag on the site is identified and investigated in a hierarchical manner, and a data leakage threat score is assigned to each third-party tag based on certain attributes associated with the tag and the resource linked by the third-party tag. A cumulative data leakage threat score is then calculated to determine if the site is a data leakage threat, such as a threat for misuse of a consumer's data. | 2015-03-19 |
20150082427 | Systems, Methods and Apparatuses for Prevention of Relay Attacks - The systems, methods and apparatuses described herein provide an apparatus configured for preventing relay attacks on a communication link between the apparatus and a communication partner. The apparatus may comprise a communication port, a timer and a processor. The processor may be configured to generate a request, transmit the request through the communication link using the communication port and start counting time using the timer, receive a response via the communication port and stop the timer, receive authentication data via the communication port, authenticate the authentication data, compare the counted time with a predefined threshold, compare a first field within the request with a second field within the response and determine whether there is a relay attack. | 2015-03-19 |
20150082428 | DETECTING ANOMALOUS BEHAVIOR PATTERNS IN AN ELECTRONIC ENVIRONMENT - The behavior of a group of resources, such as a fleet of servers, can be monitored to attempt to determine a baseline of acceptable behaviors. When a behavior is observed, the baseline can be consulted to determine whether the behavior is indicated to be acceptable. If not, the rate or extent at which the newly observed behavior is observed on groupings of similar resources can be monitored. This information can be used to determine whether the behavior is acceptable in which case information for the observed behavior can be used to automatically update the baseline such that the baseline is representative of current acceptable behavior within the group of resources. | 2015-03-19 |
20150082429 | PROTECTING WIRELESS NETWORK FROM ROGUE ACCESS POINTS - In one embodiment, a method includes receiving at an access point, notification of a rogue device in a wireless network, transmitting a plurality of association requests to the rogue device from the access point, and for each of the association requests that is accepted, transmitting a message to maintain an association between the access point and the rogue device to prevent association of clients with the rogue device. An apparatus and logic are also disclosed herein. | 2015-03-19 |
20150082430 | Data Flow Based Behavioral Analysis on Mobile Devices - Methods, devices and systems for detecting suspicious or performance-degrading mobile device behaviors intelligently, dynamically, and/or adaptively determine computing device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the mobile device behaviors are to be observed. The various aspects efficiently identify suspicious or performance-degrading mobile device behaviors without requiring an excessive amount of processing, memory, or energy resources. | 2015-03-19 |
20150082431 | DETECTION OF INFECTED NETWORK DEVICES AND FAST-FLUX NETWORKS BY TRACKING URL AND DNS RESOLUTION CHANGES - A system and method for detecting Fast-Flux malware are presented. Domain name system (DNS) lookup requests to DNS servers from a local area network (LAN) to a wide area network (WAN) are monitored. The DNS lookup requests comprise requests to resolve uniform resource locators (URLs) to network addresses. The network addresses (IP) received from the DNS servers for the DNS lookup requests are monitored provide a URL-to-IP associations list. The DNS servers used for the DNS lookup requests for the URLs are monitored to provide a DNS Domain-to-DNS server associations list. A suspicious URL log based on the URL-to-IP associations list, and a suspicious DNS log based on the DNS Domain-to-DNS server associations list are generated. | 2015-03-19 |
20150082432 | SYSTEM AND METHOD OF SEMANTICALLY MODELLING AND MONITORING APPLICATIONS AND SOFTWARE ARCHITECTURE HOSTED BY AN IAAS PROVIDER - The present disclosure is directed to a monitoring system for automatically inferring, without human modelling input or information regarding actual physical network connectivity, a service architecture of a widely distributed service operated by an Infrastructure-as-a-Service (IaaS) tenant but deployed on a set of virtual resources controlled by an independent IaaS provider. The monitoring system can collect infrastructure metadata and/or system-level metric data characterizing the set of virtual resources from the IaaS provider, and automatically infer from the metadata and/or metric data how the virtual resources should be organized into groups, clusters and hierarchies. The monitoring system can automatically infer this service architecture using naming conventions, security rules, software types, deployment patterns, and other information gleaned from the metadata and/or metric data. The monitoring system can then run analytics based on this inferred service architecture to report on service operation. | 2015-03-19 |
20150082433 | SYSTEMS AND METHODS FOR CAPTURING, REPLAYING, OR ANALYZING TIME-SERIES DATA - Provided is an intrusion detection system configured to detect anomalies indicative of a zero-day attack by statistically analyzing substantially all traffic on a network in real-time. The intrusion detection system, in some aspects, includes a network interface; one or more processors communicatively coupled to the network interface; system memory communicatively coupled to the processors. The system memory, in some aspects, stores instructions that when executed by the processors cause the processors to perform steps including: buffering network data from the network interface in the system memory; retrieving the network data buffered in the system memory; applying each of a plurality of statistical or machine-learning intrusion-detection models to the retrieved network data; aggregating intrusion-likelihood scores from each of the intrusion-detection models in an aggregate score, and upon the aggregate score exceeding a threshold, outputting an alert. | 2015-03-19 |
20150082434 | SYSTEMS AND METHODS TO COUNTER SIDE CHANNELS ATTACKS - Disclosed are devices, systems, apparatus, methods, products, and other implementations, including a method that includes identifying a process to obtain timing information of a processor-based device, and in response to identifying the process to obtain the timing information, delaying delivery of the timing information for a time-delay period. In some embodiments, identifying the process to obtain the timing information may include identifying a request to obtain the timing information of the processor-based device. In some embodiments, identifying the process to obtain the timing information may include identifying a memory-access process. | 2015-03-19 |
20150082435 | CYCLIC REDUNDANCY CHECK METHOD WITH PROTECTION FROM SIDE-CHANNEL ATTACKS - The present invention relates to a method for processing a binary data item, comprising a step of calculating a cyclic redundancy check code for the data item by means of a generator polynomial, wherein the step of calculating the cyclic redundancy check code comprises the steps of: masking the data item with a random binary mask that is a multiple of the generator polynomial, and generating the cyclic redundancy check code for the data item from the masked data item. | 2015-03-19 |
20150082436 | ANTI-TAMPERING SERVER - A method for preventing tampering with the accessibility of resources specified by Universal Resource Locators (URLs) comprising receiving a primary URL from a web server; creating a unique identifier and associating, in a database, the unique identifier with the received primary URL; creating a secondary URL that includes the unique identifier; and providing the secondary URL to the web server wherein the primary URL is cross referenced to the secondary URL through the unique identifier. | 2015-03-19 |
20150082437 | METHOD AND APPARATUS FOR DETECTING IRREGULARITIES ON A DEVICE - A system and method for the detection of irregularities, such as fraud or malware ( | 2015-03-19 |
20150082438 | SYSTEM AND SERVER FOR DETECTING WEB PAGE CHANGES - Disclosed embodiments include a distributed system and server for detecting changes to web pages comprises (a) a Web Change Detection (WCD) server connected to the network, and (b) one or more WCD agents stored on the WCD server configured to be executed directly on a web browser to detect web page changes. The WCD comprises (a) an agent storage module configured to store the WCD agents, (b) a WCD repository to store a WCD information regarding the web pages in the server memory, and (c) a WCD changes detector configured for receiving information sent by the WCD agents and detecting changes on the web pages. The WCD system relies on the web users accessing sites to collaboratively detect the changes on the web pages, eliminating the need for crawler estimates of web-page changes. | 2015-03-19 |
20150082439 | AUTOMATIC CONTEXT-SENSITIVE SANITIZATION - An automatic context-sensitive sanitization technique detects errors due to the mismatch of a sanitizer sequence with a browser parsing context. A pre-deployment analyzer automatically detects violating paths that contain a sanitizer sequence that is inconsistent with a browsing context associated with outputting an untrusted input. The pre-deployment analyzer determines a correct sanitizer sequence which is stored in a sanitization cache. During the runtime execution of the web application, a path detector tracks execution of the web application in relation to the violating paths. The correct sanitizer sequence can be applied when the runtime execution follows a violating path | 2015-03-19 |
20150082440 | DETECTION OF MAN IN THE BROWSER STYLE MALWARE USING NAMESPACE INSPECTION - Methods and systems for detecting fraudulent activity are described. A user types in a web address in his or her browser to request a webpage from a server, and the server communicates the webpage to the user. The communicated webpage includes a document object model (DOM) inspector and/or a JavaScript (JS) namespace inspector. The DOM inspector and JS namespace inspector detect anomalous DOM elements and anomalous JS namespace elements respectively. The DOM inspector and JS namespace inspector discover objects on the rendered webpage that should not be there. | 2015-03-19 |
20150082441 | Exploiting Hot Application Programming Interfaces (APIs) and Action Patterns for Efficient Storage of API logs on Mobile Devices for Behavioral Analysis - Methods and devices for detecting suspicious or performance-degrading mobile device behaviors may include performing behavior monitoring and analysis operations to intelligently, dynamically, and/or adaptively determine the mobile device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the behaviors are to be observed. Such behavior monitoring and analysis operations may be performed continuously (or near continuously) in a mobile device without consuming an excessive amount of processing, memory, or energy resources of the mobile device by identifying hot application programming interfaces (APIs) and hot action patterns that are invoked or used most frequently by software applications of the mobile device and storing information regarding these hot APIs and hot action patterns separately and more efficiently. | 2015-03-19 |
20150082442 | System and method to perform secure web application testing based on a hybrid pipelined approach - A processor implemented method of performing a security web application testing based on a hybrid pipelined application which includes (a) receiving, a scan profile selected from a group includes (i) an uniform resource locator associated with an application, (ii) one or more scan attack templates, (iii) one or more attack rules, and (iv) one or more automation scan results, (b) generating, a one or more possible tasks based on the scan profile, (c) selecting, at least a sub-set of tasks from the one or more possible tasks, (d) assigning, the sub-set of tasks to an automated task performing tool, and a user for execution, (e) obtaining, one or more tasks results associated with the sub-set of tasks executed by the automated task performing tool, and the user, and (f) updating, a database based on the one or more tasks results. | 2015-03-19 |
20150082443 | SYSTEM TO AUTOMATE COMPLIANCE WITH LICENSES OF SOFTWARE THIRD-PARTY CONTENT - A method to automate compliance with software package content licenses is disclosed. The method may generate a dependency graph for a software product's package code by creating nodes only for software packages upon which run-time code depends. Software package content license lists may be propagated through the generated dependency graph. License notice files may be generated based on the propagated license lists. | 2015-03-19 |
20150082444 | SECURITY MODE CONFIGURATION PROCEDURES IN WIRELESS DEVICES - A method of detecting an error in a security mode configuration procedure conducted at a radio access network is provided. A cell update message is transmitted which causes the radio access network to abort a security mode configuration procedure. After the transmission of an update message, a new security mode configuration is received and the original security mode configuration is replaced with a new security mode configuration. A security mode configuration check is performed on a received downlink message using the new security mode configuration. If the security mode configuration check fails, a further security mode configuration check is performed on the downlink message to detect an error in the security mode configuration procedure. If it is determined there has been an error in the security mode configuration procedure, security mode configuration checks are performed on further downlink messages received from the network using the original security mode configuration. | 2015-03-19 |
20150082445 | INFORMATION PROCESSING METHOD AND ELECTRONIC DEVICE - The present invention discloses an information processing method and an electronic device so as to address such a technical problem in the convention that data can not be protected from being misappropriated by another person while ensuring a rapid and convenient daily access of the user to the data. The method is applicable to a first electronic device and includes: obtaining first data; dividing the first data into a first part of data and a second part of data where the first part of data satisfies a first dimension and the second part of data satisfies a second dimension, and there is an association relationship of the first dimension with the second dimension, wherein the first electronic device characterizes a response result as a response failure when obtaining a second instruction for the first part of data and responding to the second instruction with the first part of data; and the first electronic device characterizes the response result as a response failure after obtaining a third instruction for the second part of data and responding to the third instruction with the second part of data; storing the first part of data on a first storage unit of the first electronic device; and storing the second part of data on a second storage unit. | 2015-03-19 |
20150082446 | METHOD AND APPARATUS FOR DISPLAYING POTENTIALLY PRIVATE INFORMATION - Methods and apparatus for displaying potentially private information are disclosed. A computing device, that is showing a breathing view on its touch screen display, detects a peek request event, such as a swipe on the display. Before allowing the user to see potentially private information in response to the peek request, the computing device determines if the computing device is currently locked and if an increased privacy setting is enabled. If the computing device is not locked, or the increased privacy setting is not enabled (even though the computing device may be locked), the computing device shows a full peek view (e.g., some or all of the text from a recent text message). However, if the computing device is locked, and the increased privacy setting is enabled, the computing device shows a secure peek view (e.g., the number of new text messages, but no text from the messages). | 2015-03-19 |
20150082447 | SYSTEM AND METHOD FOR LICENSING A PLURALITY OF SOFTWARE COMPONENTS - A method for licensing a plurality of software components on a data processing system, including retrieving a plurality of component-specific identification codes of the plurality of software components by a license management client installed on the data processing system; bundling the component-specific identification codes in a system-specific licensing query by the license management client; sending the system-specific licensing query from the license management client to a license management server assigned to the license management client; extracting the component-specific identification codes from the system-specific licensing query by the license management server for generating component-specific licensing queries; sending the component-specific licensing queries by the license management server to each one of a plurality of licensing services; and receiving component-specific license keys from the plurality of licensing services for licensing the plurality of software components. | 2015-03-19 |
20150082448 | Method for Detecting Spammers and Fake Profiles in Social Networks - A method for protecting user privacy in an online social network, according to which negative examples of fake profiles and positive examples of legitimate profiles are chosen from the database of existing users of the social network. Then, a predetermined set of features is extracted for each chosen fake and legitimate profile, by dividing the friends or followers of the chosen examples to communities and analyzing the relationships of each node inside and between the communities. Classifiers that can detect other existing fake profiles according to their features are constructed and trained by using supervised learning. | 2015-03-19 |
20150082449 | DATA MASKING SYSTEMS AND METHODS - Embodiments include a method for data masking such as receiving, by a first data masking component, data including unmasked data for a first attribute, the first data masking component including a data set and a masking algorithm; generating, by the first data masking component, masked attribute data for the first attribute by applying the masking algorithm to the unmasked data associated with the first attribute using the data set; and replacing, by the first data masking component, the data for the first attribute in the first data with the masked attribute data. | 2015-03-19 |
20150082450 | SYSTEM AND METHOD FOR SECURE CROSS-DOMAIN COMMUNICATION IN A BROWSER - A method for client-side cross-domain communication of a browser application executing on a client computing device, wherein said browser application comprises a parent host window retrieving internet game operator specific first content from an internet game operators first domain, wherein said internet game operator specific first content comprises an inner window markup language element retrieving internet game provider second content from an internet game providers second domain, the method comprising the steps of determining that a game related event has occurred when processing said internet game providers second content in said inner window and sending an game event signal as game event data indicative of said determined game related event data from said inner window to said parent host window. | 2015-03-19 |
20150082451 | System and Method for Evaluating Domains to Send Emails While Maintaining Sender Reputation - Systems, device and techniques are disclosed for evaluating domains to send emails while maintaining sender reputation. Registration records of a domain are retrieved. The registration records include a mail server record and one or more records linking the domain to another domain or to an IP address. The mail server record is verified to be associated with a domain that is not on a black list. A webpage is retrieved from a website associated with the one or more records linking the domain to another domain or to an IP address. The webpage is compared to webpages for websites that are on white lists. An electronic communications sending strategy is determined based on verifying that the mail server record is associated with a domain that is not on a blacklist and comparing of the webpage to webpages for websites that are on one or more white lists. | 2015-03-19 |
20150082452 | METHOD AND APPARATUS FOR GEOLOCATION OF A NETWORK USER - A database correlating the geographic locations of users of a network to the network address through which the users access the network is maintained and used to infer the geographic location of other users of the network that access the website through the same IP addresses. An Internet website operator may generate such a database from home or business address information self-reported by users of the website. If a plurality of users that access a website through the same IP address have self-reported information as to their geographic location to a website operator, that information collectively provides information as to the likely geographic location and the geographic diversity of other users that access the network through that IP address. Accordingly, such information is used to infer the extent to which a given IP address is likely to correlate to any particular geographic area and the particular area. Additionally, a website operator that has information indicative of the veracity of the self-reported location information may use that information to rate the likelihood that the self-reported location information for a given user is truthful and then use that rating to provide an even more accurate rating of the likelihood that an inferred location of a user is in a given location. | 2015-03-19 |
20150082453 | METHOD AND APPARATUS FOR HIERARCHICAL ASSIGNMENT OF RIGHTS TO DOCUMENTS AND DOCUMENTS HAVING SUCH RIGHTS - A system and method for distribution of digital works in a tree-like structure of devices. A hierarchical right may include a first usage right governing a use for the digital work and a first delegation right governing distribution of the digital work to child nodes of the tree-like structure. A second usage right and/or a second delegation right may be generated based on the hierarchical right, the second usage right governing a use for the digital work and the second delegation right governing distribution of the digital work to child nodes of a first child node of the tree-like structure. The second usage right and/or the second delegation right may be assigned to a version of the digital work, and the second usage right and/or the second delegation right and the version of the digital work may be forwarded to the first child node. | 2015-03-19 |
20150082454 | SYSTEMS AND METHODS FOR LICENSING OF MOBILE APPLICATIONS - System and methods for licensing of dynamic mobile applications are disclosed herein. In one embodiment, a non-transitory computer readable medium storing executable instructions is provided. The instructions, when executed by a processor, cause the processor to communicatively couple to a mobile device and to receive a user login, a user password, and a client identification from the mobile device. The instructions additionally cause the processor to validate a client as a licensed client based on the based on the user login, user password, and client identification and to derive a connectivity data based on the user login, user password, and client identification if the client is a valid licensed client, wherein the connectivity data comprises a first connectivity data configured to communicatively couple the mobile device to a first system; and wherein the mobile device is configured to download a first API from the first system. | 2015-03-19 |
20150082455 | Data Collection Privacy - Various implementations of data collection privacy techniques for web content are described herein. Web content that is authored via content authoring service may be associated with data that describes collection behaviors of the web content in accordance with an established data collection privacy scheme. In one approach, data collection privacy is implemented using mark-up constructs contained in a manifest that is included with or otherwise associated with the web content. A content rendering application, such as a browser, may be configured to parse the content and recognize the collection behaviors based on the corresponding data indicative of the behaviors. The content rendering application may then output a notification to inform the user regarding the collection behaviors and provide a set of options available for management of data collection. | 2015-03-19 |
20150082456 | DATA EXFILTRATION PREVENTION FROM MOBILE PLATFORMS - Technology is disclosed for preventing an exfiltration of a data associated with an application executing on a mobile device. The technology can migrate the application from a computing platform of the mobile device to a secure computing platform, where the secure computing platform is independent of the computing platform of the mobile device. The technology can further receive a request to access the application through the mobile device, execute the requested application on the secure computing platform, and provide an access to the requested application executing on the secure computing platform through the mobile device. The access provided through the mobile device includes displaying information on the mobile device, where the displayed information includes data generated by the execution of requested application on the secure platform. | 2015-03-19 |
20150082457 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND RECORDING MEDIUM STORING INFORMATION PROCESSING PROGRAM - An information processing apparatus includes a memory that includes a first storage area and a second storage area and a processor that generates link information to access the file stored in the first storage area, in the second storage area associated with the user identification information associated with the first storage area, requests a notification server that transmits a notification, with identification information that identifies a communication apparatus that corresponds to the user identification information associated with the first storage area, and transfers, in response to a request from the communication apparatus that receives the notification, the link information stored in the second storage area associated with the user identification information corresponding to the communication apparatus and that further transfers, in response to access of the file by the communication apparatus using the link information, the file obtained from the first area to the communication apparatus. | 2015-03-19 |
20150082458 | METHODS AND SYSTEMS FOR UPGRADE AND SYNCHRONIZATION OF SECURELY INSTALLED APPLICATIONS ON A COMPUTING DEVICE - Embodiments of the present disclosure provide for upgrades and synchronization of applications installed on a device, such as a mobile device. In one embodiment, a device may include applications purchased and downloaded via a content management system. The device maintains a list or database of applications that are authorized for each device. This list is also replicated in a remote cache that is maintained by an archive host. The device may then synchronize and upgrade these applications across multiple platforms, such as one or more computers that can be coupled to the device or the archive host. The archive host allows for files of the application be provided back to the device. Upon installation, the device can then confirm the authorization and identity of the newly installed application. | 2015-03-19 |
20150082459 | GEOLOCATION WITH CONSUMER CONTROLLED PERSONALIZATION LEVELS - A geolocation system provides for multiple levels of privacy authorization allowing flexible use by consumers who wish to obtain the benefits of localized product information promotion, balanced against a desire for precise control of their personal information. The geolocation system in one embodiment may convert scattered location data into continuous consumer trajectories to attain more accurate readings of consumer activity including dwell time, heat maps and customer conversions between different locations. | 2015-03-19 |
20150082460 | GATEWAY-BASED AUDIT LOG AND METHOD FOR PREVENTION OF DATA LEAKAGE - A system and method for prevention of data leakage, the system comprising: a server configured to receive and transmit user activity commands; a protection module configured to validate and reconstruct commands received from the server and to transmit the validated reconstructed commands, the protection module further configured to create a security image associated with a specific user; and a secured transmission module configured to transmit the security image to the server while ensuring that the security image is sent securely to the associated user, wherein the server is further configured to receive the security image via the secured transmission module and to present the security image to the associated user. | 2015-03-19 |
20150082461 | EVENT DRIVEN PERMISSIVE SHARING OF INFORMATION - Event driven permissive sharing of information is disclosed. In an aspect, user equipment can include information sharing profiles that can facilitate sharing information with other devices or users, such as sharing location information. The information sharing profiles can include trigger values, such that when a target value transitions the trigger value, a permission value is updated to restrict or allow access to sharable information. As such, event driven permissive sharing of information allows for designation of temporary friend information sharing with user-defined triggers. | 2015-03-19 |
20150082462 | Selective Content Accessibility in a Social Network - A social networking service encourages users to post content to a communication channel with varying levels of accessibility to other users. Users may select how content will be published and control the accessibility of uploaded content using a privacy setting for each content item that the user posts. The privacy setting defines, or identifies, the set of connections who may view the posted content item. The posted content item is placed in a particular communication channel in the social networking service, such as a newsfeed or stream, where the content item can be viewed by those who are permitted to view it according to its associated privacy setting. Varying granularities of privacy settings provide flexibility for content accessibility on a social networking service. | 2015-03-19 |
20150082463 | MEDIA RIGHTS MANAGEMENT ON MULTIPLE DEVICES - Media rights are managed to include not just device authentication, but to include elements of user, device, and service authorization. A user can play media on a mobile device, continue playing the media on a desktop computer, and subsequently move to a large screen television and media rights are automatically identified to provide the most appropriate authorized content. This allows an authorized user to seamlessly access different forms of the same content on a variety of authenticated devices using the same digital rights management mechanisms. | 2015-03-19 |
20150082464 | SECURITY ADAPTER PROGRAM AND SECURITY ADAPTER APPARATUS - A security adapter apparatus according to embodiments includes a reception unit, a first manipulation unit, a delivery unit, and a transmission unit. The reception unit receives a request message that specifies a service name from the external application unit. The first manipulation unit searches the first storage unit based on the service name in the received request massage and manipulates the request message so that the request message contains an application name resulting from the search as a destination. The delivery unit delivers the manipulated request message to a first common bus. The transmission unit transmits a transmission message to the external application unit when the transmission message is received from one of the internal application units via a bus connection adaptor and the first common bus. | 2015-03-19 |
20150082465 | System and Method for Whole-Animal High-Throughput Compound Screening - The present invention provides systems and methods for performing assays for determining the presence of one or more compounds or analytes in a sample using whole-animals. The systems and methods are particularly suited to high-throughput screening techniques to identify compounds that are effective in a whole animal based system. The methods of the invention have broad application in high-throughput drug discovery and identification, particularly for molecules which are associated with disease and disease progression. | 2015-03-19 |
20150082466 | Transgenic Non-Human Vertebrate for the Expression of Class-Switched, Fully Human, Antibodies - The present invention relates to humanisation of antibodies in vivo. The invention provides non-human vertebrates, cells, populations and methods useful for humanising chimaeric antibodies in vivo. Using the present invention it is possible straightforwardly and rapidly to obtain antigen-specific antibodies that are fully human (ie, comprising human variable and constant regions) and have undergone recombination, junctional diversification, affinity maturation and isotype switching in vivo in a non-human vertebrate system. Furthermore, such antibodies are humanised (eg, totally human)—and selected—totally in vivo, and as such the present invention harnesses in vivo filtering for expressibility, affinity and biophysical characteristics in the context of the desired human variable and constant region pairings. This is avoids problems of down-grading antibody characteristics when humanising the constant region of chimaeric antibodies in vitro. | 2015-03-19 |
20150082467 | PHARMACEUTICAL COMPOSITION FOR VIRAL TREATMENT, AND METHOD FOR SCREENING ANTIVIRAL AGENT - The present invention relates to; a pharmaceutical compostion capable of enhancing immunity against viruses by specifically decreasing the expression of the OASL1 protein; and a method for screening for a material capable of being used as an antiviral agent by comparing the amount of expression of the OASL1 protein. | 2015-03-19 |
20150082468 | INVERSE PATTERNING PROCESS FOR THREE-DIMENSIONAL MULTI-COMPARTMENTAL MICRO-ORGANIZATION OF MULTIPLE CELL TYPES - The invention features an “inverse patterning” or “Intaglio-Void/Embed-Relief Topographic (In VERT) molding” manufacturing process for generating high-resolution three-dimensional (3D) multi-cellular microstructures in distinct cellular compartments of a single hydrogel. The platform has general utility in the development of engineered tissues for human therapies, drug testing, and disease models. Additionally, the platform can serve as a model system for studying 3D cell-cell interactions in fields as diverse as stem cell biology to the development of cancer therapeutics. | 2015-03-19 |
20150082469 | HUMANIZED IL-7 RODENTS - Genetically modified non-human animals comprising a human or humanized interleukin-7 (IL-7) gene. Cells, embryos, and non-human animals comprising a human or humanized IL-7 gene. Rodents that express human or humanized IL-7 protein. Genetically modified mice that comprise a human or humanized IL-7-encoding gene in their germline, wherein the human or humanized IL-7-encoding gene is under control of endogenous mouse IL-7 regulatory sequences. | 2015-03-19 |
20150082470 | METHODS AND COMPOSITIONS FOR TRANSLATIONAL PROFILING AND MOLECULAR PHENOTYPING - Methods and compositions are provided for translational profiling and molecular phenotyping of specific tissues, cells and cell subtypes of interest. The methods provided herein facilitate the analysis of gene expression in the selected subset present within a heterogeneous sample. | 2015-03-19 |
20150082471 | METHOD FOR CULTURING AVIAN GONOCYTES - A sustained culture of isolated avian gonocytes is provided, as well as a method of making and using the same. A chimeric avian containing an isolated gonocyte and a transgenic avian produced using the chimeric avian are also provided. The cell and method may be employed to make, among other things, transgenic avian that produce a heterologous protein, e.g., a therapeutic protein. | 2015-03-19 |
20150082472 | NEW MELON VARIETY NUN 26367 MEM - The invention relates to the field of | 2015-03-19 |
20150082473 | NEW TOMATO VARIETY NUN 00203 TOP - The invention provides a new and distinct hybrid variety of tomato, NUN 00203 TOP. | 2015-03-19 |
20150082474 | METHODS AND COMPOSITIONS FOR SELECTING SOYBEAN PLANTS RESISTANT TO PHYTOPHTHORA ROOT ROT - The present invention relates to the field of plant breeding and disease resistance. More specifically, the invention includes a method for breeding soybean plants containing quantitative trail loci (QTL) for resistance the | 2015-03-19 |
20150082475 | Root Growth, Nutrient Uptake, and Tolerance of Phosphorus Deficiency in Plants and Related Materials and Methods - Described herein are methods and materials useful for improving root growth and nutrient uptake in cereal grasses. In particular, present disclosure provides methods for increasing root growth and nutrient uptake in a cereal grass involving marker assisted selection and backcrossing. The present disclosure also provides recombinant DNA for the generation of transgenic plants, transgenic plant cells, and methods of producing the same. The present disclosure also provides materials and methods useful for improving the tolerance of a cereal grass to phosphorus-deficiency The present disclosure further provides methods for generating transgenic seed that can be used to produce a transgenic plant having increased root growth, nutrient uptake, and phosphorus-deficiency tolerance. | 2015-03-19 |