14th week of 2015 patent applcation highlights part 64 |
Patent application number | Title | Published |
20150096014 | Function Performing Apparatus and Portable Device - A function performing apparatus includes a function performing unit performing a specific function, a processor, and memory storing computer-readable instructions therein, the computer-readable instructions, when executed by the processor, causing the function performing apparatus to perform, in response to receiving a user authentication information when the user authentication information has been registered in an authentication memory, transitioning a state of the apparatus from a non-permission state to a permission state, registering, in the authentication memory, a device authentication information in association with the user authentication information upon establishing a first connection with a portable device, and transitioning the state of the apparatus from the non-permission state to the permission state when a second connection with the portable device is established and the device authentication information is obtained from the portable device. | 2015-04-02 |
20150096015 | Function Performing Apparatus and Storage Medium - A function performing apparatus includes a function performing unit, an operation unit, a processor and memory. The function performing apparatus receives a first instruction from a portable device, determines whether first authentication information is to be registered in an authentication memory, registers the first authentication information in authentication the memory, transmits the first authentication information, receives a second instruction including the first authentication information from the portable device, changes a state of the function performing apparatus from a non-permission state to a permission state if the second instruction is received while the first authentication information is registered in the authentication memory and changes the state from the non-permission state to the permission state if second authentication information is input to the function performing apparatus by the operation unit while the second authentication information is registered in the authentication memory. | 2015-04-02 |
20150096016 | Processing Apparatus and Storage Medium - A processing apparatus includes a process performing unit, an operation unit, a processor and memory. The processing apparatus receives first identification information from a communication device, acquires second identification information input by the operation unit, determines whether registration of the first and second identification information is permitted, registers registration information in which the first and second identification information are associated, when the first identification information is received after registering the registration information, performs authentication based on the first identification information, and, when the second identification information is acquired after registering the registration information, performs authentication based on the second identification information. In both cases where the authentication has been performed based on the first and second identification information, the process performing unit performs the specific process by using information managed in association with the registration information. | 2015-04-02 |
20150096017 | MANAGING DOMAIN NAME ABUSE - A method for providing an abuse sentry service for responding to domain name abuse is described. The method comprises the following steps. A plurality of disparate abuse feeds is received, each comprising data relating to a subset of potential domain name abuse. Filters are applied to the data to create a custom abuse feed. Data from the custom abuse feed is grouped based on priority levels. For each of the groups, one or more corresponding workflows are executed as a response to the potential domain name abuse. A computer readable medium including instructions for implementing the method is also described. | 2015-04-02 |
20150096018 | Systems and Methods for Using a Reputation Indicator to Facilitate Malware Scanning - Described systems and methods allow protecting a computer system from malware, such as viruses, Trojans, and spyware. A reputation manager executes in conjunction with an anti-malware engine. The reputation manager determines a reputation of a target process executing on the computer system according to a reputation of a set of executable modules, such as shared libraries, loaded by the target process. The anti-malware engine may be configured to employ a process-specific protocol to scan the target process for malware, the protocol selected according to process reputation. Processes trusted to be non-malicious may thus be scanned using a more relaxed protocol than unknown or untrusted processes. The reputation of executable modules may be static; an indicator of module reputation may be stored and/or retrieved by a remote reputation server. Process reputation may be dynamically changeable, i.e. re-computed repeatedly by the reputation manager in response to process life-cycle and/or security events. | 2015-04-02 |
20150096019 | SOFTWARE NETWORK BEHAVIOR ANALYSIS AND IDENTIFICATION SYSTEM - A particular method includes detecting, at a detection module, an indicator corresponding to a suspicious software component, where the indicator is detected based on monitored network data of a network system and based on a plurality of network behavior profiles. At least one of the network behavior profiles includes an ordered sequence of network actions. The method further includes determining, at an identification module, whether the indicator corresponds to any of the plurality of network behavior profiles. The method further includes generating output data in response to a determination that the indicator corresponds to a particular network behavior profile of the plurality of network behavior profiles. | 2015-04-02 |
20150096020 | LIMITING THE EFFICACY OF A DENIAL OF SERVICE ATTACK BY INCREASING CLIENT RESOURCE DEMANDS - A device may detect an attack. The device may receive, from a client device, a request for a resource. The device may determine, based on detecting the attack, a computationally expensive problem to be provided to the client device, where the computationally expensive problem requires a computation by the client device to solve the computationally expensive problem. The device may instruct the client device to provide a solution to the computationally expensive problem. The device may receive, from the client device, the solution to the computationally expensive problem. The device may selectively provide the client device with access to the resource based on the solution. | 2015-04-02 |
20150096021 | METHOD AND SYSTEM FOR METADATA DRIVEN TESTING OF MALWARE SIGNATURES - Techniques are disclosed for evaluating the effectiveness of a malware signature. A query tool translates a markup language malware signature definition into a database query. The query is then executed against a database of application features to identify software packages that the signature would identify as malware. The results of the query are compared with threat information stored in the database and classified as being true/false positives and true/false negatives. | 2015-04-02 |
20150096022 | DYNAMICALLY ADAPTIVE FRAMEWORK AND METHOD FOR CLASSIFYING MALWARE USING INTELLIGENT STATIC, EMULATION, AND DYNAMIC ANALYSES - Techniques for malware detection are described herein. According to one aspect, control logic determines an analysis plan for analyzing whether a specimen should be classified as malware, where the analysis plan identifies at least first and second analyses to be performed. Each of the first and second analyses identified in the analysis plan including one or both of a static analysis and a dynamic analysis. The first analysis is performed based on the analysis plan to identify suspicious indicators characteristics related to processing of the specimen. The second analysis is performed based on the analysis plan to identify unexpected behaviors having processing or communications anomalies. A classifier determines whether the specimen should be classified as malicious based on the static and dynamic analyses. The analysis plan, the indicators, the characteristics, and the anomalies are stored in a persistent memory. | 2015-04-02 |
20150096023 | FUZZY HASH OF BEHAVIORAL RESULTS - A computerized method is described in which a received object is analyzed by a malicious content detection (MCD) system to determine whether the object is malware or non-malware. The analysis may include the generation of a fuzzy hash based on a collection of behaviors for the received object. The fuzzy hash may be used by the MCD system to determine the similarity of the received object with one or more objects in previously classified/analyzed clusters. Upon detection of a “similar” object, the suspect object may be associated with the cluster and classified based on information attached to the cluster. This similarity matching provides 1) greater flexibility in analyzing potential malware objects, which may share multiple characteristics and behaviors but are also slightly different from previously classified objects and 2) a more efficient technique for classifying/assigning attributes to objects. | 2015-04-02 |
20150096024 | ADVANCED PERSISTENT THREAT (APT) DETECTION CENTER - A computerized method is described in which one or more received objects are analyzed by an advanced persistent threat (APT) detection center to determine if the objects are APTs. The analysis may include the extraction of features describing and characterizing features of the received objects. The extracted features may be compared with features of known APT malware objects and known non-APT malware objects to determine a classification or probability of the received objects being APT malware. Upon determination that the received objects are APT malware, warning messages may be transmitted to a user of associated client devices. Classified objects may also be used to generate analytic data for the prediction and prevention of future APT attacks. | 2015-04-02 |
20150096025 | System, Apparatus and Method for Using Malware Analysis Results to Drive Adaptive Instrumentation of Virtual Machines to Improve Exploit Detection - According to one embodiment, an electronic device comprises a memory to store information and a processor. The processor is adapted to receive information associated with content such as network traffic, to process the stored information and to conduct operations on the content. These operations may comprise determining, by a virtual machine processed by the processor, an occurrence of an event during malware analysis of an object associated with the content, and dynamically altering a virtual machine instrumentation of the virtual machine based on information associated with the event. | 2015-04-02 |
20150096026 | CYBER SECURITY - Systems and methods that use probabilistic grammatical inference and statistical data analysis techniques to characterize the behavior of systems in terms of a low dimensional set of summary variables and, on the basis of these models, detect anomalous behaviors are disclosed. The disclosed information-theoretic system and method exploit the properties of information to deduce a structure for information flow and management. The properties of information can provide a fundamental basis for the decomposition of systems and hence a structure for the transmission and combination of observations at the desired levels of resolution (e.g., component, subsystem, system). | 2015-04-02 |
20150096027 | SYSTEM AND METHOD FOR EVALUATING MALWARE DETECTION RULES - A malware detection rule is evaluated for effectiveness and accuracy. The detection rule defines criteria for distinguishing files having a characteristic of interest from other files lacking that characteristic, for instance, malicious files vs. benign files. The detection rule is applied to a set of unknown files. This produces a result set that contains files detected from among the set of unknown files as having the at least one characteristic of interest. Each file from the result set is compared to at least one file from a set of known files having the characteristic to produce a first measure of similarity, and to at least one file from a set of known files lacking the characteristic to produce a second measure of similarity. In response to the first measure of similarity exceeding a first similarity threshold, the detection rule is deemed effective. In response to the second measure of similarity exceeding a second similarity threshold, the detection rule is deemed inaccurate. | 2015-04-02 |
20150096028 | Method of Detecting Malware in an Operating System Kernel - The present invention relates to means for detecting malware. The method is realized on a computer with an operating system (OS) installed thereon, and comprises a step in which a point of interrupt is established when a system call is made by a user application requesting the transfer of control via an address in the kernel of the loaded OS. Next, the data structure of the loaded OS is checked. As this check is carried out, the address of the command in the random-access memory of the computer, by means of which command control will be transferred during the system call, is determined and the addresses of the commands to be executed during the system call are checked to see if they belong to the normal range of addresses of the OS kernel and OS kernel modules in the random-access memory. The presence of malware is then detected in the event that a command address does not belong to the normal range of addresses. The proposed method includes a dynamic check of the execution of the OS kernel code in order to detect the illegal interception and alteration of the code in the kernel and in the kernel modules (drivers) that are to be loaded. The proposed method enables the detection of both known and previously unregistered malware in an OS kernel and in OS kernel modules that are to be loaded. | 2015-04-02 |
20150096029 | Dynamic Selection and Loading of Anti-Malware Signatures - An anti-malware system dynamically loads and unloads additional malware detection signatures based on a collection of data sources that indicate what signatures are relevant to a host machine in its current environment. A signature selector component determines what relevant signatures should be loaded. The signature selector component uses a variety of data sources either individually, or in combination, to determine relevancy of the available malware detection signatures. The anti-malware system dynamically determines which of the available malware detection signatures and classes of signatures are relevant and should be provided to a machine based on available information. The malware detection signatures are obtained and loaded automatically from one or more sources when a threat becomes relevant. A program or application may be blocked from accessing files until the relevant malware detection signatures have been loaded onto the machine. | 2015-04-02 |
20150096030 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PREVENTING COMMUNICATION OF UNWANTED NETWORK TRAFFIC BY HOLDING ONLY A LAST PORTION OF THE NETWORK TRAFFIC - A system, method, and computer program product are provided for preventing communication of unwanted network traffic by holding only a last portion of the network traffic. In use, network traffic associated with a file transfer is received. Additionally, only a last portion of the network traffic associated with the file transfer is held for determining whether the file is unwanted. Further, the last portion of the network traffic associated with the file transfer is conditionally forwarded to a destination device, based on the determination. | 2015-04-02 |
20150096031 | SYSTEM AND METHOD FOR PROVIDING SIMPLIFIED END-TO-END SECURITY FOR COMPUTING DEVICES IN STANDALONE, LAN, WAN OR INTERNET ARCHITECTURES - The present invention generally relates to systems and methods for end-to-end security for computing devices in standalone, LAN, WAN or Internet architectures. Specifically, the present invention relates to a computer implemented system and method for providing simplified end-to-end security for computing devices in standalone, LAN, WAN or Internet architectures. | 2015-04-02 |
20150096032 | DETECTING VULNERABILITY TO RESOURCE EXHAUSTION - In an aspect of managing resource exhaustion, a method includes receiving a program code that is configured for generating a random number. The generating is identified as vulnerable to a resource exhaustion. The method also includes identifying a statement in the program code at which a value of a variable associated with the generating of the random number is affected, inserting a hooking code in the statement for monitoring the variable at the statement, and running the program code in a plurality of iterations. A consumption level of the resource is varied in the plurality of iterations. The method further includes monitoring a plurality of values of the variable in the plurality of iterations. The method also includes executing a regression analysis on the plurality of values and returning a root cause of the vulnerability. | 2015-04-02 |
20150096033 | Security Testing Using Semantic Modeling - Optimized testing of vulnerabilities in an application implemented by a method includes generating a first probe directed to determine whether an application is vulnerable to a first type of attack; analyzing one or more responses from the application based on the application responding to the first probe; in response to determining that the one or more responses from the application validate a first hypothesis about one or more vulnerabilities associated with the application, and generating at least a second probe to further verify the first hypothesis. The second probe focuses on discovering additional details about the application's vulnerabilities to the first type of attack or a second type of attack. | 2015-04-02 |
20150096034 | Determine Anomalies in Web Application Code Based on Authorization Checks - Example embodiments disclosed herein relate to determining an anomaly of a missing authorization or inconsistent authorization in web application code. The web application code is analyzed to identify methods that have authorization checks associated and labeling the identified methods as related to authorization checks. Unidentified methods are associated as non-authorization check methods. The methods are compared to determine the anomaly. | 2015-04-02 |
20150096035 | POLLUTING RESULTS OF VULNERABILITY SCANS - A security device may receive, from a server device, a response to a request. The request may be provided by an attacker device and may include a plurality of input values. The security device may determine the plurality of input values, included in the request, based on receiving the response. The security device may modify the response to form a modified response. The response may be modified to include information associated with the plurality of input values. The response may be modified in an attempt to prevent the attacker device from identifying a vulnerability, associated with the server device, based on the plurality of input values being included in the response. The security device may provide the modified response to the attacker device. | 2015-04-02 |
20150096036 | Security Testing Using Semantic Modeling - Optimized testing of vulnerabilities in an application implemented by a method includes generating a first probe directed to determine whether an application is vulnerable to a first type of attack; analyzing one or more responses from the application based on the application responding to the first probe; in response to determining that the one or more responses from the application validate a first hypothesis about one or more vulnerabilities associated with the application, and generating at least a second probe to further verify the first hypothesis. The second probe focuses on discovering additional details about the application's vulnerabilities to the first type of attack or a second type of attack. | 2015-04-02 |
20150096037 | ENHANCED VIEW COMPLIANCE TOOL - According to one embodiment, an apparatus comprises a network interface and a processor communicatively coupled to the network interface. The network interface communicates with a database comprising a plurality of columns and a plurality of views. Each view is associated with at least one column of the plurality of columns. The processor receives a request to determine one or more noncompliant views of the database. For each view and each column associated with the view, the processor determines whether the column is associated with a privacy indicator that indicates that the column should be masked and whether the view masks the column. The processor then determines that the view is noncompliant if the view does not mask at least one column that should be masked, and generates a report that indicates whether each view of the database is noncompliant. The network interface communicates the report. | 2015-04-02 |
20150096038 | COLLISION AVOIDANCE IN A DISTRIBUTED TOKENIZATION ENVIRONMENT - A client receives sensitive data to be tokenized. The client queries a token table with a portion of the sensitive data to determine if the token table includes a token mapped to the value of the portion of the sensitive data. If the mapping table does not include a token mapped to the value of the portion of the sensitive data, a candidate token is generated. The client queries a central token management system to determine if the candidate token collides with a token generated by or stored at another client. In some embodiments, the candidate token includes a value from a unique set of values assigned by the central token management system to the client, guaranteeing that the candidate token does not cause a collision. The client then tokenizes the sensitive data with the candidate token and stores the candidate token in the token table. | 2015-04-02 |
20150096039 | DYNAMIC TOKENIZATION WITH MULTIPLE TOKEN TABLES - Sensitive data is accessed by a tokenization system. The sensitive data includes a first portion and a second portion. A token table is selected from a plurality of dynamic token tables based on the second portion of the received data. The selected token table is queried with the first portion of the sensitive data. If the selected token table includes a token mapped to the value of the first portion of the sensitive data, the first portion of the sensitive data is replaced with the token to form tokenized data. If the selected token table does not include a token mapped to the value of the first portion of the sensitive data, a token is generated, the sensitive data is tokenized with the generated token, and the generated token and association with the value of the first portion of the sensitive data is stored in the selected token table. | 2015-04-02 |
20150096040 | Tokenization Column Replacement - A tokenization system includes a vector table and one or more token tables. The tokenization system accesses sensitive data and a vector from a vector table column, and modifies the sensitive data based on the accessed vector. The tokenization system then queries the one or more token tables using a portion of the modified data to identify a token mapped to the portion of the modified data. The portion of the modified data is replaced with the token to create tokenized data. The vector table can be updated by replacing a vector table column with an updated vector table column. The tokenization system can modify subsequent data using the updated vector column prior to tokenization. | 2015-04-02 |
20150096041 | IDENTIFYING AND RANKING PIRATED MEDIA CONTENT - A computer identifies and ranks URL hyperlinks to possible pirated media content by searching a web page from a first website for one or more indicator keywords, wherein a strength of an indicator keyword is related to a likelihood of pirated media content. Responsive to locating a plurality of instances of the one or more indicator keywords, identifying a plurality of hyperlinks respectively associated with one or more of the plurality of instances. Weighting, the identified plurality of hyperlinks based on at least one of: a strength of associated indicator keywords, number of associated indicator keywords, number of times each hyperlink was identified, and date of posting. Ranking the plurality of hyperlinks according to weight indicating a relative likelihood that respective hyperlinks point to pirated media content in a ranked list. | 2015-04-02 |
20150096042 | METHOD AND APPARATUS FOR IMPROVED PRIVATE MESSAGING - An improved method and apparatus for private messaging is disclosed. In one embodiment, a first device transmits a message to a second device via a server. The message is displayed on the second device without any identification of the sender, and the message disappears after a predetermined time period and is permanently deleted from the first device, second device, and server. In another embodiment, the second device sends communications to the server indicating that the second device received the message, opened the message, and deleted the message, and the server sends those communications to the first device. | 2015-04-02 |
20150096043 | METHODS AND APPARATUS TO IDENTIFY PRIVACY RELEVANT CORRELATIONS BETWEEN DATA VALUES - Methods, apparatus, systems and articles of manufacture are disclosed to identify privacy relevant correlations between data values. An example disclosed apparatus includes a principal monitor to identify a first privacy value associated with a first principal, a tuple manager to build a probability tuple matrix comprising a first tuple and a plurality of second tuples, the first tuple including the first principal and the associated first privacy value, and an Eigenvector engine to evaluate the probability tuple matrix to identify a dominant Eigenvector indicative of a correlation between the first privacy value and one of the plurality of second tuples. | 2015-04-02 |
20150096044 | Method and device for adjusting screen locking time, and electronic terminal - Disclosed are a method and a device for adjusting screen locking time, and an electronic terminal. Time interval values T1, T2, . . . , and TN between screen locking and screen unlocking for consecutive N times are acquired, and when it is determined that the acquired time interval values T1, T2, . . . , and TN are all in a preset threshold range, a current screen locking time value is updated into the sum of the current screen locking time value and a preset time delay value. In the disclosure, a usage situation in which the terminal automatically locks the screen and a user unlocks the screen is monitored in real time, and according to the time intervals between screen locking and screen unlocking for consecutive N times, it is determined whether the current screen locking time is appropriate in the current usage environment and situation. When the determining result is that the current screen locking time is inappropriate, the current screen locking time value is automatically updated into the current screen locking time value plus the preset time delay value, so as to achieve the objective of dynamically adjusting the screen locking time according to the current usage environment and situation, thereby effectively reducing the unlocking operations and screen locking settings of the user and improving satisfaction in the user experience. | 2015-04-02 |
20150096045 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR SECURELY MANAGING DATA ON A SECURE ELEMENT - Systems, methods, and computer program products are provided for managing applets. A first request to personalize the first applet is received over a communications network. A second request including a command requesting at least a portion of the second applet data is communicated to the second applet. At least a portion of the second applet data is communicated to the first applet. One or more values of the first applet data are replaced with one or more values of at least the portion of the second applet data. | 2015-04-02 |
20150096046 | Verifiable Tokenization - Use rules are included within tokenized data either before or after tokenization. The use rules can be appended to the data before or after tokenization, can be used to modify the data before or after tokenization, and can be used to select or generate token tables for use in tokenizing the data. The use rules limit how, where, and when the tokenized data can be used, who can use the tokenized data, and the like. In addition, data can be tokenized such that the tokenized data can be identified as tokenized based on the tokenized data failing a validation test. The data is tokenized using one or more token tables, and the validation test is applied to the tokenized data. If the tokenized data passes the validation test, the data is modified with formatting rules or re-tokenized with additional token tables until the tokenized data fails the validation test. | 2015-04-02 |
20150096047 | COMMUNICATION APPARATUS, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM - A communication apparatus has an auto-complete function using an LDAP protocol. The apparatus inputs character information, and verifies a certificate of an LDAP server. The apparatus obtains, by the LDAP protocol, address information including the character information input by the input unit after verifying the certificate of the LDAP server. | 2015-04-02 |
20150096048 | ALTERNATE FILES RETURNED FOR SUSPICIOUS PROCESSES IN A COMPROMISED COMPUTER NETWORK - Methods and systems are presented of presenting false and/or decoy content to an intruder operating on a computer system by obfuscating critical files on a computer storage device with data that directs subsequent infiltration and propagation to designated decoy hosts and decoy applications. | 2015-04-02 |
20150096049 | MULTI-LAYER SYSTEM FOR PRIVACY ENFORCEMENT AND MONITORING OF SUSPICIOUS DATA ACCESS BEHAVIOR - A method for controlling data access in a data-at-rest system includes executing a link intrusion prevention analysis between multiple layers of the data-at-rest system, introducing a privacy policy at enforcement points that span multiple system layers, and dynamically altering the privacy policy. | 2015-04-02 |
20150096050 | Enhanced Security For Accessing Virtual Memory - A disclosed method includes obtaining a physical address corresponding to a virtual address responsive to detecting a virtual address associated with a memory access instruction and, responsive to identifying a memory page associated with the physical address as a sensitive memory page, evaluating sensitive access information associated with the memory page. If the sensitive access information satisfies a sensitive access criteria, invoking a sensitive access handler to control execution of the memory access instruction. | 2015-04-02 |
20150096051 | Method, Apparatus, and System for Manageability and Secure Routing and Endpoint Access - A solution is presented to securing endpoints without the need for a separate bus or communication path. The solution allows for controlling access to endpoints by utilizing a management protocol by overlapping with existing interconnect communication paths in a packet format and utilizing a PCI address BDF (Bus number, Device number, and Function number) for verification. | 2015-04-02 |
20150096052 | Children's Online Personal Info Privacy Protection Service - A children's online personal information privacy protection service is disclosed, implemented in one embodiment within a Home Subscriber Server (HSS) of an IMS communication network. The HSS maintains service profiles including child user flags identifying which users are child users; and the service profiles for child users includes items of child user personal information content and access authorization data. The access authorization data is adjustable based on parental consent to allow or disallow access to certain network entities. When queried for information content by a network entity, the HSS consults the child user flag to determine whether the query relates to a child user, and if so, controls access to the information content based on the access authorization data. | 2015-04-02 |
20150096053 | Method And Apparatus For Managing Access To Electronic Content - According to at least one example embodiment, a method and corresponding content protection server for managing access to electronic content comprise retrieving access policies, or permissions, associated with a content item from a corresponding content sharing application, or rights issuer. The access policies are translated into a format recognizable by a digital rights management (DRM) engine, and forwarded to the DRM engine. The translated access policies are then provided by the DRM engine to a client device where the translated access policies are enforced in managing any potential access to the content item. | 2015-04-02 |
20150096054 | System And Method For Processing User Rights - A system and method for processing entitlement rights are disclosed. The method, in one aspect, provides for storing content at a first time, receiving a request for playback of the content at a second time, and processing a user right associated with the content to authenticate the user right in response to the request for playback, wherein the user right is authenticated based upon a state of the user right at the first time. | 2015-04-02 |
20150096055 | Monitoring Digital Images - Digital images are monitored by enabling access to a digital image, receiving a notification associated with the digital image from a first user, and regulating access of the first user to the digital image based on the notification received from the first user. | 2015-04-02 |
20150096056 | COLLISION AVOIDANCE IN A DISTRIBUTED TOKENIZATION ENVIRONMENT - A client receives sensitive data to be tokenized. The client queries a token table with a portion of the sensitive data to determine if the token table includes a token mapped to the value of the portion of the sensitive data. If the mapping table does not include a token mapped to the value of the portion of the sensitive data, a candidate token is generated. The client queries a central token management system to determine if the candidate token collides with a token generated by or stored at another client. In some embodiments, the candidate token includes a value from a unique set of values assigned by the central token management system to the client, guaranteeing that the candidate token does not cause a collision. The client then tokenizes the sensitive data with the candidate token and stores the candidate token in the token table. | 2015-04-02 |
20150096057 | Device Robustness Framework - Systems and methods for utilizing a robustness framework to restrict access to digital content distributed via a network in accordance with embodiments of the invention are disclosed. In one embodiment, restricting access to digital content includes loading device robustness information, where the device robustness information includes a device robustness level defined using a set of robustness rules, loading at least one digital rights management (DRM) certificate, where the at least one DRM certificate is utilized to authenticate the device to a DRM server, requesting playback of the content from a content store, where the content store is configured to store the content in at least one content distribution server, receiving the content from the at least one content distribution server upon a verification that the device robustness satisfies a threshold robustness by a computing system, and accessing the received content utilizing the at least one DRM certificate. | 2015-04-02 |
20150096058 | INFORMATION PROCESSING APPARATUS - According to one embodiment, an information processing apparatus includes a nonvolatile semiconductor memory and a processor. The nonvolatile semiconductor memory stores identification information. The processor controls an application which executes authentication processing for authenticating validation of the identification information stored in the nonvolatile semiconductor memory. The processor executes the application to read the identification information from the nonvolatile semiconductor memory, and to execute the authentication processing for determining whether or not the identification information is authentic. When the identification information is authentic, the processor continues at least some processes of the application, and when the identification information is inauthentic, the processor ends at least some processes of the application. | 2015-04-02 |
20150096059 | License Management System - A license management system comprises at least one processor capable of executing processor-executable code coupled with a non-transitory processor-readable medium storing a master license database and processor-executable code for causing the processor to: (a) store a master state of a network device indicative of at least one license key associated with the network device in the master license database; (b) access information indicative of a license key request for the network device subsequent to the storing of the master state, the license key request including a current state of the network device; (c) compare the master state of the network device with the current state of the network device; and (d) in response to the master state differing from the current state of the network device, generate an error message and store the error message in non-transitory processor-readable medium. | 2015-04-02 |
20150096060 | Systems and Methods for Accessing Digital Content Using Electronic Tickets and Ticket Tokens - Systems and methods for accessing digital content using electronic tickets and ticket tokens in accordance with embodiments of the invention are disclosed. In one embodiment, a user device includes a processor, a network interface, and memory configured to store an electronic ticket, and a ticket token, and the processor is configured by an application to send a request for digital content, receive a ticket token from a merchant server, wherein the ticket token is generated by a DRM server and associated with an electronic ticket that enables playback of the requested digital content, send the ticket token to a DRM server, receive an electronic ticket that enables playback of requested digital content, request the digital content associated with the electronic ticket, and play back the requested digital content using the electronic ticket. | 2015-04-02 |
20150096061 | FLEXIBLE PRINTED CABLE AND INFORMATION PROCESSING DEVICE - It is an object of this invention to provide an FPC capable of improving tamper resistance. An FPC ( | 2015-04-02 |
20150096062 | SECURITY PROCESSING APPARATUS AND SECURITY PROCESSING METHOD - The position information acquisition unit acquires the first current position information of the multifunction peripheral and the second current position information of HDD. The position information determination unit executes the first determination whether or not the first current position information is identical with the first registered position information and the second determination whether or not the second current position information is identical with the second registered position information. The activation permission unit activates the multifunction peripheral and HDD when the current position information are identical with the registered position information based on the first and second determinations, or activates the multifunction peripheral only when the current position information is identical with the registered position information based on the first or second determination, or not activates the multifunction peripheral and HDD when the current position information are not identical with the registered position information based on the first and second determinations. | 2015-04-02 |
20150096063 | MOUSE ARTIFICIAL CHROMOSOME VECTOR - Disclosed is a mouse artificial chromosome vector, comprising: a natural centromere derived from a mouse chromosome; a mouse-chromosome-derived long-arm fragment formed by deleting a long-arm distal region at a mouse chromosome long-arm site proximal to the centromere; and a telomere sequence, wherein the vector is stably retained in a cell and/or tissue of a mammal. In addition, disclosed are cells or non-human animals comprising the vector, and use of the cells or non-human animals. | 2015-04-02 |
20150096064 | RNA-INTERFERENCE BY SINGLE-STRANDED RNA MOLECULES - The present invention relates to sequence and structural features of single-stranded (ss)RNA molecules required to mediate target-specific nucleic acid modifications by RNA-interference (RNAi), such as target mRNA degradation and/or DNA methylation. | 2015-04-02 |
20150096065 | METHOD OF REGULATING GENE EXPRESSION - The present invention relates, in general, to gene expression and, in particular, to a method of inhibiting the expression of a target gene and to constructs suitable for use in such a method. | 2015-04-02 |
20150096066 | TARGET MOLECULES FOR TRANSCRIPTIONAL CONTROL SYSTEMS - The invention provides systems to control gene expression or activity using target molecules. | 2015-04-02 |
20150096067 | FEED FOR FISH - A fish feed includes carvacrol and/or salvia extract (provided that where the fish feed comprises carvacrol and not salvia extract the lipid content of the fish feed is at least 15 wt %). The salvia extract may be selected from extract of | 2015-04-02 |
20150096068 | SQUASH HYBRID SV8655YL AND PARENTS THEREOF - The invention provides seed and plants of squash hybrid SV8655YL and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of squash hybrid SV8655YL and the parent lines thereof, and to methods for producing a squash plant produced by crossing such plants with themselves or with another squash plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2015-04-02 |
20150096069 | Transgenic Plants With Enhanced Traits - This disclosure provides transgenic plants having enhanced traits such as increased yield, enhanced nitrogen use efficiency and enhanced drought tolerance; propagules, progeny and field crops of such transgenic plants; and methods of making and using such transgenic plants. This disclosure also provides methods of producing hybrid seed from such transgenic plants, growing such seed and selecting progeny plants with enhanced traits. Also disclosed are transgenic plants with altered phenotypes which are useful for screening and selecting transgenic events for the desired enhanced trait. | 2015-04-02 |
20150096070 | CHIMERIC PROMOTERS AND THEIR USES IN PLANTS - The present invention provides novel promoters for use in plants. Specifically, the present invention provides novel chimeric promoters comprising combinations of plant viral enhancer elements and plant promoters. The present invention also provides DNA constructs; transgenic cells, plants, and seeds containing these novel chimeric promoters; and methods for preparing and using the same. | 2015-04-02 |
20150096071 | TOMATO HYBRID PX 02481245 AND PARENTS THEREOF - The invention provides seed and plants of tomato hybrid PX 02481245 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid PX 02481245 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2015-04-02 |
20150096072 | TOMATO HYBRID PX 02470002 AND PARENT LINES THEREOF - The invention provides seed and plants of tomato hybrid PX 02470002 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid PX 02470002 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2015-04-02 |
20150096073 | TOMATO HYBRID PX 02490003 AND PARENTS THEREOF - The invention provides seed and plants of tomato hybrid PX 02490003 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid PX 02490003 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2015-04-02 |
20150096074 | Rice Cultivar Designated 'CL151' - A novel rice cultivar, designated ‘CL151,’ is disclosed. The invention relates to the seeds of rice cultivar ‘CL151,’ to the plants of rice ‘CL151,’ and to methods for producing a rice plant produced by crossing the cultivar ‘CL151’ with itself or another rice variety, and to single gene conversions of such plants. The invention further relates to hybrid rice seeds and plants produced by crossing the cultivar ‘CL151’ with another rice cultivar. The invention further relates to other derivatives of the cultivar ‘CL151.’ | 2015-04-02 |
20150096075 | High Yielding Soybean Plants with Low Linolenic Acid - The invention overcomes the deficiencies of the prior art by providing methods for marker assisted selection to create plants of a soybean variety that exhibit a mid/low linolenic acid content with a commercially significant yield and an agronomically elite phenotype. The invention also provides derivatives and plant parts of these plants. Further provided by the invention are methods for the use of these plants. The invention is significant in that oil with decreased linolenic acid exhibits numerous beneficial characteristics yet prior art varieties with decreased linolenic acid also exhibited decreased yield and poor agronomic quality. | 2015-04-02 |
20150096076 | HIGH YIELD TOMATO PLANTS - The present invention discloses a tomato plant exhibiting a branching inflorescence phenotype. The aforementioned plant produces statistically significant high yield of mature fruits having the characteristics of average individual fruit weight or average individual fruit brix levels or a combination thereof, similar to fruits produced by a tomato line that is used as the normally branched parent line of said tomato plant. It is also within the scope of the present invention to disclose methods for producing the aforementioned tomato plants and uses thereof. | 2015-04-02 |
20150096077 | Plants with Improved Nitrogen Utilization and Stress Tolerance - The present invention relates to transgenic plants that have increased nitrogen use efficiency, stress tolerance, or both and that have been transformed using a novel vector construct including nucleic acid sequences that modulate nitrogen use in plants. In various embodiments, the vector construct includes one or more nucleic acid sequences selected from the group consisting of SEQ ID NO: 2, 4, 7, 9, 11, 13, 15, 17, 22, 24, 26, 28, 30, 32, 34, 36, or 38. The invention also relates to isolated vectors for transforming plants and to antibodies used for detecting transformed plants. The invention also relates to methods of expressing in plants the nucleic acid molecules corresponding to the nucleic acid sequences that modulate nitrogen use in plants or are modulated by nitrogen conditions. | 2015-04-02 |
20150096078 | CITRUS TRISTEZA VIRUS BASED VECTORS FOR FOREIGN GENE/S EXPRESSION - Disclosed herein are viral vectors based on modifications of the | 2015-04-02 |
20150096079 | Compositions and Methods for Silencing Gene Expression - A method of introducing naked dsRNA into a seed is provided. The method comprising contacting the seed with the naked dsRNA under conditions which allow penetration of the dsRNA into the seed, thereby introducing the dsRNA into the seed. | 2015-04-02 |
20150096080 | ACTIVATION TAGGING PLATFORM FOR MAIZE, AND RESULTANT TAGGED POPULATIONS AND PLANTS - Disclosed herein is an activation tagging construct for maize, resulting tagged populations and plants. In one example, an activation tagging DNA construct includes a coding sequence for a transposase, a detectable reporter (such as anthocyanin regulatory genes B-Peru and C1) and a non-autonomous transposable T-DNA cassette. For example, the transposable T-DNA cassette is inserted into the detectable reporter encoding region such that the B-Peru and C1 genes express anthocyanins in a cell containing the maize activation tagging DNA construct only upon excision of the transposable cassette. Methods of generating a tagged population of maize plants include transforming a maize plant cell or tissue with the disclosed constructs. | 2015-04-02 |
20150096081 | SUBSTANCE INTRODUCTION METHOD FOR PLANT AND PLANT OBTAINED THEREWITH - This invention relates to a method for introducing a substance into a plant, said method comprising the following steps:
| 2015-04-02 |
20150096082 | Expression of the Human IGF-1 In Transgenic Plastids - A plastid transformation vector for stably transforming a plastid genome, comprising, as operably-linked components, a first flanking sequence, a DNA sequence coding for synthetic insulin-like growth factor-1 (IGF-1s) (SEQ ID NO. 1) or a substantially homologous DNA sequence of IGF-1s, which is capable of expression in the plastid genome, and a second flanking sequence. | 2015-04-02 |
20150096083 | GENOME WIDE IDENTIFICATION AND CHARACTERIZATION OF GENE EXPRESSION REGULATORY ELEMENTS IN ZEA MAYS FOR USE IN PLANTS - The present invention provides non-coding regulatory element polynucleotide molecules isolated from the lipid transfer protein (LTP) gene of | 2015-04-02 |
20150096084 | Blueberry plant named 'drisbluenine' - A new and distinct variety of blueberry plant named ‘DrisBlueNine’ particularly distinguished by having a late harvest season, high productivity and large, firm berries, is disclosed. | 2015-04-02 |
20150096085 | Avocado tree named 'Nico' - The ‘Nico’ avocado is of medium size, average 16-22 ounces and being about 5.3 inches in length, and has overall good eating qualities. The fruit matures and can be picked in March to early April. The fruit is an ovate berry that has a soft shelled, smooth textured, exocarp that is dark green. | 2015-04-02 |
20150096086 | Strawberry plant named 'drisstrawthirtysix' - A new and distinct variety of strawberry plant named ‘DrisStrawThirtySix’ particularly characterized by a very vigorous plant bearing large, conic shaped fruit having an early harvest maturity is disclosed: | 2015-04-02 |
20150096087 | Strawberry plant named 'DRISSTRAWFORTYONE' - A new and distinct variety of strawberry plant named ‘DrisStrawFortyOne’ particularly characterized by a dense plant bearing dark red fruit having a mid-season harvest maturity is disclosed. | 2015-04-02 |
20150096088 | Phalaenopsis orchid plant named 'PHALDUXI' - A new and distinct variety of | 2015-04-02 |
20150096090 | Sedum plant named 'Touchdown Breeze' - A new and distinct hybrid of | 2015-04-02 |
20150096091 | Sedum plant named 'Touchdown Teak' - A new and distinct hybrid of | 2015-04-02 |
20150096092 | Sedum plant named 'Touchdown Jade' - A new and distinct hybrid of | 2015-04-02 |
20150096093 | Sedum plant named 'Touchdown Flame' - A new and distinct hybrid of | 2015-04-02 |