22nd week of 2014 patent applcation highlights part 62 |
Patent application number | Title | Published |
20140150033 | METHOD AND APPARATUS FOR PROVIDING BI-DIRECTIONAL DATA SERVICES AND LIVE TELEVISION PROGRAMMING TO MOBILE PLATFORMS - A system for bi-directional data content transfer between a plurality of mobile platforms, such as aircraft or cruise ships, and a ground-based control segment. The system includes the ground-based control segment, a space segment and a mobile system disposed on each mobile platform. The ground-based control segment includes an antenna which is used to transmit encoded RF signals representative of data content to the space segment. The space segment includes a plurality of satellite transponders, with one of the transponders being designated by the ground-based control segment to transpond the encoded RF signals to the mobile system. The mobile system includes steerable receive and transmit antennas. The receive antenna receives the encoded RF signals from the satellite transponder, which are thereafter decoded, demodulated, D/A converted by a communications subsystem and transmitted to a server. The server filters off that data content not requested by any occupants on the mobile system. A local area network (LAN) receives the remaining data content and provides same to individual users on the mobile platform in accordance with previously submitted programming requests or data input by the users at access stations associated independently with each user. The transmit antenna is used to transmit data content from laptop computers, PDAs or other user electronic devices coupled to the access stations back to the designated satellite transponder. The satellite transponder then transponds the data back to the antenna of the ground-based control segment. | 2014-05-29 |
20140150034 | AIRCRAFT IN-FLIGHT ENTERTAINMENT SYSTEM HAVING A DUAL-BEAM ANTENNA AND ASSOCIATED METHODS - An aircraft in-flight entertainment (IFE) system for an aircraft includes a radome to be carried by the aircraft, and a dual-beam satellite antenna and at least one positioner coupled thereto to be carried by the aircraft and protected by the radome. The dual-beam satellite antenna is to generate dual antenna beams for television programming and Internet data from respective spaced apart satellites. The dual-beam satellite antenna includes a first aperture for receiving the television programming, and a second aperture adjacent the first aperture for receiving the Internet data. A television programming distribution system is to be carried by the aircraft and coupled to the dual-beam satellite antenna to provide television programming within the aircraft. At least one access point is to be carried by the aircraft and coupled to the dual-beam satellite antenna to provide a wireless local area network (WLAN) within the aircraft for the Internet data. | 2014-05-29 |
20140150035 | APPARATUS AND METHOD FOR RECEIVING SATELLITE BROADCAST - Provided is an apparatus and a method for receiving a satellite broadcast. The method may include estimating a channel using signal-to-noise ratio (SNR) information being received, determining a video signal to be received among at least two video signals based on the estimated channel, and controlling selective reception of the determined video signal. | 2014-05-29 |
20140150036 | METHOD AND SYSTEM FOR REPRODUCING CONTENTS, AND COMPUTER-READABLE RECORDING MEDIUM THEREOF - A content reproducing method and system for performing seamless playback of contents between devices is provided. The contents reproducing system includes a portable device which, when a short distance communication with a remote control which is configured to control an electronic device occurs during reproducing of contents, generates data required by the electronic device for reproducing the contents that are being reproduced, and which transmits the generated data to the remote control; the remote control which receives the data from the portable device and which transmits the received data to the electronic device, in conjunction with the occurrence of the short distance communication with the portable device; and the electronic device for receiving the contents from a contents provider and reproducing the contents. | 2014-05-29 |
20140150037 | GATEWAY DEVICE, SYSTEM AND METHOD - A local network system includes one or more terminals operable to act as a client on the local network, a dongle in communication with a terminal and a gateway device operable to manage communications between the one or more terminals and an external network. The gateway device includes a memory configured to store a set of instructions, a processor configured to execute the set of instructions, a first communications module in communication with the external network, a second communications module for providing communication between the gateway device and at least one terminal via the dongle, and a third communications module for providing communication between the gateway device and at least one other terminal. | 2014-05-29 |
20140150038 | INTELLIGENT DEVICE SYSTEM AND METHOD FOR DISTRIBUTION OF DIGITAL SIGNALS ON A WIDEBAND SIGNAL DISTRIBUTION SYSTEM - A plurality of intelligent device systems for use with a wideband signal distribution network, and methods for transmitting digital information and receiving digital and non-digital information onto and off of an RF carrier through a wideband signal distribution network, are disclosed. The intelligent device systems provide networks of intelligent devices that modulate and demodulate digital video, IP video/data/voice and digital wireless onto, and off of, a wideband signal distribution system, such as an analog carrier system, using existing EIA/TIA 568 standard wiring infrastructure. The methods modulate and demodulate digital video, IP video/data/voice and digital wireless onto, and off of, a wideband distribution system, such as an analog carrier system, and separate IP portions from non-IP portions. | 2014-05-29 |
20140150039 | MANAGING VIDEO-ON-DEMAND - Technologies manage video-on-demand (VoD) for a set of video files stored in a hierarchical network comprising a plurality of nodes, one or more of the plurality of nodes being user nodes, the user nodes connected to one or more of the plurality of parent nodes, and one or more of the plurality of parent nodes storing a video file previously requested by a user node, the method comprising, for a user node, periodically ranking a video file from the set of video files wherein the ranking is based on separation between a parent node in the network storing the video file and the user node, and interest of the user node for the video file; and on receiving a request for the VoD, providing a list of the set of video files and recommending one or more video files having a predefined ranking. | 2014-05-29 |
20140150040 | RECEIVER, RECEPTION METHOD, TRANSMITTER AND TRANSMISSION METHOD - Disclosed herein is a receiver including: a reception section adapted to receive AV, namely audio and visual content; a registration section adapted to register related content relating to the AV content based on control information included in an application program executed in response to the AV content; and a presentation control unit adapted to exercise control in such a manner that if the registered related content is selected, the selected related content is presented. | 2014-05-29 |
20140150041 | DISTRIBUTED CABLE MODEM TERMINATION SYSTEM WITH SOFTWARE RECONFIGUABLE MAC AND PHY CAPABILITY - Distributed and highly software reconfigurable CMTS (CMRTS) device, based on MAC and PHY units with FPGA and DSP components, for a HFC CATV network. The various CATV RF modulators, such as QAM modulators, may be divided between QAM modulators located at the cable plant, and remote QAM modulators ideally located at the fiber nodes. A basic set of CATV QAM data waveforms may optionally be transmitted to the nodes using a first fiber, and a second set of IP/on-demand data may be transmitted to the nodes using an alternate fiber or alternate fiber frequency, and optionally using other protocols such as Ethernet protocols. The nodes will extract the data specific to each neighborhood and inject this data into unused QAM channels, thus achieving improved data transmission rates through finer granularity. A computerized “virtual shelf” control system for managing and reconfiguring the FPGA and DSP based CMTRS units is also disclosed. | 2014-05-29 |
20140150042 | MOBILE DEVICE WITH LOCATION-BASED CONTENT - Methods for automatically buffering and displaying video feeds associated with a live event are described. The video feeds displayed on the mobile device may comprise live video feeds or replays associated with the live event. A replay may comprise a playback of one or more buffered video feeds in a particular sequence and at a particular playback rate. The particular sequence may be determined based on the viewing behavior of the end user of the mobile device and/or the viewing behaviors of one or more other end users using other mobile devices at the live event. In some cases, the replay may comprise a shared replay in which a group of end users attending the live event may interact with each other while sharing a common replay. | 2014-05-29 |
20140150043 | SCENE FRAGMENT TRANSMITTING SYSTEM, SCENE FRAGMENT TRANSMITTING METHOD AND RECORDING MEDIUM - A scene fragment transmitting system, a scene fragment transmitting method and a non-transitory recording medium thereof are provided. This system includes a serving module and a terminal module. The terminal module is used for inputting a scene instruction. The serving module, according to comparison between the scene instruction and the scene description data, captures one or more than one required scene fragment medium from a piece of media data. The terminal module obtains this scene fragment medium or these scene fragment media, and presents a playable scene fragment medium on a play interface. | 2014-05-29 |
20140150044 | GENERATION DEVICE, DISTRIBUTION SERVER, GENERATION METHOD, PLAYBACK DEVICE, PLAYBACK METHOD, PLAYBACK SYSTEM, GENERATION PROGRAM, PLAYBACK PROGRAM, RECORDING MEDIUM AND DATA STRUCTURE - A distribution server ( | 2014-05-29 |
20140150045 | RECEPTION/REPRODUCTION DEVICE, TRANSMISSION DEVICE, RECEPTION/REPRODUCTION METHOD AND TRANSMISSION METHOD - To provide a reception and playback device capable of playing back a program in viewer's desired display mode. The reception and playback device receives, with respect to a program that is currently played back in a first display mode, a switching instruction to switch from the first display mode to a second display mode, receives switching permission information indicating whether switching of a playback target stream of the program is permissible from a first stream to a second stream respectively corresponding to the first display mode and the second display mode, when receiving the switching instruction, judges whether switching of the display mode is permissible from the first display mode to the second display mode based on the switching permission information, when judging affirmatively, switches from the first stream to the second stream to perform playback using the second stream, and when judging negatively, performs playback using the first stream. | 2014-05-29 |
20140150046 | Distributing Audio Video Content - A method of distributing audio video content is described. The method includes: receiving configuration data for a plurality of devices; for each device in the plurality of devices, computing a set of bit rates based, at least in part, on the configuration data; encoding audio video content at each bit rate in each set of bit rates to produce a plurality of encoded audio video content streams; splitting each encoded audio video content stream in the plurality of encoded audio video content streams into chunks to produce a plurality of chunked encoded audio video content streams; for each device in the plurality of devices, creating a separate index file, each separate index file including references to at least one of the plurality of chunked encoded audio video content streams; publishing a locator for each separate index file in a catalogue; and transmitting the plurality of chunked encoded audio video content streams and each separate index file to a network. Related systems, apparatus, and methods are also described. | 2014-05-29 |
20140150047 | VIRTUAL CCAP CABLE MODEM TERMINATION SYSTEM WITH SOFTWARE RECONFIGUABLE MAC AND PHY CAPABILITY - Distributed and software reconfigurable remote CMTS (CMRTS) device, based on MAC and PHY units with FPGA and DSP components, for a HFC CATV network. The various CATV RF modulators, such as QAM modulators, may be located entirely at the fiber nodes if desired. Although a basic set of CATV QAM data waveforms may optionally be transmitted to the nodes using a first fiber, in a preferred embodiment, all data may be transmitted to the nodes using other protocols such as Ethernet protocols. The nodes will extract the data specific to each neighborhood and inject this data into the cable portion of the system as RF waveforms, such as RF QAM channels. A computerized “virtual shelf” control system for managing and reconfiguring the FPGA and DSP based CMTRS units, as well as a new type of edge router based all-digital virtual head end (virtual converged cable access platform) is also disclosed. | 2014-05-29 |
20140150048 | METHOD AND APPARATUS FOR PROCESSING DIGITAL SERVICE SIGNAL - A digital service signal apparatus is disclosed. The digital service signal apparatus includes a receiving module receiving signaling information having channel information for an application from the digital service signal, a generating module generating a request using the channel information, a sending module sending the generated request, a downloading module downloading the application, an executing module configured to execute the API related to the application and a registering module configured to register the specific key set according to the mode number. | 2014-05-29 |
20140150049 | METHOD AND APPARATUS FOR CONTROLLING MANAGEMENT OF MOBILE DEVICE USING SECURITY EVENT - A method controls the management of a mobile device using a security event. The method includes acquiring, by a wireless intrusion prevention server, security threat information by monitoring RF signals generated from an access point (AP) and the mobile device, transmitting the security threat information to a mobile device management server, and executing, by the mobile device management server, a device management policy for the mobile device based on the security threat information. | 2014-05-29 |
20140150050 | METHOD, A SYSTEM, AND A COMPUTER PROGRAM PRODUCT FOR MANAGING ACCESS CHANGE ASSURANCE - A method for evaluating a deployment of a network access change request, the method includes: (a) formatting a network access change request to provide a formatted network access change request; wherein the formatted network access change request includes multiple formatted request items; wherein the multiple formatted request items includes a requested access type, an address of an access source, an address of an access destination; (b) determining multiple relationships between the multiple formatted request items and corresponding items of at least one entity out of a network model and a current network policy; and (c) responding to the network access change request in response to the multiple determined relationships. | 2014-05-29 |
20140150051 | DYNAMIC RESOLUTION OF FULLY QUALIFIED DOMAIN NAME (FQDN) ADDRESS OBJECTS IN POLICY DEFINITIONS - Dynamic resolution of Fully Qualified Domain Name (FQDN) address objects in policy definitions is provided. In some embodiments, dynamic resolution of Fully Qualified Domain Name (FQDN) address objects in policy definitions includes receiving a network policy that includes a domain name (e.g., the network policy can include a network security rule that is based on the domain name); and periodically updating Internet Protocol (IP) address information associated with the domain name by performing a Domain Name Server (DNS) query. In some embodiments, dynamic resolution of Fully Qualified Domain Name (FQDN) address objects in policy definitions includes dynamically performing a first local Domain Name Server (DNS) lookup for a first VSYS using a first DNS server on a first domain name for implementing a network policy based on the first domain name; dynamically performing a second local DNS lookup for a second VSYS using a second DNS server on the first domain name for implementing the network policy based on the first domain name; in which the network policy includes a network security rule that is based on the first domain name, and the network policy includes a network security rule that is based on the second domain name. | 2014-05-29 |
20140150052 | WEB SERVICE PROVISION SYSTEM, SERVER DEVICE, AND METHOD - A web application server includes a user information management unit that manages user IDs and attributes such that each of the user IDs is associated with corresponding one of the attributes, a security policy management unit that manages security policies such that each of security policies is associated with corresponding one of the attributes, a security policy acquisition unit that acquires one of the security policies based on one of the attributes associated with one of the user IDs, and an HTML file generation unit that generates an HTML file in which a script to acquire personal data of corresponding one of users from an intra-company database server is embedded based on one of the security policies of the corresponding one of the users. | 2014-05-29 |
20140150053 | COMBINING NETWORK ENDPOINT POLICY RESULTS - An endpoint integrity system controls access to resources of a protected network for endpoint devices attempting to access the protected network. The system may include a number of evaluation modules that communicate with an endpoint device. The evaluation modules generate policy results for the endpoint device, in which each of the policy results assume one of three or more states, called a multi-state policy result. The multi-state policy results are combined to produce a combined Boolean policy result. | 2014-05-29 |
20140150054 | METHOD AND APPARATUS FOR A MASTER PRIVACY POLICY MECHANISM IN A COMMUNICATIONS NETWORK - A method, non-transitory computer readable medium and apparatus for providing a master privacy policy in a communications network are disclosed. For example, the method receives a privacy control parameter to configure a master privacy policy, stores the master privacy policy in the communications network, and applies the master privacy policy to configure a third party service provider privacy policy for a third party service provider based upon the master privacy policy. | 2014-05-29 |
20140150055 | DATA REFERENCE SYSTEM AND APPLICATION AUTHENTICATION METHOD - A server system includes an application server and a data server. The application server includes an application authentication unit that authenticates an application on the basis of information that has been received from a communication terminal and that is related to the application included in the terminal and includes a token issuing unit that issues, when the legitimacy of the application has been authenticated, signature information that includes server information that indicates a server that stores therein data accessed by the application. The data server includes an authentication unit that determines, on the basis of the signature information received from the communication terminal, whether the server information included in the signature information indicates the data server and includes a control unit that permits the application in the communication terminal to access the data when the server information indicates the data server. | 2014-05-29 |
20140150056 | FUEL DISPENSER USER INTERFACE SYSTEM ARCHITECTURE - A vending machine can include a touch display and a touch controller operatively connected to the touch display and configured to transmit display data to the touch display and receive input data from a touchscreen function of the touch display. The vending machine also includes a secure device operatively connected to the touch display for securing the display by managing touch input information provided to one or more applications based on the input data received from the touchscreen functionality. The vending machine has a processor operatively connected to the secure device for communicating access requests for the touch display to the secure device from the one or more applications along with an indication of whether the one or more applications are signed by an authorized entity. The secure device manages the touch input information provided to the one or more applications further based at least in part on the indication. | 2014-05-29 |
20140150057 | METHOD AND APPARATUS FOR RECOGNIZING IMAGE CONTENT - Embodiments of the present invention provide a method and apparatus for recognizing image contents. In one embodiment of the present invention, there is provided a method for recognizing image contents, comprising: providing at least a first image pair and a second image pair to a user; obtaining a first answer and a second answer from the user, wherein the first answer and the second answer respectively indicate the user's determination on whether the image contents in the first image pair and the second image pair are same or not; and modifying a weight of the second image pair in response to the first answer matching a predetermined answer. In one embodiment of the present invention, there is provided an apparatus for recognizing image contents. | 2014-05-29 |
20140150058 | AUTHENTICATION METHOD FOR STATELESS ADDRESS ALLOCATION IN IPV6 NETWORKS - The authentication method for stateless address allocation in IPv6 networks provides a P2P trust-verification approach for identifying a rogue node. Alternatively, the authentication method provides an information hiding scheme to avoid being plagued by rogue nodes. In both cases, the authentication method is embodied in a computer software product having machine readable code. | 2014-05-29 |
20140150059 | CONFERENCE DATA MANAGEMENT - Tools are provided for conducting a conference/meeting and/or obtaining, managing and archiving conference/meeting data. For example, a conference application can be provided through a network to a registrant or participant of the conference. The conference application allows the registrant or participant to access conference data (such as presentation slides, conference materials, other posted content, etc.), save comments, files, other content, etc., make revisions to the conference data, and share data with other registrants or participants of the conference. | 2014-05-29 |
20140150060 | SYSTEM AND METHOD FOR PROTECTING DATA IN AN ENTERPRISE ENVIRONMENT - Provided are a system and method for protecting data in an electronic communications environment. An interested entity establishes one or more controls for a received unit of data. At a source device in the electronic communications network, the unit of data is encapsulated with self-protection security data that includes the one or more controls. The encapsulated unit of data is delivered from the source device to a destination device in the electronic communications network. A data broker facilitates the delivery of the data to the destination device according to the controls. Facilitating the delivery of the data includes: identifying for the receiving device a collection of services corresponding to the controls independently of the network. | 2014-05-29 |
20140150061 | FULL SPECTRUM CYBER IDENTIFICATION DETERMINATION PROCESS - A full spectrum cyber identification determination process for accurately and reliably determining and reporting any identification determination from a full spectrum of possible cyber identification determinations. | 2014-05-29 |
20140150062 | SYSTEM FOR PROVIDING LEARNING ACCORDING TO GLOBAL POSITIONING INFORMATION AND METHOD THEREOF - A system for providing learning according to global positioning information and a method thereof are provided. A server queries for a corresponding learning content according to global positioning information provided by a first client, so that a student can learn anytime and anywhere. The server records contents already learnt by the student. A corresponding test type and test content are provided for a second client, and selection is performed to generate a test paper, which is provided for the first client so that the student can take a test. Therefore, learning anytime and anywhere is enabled, thereby achieving the technical effect of optimal learning efficiency. | 2014-05-29 |
20140150063 | SECURE ASSOCIATION - To enable formation of secure associations between IP-enabled devices when they have not previously connected, a method is proposed where a declaration of ownership of a target device is made by the subscriber of a originating device and that subscriber giving that declaration is authenticated by means of a SIM card, say. The originating device establishes secure connection to a first server. The target device establishes a secure connection to a second server. Provided the first and second servers can establish a conventional IP-type SA (e.g. using IPSec or TLS), there is a chain of secure associations between the two devices. This chain is then used to build a new secure association between originating device and target Device. The first and second servers thus act as proxies for two devices respectively and negotiate the secure association on their behalf. They then transfer the new secure association information securely to the devices using the existing chain of secure associations. | 2014-05-29 |
20140150064 | Authentication of Warning Messages in a Network - There is described herein a device ( | 2014-05-29 |
20140150065 | Methods and Processes for Storing and Utilizing State Information for Service Providers - Methods, computer-readable media, and apparatuses are disclosed for storing and utilizing state information for service providers. In one aspect of the invention, the methods, processes, or apparatus may include one or more of the following steps: 1) storing state information on a vault; 2) requesting state information on the vault from a receiving party and a device and providing identification to the vault; 3) authenticating and certifying the request from the receiving party; 4) providing the state information to the receiving party; 5) using the state information on the device; and 6) returning the state information to the vault. An additional aspect of the invention provides a method and/or process for storing and utilizing web-based cookies on a cloud environment for service providers. | 2014-05-29 |
20140150066 | CLIENT BASED RESOURCE ISOLATION WITH DOMAINS - A method may comprise determining, in an operating system instance, that an access control is being attempted to control an object by a user from a first client of a plurality of clients. Domain and client identifiers associated with the user may be determined. Any domain identifiers from a set and any client identifiers from a set may be accessed that may be associated with the object, where the domain identifiers may uniquely identify one or more domains and the client identifiers may uniquely identify one or more clients. One or more domain and client isolation rules may be evaluated to determine whether access control is permitted on the object based on whether a domain identifier is associated with both the object and the user and whether a client identifier is associated with both the object and the client. A permit or deny indication may be returned based on whether or not access control is permitted on the object. | 2014-05-29 |
20140150067 | SYSTEM AND METHOD FOR NETWORK CONTROLLED P2P DEVICE DISCOVERY - Embodiments of the present invention provide a system and method that provides a user within a P2P network the ability to discover other devices in their vicinity, but under control of the network operator. | 2014-05-29 |
20140150068 | MANAGING SOCIAL NETWORK ACCESSIBILITY BASED ON AGE - When a user having an age less than a threshold age (a child user) attempts to access an online service or perform actions using the online service, the online service obtains parental authorization from an additional user having a parental relationship to the user. The child user may identify the user having the parental relationship and the online service verifies the validity of the identified user's account, the age of the identified user, and/or a connection between the identified user and the child user having a parental relationship type. The online service may make these verifications based in part social and transactional information associated with the identified user's account. Upon successful verification, the online service allows the identified user to authorize account creation for the child user, and/or manage the account and actions of the child user. | 2014-05-29 |
20140150069 | METHOD FOR DISTINGUISHING AND BLOCKING OFF NETWORK NODE - The invention provides a method for distinguishing and blocking off a network node. The method includes a packet receiving step and a packet distinguishing processing step. The packet receiving step is provided for receiving an ARP packet from a network node within a network segment. The packet distinguishing processing step is provided for distinguishing whether the network node is authorized or not by having an internet protocol address and a media access control address of the ARP packet to be compared with a permission list, and then for permitting the network node to connect with the network segment or for blocking off the network node. Thereby the network system can be protected and the safety of the network in use increases. | 2014-05-29 |
20140150070 | MOBILE DEVICE IDENTIFY FACTOR FOR ACCESS CONTROL POLICIES - A secure VPN connection is provided based on user identify and a hardware identifier. A client application may initiate the VPN connection. A client device user may provide identification information to the application, which then sends a VPN connection request to a remote VPN gateway. The VPN gateway may require an equipment identifier to establish the secure VPN gateway. If the hardware ID is registered, the secure VPN connection is established. If the hardware ID is not registered with the VPN gateway, the connection may be denied. In some instances, a connection may be established with an unregistered equipment ID based on settings at the VPN gateway. | 2014-05-29 |
20140150071 | SOCIAL AUTHENTICATION OF USERS - User authentication is provided. A social network associated with a user of a client device is monitored to determine whether a set of designated users are currently logged in and authenticated to access a secure resource. A video connection is established between the user of the client device and the set of designated users that are currently logged in and authenticated to access the secure resource. In addition, an authentication request screen is sent showing captured video authentication data corresponding to the user of the client device to the set of designated users that are currently logged in and authenticated to access the secure resource. | 2014-05-29 |
20140150072 | SOCIAL AUTHENTICATION OF USERS - User authentication is provided. A social network associated with a user of a client device is monitored to determine whether a set of designated users are currently logged in and authenticated to access a secure resource. A video connection is established between the user of the client device and the set of designated users that are currently logged in and authenticated to access the secure resource. In addition, an authentication request screen is sent showing captured video authentication data corresponding to the user of the client device to the set of designated users that are currently logged in and authenticated to access the secure resource. | 2014-05-29 |
20140150073 | AUTHENTICATION IN A WIRELESS TELECOMMUNICATIONS NETWORK - To facilitate authentication over a wireless access network, it is proposed to provide a hub device having an authentication storage means (i.e. a (U)SIM) to which one or more machine devices are connected. Each machine devices connects to a wireless access network and in order to authenticate with that network requests authentication information from the hub device. The core network of the wireless access network, authenticates each machine device and provides the machine devices with parallel access to the access network in accordance with authentication information obtained from the hub device. The authentication information is unique to the respective machine device but also associated with information stored on the authentication storage means of the hub device. | 2014-05-29 |
20140150074 | METHOD OF ESTABLISHING SECURE GROUPS OF TRUSTED CONTACTS WITH ACCESS RIGHTS IN A SECURE COMMUNICATION SYSTEM - A method of establishing secure groups of trusted contacts with access rights in a secure communication system. The method includes establishing secure groups of trusted contacts in the secure communication system; storing information corresponding to the trusted contacts of a secure group as a secure group in a database; and determining access rights of the secure group and storing the access rights in the database with the stored information corresponding to the secure group. | 2014-05-29 |
20140150075 | SECURELY ESTABLISHING ICE RELAY CONNECTIONS - Methods, apparatuses, and computer program products are described for securely connecting a plurality of ICE client devices without using TURN. A session border controller (SBC) receives, via a website application server, a connectivity message from a first ICE client device at a first relay port and a connectivity message from a second ICE client device at a second relay port. The SBC authenticates the messages using credential information received from the server, and latches address information associated with the first client device to the first relay port and address information associated with the second client device to the second relay port. The SBC forwards the message from the first client device to the second client device and the message from the second client device to the first client device, and establishes an ICE relay connection indirectly between the first client device and the second client device via the relay ports. | 2014-05-29 |
20140150076 | Database Virtualization - Aspects of the subject matter described herein relate database virtualization. In aspects, clusters of database servers may be located at various locations of the Internet. When a client seeks to access a logical database, the client may send a logical server and logical database name in a data structure. These names may be used to find a physical server(s) and database(s) that correspond to the logical database. Once the location is determined, a proxy component is used to intercept and/or forward communications between the client and the physical server(s) and database(s) corresponding to the logical database. Using this system, a client may access data from a logical database without knowing the physical address of the logical user database. | 2014-05-29 |
20140150077 | System and Method for Selectively Sharing Information - Disclosed is a system and method for selectively sharing information among users of a computer application. Specific utility in healthcare applications is disclosed, but the scope of the invention is not limited to healthcare applications. The method involves selecting specific users, with whom information will be shared, a method for selecting such users' restrictions on the information that can be accessed by such users. Also disclosed is a system and method through which certain users can transmit communications on behalf of other users. | 2014-05-29 |
20140150078 | Anonymous Personal Content Access with Content Bridge - An online content publishing and consumption environment can be modeled such that communities of content consumers (users), such as educational institutes and libraries, are categorized as Content Brokers; content providers, such as book, music, and multimedia publishers, and news sources, are categorized as Content Providers; and a Content Bridge, a standalone component providing the functionalities of the presently claimed invention in the online content publishing and consumption environment. The Content Bridge allows a simpler and loosely-coupled integration with lowered integration cost and effort, as the Content Broker is required to integrate once only with the Content Bridge instead of having to integrate individually with every Content Provider. | 2014-05-29 |
20140150079 | SYSTEM AND METHOD FOR AUTHENTICATING MULTIPLE DEVICES WITH A SAME CREDENTIAL - A first device implements an application platform that is shared with a second device. The application platform can be implemented so that the first device and the second device operate to have a same identity to at least the network service. The first device provides a user interface in order to receive input for accessing or using the network service. Additionally, the first device communicates input received in response to providing the user interface to the network service. The first device can receive a token from the network service in response to communicating the input. Additionally, the first device can communicate a set of data items to the second device. The set of data items includes the token and one or more identifiers that enable the second device to access and use the network service while appearing as the first device to the network service. | 2014-05-29 |
20140150080 | AUTHORIZING ACCESS TO DIGITAL CONTENT - Systems and methods for controlling access to content are disclosed. Content can be consumed by a device. Access to the content is controlled by duration. A device is provided with a token that allows the user to consume content via a subscription basis. | 2014-05-29 |
20140150081 | SYSTEMS AND METHODS FOR ELIMINATING REDUNDANT SECURITY ANALYSES ON NETWORK DATA PACKETS - A computer-implemented method for eliminating redundant security analyses on network data packets may include (1) intercepting, at a networking device, at least one network data packet destined for a target computing device, (2) identifying a security system installed on the target computing device, (3) determining that the security system installed on the target computing device does not satisfy a predefined security standard, and then (4) performing a security analysis that satisfies the predefined security standard on the network data packet at the networking device based at least in part on determining that the security system installed on the target computing device does not satisfy the predefined security standard. Various other methods, systems, and computer-readable media are also disclosed. | 2014-05-29 |
20140150082 | Net-Based Email Filtering - A local gateway device receives email across the internet from a sender of the email and forwards it across the internet to an email filtering system. The email filtering system analyzes the email to determine whether it is spam, phishing or contains a virus and sends it back to the local gateway device along with the filtered determination. The local gateway device forwards the received email and the filtered determination to a local junk store which handles the email appropriately. For example, if the email has been determined to be spam, phishing or containing a virus, the junk store can quarantine the email and if the email has been determined to be non-spun and/or not phishing and/or not containing a virus, the junk store can forward the email to a local mail server for delivery. | 2014-05-29 |
20140150083 | VIRTUAL PRIVATE NETWORK SOCKET - A system and method for a virtual private network (VPN) wherein some embodiments includes creating complementary stack layers on both a client and a server device. An application operating through the VPN establishes a socket level protocol for operation of the VPN such that an application communicates with a client socket VPN layer which, in turn, is coupled to a server VPN layer. Data is encapsulated in a private tunnel. Certain embodiments may provide for VPN sockets for each application allowing concurrent VPNs to operate on a single device. | 2014-05-29 |
20140150084 | USER AUTHENTICATION APPARATUS OF PORTABLE TERMINAL - A user authentication apparatus safely uses resources by forming a communication channel between a plurality of execution environments through user authentication in a portable terminal providing the plurality of execution environments based on a virtualization solution, and prevents private information from being illegally leaked by hacking by not directly exposing a PIN number or a password a user inputs using a virtual keyboard and a keyboard coordinate when authenticating the user. | 2014-05-29 |
20140150085 | USER AUTHENTICATION BASED ON A USER'S OPERATION ON A DISPLAYED THREE-DIMENSIONAL MODEL - An authentication device authenticates a user based on a user's operation. The authentication device comprises a display control unit, an operation input unit, and an authentication unit. The display control unit is a processor-based logic that displays a three-dimensional model on a display device. The operation input unit is a hardware unit that inputs a user's operation on the displayed three-dimensional model. The authentication unit is a processor-based logic that authenticates the user based on the user's operation, wherein the user's operation comprises a change operation of at least one of a position and posture of the three-dimensional model having been input from the user. | 2014-05-29 |
20140150086 | COMPUTER-IMPLEMENTED METHOD FOR REPLACING A DATA STRING - A computer-implemented method for replacing a security-relevant unencrypted data string from a data record by a token in a tokenisation device. The method is structured in such a way that it works more efficiently than a replacement table with randomly generated tokens and is more secure than the generation of tokens by exclusive application of a mathematical function to the unencrypted data string. | 2014-05-29 |
20140150087 | VOICE KEY AND METHOD FOR PROTECTING SECURITY OF COMPUTING DEVICE USING THE VOICE KEY - A voice key includes a voice sensor, a microprocessor chip, a storage device, a port, a record button, and an enter button. When the voice key is connected to a computing device and the record button is pressed, the voice sensor is triggered to record a voice signal input by a user. The microprocessor chip converts the voice signal into a password, stores the password in the storage device, and sends the password to the computing device to lock the computing device. When the voice key is connected to the computing device again and the enter button is pressed, the microprocessor chip retrieves the password from the storage device and sends the password to the computing device. The computing device is unlocked in response to determining that the received password matches the password stored in the computing device. | 2014-05-29 |
20140150088 | TEMPERATURE KEY AND METHOD FOR PROTECTING SECURITY OF COMPUTING DEVICE USING THE TEMPERATURE KEY - A temperature key includes a temperature sensor, a microprocessor chip, a storage device, a port, a record button and an enter button. When the temperature key is connected to a computing device and the record button is pressed, the temperature sensor is triggered to record a temperature signal input by a user. The microprocessor chip converts the temperature signal into a password, stores the password in the storage device, and sends the password to the computing device to lock the computing device. When the temperature key is connected to the computing device again and the enter button is pressed, the microprocessor chip retrieves the password from the storage device and sends the password to the computing device. The computing device is unlocked in response to determining that the received password matches the password stored in the computing device. | 2014-05-29 |
20140150089 | PRESSURE KEY AND METHOD FOR PROTECTING SECURITY OF COMPUTING DEVICE USING THE PRESSURE KEY - A pressure key includes a pressure sensor, a microprocessor chip, a storage device, a port, a record button and an enter button. When the pressure key is connected to a computing device and the record button is pressed, the pressure sensor is triggered to record a pressure signal input by a user. The microprocessor chip converts the pressure signal into a password, stores the password into the storage device, and sends the password to the computing device to lock the computing device. When the pressure key is connected to the computing device again and the enter button is pressed, the microprocessor chip retrieves the password from the storage device and sends the password to the computing device. The computing device is unlocked if the received password matches the password stored in the computing device. | 2014-05-29 |
20140150090 | CHALLENGE-RESPONSE METHODOLOGY FOR SECURING VEHICLE DIAGNOSTIC SERVICES - A method for locally authenticating a vehicle diagnostic tool with a vehicle using a challenge-response authentication scheme includes: receiving a pairing request from the vehicle diagnostic tool; presenting a user with a challenge through at least one of an audio system and an LCD display associated with the vehicle; receiving a response to the challenge from a user; and authenticating the vehicle diagnostic tool if the response from the user is identical to an expected response. | 2014-05-29 |
20140150091 | BIOMETRIC SENSOR FOR HUMAN PRESENCE DETECTION AND ASSOCIATED METHODS - An electronic device may include a communications interface, a user prompting device, a biometric sensor, and a controller. The controller may perform biometric spoof detection with the biometric sensor, and receive a request for human presence verification from a remote device via the communications interface. The controller may also prompt the user for a verification action using the sensor based upon receiving the request, and determine that the user has completed the verification action in response to the prompting and based upon the biometric spoof detection. The controller may further send a response to the remote device via the communications interface and based upon determining that the user has completed the verification action. The controller may send a notification to the remote device that there is a biometric sensor. | 2014-05-29 |
20140150092 | METHOD AND APPARATUS FOR SECURE CREDENTIAL ENTRY WITHOUT PHYSICAL ENTRY - A method and apparatus are disclosed wherein a portable memory storage device is provided for interfacing with a communications port of the computer system. During operating system start up of the operating system of the computer, fields relating to security of the operating system are prompted for. The portable memory store retrieves from memory therein data for populating said fields and provides same to the computer system mimicking a data entry device other than a portable memory store. | 2014-05-29 |
20140150093 | ELECTRONIC MODULE FOR MAKING A MESSAGE ACCESSIBLE TO A TARGETED OPERATING SYSTEM - An electronic module that includes means for determining an operating system targeted by a message received by a transmitter-receiver of an electronic device, from among at least a Rich-OS operating system and a trusted operating system executed on a chipset of the electronic device, so that the message becomes accessible to the targeted operating system. The determining means may be set in operation in response to receipt of the message by the transmitter-receiver. | 2014-05-29 |
20140150094 | SYSTEMS AND METHODS FOR TRANSPARENTLY MONITORING NETWORK TRAFFIC FOR DENIAL OF SERVICE ATTACKS - A mitigation service can monitor network traffic in one direction between a client computer and a server computer. The mitigation service can receive a request from a client computer to establish a network connection with a server computer. The mitigation service can reply to the client computer with an acknowledgment that is configured to cause the client computer to issue a request to reset the connection. The acknowledgement is configured not to affect the establishment of the network connection with the server computer. The mitigation service can compare the details of the reset request with the request to establish the network connection. If the details match, the mitigation service can forward the request to establish the network connection to the server computer. | 2014-05-29 |
20140150095 | SYSTEMS AND METHODS TO DETECT AND RESPOND TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS - Embodiments relate to systems, devices, and computer-implemented methods for mitigating Distributed Denial of Service (“DDoS”) attacks. The method can include receiving, by a server, a response message from an application server. The method can further include determining a source internet protocol (IP) address associated with the source client based on a request message received from a source client. The request message received from the source client corresponds to the response message received from the application server. In addition, the method can include identifying, by the server, a plurality of counters associated with the source IP address, and identifying, by the server, a response type of the response message. Further, the method can include causing a value of at least one of the plurality of counters to change based on the response message and the response type. | 2014-05-29 |
20140150096 | METHOD FOR ASSURING INTEGRITY OF MOBILE APPLICATIONS AND APPARATUS USING THE METHOD - An apparatus for assuring integrity of a mobile application or application software (app) includes a developer registration management unit configured to authenticate a mobile app developer based on an authentication means in response to a subscription and registration request of the mobile app developer, and an integrity verification unit configured to verify whether the mobile app has the integrity by unpackaging the mobile app uploaded to an app store server in a packaged state and determine whether to write a code signature of the app store server to the mobile app based on an integrity verification result. Thus, a secure mobile ecosystem can be constructed. | 2014-05-29 |
20140150097 | SYSTEM AND METHOD FOR EMAIL FRAUD RISK ASSESSMENT - Email address Fraud Risk Assessment using a system of data element collection and computation. Data elements for each potion of an email address's local and domain portion is acquired from internal and external data sources, captured, evaluated, and then assigned a value. Data acquisition may include use of domain information, databases, Email Service Providers, Simple Mail Transfer Protocol, corporate and social media services, and search engine services. Using the assigned values, a Fraud Risk Score is computed and then displayed to a user along with additional information, explanations and recommendations. | 2014-05-29 |
20140150098 | SYSTEM AND METHOD FOR PREVENTING OPERATION OF UNDETECTED MALWARE LOADED ONTO A COMPUTING DEVICE - Methods and devices for protecting computing devices against the effects of surreptitiously loaded machine language programs from a malware source. The user defines a pattern of disruption of the sequence of bytes. The user then installs legitimate programs to be run on a particular computing device by loading the original program onto the local hard drive and replacing the program by one to which the pattern of disruption has been applied. Using the user-defined disruption pattern, the computing device can define the transforms necessary to reverse the application of the disruptive pattern. As part of the process the operating system for the computing device is modified to apply transforms that reverse the disruption pattern when executing a program file loaded into RAM. | 2014-05-29 |
20140150099 | METHOD AND DEVICE FOR DETECTING MALICIOUS CODE ON WEB PAGES - A method for detecting malicious code on web pages includes: obtaining a function list by executing a specified code and a predefined object code; parsing the specified code and obtaining variable values according to a parsing result and the function list; and determining whether a malicious code exists on web pages according to variable values. A device for detecting malicious code on web pages is also provided. | 2014-05-29 |
20140150100 | Adaptive Observation of Driver and Hardware Level Behavioral Features on a Mobile Device - Methods, devices and systems for detecting suspicious or performance-degrading mobile device behaviors intelligently, dynamically, and/or adaptively determine computing device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the mobile device behaviors are to be observed. The various aspects efficiently identify suspicious or performance-degrading mobile device behaviors without requiring an excessive amount of processing, memory, or energy resources. | 2014-05-29 |
20140150101 | METHOD FOR RECOGNIZING MALICIOUS FILE - A method for recognizing malicious file has steps: receiving a static file through a network or an input/out interface to be stored in the memory; defining suspicious positions where components of a malware are possibly encrypted in the static file; decrypting the suspicious positions to identify a PE header and a shellcode; extracting the PE header and the shellcode terms in segments; and determining whether the PE header and the shellcode terms can be assembled into an executable binary which indicates a recognition of the malicious file. | 2014-05-29 |
20140150102 | DETECTING ALTERED APPLICATIONS USING NETWORK TRAFFIC DATA - A method, computer readable medium and apparatus for detecting an altered application are disclosed. Network traffic data is obtained for a number of endpoint devices to determine a network traffic signature for a first application. The signature comprises a set of flows within a time window. Network traffic data is monitored to determine a network traffic signature for a second application. The signature for the second application comprises the network traffic signature of the first application plus a flow to an additional address. The method determines a ratio of endpoint devices having network traffic data that matches the signature for the second application as compared to a percentage of endpoint devices having network traffic data that matches the signature for the first application. When the percentage satisfies a threshold, the method determines that the second application is the altered application comprising an altered version of the first application. | 2014-05-29 |
20140150103 | APPLICATION MODULE INJECTION DEVICE, COMPUTING DEVICE INCLUDING APPLICATION MODULE INJECTION FUNCTION, AND RECORDING MEDIUM FOR RECORDING PROGRAM FOR EXECUTING APPLICATION MODULE INJECTION METHOD - Provided are an application module injection device, a computing device including an application module injection function, and a recording medium that records a program for executing an application module injection method. The application module injection device includes a function registration unit configured to register, in an operating system (OS), a first callback function for receiving a notice about whether a process corresponding to a program whose execution is instructed by a user is created from the OS and a second callback function for receiving a notice about whether an image corresponding to the program whose execution is instructed by the user is driven, a process information acquisition unit configured to receive the notice about whether the process corresponding to the program whose execution is instructed by the user is created from the OS through the first callback function, a process determination unit configured to select a process generated so as to correspond to the program whose execution is instructed by the user as an application module injection target process when the program whose execution is instructed by the user, which is determined through the second callback function, corresponds to a predetermined type of program, a context change unit configured to change a first entry point included in a context of a thread corresponding to the application module injection target process into a second entry point of an injected application module, and an application module injection unit configured to inject the application module into the application module injection target process. | 2014-05-29 |
20140150104 | ELECTRONIC ASSEMBLY COMPRISING A DISABLING MODULE - An electronic assembly for an electronic device may include a detection module to detect a security anomaly of a Rich-OS operating system and a disabling module to disable at least one secure function of the electronic device in response to the detection. The disablement nevertheless allows use of the electronic device in fail-soft mode. The electronic assembly may be implemented such that these two modules are dependent on a trusted operating system, and the trusted operating system and the Rich-OS operating system may be stored in a memory of the electronic assembly and executed on the electronic assembly. | 2014-05-29 |
20140150105 | CLUSTERING PROCESSING METHOD AND DEVICE FOR VIRUS FILES - A method and device for clustering virus files is provided. The method involves statically analyzing binary data of virus files to be clustered, so as to obtain PE structure data of the virus files. Further, based on a comparison of the PE structure data, those virus files with PE structure data meeting a specific similarity may be categorized into the same category. The device may include a first data analyzing module configured to extract PE structure data of virus files to be clustered by static analysis of binary data of the virus files. A first clustering module of the device may compare the PE structure data and cluster the virus files having the PE structure data meeting a specific similarity into the same category. The solution may improve efficiency of clustering computer virus files, reduce resource consumption, and avoid the risk of virus infection caused by dynamically running the virus files. | 2014-05-29 |
20140150106 | COMPUTER PROGRAM, METHOD, AND SYSTEM FOR PREVENTING EXECUTION OF VIRUSES AND MALWARE - Preventing execution of viruses or malware on a computing device includes compiling an inventory recordation of legitimate applications and terminating execution of any application not on the inventory recordation while in a protected mode. An instantaneous and unprompted inventory recordation known as a “snapshot” can be performed by the computer program. A user may further train the computer program to identify legitimate applications routinely accessed by the user and to be updated to the inventory recordation, such that the inventory recordation is personal to the user. After training, the protected mode can be activated. A smart icon graphical user interface is utilized, that automatically toggles between locked and unlocked depending on if the computing device is at risk or not, to place the computing device in a protected or unprotected mode. | 2014-05-29 |
20140150107 | METHOD AND SYSTEM FOR INTERFACE DATA UTILIZATION - Methods and system for interface data utilization are described. In one embodiment, source interface data may be provided from a provider. The source interface data may be capable of being used to provide a source user interface for a networked resource associated with the provider. A user request may be received through the source user interface. A service call may be provided over a network to an application based on the receiving of the user request. The application may be associated with an application manager. Response data may be received over the network from the application based on the service call. Target interface data may be rendered based on the response data. The target interface data may be provided from the provider. | 2014-05-29 |
20140150108 | PREVENTION OF ACCIDENTAL PASSWORD DISCLOSURE IN APPLICATION WINDOWS - Text entry context information associated with text entry within an inter-user communication application is evaluated. A determination is made as to whether the evaluated text entry context information identifies a text string entered by a user as a potential password inadvertently entered into the inter-user communication application by the user. In response to determining that the text string is identified as the potential password, the user is prompted to confirm that the user intends to send the text string using the inter-user communication application. The text string is transmitted using the inter-user communication application in response to a confirmation from the user to send the text string. | 2014-05-29 |
20140150109 | METHOD FOR PROTECTING USER PRIVACY IN SOCIAL NETWORKS - A method for protecting user privacy in an online social network, comprising the steps of defining, for a given primary user of an online social network who is authorized to post multimedia information in an account of the social network, a personal profile type that characterizes a level of desired privacy and that is selected from a group of predetermined profile types; defining a personal profile type selected from the group for each of a plurality of secondary users who are interested in accessing posted multimedia information of the primary user while functioning as a friend thereof; and denying a request for friendship initiated by one of the plurality of secondary users when the profile type of the primary user and of the one of the plurality of secondary users are incompatible as defined by predetermined rules, that may be stored in the privacy setting module. | 2014-05-29 |
20140150110 | METHOD FOR ROUTING A MESSAGE - A method for routing at least one message, this method being implementation-dependent on a trusted operating system of an electronic device comprising an electronic assembly on which the trusted operating system and a Rich-OS operating system are executed. The method may include operations for consulting a trusted memory of a terminal, which may be called a first memory, and when the first memory contains a message, determining the operating system targeted by the message from among at least the Rich-OS operating system and the trusted operating system. And when the message targets the Rich-OS system, transferring the message from the first memory to a memory accessible to the Rich-OS system, which may be called a second memory. | 2014-05-29 |
20140150111 | Audio/Video Identification Watermarking - The invention is directed to marking audio/video (A/V) signals for use in tracing content to a source. An ID controller captures an A/V synchronization fingerprint from a master A/V signal, stores the fingerprint in a data store, and provides signals to an ID encoder to have encoded an identifier into a copy of the master A/V signal. The identifier is encoded to be persistent through actions such as capture, compression, and/or transcoding. In one embodiment, the identifier is encoded as a bit sequence, where each bit is encoded using an encoding technique that is hereinafter called a Mississippi encoding technique. The encoded identifier within the copied A/V signal may later be determined by extracting the fingerprint and comparing it to the stored fingerprint to determine the identifier. The identifier may then be used to trace a source of the copied A/V signal. | 2014-05-29 |
20140150112 | DEVICE AND PORTABLE STORAGE DEVICE WHICH ARE CAPABLE OF TRANSFERRING RIGHTS OBJECT, AND A METHOD OF TRANSFERRING RIGHTS OBJECT - A device and a portable storage device which are capable of transferring a rights object (RO) and a method of transferring an RO are provided. The method includes enabling a device to transmit an installation request message to a portable storage device for installing a copy of an original RO present in the device in the portable storage device, enabling the device to install the copy of the original RO in the portable storage device, and enabling the device to receive an installation response message indicating that the copy of the original RO has been successfully installed in the portable storage device from the portable storage device. | 2014-05-29 |
20140150113 | DEVICE AND PORTABLE STORAGE DEVICE WHICH ARE CAPABLE OF TRANSFERRING RIGHTS OBJECT, AND A METHOD OF TRANSFERRING RIGHTS OBJECT - A device and a portable storage device which are capable of transferring a rights object (RO) and a method of transferring an RO are provided. The method includes enabling a device to transmit an installation request message to a portable storage device for installing a copy of an original RO present in the device in the portable storage device, enabling the device to install the copy of the original RO in the portable storage device, and enabling the device to receive an installation response message indicating that the copy of the original RO has been successfully installed in the portable storage device from the portable storage device. | 2014-05-29 |
20140150114 | VISUAL SECUREMENT OF SENSITIVE DATA - Various embodiments of systems and methods for visual securement of sensitive data are described herein. In one aspect, the method includes receiving a request for displaying a report. It is determined whether the requested report comprises sensitive data. When the report comprises the sensitive data, a display rule related to the sensitive data is identified. Based upon the identified display rule, the sensitive data within the report is displayed. | 2014-05-29 |
20140150115 | ASSIGNING ELECTRONICALLY PURCHASED ITEMS OF CONTENT TO USERS - The described embodiments include a content provider device that can assign items of content (applications, digitally-rendered music, books, videos, etc.) to users upon receiving assignment messages from administrative devices. The items of content can be electronically transferred to the user's devices to be used by users. The content provider device can also revoke assignments of items of content from users upon receiving revocation messages from administrative devices. The revocation generally causes the loss of one or more rights to the item of content for the user. For example, the content provider device can stop providing services for the item of content and/or can cause the item of content to be deleted from a corresponding user's device. | 2014-05-29 |
20140150116 | CONTROLLING RELEASE OF SECURE DATA - Controlling release of secure data is described. In an embodiment data verified by a trusted authority and other personal data may be stored in a data store on a mobile device. In an example the data store may be secured cryptographically. In an example the data store may be encrypted using one or more encryption keys. In response to receiving a request from a requesting application one or more of the data items may be provided to the requesting party to verify an aspect of a user's identity. In an example, in response to receiving a request from a requesting application user input may be requested, the user input specifying whether or not the data item may be released. In an example, the data store may be provided with a certificate, which may be revoked to prevent access to the stored data items. | 2014-05-29 |
20140150117 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, INFORMATION PROCESSING DEVICE, PROGRAM AND STORAGE MEDIUM - To reduce a fear in that another person notices limitation of a range of information that forms a basis of a screen provided to a user, a page generation unit identifies a publicly-displayable range of information on the user based on control information, which is information different from a password and is identified based on content of an operation performed in a password input field with an input device. The page generation unit limits the range of the information that forms the basis of the screen provided to the user so that the range of the information falls within the publicly-displayable range identified by the page generation unit. | 2014-05-29 |
20140150118 | INFORMATION PROCESSING DEVICE, CONTROL METHOD THEREFOR, PROGRAM, AND INFORMATION STORAGE MEDIUM - To provide an information processing device that is capable of restricting the use of an application or content in an unauthorized device to which the application or the content is copied. A storage situation information storing unit ( | 2014-05-29 |
20140150119 | Security Restrictions on Binary Behaviors - A security model restricts binary behaviors on a machine based on identified security zones. Binary behaviors can be attached to an element of a document, web-page, or email message. The binary behavior potentially threatens security on the local machine. A security manager intercepts download requests and/or execution requests, identifies a security zone for the requested binary behavior, and restricts access based on the security zone. The binary behavior can identify a security zone according to the related URL. In one example, all binary behaviors associated with a security zone are handled identically. In another example, a list of permissible binary behaviors is associated with a security zone such that only specified binary behaviors are granted access. In still another example, a list of impermissible binary behaviors is associated with a security zone such that binary behaviors that are found in the list cannot initiate access. | 2014-05-29 |
20140150120 | SYSTEMS AND METHODS FOR SECURING DATA IN THE CLOUD - A secure data parser is provided that may be integrated into any suitable system for securely storing data in and communicating data with cloud computing resources. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. | 2014-05-29 |
20140150121 | MIME Handling Security Enforcement - A model restricts un-trusted data/objects from running on a user's machine without permission. The data is received by a protocol layer that reports a MIME type associated with the DATA, and caches the data and related cache file name (CFN). A MIME sniffer is arranged to identify a sniffed MIME type based on the cached data, the CFN, and the reported MIME type. Reconciliation logic evaluates the sniffed MIME type and the CFN to determine a reconciled MIME type, and to update the CFN. A class ID sniffer evaluates the updated CFN, the cached data, and the reconciled MIME type to determine an appropriate class ID. Security logic evaluates the updated CFN, the reported class ID, and other related system parameters to build a security matrix. Parameters from the security matrix are used to intercept data/objects before an un-trusted data/object can create a security breach on the machine | 2014-05-29 |
20140150122 | Methods and Systems for Using Derived User Accounts - Methods, systems and articles of manufacture consistent with features of the present invention allow the generation and use of derived user accounts, or DUA, in a computer system comprising user accounts. In particular, derivation rules define how a DUA is linked to or created based on an existing original user account, or OUA. Derivation transformations may also update the state of a DUA based on its corresponding OUA or give feedback from the state of a DUA to the state of its corresponding OUA. | 2014-05-29 |
20140150123 | USING RECEIPTS TO CONTROL ASSIGNMENTS OF ITEMS OF CONTENT TO USERS - The described embodiments comprise an electronic device that executes an application, the electronic device including a processing subsystem. In these embodiments, the processing subsystem is configured to acquire a receipt associated with the application, wherein the application was purchased by a purchasing entity and installed on the electronic device after being assigned to a user of the electronic device by the purchasing entity. The processing subsystem is further configured to determine, using the receipt, if the application has expired. When the application has not expired, The processing subsystem is configured to execute the application with predetermined functions of the application enabled. When the application has expired, The processing subsystem is configured to execute the application with the predetermined functions of the application disabled. | 2014-05-29 |
20140150124 | In Vivo Reporter System - A construct system for expressing a reporter protein, as well as a transgenic animal and a screening method employing the same, are provided. In certain embodiments, the construct system is a three component system in which expression of a reporter protein from a reporter construct is induced by a transcription factor that is produced using two other constructs, each producing a different part of the transcription factor. The parts of the transcription factor are ligated together. Expression of the reporter only occurs in tissues in which both of the parts of the transcription factor are produced. | 2014-05-29 |
20140150125 | ANIMAL MODELS AND THERAPEUTIC MOLECULES - The invention discloses methods for the generation of chimaeric human—non-human antibodies and chimaeric antibody chains, antibodies and antibody chains so produced, and derivatives thereof including fully humanised antibodies; compositions comprising said antibodies, antibody chains and derivatives, as well as cells, non-human mammals and vectors, suitable for use in said methods. | 2014-05-29 |
20140150126 | ANIMAL MODELS AND THERAPEUTIC MOLECULES - The invention discloses methods for the generation of chimaeric human-non-human antibodies and chimaeric antibody chains, antibodies and antibody chains so produced, and derivatives thereof including fully humanised antibodies; compositions comprising said antibodies, antibody chains and derivatives, as well as cells, non-human mammals and vectors, suitable for use in said methods. | 2014-05-29 |
20140150127 | MELON HYBRID DRT 1914 AND PARENTS THEREOF - The invention provides seed and plants of melon hybrid DRT 1914 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of melon hybrid DRT 1914 and the parent lines thereof, and to methods for producing a melon plant produced by crossing such plants with themselves or with another melon plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2014-05-29 |
20140150128 | ZUCCHINI HYBRID SV9441YG AND PARENTS THEREOF - The invention provides seed and plants of zucchini hybrid SV9441YG and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of zucchini hybrid SV9441YG and the parent lines thereof, and to methods for producing a zucchini plant produced by crossing such plants with themselves or with another zucchini plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2014-05-29 |
20140150129 | ZUCCHINI HYBRID SV9480YG AND PARENTS THEREOF - The invention provides seed and plants of zucchini hybrid SV9480YG and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of zucchini hybrid SV9480YG and the parent lines thereof, and to methods for producing a zucchini plant produced by crossing such plants with themselves or with another zucchini plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2014-05-29 |
20140150130 | TOMATO VARIETY N 6410 - The invention provides a new and distinct hybrid variety of tomato, N 6410 or NUN 00201 TOP which is especially useful as processing tomato. | 2014-05-29 |
20140150131 | SOYBEAN CULTIVAR OW0913200 - The present invention is in the field of soybean variety OWO913200 breeding and development. The present invention particularly relates to the soybean variety OWO913200 and its progeny, and methods of making OWO913200. | 2014-05-29 |
20140150132 | Mutants - Identification of new FAD2 mutants which result in plants with a more desirable oleic acid composition than in known plants. For the first time, this patent disclosure provides a complete characterization of the genome of a given germplasm of | 2014-05-29 |