13th week of 2015 patent applcation highlights part 72 |
Patent application number | Title | Published |
20150089616 | TECHNIQUES FOR USER AUTHENTICATION - Techniques for user authentication are disclosed. In some situations, the techniques include receiving, from a client device, an authentication request to access a network resource, the request including a user identifier, obtaining a security credential associated with the user identifier contained in the received request, generating an authorization code based on the obtained security credential, providing to the client device instructions to obtain first information corresponding to the generated authorization code, receiving, from the client device, the first information provided in response to the provided instructions, and, when the first information received from the client device corresponds to at least a portion of the generated authorization code, authorizing the client device to access the network resource. | 2015-03-26 |
20150089617 | SINGLE SIGN-ON (SSO) FOR MOBILE APPLICATIONS - A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to ensure that access to resources stored on those resource servers is limited to access to which the resource owner consents. Each resource server registers, with the OAuth authorization server, metadata for that resource server, indicating scopes that are recognized by the resource server. The OAuth authorization server refers to this metadata when requesting consent from a resource owner on behalf of a client application, so that the consent will be of an appropriate scope. The OAuth authorization server refers to this metadata when constructing an access token to provide to the client application for use in accessing the resources on the resource server. The OAuth authorization server uses this metadata to map issued access tokens to the scopes to which those access tokens grant access. | 2015-03-26 |
20150089618 | SINGLE SIGN-ON PROCESS - Single sign-on process allowing a mobile user with a mobile phone or with a laptop to remote-access a remote server, comprising the steps of:
| 2015-03-26 |
20150089619 | WEB-BASED INTERFACE INTEGRATION FOR SINGLE SIGN-ON - Web-based single sign-on can enable a user to log in to a single interface (such as through a web browser or thin client) and then provide SSO services to the user for one or more web applications. The web-based SSO system can be extended to support one or more different access control methods, such as form-fill, Federated (OIF), SSO Protected (OAM), and other policies. The web-based SSO system can include a user interface through which the user can access different web applications, systems, etc. and manage their credentials. Each SSO service can be associated with a web interface allowing the SSO services to be accessed over the web. The web interfaces can provide CRUD (create, read, update, delete) functionality for each SSO service. To support different access policy types, the web-based SSO system can include an extensible data manager that can manage data access to different types of repositories transparently. | 2015-03-26 |
20150089620 | VIRTUALIZED DATA STORAGE AND MANAGEMENT OF POLICY AND CREDENTIAL DATA SOURCES - Web-based single sign-on can enable a user to log in to a single interface (such as through a web browser or thin client) and then provide SSO services to the user for one or more web applications. The web-based SSO system can be extended to support one or more different access control methods, such as form-fill, Federated (OIF), SSO Protected (OAM), and other policies. The web-based SSO system can include a user interface through which the user can access different web applications, systems, etc. and manage their credentials. Each SSO service can be associated with a web interface allowing the SSO services to be accessed over the web. The web interfaces can provide CRUD (create, read, update, delete) functionality for each SSO service. To support different access policy types, the web-based SSO system can include an extensible data manager that can manage data access to different types of repositories transparently. | 2015-03-26 |
20150089621 | SECURE LOGIN FOR SUBSCRIBER DEVICES - A network service may receive an authentication request from a subscriber device, the authentication request including a user credential and a device identifier of the subscriber device. The service may validate the authentication request based at least in part on the included user credential, and when the authentication request is validated, provide an authentication reply to the subscriber device indicative of allowance of the subscriber device to access the service, the authentication reply including a hash token keyed to the device identifier of the subscriber device for use in validation of subsequent authentication requests. The service may further generate a second hash token based on the device identifier of a subsequent authentication request; validate a subsequent authentication request according to the hash token and the second hash token; and when the subsequent authentication request is validated, allowing the subscriber device to access the service. | 2015-03-26 |
20150089622 | MOBILE OAUTH SERVICE - A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to ensure that access to resources stored on those resource servers is limited to access to which the resource owner consents. Each resource server registers, with the OAuth authorization server, metadata for that resource server, indicating scopes that are recognized by the resource server. The OAuth authorization server refers to this metadata when requesting consent from a resource owner on behalf of a client application, so that the consent will be of an appropriate scope. The OAuth authorization server refers to this metadata when constructing an access token to provide to the client application for use in accessing the resources on the resource server. The OAuth authorization server uses this metadata to map issued access tokens to the scopes to which those access tokens grant access. | 2015-03-26 |
20150089623 | SERVICE PROFILE-SPECIFIC TOKEN ATTRIBUTES AND RESOURCE SERVER TOKEN ATTRIBUTE OVERRIDING - A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to ensure that access to resources stored on those resource servers is limited to access to which the resource owner consents. Each resource server registers, with the OAuth authorization server, metadata for that resource server, indicating scopes that are recognized by the resource server. The OAuth authorization server refers to this metadata when requesting consent from a resource owner on behalf of a client application, so that the consent will be of an appropriate scope. The OAuth authorization server refers to this metadata when constructing an access token to provide to the client application for use in accessing the resources on the resource server. The OAuth authorization server uses this metadata to map issued access tokens to the scopes to which those access tokens grant access. | 2015-03-26 |
20150089624 | SECURITY MANAGEMENT METHOD AND APPARATUS IN A HOME NETWORK SYSTEM - To solve the problems that may occur due to the leakage of user account information, the present disclosure may manage the security using the device token that is used independently of that of the server, that is generated by a home device, and that can be used for device authentication when a smart phone controls home appliances. With the use of the device token, the present disclosure may solve the problems that the status information of home appliances is exposed by another person or the home appliances are controlled by another person, even though the user account information is leaked. | 2015-03-26 |
20150089625 | Access Control Manager - A network access manager controls access to a network interface according to a set of access control instructions specifying permissible and impermissible addresses and domains on a network. The network access manager establishes a graylist of addresses based on a domain request that is associated with a whitelisted domain that is accessed via a blacklisted address. When a request to establish a connection is received directed to a graylisted address, the connection is permitted to establish and the connection is added to a session graylist. When a session data transfer packet is received, if the session corresponds to a session on the session graylist, the session data transfer packet is examined to determine if it matches a whitelisted domain, in which case the session is associated with a session whitelist and permitted access to the network. The access control instructions may be automatically updated from a trusted access control management system. | 2015-03-26 |
20150089626 | SYSTEM AND METHOD PROVIDING MARKETPLACE FOR BIG DATA APPLICATIONS - The embodiments herein disclose a system and method for providing a marketplace for Big Data applications. The system facilitates a repository of applications, data sets, process compositions and extension modules received from the various vendors. The assets provided by the marketplace are deployed upon receiving the requests on public and private clouds. The marketplace comprises the algorithms, data sets and software systems to generate, share and save the insights for a plurality of cloud users. The system provides Big Data applications on demand from the cloud users and installs the requested application on a dedicated platform adopted for online Big Data processing. | 2015-03-26 |
20150089627 | SECURING EMAIL COMMUNICATIONS - Methods and systems are provided for securing email communications. According to one embodiment, a network device receives an outbound email originated by a computing device of an internal network and directed to a target recipient. It is determined whether a domain name of the target recipient is present in a global doppelganger database. When the domain name is determined to be present in the global doppelganger database, transmission of the outbound email to the target recipient is prevented if the domain name is an unacceptable domain name and transmission of the outbound email to the target recipient is permitted if the domain name is an acceptable domain name. | 2015-03-26 |
20150089628 | System and Method for Provision of a Router / Firewall in a Network - A firewall/router is configured in a best practices approach for security and performance and, as such, greatly enables non-technical consumers to install it as a gateway point in a small network setting. Certain embodiments provide a means to monitor network usage, configure content filtering, schedule hours of access for certain networked devices and specify which network devices may connect to the WAN. It is envisioned that certain embodiments may also be capable of sending alerts to designated and configurable targets. WAN access may be granted or blocked or throttled on a per network device basis using parameters such as, but not limited to, time of day, throttling characteristics, and classification of the content being served by the target resource. | 2015-03-26 |
20150089629 | NETWORK LABEL ALLOCATION METHOD, DEVICE, AND SYSTEM - Embodiments of the present invention provide a network label allocation method, a device, and a system, which enable a local PE to distinguish packets from different remote PEs. The method includes: generating, by a local provider edge PE, a VPN label route for each remote PE, where VPN labels in VPN label routes of different remote PEs are different, and the remote PE and the local PE at least belong to a same VPN; and sending the VPN label route to the remote PE, so that the remote PE separately matches an IP address of the remote PE with a target device IP address in the VPN label route, and matches an import route target RT of each VRF of the remote PE with a route target RT in the VPN label route, a packet related to a successfully matched VRF. | 2015-03-26 |
20150089630 | CRUM CHIP MOUNTABLE IN COMSUMABLE UNIT, IMAGE FORMING APPARATUS FOR AUTHENTIFICATING THE CRUM CHIP, AND METHOD THEREOF - Provided herein is an image forming apparatus, comprising: a consumable unit where a CRUM (Customer Replaceable Unit Monitoring) chip is mounted; and a main body configured to perform at least one of a first authentication and a second authentication of the consumable unit, when the consumable unit is mounted, wherein the main body comprises: a main controller for performing the first authentication according to firmware stored in the image forming apparatus; and an authentication controller for using at least one ASIC (Application Specific Integrated Circuit) to perform the second authentication of the consumable unit. Accordingly, it is possible to effectively authenticate a consumable unit even when the image forming apparatus is hacked. | 2015-03-26 |
20150089631 | UNLOCK PROCESSING METHOD AND DEVICE - An unlock processing method for a terminal, includes: receiving an input unlocking instruction from a user; determining whether the user belongs to a preset user group according to the unlocking instruction; and acquiring and storing information regarding the user, if it is determined that the user does not belong to the preset user group. | 2015-03-26 |
20150089632 | APPLICATION AUTHENTICATION CHECKING SYSTEM - A method for authentication checking comprises receiving an authentication verification request for accessing an application. The authentication verification request includes a user identification, a device identification and an application identification. A validity of the authentication verification request is determined based on at least a last known authentication information, and a first subset of an application policy rule-set specific to the user identification and the device identification, if the application policy rule-set permits cross-application authentication; otherwise the validity is determined based on at least a second subset of the application policy rule-set specific to the user identification, the device identification and the application identification. Access to the application is enabled if the validity of the authentication verification request is true; otherwise a new authentication is requested. | 2015-03-26 |
20150089633 | SYSTEM AND METHOD FOR ASSET ASSIGNMENT AND REPLACEMENT - A file cabinet drawer includes support rails supporting asset panels each with a plurality of asset positions to support respective assets and associated asset indicators. A controller activates panel, drawer, and asset indicators to locate assigned assets. A recipient can be reauthenticated and assigned a duplicate asset if the assigned asset becomes unavailable. An administrator can be authenticated to conduct assignment of duplicate assets. Where asset(s) include electronic identification tags, the panels can include contacts in electrical communication with support rails in respective drawers coupled to the controller to read an asset identifier from each tag. | 2015-03-26 |
20150089634 | PASSWORD ENTRY FOR DOUBLE SIDED MULTI-TOUCH DISPLAY - Password definition and recognition in programmable devices with back-to-back transparent, touchscreens includes defining first and second contact patterns on respective first and second ones of the touchscreens as patterns of touchscreen contact inputs generated from contact of respective contact elements on the touchscreens contemporaneously, wherein the touchscreens enable a viewer to see through the touchscreens. A composite password pattern is defined by mapping location of the first pattern on the first screen relative to the location of the second pattern on the second screen. Recognizing a successful entry of the composite password pattern requires an entry of the first pattern on one of first and second, back-to-back touchscreens contemporaneously with an entry of the second pattern on another of the first and second touchscreens in an alignment that is compliant with the composite password mapping | 2015-03-26 |
20150089635 | SYSTEM FOR CORRELATION OF INDEPENDENT AUTHENTICATION MECHANISMS - Described are devices, methods and non-transitory computer readable media for implementing an enhanced multi-factor authentication system. The system uses three user identifiers, and after a first user identifier is verified, the system receives a second user identifier from the user. As the second user identifier is being received, the system automatically detects a third user identifier and verifies simultaneously the second and third user identifiers. The second and third user identifiers are correlated with each other, and the correlation of these two identifiers (e.g., in addition to the identifiers themselves) is also verified. | 2015-03-26 |
20150089636 | AUTHENTICATED RELEASE OF DATA TOWARDS A DEVICE DRIVER - A method and an electronic device for authenticating release of data towards a device driver. the device comprises a main display area, a memory module and a processor module, the processor module is for executing a display function manager that manages access to an extra display area defined outside of the main display area, storing into the memory module authentication credentials identifying software applications, executing on the processor module, that are authorized for the display function manager and receiving a request, from one of the software applications executing on the processor module, for sending data towards the display function manager. the request comprises requesting credentials from the one software application. the processor is also for verifying the requesting credentials in relation to the extra display area against the stored authentication credentials and, when the requesting credentials are verified, authorizing the release of the data towards the device driver. | 2015-03-26 |
20150089637 | System, Method and Apparatus for Simultaneous Definition and Enforcement of Access-control and Integrity Policies - Access-control and information-flow integrity policies are enforced in a computing system by detecting security-sensitive sinks in software code for an application running on the computing system and retrieving an access-control policy from a database accessible to the computing system. The access-control policy maps a set of access permissions within the computing system to each one of a plurality of principals. For each detected security-sensitive sink, all principals that influence that security-sensitive sink are detected and an overall access permission is assigned to each security-sensitive sink by taking the intersection of the access permission sets for all influencing principals of that security-sensitive sink. If this permission set is inadequate, an integrity violation is reported. In addition, permission labels are assigned to each value of variables used in the security-sensitive sinks. Each permission label is a set of permissions. | 2015-03-26 |
20150089638 | SMART METER SECURITY SYSTEM AND METHOD - A system, method and computer program product for protecting utility usage information from utility company users, e.g., power company endpoints. Smart meters monitor endpoint service usage to identify the start of a critical usage period. During critical usage periods the smart meters select and modulates a generic usage pattern by the difference between the pattern and actual usage. Instead of sending actual usage data, the smart meter sends the modulated generic usage pattern to the service provider. The service provider extracts the deltas and determines endpoint service usage from the extracted deltas. | 2015-03-26 |
20150089639 | SMART METER SECURITY SYSTEM AND METHOD - A system, method and computer program product for protecting utility usage information from utility company users, e.g., power company endpoints. Smart meters monitor endpoint service usage to identify the start of a critical usage period. During critical usage periods the smart meters select and modulates a generic usage pattern by the difference between the pattern and actual usage. Instead of sending actual usage data, the smart meter sends the modulated generic usage pattern to the service provider. The service provider extracts the deltas and determines endpoint service usage from the extracted deltas. | 2015-03-26 |
20150089640 | ENDPOINT LOAD REBALANCING CONTROLLER - A endpoint load rebalancing controller, method of controlling endpoint activity to suppress side channel variation and computer program product for controlling endpoint activity for suppressing side channel variation in information from utility company users, e.g., from power company endpoints. The load rebalancing controller monitors period to period endpoint service usage and predicts next period endpoint service usage. Whenever the controller maintains determines that the endpoint usage will exhibit a change that may be sufficient to convey activity information in side channel activity, the controller rebalances activity for the next period. Rebalancing may include shifting off-line execution from one period to another and capping or increasing on-line execution activity. | 2015-03-26 |
20150089641 | COMPUTER SYSTEM AND SIGNATURE VERIFICATION SERVER - Disclosed are a computer system, a signature verification server, a method of supporting signature verification by a computer system, and a method of verifying signature. Embodiments of the present disclosure relates to a technology of misdiagnosis verification of signature used for a malicious code diagnosis, and more particularly to technologies which derive a result of performance of a malicious code diagnosis simulation on signature in a multi-user computer environment to use an actual client antivirus software and thus can overcome physical, spatial, and temporal limitations of conventional signature misdiagnosis verification by pre-distributing preliminary application signature in a state where misdiagnosis verification has not been completed to a plurality of user computers to reflect the preliminary application signature to a malicious code diagnosis on files stored in the plurality of user computers and performing misdiagnosis verification on the preliminary application signature based on information collected in connection with a result of the diagnosis. | 2015-03-26 |
20150089642 | Detecting Phishing of a Matrix Barcode - A method and a system for detecting phishing of a matrix barcode is provided. The matrix barcode comprises colored and white squares in rows and columns. The method comprises scanning the matrix barcode row by row and column by column resulting in received squares, storing a corresponding white color level for each received white square, and comparing the white color levels of the received white squares couple-wise. | 2015-03-26 |
20150089643 | MALICIOUS REQUEST ATTRIBUTION - Methods, apparatuses, and computer readable media for malicious request attribution are presented. For example, according to one aspect, requests for one or more records may be received from a requesting computing device. A determination may be made that the requests are of a malicious nature. Responsive to determining that the requests are of a malicious nature, one or more requests for obtaining information about the requesting computing device may be generated, and communicated to the requesting computing device. In some embodiments, at least one of the one or more requests for obtaining information about the requesting computing device may be configured to cause the requesting computing device to fail to properly render at least a portion of a web page comprising at least one of the one or more records. | 2015-03-26 |
20150089644 | Document Classification Using Multiscale Text Fingerprints - Described systems and methods allow a classification of electronic documents such as email messages and HTML documents, according to a document-specific text fingerprint. The text fingerprint is calculated for a text block of each target document, and comprises a sequence of characters determined according to a plurality of text tokens of the respective text block. In some embodiments, the length of the text fingerprint is forced within a pre-determined range of lengths (e.g. between 129 and 256 characters) irrespective of the length of the text block, by zooming in for short text blocks, and zooming out for long ones. Classification may include, for instance, determining whether an electronic document represents unsolicited communication (spam) or online fraud such as phishing. | 2015-03-26 |
20150089645 | METHOD AND SYSTEM FOR PREVENTING AND DETECTING SECURITY THREATS - A system and method is provided for implementing platform security on a consumer electronic device having an open development platform. The device is of the type which includes an abstraction layer operable between device hardware and application software. A secured software agent is provided for embedding within the abstraction layer forming the operating system. The secured software agent is configured to limit access to the abstraction layer by either blocking loadable kernel modules from loading, blocking writing to the system call table or blocking requests to attach debug utilities to certified applications or kernel components. | 2015-03-26 |
20150089646 | APPARATUS AND METHOD FOR PROTECTING COMMUNICATION PATTERN OF NETWORK TRAFFIC - An apparatus for protecting traffic trend in a network of a control system using artificial communication is provided. In accordance with an embodiment, the apparatus includes a communication terminal device installed in a network and configured to create and filter artificial communication. A communication server device determines whether to create artificial communication at a current time in the communication terminal device, requests a transmitting side-communication terminal device to create artificial communication, and requests a receiving side-communication terminal device to filter the artificial communication. | 2015-03-26 |
20150089647 | Distributed Sample Analysis - A method of inspecting a file on a client computer in order to determine if the file is malicious. The client computer sends a hash of the file to a server. The server then compares the hash of the file to a database of hashes of known files, and uses results of the comparison to determine whether or not the file is unknown to the server. If the file is unknown, the server sends a request for a first security analysis of the file to the client computer. The client computer then performs the first security analysis on the file, modifies the results of the first security analysis by removing or hashing selected data from results, and sends the modified results of the first security analysis to the server. The server performs a second security analysis on the modified results in order to determine if the file is malicious. | 2015-03-26 |
20150089648 | MALWARE MANAGEMENT THROUGH KERNEL DETECTION DURING A BOOT SEQUENCE - A system and method for managing pestware on a protected computer is described. The method in one variation includes monitoring events during a boot sequence of the computer; managing pestware-related events before native applications can run and after a kernel is loaded; managing pestware-related events when native applications can run; and scanning a registry of the computer for pestware when native applications can run. In variations, a pestware management engine is initialized after an operating system of the protected computer is initialized and the pestware management system both receives an event log of the monitored events and compiles the set of behavior rules utilized by kernel-level monitor. | 2015-03-26 |
20150089649 | HARDWARE BASED DETECTION DEVICES FOR DETECTING NETWORK TRAFFIC CONTENT AND METHODS OF USING THE SAME - A device for detecting network traffic content is provided. The device includes a first input port configured to receive one or more signatures, each of the one or more signatures associated with content desired to be detected, a second input port configured to receive data associated with network traffic content. The device also includes a processor configured to process the one or more signatures and the data to determine whether the network traffic content matches the content desired to be detected, and an output port configured to couple the device to a computer system of an intended recipient of the network traffic content. The output port passes the network traffic content to the computer system when it is determined that the network traffic content does not match the content desired to be detected. | 2015-03-26 |
20150089650 | METHODS OF DETECTION OF SOFTWARE EXPLOITATION - A method for detecting software exploitation broadly comprises the steps of gathering information about processes and threads executing on a computing device, monitoring instructions executed by a thread that is currently running, performing the following steps if a function to create a process or a function to load a library is called, examining a thread information block, determining whether an address included in a stack pointer of the thread is in a range of addresses for a stack specified by the thread information block, and determining whether a first plurality of no-operation instructions is followed by shell code that is followed by a second plurality of no-operation instructions. | 2015-03-26 |
20150089651 | METHODS OF DETECTION OF SOFTWARE EXPLOITATION - A method for detecting software exploitation broadly comprises the steps of gathering information about processes and threads executing on a computing device, monitoring instructions executed by a thread that is currently running, performing the following steps if a function to create a process or a function to load a library is called, examining a thread information block, determining whether an address included in a stack pointer of the thread is in a range of addresses for a stack specified by the thread information block, and determining whether a first plurality of no-operation instructions is followed by shell code that is followed by a second plurality of no-operation instructions. | 2015-03-26 |
20150089652 | METHODS OF DETECTION OF SOFTWARE EXPLOITATION - A method for detecting software exploitation broadly comprises the steps of gathering information about processes and threads executing on a computing device, monitoring instructions executed by a thread that is currently running, performing the following steps if a function to create a process or a function to load a library is called, examining a thread information block, determining whether an address included in a stack pointer of the thread is in a range of addresses for a stack specified by the thread information block, and determining whether a first plurality of no-operation instructions is followed by shell code that is followed by a second plurality of no-operation instructions. | 2015-03-26 |
20150089653 | METHODS OF DETECTION OF SOFTWARE EXPLOITATION - A method for detecting software exploitation broadly comprises the steps of gathering information about processes and threads executing on a computing device, monitoring instructions executed by a thread that is currently running, performing the following steps if a function to create a process or a function to load a library is called, examining a thread information block, determining whether an address included in a stack pointer of the thread is in a range of addresses for a stack specified by the thread information block, and determining whether a first plurality of no-operation instructions is followed by shell code that is followed by a second plurality of no-operation instructions. | 2015-03-26 |
20150089654 | MALWARE REMOVAL METHOD AND SYSTEM, AND COMPUTER STORAGE MEDIUM - A method, device, and a computer storage medium are provided. The method includes: starting a core file and building an environment after running an operation system, then loading a driver in the built environment; reading a configuration file by the driver to obtain a path of a malware; and deleting a registry and file of the malware in a kernel layer according to the path. The device includes: a start loading module configured to start a core file and build an environment after running an operation system, then load a driver in the built environment; a path reading module configured to calculate a configuration file by the driver to obtain a path of a malware; and a program deleting module configured to delete a registry and file of the malware in a kernel layer according to the path. | 2015-03-26 |
20150089655 | SYSTEM AND METHOD FOR DETECTING MALWARE BASED ON VIRTUAL HOST - A system and method for detecting malware based on a virtual host are provided. The system for detecting malware based on a virtual host includes a terminal network behavior analysis server and a virtual host. The terminal network behavior analysis server extracts network behavior information by monitoring the network behavior of an actual host, and outputs the extracted the network behavior information. The virtual host detects malware corresponding to abnormal behavior in the actual host, by receiving the network behavior information and then performing corresponding behavior. | 2015-03-26 |
20150089656 | SYSTEM AND METHOD FOR AUTOMATED REMEDYING OF SECURITY VULNERABILITIES - In a binary patching system for alleviating security vulnerabilities in a binary representation of a software application, a binary code portion determined to be associated with a security vulnerability is replaced with a replacement binary code that can avoid such vulnerability without substantially changing the functionality of the code portion that was replaced. The replacement binary code can be selected based on properties and/or context of the code portion to be replaced. | 2015-03-26 |
20150089657 | ENDPOINT LOAD REBALANCING CONTROLLER - A endpoint load rebalancing controller, method of controlling endpoint activity to suppress side channel variation and computer program product for controlling endpoint activity for suppressing side channel variation in information from utility company users, e.g., from power company endpoints. The load rebalancing controller monitors period to period endpoint service usage and predicts next period endpoint service usage. Whenever the controller maintains determines that the endpoint usage will exhibit a change that may be sufficient to convey activity information in side channel activity, the controller rebalances activity for the next period. Rebalancing may include shifting off-line execution from one period to another and capping or increasing on-line execution activity. | 2015-03-26 |
20150089658 | BATCH LOADING AND SELF-REGISTRATION OF DIGITAL MEDIA FILES - Methods and apparatus for batch loading and self-registration of digital media files is provided. The system provides numerous methods of interfacing with a content outlet. The methods further include comparing attributes of content to be downloaded with attributes of content in a media database. The methods also includes providing restrictions based on a result of the comparing. The methods further include monetizing the methods between both retailers and right-holders using the system. Additionally, the method may include providing retail analysis, resolving disputes, and distributing royalty payments to rights-holders of content. | 2015-03-26 |
20150089659 | SYSTEM AND METHOD FOR REMOTE WIPE - A remote wipe message or notification may be sent from a server computer to one or more target client devices associated with a user. A managed container running on a target client device associated with the user and having a managed cache storing content managed by or through the server computer may, in response to the remote wipe message or notification, deleting the managed content or a portion thereof from its managed cache. The managed container may send back an acknowledgement or message to the server computer that it had completed the remote wipe. The remote wipe functionality can avoid having to deal with individual applications running on the client device and therefore can eliminate the complexity of having to deal with individual applications. Furthermore, the remote wipe can be done independently of the local operating system and without affecting non-managed information/applications on the client device. | 2015-03-26 |
20150089660 | Device, System, and Method of Enhancing User Privacy and Security Within a Location-Based Virtual Social Networking Context - A first mobile computing device of a first user receives a request to participate in a location-based virtual social network. A radio component of the first mobile computing device detects venues within proximity of the first mobile computing device. Each venue includes a host of a respective virtual social network. One of the venues is selected by the user for participation in the virtual social network. A wireless connection with the virtual social network is established at the selected venue. Electronic communications with second users are conducted at the selected venue. The second users are also participants of the virtual social network. A departure of the first user from the selected venue is detected. In response to the detected departure, electronic records pertaining to the conducted electronic communications with the one or more second users are erased from the first mobile computing device. | 2015-03-26 |
20150089661 | PROTECTING BRAND-ASSOCIATED CONTENT OF COMMUNICATIONS IN A SOCIAL NETWORKING ENVIRONMENT - Disclosed are examples of systems, apparatus, methods and computer program products for protecting brand-associated content of communications in a social networking system associated with one or more databases. For example, a first communication comprising first content which identifies a brand of a business entity can be received. Metadata can be embedded in or identified in the first content. The metadata can identify the first content as being attributed to the brand of the business entity. A second communication comprising second content in which the metadata is embedded can be received. The embedded metadata in the second content can be interpreted. It can be determined that the interpreted metadata identifies the first content as being attributed to the brand of the business entity. It can be determined that the second content is different from the first content. Data indicating that the second content is different from the first content can be generated. | 2015-03-26 |
20150089662 | METHOD AND SYSTEM FOR IDENTIFYING FILE SECURITY AND STORAGE MEDIUM - A method for identifying file security, obtaining a file mark of the file, obtaining application data of the file according to the file mark, obtaining a vitality according to the application data, and obtaining the file security according to the vitality. The application data of the file can be obtained through real-time user feedback, after the file vitality is obtained according to the application data, the file security can be determined according to a statistical principle and the file vitality, thus an automatically analyzing and an artificial analyzing can be neglected. A system and a storage media for identifying the file security are also provided. | 2015-03-26 |
20150089663 | DATA REDACTION SYSTEM - An electronic data storage and retrieval system comprising one or more first computing devices and a second computing device. The one or more first computing devices comprise a plurality of first data files, wherein, each of the plurality of first data files is associated with a first authentication level. The second computing device is associated with a second authentication level. Upon receiving a request to provide at least one of the plurality of first data files from the second computing device, the one or more first computing devices compares the first authentication level with the second authentication level, and creates a copy of the at least one of the plurality of first data files. The copy of the at least one of the plurality of first data files comprises a portion of the at least one of the plurality of first data files. | 2015-03-26 |
20150089664 | ELECTRONIC DEVICE AND UNLOCKING METHOD THEREOF - An electronic device and an unlocking method thereof are provided. The electronic device has a touch screen, and the unlocking method includes following steps. When the electronic device is at a locking state, a first input and a second input corresponding to each other are received. Symbol information displayed on the touch screen is obtained according to the first input, and direction information is obtained according to the second input. When the symbol information and the direction information are matched to a predefined unlocking condition, the electronic device is switched to an unlocking state. When the symbol information and the direction information are not matched to the predefined unlocking condition, the electronic device is maintained in the locking state. | 2015-03-26 |
20150089665 | Document Management Server That Reduces Information Leakage of Non-Public Document Information - A document management server includes a document information managing unit, a location information acquisition unit, and an information transmitting unit. The document information managing unit controls public document information and non-public document information. The public document information is freely browsable. The non-public document information is browsable inside a permission area. The location information acquisition unit acquires location information of a mobile terminal to browse the non-public document information. The information transmitting unit determines whether or not the mobile terminal is inside the permission area based on the acquired location information and transmits the non-public document information to the mobile terminal while the mobile terminal is determined to be in the permission area. | 2015-03-26 |
20150089666 | APPARATUS AND METHOD FOR PROTECTING PRIVACY IN TERMINAL - Provided is an apparatus and method for protecting privacy in a terminal that may verify or determine whether a lock screen unlock input corresponds to an unlock input to enter a secret mode or an unlock input to enter a standard mode in response to sensing the lock screen unlock input, set a secret database (DB) to be inaccessible in response to a verification or determination that the lock screen unlock input corresponds to an unlock input to enter the standard mode, and set the secret DB to be accessible in response to a verification or determination that the lock screen unlock input corresponds to an unlock input to enter the secret mode. | 2015-03-26 |
20150089667 | DYNAMIC NETWORK CONSTRUCTION - A dynamic network is disclosed herein. The dynamic network can include a central server, one or several user devices, one or several remote servers, and a database server. The dynamic network can be created in response to a user request for content to be used in a compilation. The central server can identify one or several of the remote servers as potentially containing the requested content, and can communicate with the identified one or several of the remote servers to receive that content. Additionally, the server can identify and connect with one or several servers containing terms of use information for the requested content. | 2015-03-26 |
20150089668 | IDENTITY-BASED CONTENT ACCESS CONTROL - In embodiments, apparatuses, methods and storage media are described that are associated with performing identity-based access control for content. A content consumption device may be configured to control access to presented content based on identities of one or more content consumers that are physically proximate to the device. The content consumption device may be configured to perform facial and/or voice recognition on one or more content consumers to determine an identity for the one or more content consumers. The content consumption device may be configured to determine access permissions for the identified content consumers. At various times, access to a piece of content may change based on who is physically proximate to the content consumption device. Other embodiments may be described and claimed. | 2015-03-26 |
20150089669 | CONTENT PROVISION DEVICE, CONTENT PROVISION METHOD, PROGRAM, AND RECORDING MEDIUM - Content suitable for a user is provided to an information processing terminal that is confirmed to be used by the user. An accepting unit accepts an access from a user terminal. A determining unit determines whether or not to provide the user terminal with the content suitable for the user based on a length of a period from a previous access to this access of the user terminal. A processing execution unit executes processing for providing the user terminal with the content in a case where it is determined to provide the user terminal with the content suitable for the user. | 2015-03-26 |
20150089670 | APPARATUS, SYSTEM AND METHOD FOR MANAGING ELECTRONIC CONTENT LICENSES - For a particular content item duly acquired by a user is registered user information including user identification information, content identification information and model information and apparatus ID of each apparatus authorized to use the content item. For a same model, the user can be granted an authorization to use the content item in a plurality of apparatus of different apparatus IDs. In requesting an additional authorization to use the content item in a new target apparatus, the user sends to a license manager a request including model information and an apparatus ID of the target apparatus. Even where the authorization to use the particular content item has already been granted to another apparatus of a given model up to a predetermined maximum usable number, a further authorization is grantable to the target apparatus of another model than the given model, taking into account the model information included in the request. | 2015-03-26 |
20150089671 | DELIVERING AUTHOR SPECIFIC CONTENT - Delivering author specific content includes identifying author specific content with tags inserted into its metadata across multiple online resources and delivering updates about the author specific content to a user specified activity stream. | 2015-03-26 |
20150089672 | COMPUTER APPARATUS AND CONTROL METHOD FOR OPTICAL DISK DRIVE THEREOF - A computer apparatus and a control method for the ODD are disclosed. The control method includes: providing a user setting interface by the computer apparatus when the computer apparatus is in a user mode; receiving a user instruction through the user setting interface so as to start or close an ODD safety protection mode; and deciding whether or not a position state of a tray of the ODD can be changed according to that whether or not the ODD safety protection mode is started and whether or not the computer apparatus is in the user mode. | 2015-03-26 |
20150089673 | SYSTEM AND METHOD FOR GEOFENCING - A managed container may have a managed cache storing content managed by or through an application gateway server computer. The managed container may receive a request for content from an application running in a secure shell provided by the managed container on a client device. The managed container may determine whether the client device is within a specified geographical location. If not, the managed container may deny or restrict the application access to the requested content. The access denial or restriction may continue until a connection is made to the application gateway server computer or until the client device has returned to within the specified geographical location. If the client device is within the specified geographical location, the managed container may provide or restore access to requested content. Embodiments of the managed container can therefore perform geofencing by disabling or limiting access to content based on predetermined secure/insecure designations. | 2015-03-26 |
20150089674 | DEVICE LOCK AND AUTOMATIC PUBLICATION IN LOST AND FOUND DATABASE - Electronic devices are registered with a device lock service during the out of box experience. Following theft or loss of the device, an instruction can be given to remotely lock the device and at the same time publish the device as lost or stolen in a lost and found database. | 2015-03-26 |
20150089675 | SECURITY DEVICE FOR FUNCTIONAL DISPLAY, SECURITY, AND CHARGING OF HANDHELD ELECTRONIC DEVICES - A security device for allowing functional display and charging of handheld electronic devices is disclosed. The security device includes clamps with channels configured to press against and grip the edges of the handheld electronic device. In some embodiments, the security device includes a charging/data connector onto which the charging/data port of the handheld security device can be mounted. | 2015-03-26 |
20150089676 | Semiconductor Integrated Circuit - A method of a semiconductor integrated circuit comprising a logic circuit including n storage elements (n is a positive integer) which can each store 1-bit information and an attack detection circuit, the method including detecting, by an error determination circuit, through a logic operation that k-bit or less errors (k is a positive integer) have occurred in n-bit codes stored in the n storage elements, and detecting, by a light irradiation detection circuit which includes light detection elements, that light has been irradiated to (k+1) or more of the n storage elements. It is determined that the logic circuit has been attacked from outside when the error determination circuit detects an error or the light irradiation detection circuit detects light irradiation. | 2015-03-26 |
20150089677 | METHOD FOR ENHANCING TUMOR GROWTH - The present application discloses a method of testing for efficacy of a potential drug agent against cancerous cells in a mammal, including generating the cancer cells in a mammal; contacting the cancer cells with a potential drug agent by administering the potential drug agent to the mammal; and measuring effect of the potential drug agent on the cancer cells, wherein reduction of number of cancer cells in the mammal is indicative of efficaciousness of the potential drug agent against cancerous cells. | 2015-03-26 |
20150089678 | NON-HUMAN ANIMALS HAVING A HUMANIZED SIGNAL-REGULATORY PROTEIN GENE - Genetically modified non-human animals and methods and compositions for making and using the same are provided, wherein the genetic modification comprises a humanization of an endogenous signal-regulatory protein gene, in particular a humanization of a SIRPα gene. Genetically modified mice are described, including mice that express a human or humanized SIRPα protein from an endogenous SIRPα locus. | 2015-03-26 |
20150089679 | NON-HUMAN ANIMALS HAVING A HUMANIZED SIGNAL-REGULATORY PROTEIN GENE - Genetically modified non-human animals and methods and compositions for making and using the same are provided, wherein the genetic modification comprises a humanization of an endogenous signal-regulatory protein gene, in particular a humanization of a SIRPα gene. Genetically modified mice are described, including mice that express a human or humanized SIRPα protein from an endogenous SIRPα locus. | 2015-03-26 |
20150089680 | Human Lambda Light Chain Mice - Genetically modified mice are provided that express human λ variable (hVλ) sequences, including mice that express hVλ sequences from an endogenous mouse λ light chain locus, mice that express hVλ sequences from an endogenous mouse κ light chain locus, and mice that express hVλ sequences from a transgene or an episome wherein the hVλ sequence is linked to a mouse constant sequence. Mice are provided that are a source of somatically mutated human λ variable sequences useful for making antigen-binding proteins. Compositions and methods for making antigen-binding proteins that comprise human λ variable sequences, including human antibodies, are provided. | 2015-03-26 |
20150089681 | METHODS OF MODIFYING A TARGET NUCLEIC ACID WITH AN ARGONAUTE - This disclosure provides for compositions and methods for the use of designed nucleic acid-targeting nucleic acids, Argonautes, and complexes thereof. | 2015-03-26 |
20150089682 | ALS Inhibitor Herbicide Tolerant B. Napus Mutants - The present invention relates to an ALS inhibitor herbicide tolerant | 2015-03-26 |
20150089683 | Transgenic Plants With Enhanced Traits - This disclosure provides transgenic plants having enhanced traits such as increased yield, increased nitrogen use efficiency and enhanced drought tolerance; propagules, progeny and field crops of such transgenic plants; and methods of making and using such transgenic plants. This disclosure also provides methods of producing hybrid seed from such transgenic plants, growing such seed and selecting progeny plants with enhanced traits. Also disclosed are transgenic plants with altered phenotypes which are useful for screening and selecting transgenic events for the desired enhanced trait. | 2015-03-26 |
20150089684 | Transgenic plants with enhanced agronomic traits - This invention provides transgenic plant cells with recombinant DNA for expression of proteins that are useful for imparting enhanced agronomic trait(s) to transgenic crop plants. This invention also provides transgenic plants and progeny seed comprising the transgenic plant cells where the plants are selected for having an enhanced trait selected from the group of traits consisting of enhanced water use efficiency, enhanced cold tolerance, increased yield, enhanced nitrogen use efficiency, enhanced seed protein and enhanced seed oil. Also disclosed are methods for manufacturing transgenic seed and plants with enhanced traits. | 2015-03-26 |
20150089685 | NOVEL MAIZE PLANT - The present invention relates to maize plants with a genome comprising a unique allele profile associated with the corresponding QTLs contributing to the expression of a variety of phenotypic traits of economic interest selected from the group of grain yield, grain moisture at harvest, early and late root lodging, stalk lodging, common smut incidence, fusarium ear rot incidence, sulcotrione resistance, and tassel architecture. | 2015-03-26 |
20150089686 | Plant Germplasm Resistant to RNA Viruses - Disclosed is a dsRNA construct used to silencing specific eukaryotic translation initiation factor in plants to produce a plant resistant to viruses such as Potyviruses, Luteoviruses, and Furoviruses. More specifically, the plant would be resistant to viruses such as Wheat streak mosaic virus, Triticum mosaic virus, Soil bourne mosaic virus, or Barley yellow dwarf virus. Also disclosed are non-transgenic wheat plants having the genes for eIF(iso)4E-2 or eIF4G silenced. | 2015-03-26 |
20150089687 | Novel Antifungal Proteins and Methods of Use - Compositions and methods for protecting a plant from a pathogen, particularly a fungal pathogen, are provided. Compositions include amino acid sequences, and variants and fragments thereof, for novel variants of antipathogenic polypeptides generated through DNA shuffling that exhibit improved antipathogenic activity. Polynucleotides that encode the antipathogenic polypeptides are also provided. A method for inducing pathogen resistance in a plant using the polynucleotides disclosed herein is further provided. Compositions comprising an antipathogenic polypeptide or a microorganism comprising an antipathogenic polynucleotide of the invention in combination with a carrier and methods of using these compositions to protect a plant from a pathogen are further provided. Plants, plant cells, seeds, and microorganisms comprising an antipathogenic polynucleotide or polypeptide of the invention are also disclosed. | 2015-03-26 |
20150089688 | COMPOSITIONS AND METHODS OF GENE SILENCING IN PLANTS - Compositions and methods for inducing gene silencing events in plants are disclosed. The compositions typical include a polynucleotide encoding an miRNA target sequence operably linked to a sequence of from a target gene, cDNA or mRNA, or fragment thereof. When expressed in the presence of an miRNA specific for the miRNA target sequence the compositions can induce production of trans-acting siRNA that silence the target of interest. Transgenic plants and preferred plant pathways that can be targeted using the disclosed methods and compositions are also disclosed. | 2015-03-26 |
20150089689 | DOWN-REGULATION OF GENE EXPRESSION USING ARTIFICIAL MICRORNAS FOR SILENCING FATTY ACID BIOSYNTHETIC GENES - Isolated nucleic acid fragments comprising precursor miRNAs, and artificial miRNAs and their use in down-regulating gene expression of fatty acid biosynthetic genes are described. | 2015-03-26 |
20150089690 | SODIUM HYPOCHLORITE RESISTANT GENES - The present disclosure provides novel genes, identified from a | 2015-03-26 |
20150089691 | METHODS FOR INCREASING GENETIC GAIN IN A BREEDING POPULATION - Methods for method for increasing genetic gain in a breeding process are provided. The methods can include (a) providing effects with respect to a trait of interest of a plurality of genome-wide markers in a breeding population; (b) selecting from the breeding population a breeding pair, wherein crossing the breeding pair would produce a subsequent progeny population; (c) inferring or determining haplotypes based on genotypes with respect to the plurality of genome-wide markers for the breeding pair; (d) simulating a cross of the breeding pair to produce a subsequent generation, each member of the progeny generation having a simulated genotype; (e) calculating a genetic potential value of the progeny generation; (f) repeating steps (b)-(e) one or more times, wherein in each iteration of step (b) employs a different breeding pair; (g) ranking each simulated cross; and (h) selecting one or more optimal breeding pairs based on the ranking, wherein the optimal breeding pair(s) selected is/are predicted to generate progeny with increased genetic gain. Also provided are methods for choosing breeding pairs predicted to produce progeny having desired phenotypes, methods for increasing the likelihood of producing progeny individual having desired phenotypes, methods for generating progeny individual having desired genotypes and/or phenotypes, progeny produced thereby, and cells, seeds, parts, and tissues cultures thereof. | 2015-03-26 |
20150089692 | VEGETABLE OIL COMPRISING A POLYUNSATURATED FATTY ACID HAVING AT LEAST 20 CARBON ATOMS - The present invention describes a vegetable oil comprising a polyunsatured fatty acid having at least 20 carbon atoms (LC-PUFA), which oil has
| 2015-03-26 |
20150089693 | MULTI-RESONANT DETECTION SYSTEM FOR ATOMIC FORCE MICROSCOPY - A multi-resonant detection system (MRD) chip comprises an AFM tip, a cantilever, and resonator members separately positioned relative to the cantilever and tip. The chip may be fabricated from a silicon wafer. Frequency of tip motion is detected or actuated by displacement of resonator members. A rigid member, which is coupled to the chip by flexible members, coupled to the resonator members and rigidly coupled to the cantilever, enables tip motion. Resonator members include an array of discrete resonator bars, a single resonator bar or a continuous membrane which resonates at a continuous range of frequency. Tip motion is detected by measuring displacement of the resonator members using angle of light reflection, capacitance, piezo-resistive or piezo-strain techniques. Tip motion is actuated using displacement of the resonator members and capacitive, piezo-strain or piezo-resistive techniques. Resonator members may be encased by cover plates and/or hermetically sealed for measurements in a liquid medium. | 2015-03-26 |
20150089694 | METHOD FOR MEASURING THE NEAR-FIELD SIGNAL - The present invention relates to a method for measuring the near-field signal of a sample in a scattering type near-field microscope and to a device for conducting said method. | 2015-03-26 |
20150089695 | Grape plant named 'ARRATWENTYSEVEN' - A new distinct variety of grapevine named ARRATWENTYSEVEN abundantly forms attractive large crisp, meaty & juicy berries with a small seed trace and with a blue/black skin coloration; in large clusters which display a naturally sweet flavor. The fruit commonly is ready for harvesting during August in San Joaquin Valley of Central California, U.S.A, and displays good eating qualities as a table grape. The fruit firmness renders the fruit well amenable for handling, shipping, and storage | 2015-03-26 |
20150089696 | Albizia julibrissin tree name 'NCAJ1' - ‘NCAJ1’ is a new | 2015-03-26 |
20150089697 | Catharanthus plant named 'Suncatha 2243' - Disclosed herein is a new and distinct variety of | 2015-03-26 |
20150089698 | Catharanthus plant named 'Suncatha 2335' - Disclosed herein is a new and distinct variety of | 2015-03-26 |
20150089699 | Catharanthus plant named 'Suncathamiho' - Disclosed herein is a new and distinct variety of | 2015-03-26 |
20150089700 | Veronica plant named 'Florverblue' - A new and distinct cultivar of | 2015-03-26 |
20150089701 | Phalaenopsis orchid plant named 'Endless love' - A new and distinct | 2015-03-26 |
20150089702 | PETUNIA PLANT NAMED 'SUNPETU 101' - Disclosed herein is a new and distinct variety of | 2015-03-26 |
20150089703 | Petunia plant named 'Sunpetu 1072' - Disclosed herein is a new and distinct variety of | 2015-03-26 |
20150089704 | Petunia plant named 'Sunpetu 3881' - Disclosed herein is a new and distinct variety of | 2015-03-26 |