15th week of 2013 patent applcation highlights part 49 |
Patent application number | Title | Published |
20130091531 | NODE AND SYSTEM FOR A SYNCHRONOUS NETWORK - There is provided a node for facilitating time distribution in communication networks, and more specifically for time synchronization in digital television (DTV) distribution network. The node comprises an interface, a clock for establishing a local time, and a time-locked loop. The interface is configured for interconnecting the node to at least one neighboring node over an isochronous transport link for transmission and reception of repetitive frames comprising time information. The time-locked loop is configured for, based on remote time information received via the interface and local time information from the clock, synchronizing the clock to the clock of one of the at least one neighboring node. This facilitates that the node, or a corresponding synchronous network comprising nodes according to the inventive concept, is rather insensitive to network delays. In this way the requirements on the network infrastructure are reduced. In particular, there is no need for dedicated networks. Further, a synchronous network, a method for the node and a method for a synchronous network is provided. | 2013-04-11 |
20130091532 | Method and Apparatus for Providing Wireless Communications Within a Building - A wireless distribution secured cabling system includes faceplates, each of which contains an antenna or other radiating element and an active amplifier, which serves as a bi-directional repeater for the wireless communication system. The system further includes a patch panel or distribution module which connects multiple cables, which may be either twisted pair or coaxial, to amplifier, acting as a power divider and/or an impedance matching device. An antenna, which may be mounted either outside of a building structure or inside the building structure, provides communications between the structured cabling system and a service provider base station. | 2013-04-11 |
20130091533 | PASSIVE MULTI-PORT ENTRY ADAPTER AND METHOD FOR PRESERVING DOWNSTREAM CATV SIGNAL STRENGTH WITHIN IN-HOME NETWORK - A cable television (CATV) entry adapter interfaces to a CATV network and serves as a hub in an in-home network for passively communicating multimedia content or information from the CATV network and between subscriber devices connected to the ports of the CATV entry adapter, using CATV signals in a CATV frequency band and network signals in a different in-home network band. | 2013-04-11 |
20130091534 | NETWORK APPLIANCE FOR CUSTOMIZABLE QUARANTINING OF A NODE ON A NETWORK - A system, method, and apparatus are directed to managing access to a network. An agent may intercept a network packet transmitted by an enforcement point in response to a request from a device to join the network. The agent identifies, based on the network packet, a port number on the enforcement point at which the request is received. The agent may transmit the port number to a NACA to enable security enforcement operations to be performed on the device. Another device may reside outside the quarantined network and be enabled by the NACA to direct a remediation measure to be performed on the device using at least the port number. The NACA may spoof an ARP response with an address of the NACA to restrict access to resources. The NACA may also place the device into one of a plurality of quarantined networks. | 2013-04-11 |
20130091535 | EFFECTIVE TESTING OF AUTHORIZATION LOGIC OF WEB COMPONENTS WHICH UTILIZE CLAIMS-BASED AUTHORIZATION - An authorization algorithm of a software component can be selected. A static code analysis can be performed to determine a conditional statement within an algorithm of the software component. The outcome of the conditional statement can be established based on an input and a criteria using dynamic code analysis. The input can be a value associated with a claim set of a claims-based authentication policy. The criteria can be an authentication criteria specified within the algorithm. Responsive to the outcome, an execution path associated with the outcome can be determined and a code coverage criterion can be met for the conditional statement. | 2013-04-11 |
20130091536 | SYSTEM AND METHOD FOR POLICY CONFORMANCE IN A WEB APPLICATION - A method and system may analyze a script file of a web application, the script file representing actions of a task performed in conjunction with a web service, to determine whether the actions conform to policy criteria. The method and system may determine as restricted any of the actions which do not conform to the policy criteria. The method and system may execute the script file without the restricted actions to reproduce the task in response to a request by a user. | 2013-04-11 |
20130091537 | RESTRICTING NETWORK AND DEVICE ACCESS BASED ON PRESENCE DETECTION - In an example embodiment, a technique that applies a network policy responsive to specified events, or triggers, to a networked device. If a specified event occurs, the network policy may restrict the device's access to the network. For example, if a user walks away from their networked device, such as a laptop, the device's network access changes. For example, depending upon the policy, network traffic may be blocked or otherwise restricted. | 2013-04-11 |
20130091538 | SECURE FIREWALL RULE FORMULATION - A kernel extension is configured to intercept a call to associate a socket with a port of a node in a network. The call originates from a kernel of the node. The kernel extension is configured to determine the port from the call. The kernel extension is configured to determine that the port is one of a plurality of ports for which the node has authority to modify firewall rules of a firewall of the network. The kernel extension is configured to modify firewall rules maintained by the firewall to allow communications for the port to the node through the firewall. | 2013-04-11 |
20130091539 | SYSTEM AND METHOD FOR INSIDER THREAT DETECTION - A system and method include obtaining data related to accessing cyber assets and accessing physical assets from a combined cyber access and physical access control system that protects cyber and physical assets of an organization from both authorized and unauthorized access with malicious intent. The system and method compare the data to known patterns of expected behavior, and identify patterns of suspicious behavior as a function of comparing the data to the patterns of expected behavior. The comparison is utilized to identify potentially malicious insider behavior toward the cyber and physical assets. | 2013-04-11 |
20130091540 | SOCIAL DEVICE SECURITY IN A SOCIAL NETWORK - A social network (SNET) is divided into one or more circles employing separate security secrets, e.g. keys, for communication between members. A device can be a member of more than one circle, and store different keys for each of those circles in separate, restricted portions of memory. When a member leaves a circle, new keys can be generated and distributed to the remaining members. Before and after joining a circle, a level of trust associated with the device or human member can be determined based on third party trust verification and a trust history. A requirement for multiple current circle members to vouch for the prospective member can be imposed as a condition of membership. Each circle can be assigned different trust and access levels, and authorization to receive information can be checked before transmitting information between circles. | 2013-04-11 |
20130091541 | EFFECTIVE TESTING OF AUTHORIZATION LOGIC OF WEB COMPONENTS WHICH UTILIZE CLAIMS-BASED AUTHORIZATION - An authorization algorithm of a software component can be selected. A static code analysis can be performed to determine a conditional statement within an algorithm of the software component. The outcome of the conditional statement can be established based on an input and a criteria using dynamic code analysis. The input can be a value associated with a claim set of a claims-based authentication policy. The criteria can be an authentication criteria specified within the algorithm. Responsive to the outcome, an execution path associated with the outcome can be determined and a code coverage criterion can be met for the conditional statement. | 2013-04-11 |
20130091542 | APPLICATION MARKETPLACE ADMINISTRATIVE CONTROLS - The subject matter of this specification can be embodied in, among other things, a method that includes receiving, by one or more servers associated with an application marketplace, a policy that includes data that identifies one or more users, and a restricted permission. A request is received, by the servers associated with the application marketplace, to access one or more applications that are distributed through the application marketplace, wherein the request includes data that identifies a particular one of the users. One or more of the applications that are associated with the restricted permission are identified by the servers associated with the application marketplace, and access by the particular user to the applications that are associated with the restricted permission is restricted by the servers associated with the application marketplace. | 2013-04-11 |
20130091543 | SYSTEM AND METHOD FOR CREATING SECURE APPLICATIONS - A method for generating a secure application is described herein. The method can include the steps of obtaining a target application and decomposing the target application into original files that contain predictable instructions. One or more predictable instructions in the original files may be identified. In addition, the target application may be modified to create the secure application by binding one or more intercepts to the target application. These intercepts can enable the modification of the predictable instructions in accordance with one or more policies such that the behavior of the secure application is different from the original behavior of the target application. Modification of the target application may be conducted without access to the source code of the target application. | 2013-04-11 |
20130091544 | SYSTEM AND METHOD FOR ENFORCING A POLICY FOR AN AUTHENTICATOR DEVICE - A system and method including defining at least one device authentication policy; at a policy engine, initializing authentication policy processing for an authenticator device; collecting device status assessment; evaluating policy compliance of the device status assessment to an associated defined device authentication policy; and enforcing use of the authenticator device according to the policy compliance. | 2013-04-11 |
20130091545 | DELIVERY OF CUSTOMIZED CONTENT FOR UNIQUELY IDENTIFIED MEMORY DEVICES - In particular embodiments, customized content is determined and provided to a user based on a unique identifier stored on a memory device. In one embodiment, a method of delivering content can include: accessing a unique identifier from a memory device that is removably coupled to a computing device, where the memory device includes the unique identifier and preloaded content; using the unique identifier to determine personalized information about a user of the memory device; authenticating the memory device by using the unique identifier from the memory device; determining customized content for the user if the memory device is authenticated, where the customized content is based on the unique identifier; and providing the customized content for presentation to the user along with the preloaded content and the personalized information. | 2013-04-11 |
20130091546 | Transmitting Authentication Information - The invention relates to a session control entity, a subscriber data entity, method and a computer program product for registering a user to a network, obtaining authentication information for the user and transmitting the authentication information to a subscription entity of the network during a registration of the user. | 2013-04-11 |
20130091547 | Method and System for Enabling Non-Intrusive Multi Tenancy Enablement - A system for enabling non-intrusive multi tenancy enablement in an application may include a processing unit configured to, among other things, identify a data isolation mechanism available in said application, create a centralized multi-tenant database, generate a controlled provisioning layer to manage relationships between a set of consumers and a corresponding entity uniquely developed for said consumers, and generate a multi-tenant wrapper interface for managing relationship(s) between said consumers and instances of the application. The system may further include a memory unit configured to host said centralized customer database to manage users and associated access privileges in said application. | 2013-04-11 |
20130091548 | SENDING DIGITAL DATA VISUALLY USING MOBILE DISPLAY AND CAMERA SENSOR - A system for establishing a connection between a first device and a wireless network includes a first control module, located on the first device, that receives encoded digital data. The encoded digital data corresponds to a plurality of images displayed sequentially on a display of a second device. Each of the plurality of images corresponds to a different portion of the encoded digital data. A decoder module, located on the first device, converts the encoded digital data into configuration data. The configuration data includes at least one of an identifier of the wireless network, an encryption key associated with the wireless network, and a password associated with the wireless network. The first control module uses the configuration data to establish the connection with the wireless network. | 2013-04-11 |
20130091549 | SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO CONTENT DISTRIBUTED OVER A NETWORK - A computer-implemented method is provided for controlling use of a file on a user device. The method includes transmitting authentication information to a system and downloading the file from the system over the network upon successful authentication by the system. The method also includes limiting access of the file to a client application of the user device and preventing altering of the file, printing of the file and opening of the file outside of the client application. Notes corresponding to the file can be stored in a local storage area. | 2013-04-11 |
20130091550 | SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO CONTENT DISTRIBUTED OVER A NETWORK - A computer-implemented method is provided for controlling use of a file on a user device. The method includes transmitting authentication information to a system and downloading the file from the system over the network upon successful authentication by the system. The method also includes limiting access of the file to a client application of the user device and preventing altering of the file, printing of the file and opening of the file outside of the client application. Notes corresponding to the file can be stored in a local storage area. | 2013-04-11 |
20130091551 | Social Processing Member Offering Fixed and Intelligent Services - A social networking system offers a variety of fixed and intelligent services and social device resources participating as members in a social network (SNET) group. Such members may include, for example, social billing and payment services, digital assistants and artificial intelligence functions, robotic control and training services, media content storage and playback services, data backup services, services that support distributed processes such as distributed research projects, networking elements such as network attached storage (NAS), firewalls, proxies, etc. In various embodiments, such services and resources may become available upon being selectively docked or otherwise associated (e.g., through docking of a supporting device) with a SNET group by a human member or third party via a docked user device. Selection of available services may be supported through a visual menu provided by a member device or support service. | 2013-04-11 |
20130091552 | AUTHENTICATION METHOD AND APPARATUS FOR USER EQUIPMENT AND LIPA NETWORK ENTITIES - An authentication method for user equipment (UE) and LIPA network entities is applicable to a cross-LIPA communication environment having an UE end, a visiting LIPA network entity end (LIPA | 2013-04-11 |
20130091553 | METHOD AND APPARATUS FOR DETERMINING INPUT - A method and apparatus for determining an input are provided. The method includes authenticating an external device, when the external device approaches in a predetermined range; determining an area approached by the external device and determining whether the determined area is valid; and outputting a predetermined indication to a predetermined area related to the area approached by the external device. | 2013-04-11 |
20130091554 | TERMINAL APPARATUS, SERVER APPARATUS, NETWORK SYSTEM, AND COMMUNICATION METHOD - A terminal apparatus according to an embodiment includes: a cookie memory unit that stores an Opt-allow cookie which is data set by a user and is data indicating whether use of user information regarding the user is permitted for each user information; a connecting unit that performs communication connection with a server apparatus that determines content to be delivered based on the user information; and a transmitting unit that transmits the Opt-allow cookie stored in the cookie memory unit to the server apparatus, when the server apparatus connected through the communication connection by the connecting unit receives the cookie. | 2013-04-11 |
20130091555 | COMMUNICATION RELAY APPARATUS, COMMUNICATION RELAY SYSTEM, COMMUNICATION RELAY METHOD, AND COMMUNICATION RELAY PROGRAM - This invention is directed to acquisition of a communication path for a mobile communication apparatus in a case of occurrence of communications beyond the capacity of a radio base station due to a communication trouble or the like. | 2013-04-11 |
20130091556 | METHOD FOR ESTABLISHING A SECURE AND AUTHORIZED CONNECTION BETWEEN A SMART CARD AND A DEVICE IN A NETWORK - It is provided a method a method for establishing a first secure and authorized connection between a smart card and a first device in a network, wherein the first device comprises a second secure connection to a second device, wherein the method comprises storing a first security data; transferring the first security data between the first device and the second device; providing the first security data at the first device; establishing a binding between the smart card and the first device via the first secure and authorized connection utilizing the first security data; authorizing the binding between the smart card and the first device; and sending a second security data from the smart card to the first device via the first secure and authorized connection whereas the second security data may be usable for authentication of the first device to the network. | 2013-04-11 |
20130091557 | SYSTEM AND METHOD FOR PROVIDING CLOUD-BASED CROSS-PLATFORM APPLICATION STORES FOR MOBILE COMPUTING DEVICES - A method of accessing an application on an internet computing device includes deploying a cross-platform application store server, and accessing one or more multi-platform applications in either of two modes: a first mode including running in a cloud one or more multi-platform applications in an application container, and remotely displaying the applications using a display protocol, or a second mode including running by proxy one or more local applications on a device in a secure application container. | 2013-04-11 |
20130091558 | METHOD AND SYSTEM FOR SHARING MULTIMEDIA CONTENTS BETWEEN DEVICES IN CLOUD NETWORK - A method and system for sharing contents between devices registered in a cloud system. A cloud server in the cloud system includes a web server for controlling access of a first device to the cloud server; a cloud control unit for controlling networking between devices registered in the cloud server and a content server having access to the cloud server; a device management unit for managing information regarding the first device and the registered devices; and a context recognition management unit for managing context information of the first device and the registered devices. | 2013-04-11 |
20130091559 | Computer-Implemented Method for Mobile Authentication and Corresponding Computer System - In one embodiment of the present invention a computerized method includes receiving at a personal-mobile device a first communication, which includes information for requesting user verification for logging into an account of a user, via a computing device. The account is with a service provided by an application server. The method includes starting a personal-authentication application on the personal-mobile device in response to receiving the first communication, and receiving in the personal-authentication application a user verification for confirming logging into the account. The method includes logging into the account via the computing device based on receipt of the user verification. Embodiments of the present invention provide enhanced security for logging into an account that a user may have with a service by providing that a personal-mobile device, such as a mobile telephone, which is personal to a user, is configured as a security token for login to the account. | 2013-04-11 |
20130091560 | SEAMLESS DATA NETWORKING - A roaming client in communication with an enterprise site through a virtual private network (VPN) gateway maintains an address for a virtual network interface upon becoming a resident client at the enterprise site. A physical interface for the resident includes two valid addresses. Seamless data networking is achieved while promoting routing efficiency by reducing the amount of local traffic addressed to and from the virtual address that is unnecessarily routed through VPN gateways. | 2013-04-11 |
20130091561 | EXECUTING COMMANDS PROVIDED DURING USER AUTHENTICATION - A mobile device may receive commands during confirmation of an identity of an individual access the device or secure data on the device. The commands may instruct the mobile device to perform security-related functions. For example, when the individual is under duress when logging in to the mobile device, the individual may perform a gesture indicating to the mobile device to change the password. The mobile device then changes the password for the individual to a secondary password. If a thief then takes the mobile device from the individual, the thief will no longer have access to the mobile device using the password provided by the individual under duress. | 2013-04-11 |
20130091562 | COMPUTER - It is an object of the present invention to provide a technique for managing, in a file system that stores past images of a data file, access right to the past images. | 2013-04-11 |
20130091563 | METHOD AND APPARATUS FOR IMPROVED DIGITAL RIGHTS MANAGEMENT - A method and apparatus for improved digital rights management is provided. | 2013-04-11 |
20130091564 | SYSTEMS AND METHODS FOR MITIGATING THE UNAUTHORIZED USE OF A DEVICE - The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a method includes detecting that a security compromise event has occurred for a mobile device. The method also includes altering a function of the mobile device in response to the security compromise event to mitigate loss of control by an authorized user. Altering the function of the mobile device includes denying access to data stored on the mobile device. | 2013-04-11 |
20130091565 | Access Control for Electrical Charging Stations - A method for access control and session control of electrical producers and/or consumers in accessible energy transfer units is provided, wherein the producer or the consumer is authenticated and authorized at the energy transfer unit, and producer- or consumer-specific data are forwarded by the energy transfer unit to an energy provider after authentication and authorization of the producer or the consumer. A temporarily-valid session token is generated for the control of the energy transfer by the energy provider, and forwarded to the energy transfer unit and the producer or the consumer. Electrical energy is transferred between the energy transfer unit and the producer or the consumer, wherein in a defined time interval during the energy transfer process the session token is sent at least once by the energy transfer unit to the producer or the consumer and from the producer or the consumer to the energy transfer unit. | 2013-04-11 |
20130091566 | INTERNET PROTOCOL ADDRESS SPACE MANAGEMENT TO MITIGATE AND DETECT CLOAKING AND OTHER ABUSE - In one embodiment, an intelligent detection system | 2013-04-11 |
20130091567 | DEVICE AND METHOD FOR ENERGY MANAGEMENT IN A HOUSEHOLD - An energy management system comprises one or more appliances, a remote device, and a communication device. In one embodiment, the communication device forms a physical connection with the remote device and thereafter a physical connection with an associated appliances. The first physical connection binds the communication to the remote device, thereby forming a secure connection over which inputs and outputs can be exchanged between the remote and the associated appliance when the communication device is connected to the appliance. | 2013-04-11 |
20130091568 | SYSTEMS AND METHODS FOR SECURE IN-VM MONITORING - Security systems can provide secure and efficient in-VM monitoring. An exemplary security system can be built upon hardware virtualization features and can comprise a virtual machine having a plurality of standard virtual address spaces, as well as a hidden virtual address space. While the standard virtual address spaces can be directly accessible by a kernel in the virtual machine, the hidden virtual address space can be hidden from the kernel, which can be absent a virtual page table corresponding to the hidden virtual address space. A security monitor can reside in the hidden address space, monitoring the kernel without being modifiable by the kernel. A processor can transfer focus from the standard virtual address spaces to the hidden virtual address space only through predetermined entry gates, and the processor can transfer focus from the hidden virtual address space to the standard virtual address spaces only through predetermined exit gates. | 2013-04-11 |
20130091569 | LOGIN INITIATED SCANNING OF COMPUTING DEVICES - Embodiments of the invention relate to systems, methods, and computer program products for login initiated remote scanning of computer devices. The present invention detects login to the network via access management systems. The login data provides information that identifies the device so that the device can be checked against a scan database to determine if and when a previous scan occurred. Based on the findings in the scan database determinations are made as to whether to perform a scan. Additionally, the level of scanning can be determined based on previous scan dates and previous scan results, which may dictate customized scanning. In addition, the priority of the impending scan may be dictated by previous scan dates and results. Further embodiments provide for assessing risk, such as risk scoring or the like, concurrently or in near-real-time with the completion of the scan so that alerts may be communicated. | 2013-04-11 |
20130091570 | SHORT-RANGE MOBILE HONEYPOT FOR SAMPLING AND TRACKING THREATS - Files received by a mobile device are sampled for malware tracking. The method includes configuring file transfer mechanisms that use short-range communication technology on the mobile device to appear, to other devices, to be open for accepting all attempts to transfer files. The method further comprises intercepting files transferred via the short-range communication technology to the mobile device from another device. The method also comprises quarantining the files transferred to the mobile device and logging identifying information about each of the files quarantined and about the other devices from which each of the files originated. The method further includes providing the logged identifying information for the files received to a security server. The method can also include, responsive to a request from the security server for more information about one of the files, providing a copy of that file to the security server for malware analysis and for updating a reputation system tracking mobile device malware. | 2013-04-11 |
20130091571 | SYSTEMS AND METHODS OF PROCESSING DATA ASSOCIATED WITH DETECTION AND/OR HANDLING OF MALWARE - The present disclosure relates to malware and, more particularly, towards systems and methods of processing information associated with detecting and handling malware. According to certain illustrative implementations, methods of processing malware are disclosed. Moreover, such methods may include one or more of unpacking and/or decrypting malware samples, dynamically analyzing the samples, disassembling and/or reverse engineering the samples, performing static analysis of the samples, determining latent logic execution path information regarding the samples, classifying the samples, and/or providing intelligent report information regarding the samples. | 2013-04-11 |
20130091572 | Systems, methods, and devices for defending a network - Certain exemplary embodiments comprise a method comprising: within a backbone network: for backbone network traffic addressed to a particular target and comprising attack traffic and non-attack traffic, the attack traffic simultaneously carried by the backbone network with the non-attack traffic: redirecting at least a portion of the attack traffic to a scrubbing complex; and allowing at least a portion of the non-attack traffic to continue to the particular target without redirection to the scrubbing complex. | 2013-04-11 |
20130091573 | SYSTEM AND METHOD FOR A DISTRIBUTED APPLICATION OF A NETWORK SECURITY SYSTEM (SDI-SCAM) - A widely distributed security system (SDI-SCAM) that protects computers at individual client locations, but which constantly pools and analyzes information gathered from machines across a network in order to quickly detect patterns consistent with intrusion or attack, singular or coordinated. When a novel method of attack has been detected, the system distributes warnings and potential countermeasures to each individual machine on the network. Such a warning may potentially consist of a probability distribution of the likelihood of an intrusion or attack as well as the relative probabilistic likelihood that such potential intrusion possesses certain characteristics or typologies or even strategic objectives in order to best recommend and/or distribute to each machine the most befitting countermeasure(s) given all presently known particular data and associated predicted probabilistic information regarding the prospective intrusion or attack. If any systems are adversely affected, methods for repairing the damage are shared and redistributed throughout the network. | 2013-04-11 |
20130091574 | INCIDENT TRIAGE ENGINE - An incident triage engine performs incident triage in a system by prioritizing responses to incidents within the system. One prioritization method may include receiving attributes of incidents and assets in the system, generating cumulative loss forecasts for the incidents, and prioritizing the responses to the incidents based on the cumulative loss forecasts for the incidents. Another prioritization method may include determining different arrangements of incidents within a response queue, calculating cumulative queue loss forecasts for the different arrangements of incidents within the response queue, and arranging the incidents in the response queue based on the arrangement of incidents that minimizes the total loss to the system over the resolution of all of the incidents present in the response queue. | 2013-04-11 |
20130091575 | ANTIVIRUS SYSTEM AND METHOD FOR REMOVABLE MEDIA DEVICES - A removable media device, which may be a USB attached device or other type of removable media device, includes a software program located on the device which upon startup or access, the software program scans one or more of electronic files stored on the removable media device and electronic files being transferred to or from the electronic media device and to or from a host computing system for the detection of viruses therein. The software program is further configured to block the transfer of detected virus-containing electronic files and to disallow the copy or writing of files to or from the removable media device to or from a host computing system that can not be scanned. The software program is further configured to block the encryption of files being written to a removable media device if such device contains hardware or software encryption if such files can not be scanned. | 2013-04-11 |
20130091576 | WIRELESS COMMUNICATION SYSTEM CONGESTION REDUCTION SYSTEM AND METHOD - A messaging server forwards emails to mobile communication devices of users to whom the emails were respectively addressed. An antivirus server determines whether an email addressed to a user of a mobile communication device, to be forwarded by the messaging server to the mobile communication device, is infected with a virus. In response to determining the email is infected with a virus, a bulletin generator transmits, to the mobile communication devices besides the mobile communication device of the addressee of the email determined to be infected, an all points bulletin message disclosing the existence of the virus. The bulletin message is transmitted directly to, instead of via email to, the wireless mobile communication devices. | 2013-04-11 |
20130091577 | METHODS AND SYSTEMS FOR AUTOMATED NETWORK SCANNING IN DYNAMIC VIRTUALIZED ENVIRONMENTS - Systems and methods for managing jobs to be scanned based on existence of processing nodes are described. One of the methods includes obtaining identification information regarding operation of a first set of the processing nodes from an inventory and creating a job for scanning the processing nodes of the first set for security vulnerability. The job includes the identification information. The method further includes verifying the inventory to determine the first identifying information of the first set of processing nodes for removal from the job and loading the job having second identifying information for a second set of processing nodes that remain after the verifying operation. | 2013-04-11 |
20130091578 | SYSTEM AND A METHOD FOR AUTOMATICALLY DETECTING SECURITY VULNERABILITIES IN CLIENT-SERVER APPLICATIONS - A method for automatically detecting security vulnerabilities in a client-server application where a client is connected to a server. The method is implemented by a computer having a processor and a software program stored on a non-transitory computer readable medium. The method includes automatically extracting, with the software program at the client, a description of one or more validation checks on inputs performed by the client. The method also includes analyzing the server, with the software program by using the one or more validation checks on inputs performed by the client, to determine whether the server is not performing validation checks that the server must be performing. The method further includes determining that security vulnerabilities in the client-server application exist when the server is not performing validation checks that the server must be performing. A method further proposes preventing parameter tampering attacks on a running client-server application by enforcing the one or more validation checks on inputs performed by the client on each input that is submitted to the server. | 2013-04-11 |
20130091579 | INTELLIGENT CONNECTORS INTEGRATING MAGNETIC MODULAR JACKS AND INTELLIGENT PHYSICAL LAYER DEVICES - An apparatus comprises a connector, wherein the connector comprises i) a jack, wherein the jack comprises a) a plurality of electrical terminals, and b) a magnetic component electrically coupled to the plurality of electrical terminals; and ii) a physical layer device, wherein the physical layer device comprises a) a physical layer module, wherein the physical layer module comprises an interface configured to receive packets from the jack, and an interface bus configured to inspect the packets, and b) a network interface configured to, based on the inspection of the packets by the interface bus, provide the packets to a device separate from the physical layer device. | 2013-04-11 |
20130091580 | Detect and Prevent Illegal Consumption of Content on the Internet - Disclosed are systems and methods for preventing (or at least deterring) a user from inadvertently or directly consuming illegal content on the Internet. For example, determine when a user might visit a site distributing illegal content (i.e., material in violation of a copyright or otherwise inappropriately distributed) and presenting a warning to the user prior to navigating to the identified inappropriate distribution site. Optionally, alternative distribution sites (i.e., an authorized distribution site) for the same or similar material can be presented to the user. For example, a user might be likely to visit an inappropriate distribution site when sent a message containing a link or when search results from a search engine query identify a plurality of distributors for a requested movie, song, book, etc. By informing a user of illegal sources and possible alternatives, a user can obtain the desired electronic distribution without violating an author's intellectual property rights. | 2013-04-11 |
20130091581 | Methods and Systems for Establishing and Maintaining Verified Anonymity in Online Environments - In online communities and e-commerce sites that desire identity verification of individuals, a verified user is restricted to a single user identity, typically the user's real name. The use of one's real name in the context of online transactions and communication, however, is often not ideal, and in some instances, may present a safety risk for the individual. Further, specific transactions may require privacy. This invention provides methods and systems that allow an online user to establish and maintain verified anonymity. To accomplish this, a user's real identity is first verified, after which s/he establishes one or more pseudonyms each associated with the user's account, which the user may select to for use in the online environment, for example, an online social network. | 2013-04-11 |
20130091582 | CONTENT SECURITY IN A SOCIAL NETWORK - Members of a social network (SNET) circle can share content with other members of SNET circle, members of the same SNET that are not members of the same circle, or send content to people or devices outside of SNET. Different levels of content security can be applied to the shared content, depending on who requests the content, the destination of the content, user preferences, content type, SNET, SNET circle, or other security parameters. Content can be tagged to limit the number of times it can be accessed, the length of time access is allowed, and to otherwise control redistribution. Content can also be protected by limiting host network access to the content, implementing SNET circle firewalls and virtual private networks, or transcoding content before allowing transmission to non-SNET circle or SNET members. Docking of devices into an SNET security circle can be restricted to properly secured devices. | 2013-04-11 |
20130091583 | METHOD AND DEVICE FOR SECURED ENTRY OF PERSONAL DATA - A method for secured entry of personal data is disclosed. This method comprises for each item of personal data a first step of presentation of a virtual keyboard comprising keys and a first cursor, followed by a step of selection of a key corresponding to the item of personal data wherein the virtual keyboard also comprises at least one dummy cursor and wherein the position on the virtual keyboard of the at least one dummy cursor depends on the position of the first cursor. A device for secured entry of personal data configured to implement the method is further disclosed. | 2013-04-11 |
20130091584 | Distributed System and Method for Tracking and Blocking Malicious Internet Hosts - Disclosed are systems and methods to perform coordinated blocking of source addresses, such as an Internet Protocol (IP) addresses, across a plurality of network appliances (e.g., gateways). In one disclosed embodiment the method and system temporarily alter a configuration of one or more network appliances (based on user defined configuration parameters) to allow communication from a “blocked” IP address for a period of time. A network appliance can then “receive” an email and perform analysis and provide results of the analysis to a reputation service. Thereby, the temporarily allowed communication can be used to learn information about a threat which would not have been available if all communication from that IP address had actually been blocked at the network appliance. | 2013-04-11 |
20130091585 | MOBILE WIRELESS COMMUNICATIONS DEVICE HAVING VALIDATION FEATURE AND RELATED METHODS - A mobile wireless communications device may include a wireless transceiver and a controller coupled to the wireless transceiver. The controller may be configured to determine if an email address is associated with the mobile wireless communications device. The controller may further be configured to wirelessly send a validation request to a validation server based upon the email address, and wait for a validation email to be wirelessly received from the validation server based upon the validation request if the email address is associated with the wireless communications device, and if the validation email is wirelessly received, then validate access an application based upon the validation email. | 2013-04-11 |
20130091586 | Electronic Permission Slips for Controlling Access to Multimedia Content - An administrator controls viewer access to restricted multimedia programs using electronic permission slips. In response to a viewer's request to view a restricted multimedia program, the viewer may initiate the generation of an electronic permission slip that is sent to an electronic device associated with the administrator. The electronic permission slip may include text-based information, graphical information, audio information, and the like. The electronic permission slip may enable input of permission data regarding whether the viewer is allowed to receive the blocked program. In response to the administrator granting permission, a service provider network allows the viewer to access the restricted multimedia program. | 2013-04-11 |
20130091587 | SYSTEMS AND METHODS OF IMPLEMENTING REMOTE BOUNDARY SCAN FEATURES - A system and method for remotely performing boundary scans on a circuit board, device and/or system across a network. A first computing component, connected to the network, includes a computer readable media including computer executable instructions. The instructions cause the computing component to maintain or access a library of test scan procedures for a plurality of subject circuit boards. At least one of the test scan procedure is downloaded to a second computing component proximate the circuit board, device and/or system. The second computing component and the test scan procedure are monitored and controlled remotely via the network. | 2013-04-11 |
20130091588 | METHOD AND APPARATUS FOR IMPROVED DIGITAL RIGHTS MANAGEMENT - A method and apparatus for improved digital rights management is provided. | 2013-04-11 |
20130091589 | MULTI-DOMAIN SECURE COMPUTER SYSTEM - Disclosed is a hardware based secure multi-level security computing system system. The system comprises a chassis enclosing multiple separate, secure computer devices or domains, each within an electromagnetic shielding Faraday cage. The chassis structure includes internal electromagnetic shields and other features to prevent cross domain electromagnetic interference or compromising emanations. The chassis may be the size of a standard computer tower. The computer devices or domains may be configured for handling information of different classification levels. Optionally, each of the computer devices may operate on significantly less power than a standard computer. Preferably, each computer operates on no more than 50 Watts of power, more preferably on less than 35 Watts of power. | 2013-04-11 |
20130091590 | ENABLING A SERVICE TO RETURN LOST LAPTOPS - A method, system, and computer-readable storage medium for providing a unique identifier for a computer system and a message from a service external to the computer system, such as a laptop return service, for display when the computer system is powered on. The computer system is configured to restrict functionality until the service authorizes restoration of full functionality of the computer system. The message includes contact information for the laptop return service and, when the service is contacted, the service sends an instruction to return the computer system to full functionality. Other embodiments are described and claimed. | 2013-04-11 |
20130091591 | ARTERY- AND VEIN-SPECIFIC PROTEINS AND USES THEREFOR - Arterial and venous endothelial cells are molecularly distinct from the earliest stages of angiogenesis. This distinction is revealed by expression on arterial cells of a transmembrane ligand, called EphrinB2 whose receptor EphB4 is expressed on venous cells. Targeted disruption of the EphrinB2 gene prevents the remodeling of veins from a capillary plexus into properly branched structures. Moreover, it also disrupts the remodeling of arteries, suggesting that reciprocal interactions between pre-specified arterial and venous endothelial cells are necessary for angiogenesis. This distinction can be used to advantage in methods to alter angiogenesis, methods to assess the effect of drugs on artery cells and vein cells, and methods to identify and isolate artery cells and vein cells, for example. | 2013-04-11 |
20130091592 | SOYBEAN CULTIVAR S090098 - A soybean cultivar designated S090098 is disclosed. The invention relates to the seeds of soybean cultivar S090098, to the plants of soybean cultivar S090098, to the plant parts of soybean cultivar S090098, and to methods for producing progeny of soybean cultivar S090098. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S090098. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S090098, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S090098 with another soybean cultivar. | 2013-04-11 |
20130091593 | SOYBEAN CULTIVAR S090033 - A soybean cultivar designated S090033 is disclosed. The invention relates to the seeds of soybean cultivar S090033, to the plants of soybean cultivar S090033, to the plant parts of soybean cultivar S090033, and to methods for producing progeny of soybean cultivar S090033. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S090033. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S090033, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S090033 with another soybean cultivar. | 2013-04-11 |
20130091594 | COTTON CULTIVAR UA03 - A cotton cultivar, designated UA03, is disclosed. The invention relates to the seeds of cotton cultivar UA03, to the plants of cotton UA03 and to methods for producing a cotton plant produced by crossing the cultivar UA03 with itself or another cotton variety. The invention further relates to hybrid cotton seeds and plants produced by crossing the cultivar UA03 with another cotton cultivar. | 2013-04-11 |
20130091595 | SOYBEAN CULTIVAR S100316 - A soybean cultivar designated S100316 is disclosed. The invention relates to the seeds of soybean cultivar S100316, to the plants of soybean cultivar S100316, to the plant parts of soybean cultivar S100316, and to methods for producing progeny of soybean cultivar S100316. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S100316. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S100316, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S100316 with another soybean cultivar. | 2013-04-11 |
20130091596 | SOYBEAN CULTIVAR S100297 - A soybean cultivar designated S100297 is disclosed. The invention relates to the seeds of soybean cultivar S100297, to the plants of soybean cultivar S100297, to the plant parts of soybean cultivar S100297, and to methods for producing progeny of soybean cultivar S100297. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S100297. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S100297, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S100297 with another soybean cultivar. | 2013-04-11 |
20130091597 | Protein IPA1 Related To Plant Architecture, Its Coding Genes And Uses - The present invention discloses a protein IPA1 related to plant architecture, its coding genes and uses, wherein the protein is 1) or 2) as follows: 1) the protein consisting of the amino acid sequence showed by sequence 1 in the sequence list; 2) the protein derived from the protein of 1) by substitution and/or deletion and/or addition of one or several amino acid residues in the amino acid sequence defined in 1) and relating to plant architecture. IPA1 gene can be used for molecular marker-assisted breeding, cultivating new rice varieties and improving rice yield. | 2013-04-11 |
20130091598 | Nematode-Resistant Transgenic Plants - The present invention concerns double stranded RNA compositions and transgenic plants capable of inhibiting expression of plants genes, and methods associated therewith. Specifically, the invention relates to the use of RNA interference to inhibit expression of a target plant gene which is a plant a CLASP1 gene, an Aspartic Proteinase Delta Subunit gene, a Secreted Protein 1 gene, a Lectin Receptor Kinase-like gene, a Pectin Methylesterase-like gene, and an N PY1 gene, and relates to the generation of plants that have increased resistance to parasitic nematodes. | 2013-04-11 |
20130091599 | Cosmid Vector for Transforming Plant and Use Thereof - The present invention provides novel cosmid vectors for plant transformation. The cosmid vectors have a full length of 15 kb or less and contain: 1) an origin of replication of an IncP plasmid, but not any origin of replication of other plasmid groups; 2) the trfA1 gene of an IncP plasmid; 3) an oriT of an IncP plasmid; 4) the incC1 gene of an IncP plasmid; 5) a cos site of lambda phage, which is located outside the T-DNA; 6) a drug resistance gene expressed in | 2013-04-11 |
20130091600 | NUCLEIC ACID MOLECULES THAT TARGET PP1-87B AND CONFER RESISTANCE TO COLEOPTERAN PESTS - This disclosure concerns nucleic acid molecules and methods of use thereof for control of coleopteran pests through RNA interference-mediated inhibition of target coding and transcribed non-coding sequences in coleopteran pests. The disclosure also concerns methods for making transgenic plants that express nucleic acid molecules useful for the control of coleopteran pests, and the plant cells and plants obtained thereby. | 2013-04-11 |
20130091601 | NUCLEIC ACID MOLECULES THAT TARGET RPA70 AND CONFER RESISTANCE TO COLEOPTERAN PESTS - This disclosure concerns nucleic acid molecules and methods of use thereof for control of coleopteran pests through RNA interference-mediated inhibition of target coding and transcribed non-coding sequences in coleopteran pests. The disclosure also concerns methods for making transgenic plants that express nucleic acid molecules useful for the control of coleopteran pests, and the plant cells and plants obtained thereby. | 2013-04-11 |
20130091602 | METHODS FOR MANUFACTURING PLANT CELL WALLS COMPRISING CHITIN - Methods and means are provided for the modification of the reactivity of plant secondary cell walls, particularly in cotton cell walls found in cotton fibers. This can be conveniently achieved by expressing a chimeric gene encoding a | 2013-04-11 |
20130091604 | ABOVEGROUND ORGAN SPECIFIC PROMOTERS FOR TRANSFORMING PLANTS AND USES THEREOF - A promoter for transformation of a plant, in particular an aboveground organ specific promoter, a recombinant plant expression vector including the promoter, a method of producing target protein using the recombinant plant expression vector, target protein produced by the method, a method of producing a transformed plant using the recombinant plant expression vector, a transformed plant produced by the same, and a seed of the plant. | 2013-04-11 |
20130091605 | NITRATE REDUCTASES FROM RED ALGAE, COMPOSITIONS AND METHODS OF USE THEREOF - The NR enzymes described herein were discovered in the red algae of | 2013-04-11 |
20130091606 | Methods and compositions for enhanced Agrobacterium-mediated transformation Efficiency - The present invention relates to a method of | 2013-04-11 |
20130091607 | METHODS OF PREPARING NANOPROBES AND ENDOSCOPE-LIKE DEVICES - The present invention is directed to methods of preparing nanoprobes, including multifunctional cellular endoscope-like devices, comprising nanotubes, nanorods, and/or nanowires. | 2013-04-11 |
20130091608 | MINIATURE ROSE PLANT NAMED 'SAVABOO' - ‘SAVaboo’ is a new and distinct variety of hardy miniature rose plant, identified by its bi-color blooms of a noticeable bright orange-red offset by the deep yellow at the center and covering the reverse of the petals. The plant is vigorous and a profuse bloomer, making it ideal as a specimen plant, in a border, or in a container. | 2013-04-11 |
20130091609 | Verbena plant named 'VEAZ0003' | 2013-04-11 |