26th week of 2014 patent applcation highlights part 82 |
Patent application number | Title | Published |
20140181911 | METHOD, SYSTEM AND PROGRAM PRODUCT FOR SECURE AUTHENTICATION - A method, system and program product comprises establishing a communication with a computing system using a first device for communicating with the computing system over a first communication channel. The computing system is in communication with a second device configured for communicating with the computing system over a second communication channel separate from the first communication channel. The first device is paired with the computer system in which the first device and the computer system are mutually authenticated. A code presented by the second device is captured using the first device. The code is communicated to the computing system over the first communication channel in which the computer system uses the code in authorizing the second device to perform a function. The computer system communicates an authorization to the second device using the second communication channel. | 2014-06-26 |
20140181912 | Access Reviews at IAM System Implementing IAM Data Model - Systems and methods of conducting access reviews of access rights to logical computing resources are provided. An access reviewer may receive a selection indicating a user having access to one or more logical computing resources of a computer system. The access reviewer may identify a set of current logical computing resources that the user has access to and a set of current logical entitlements associated with the user. The access reviewer may generate an access review summary based on a comparison of the current logical computing resources to one or more of the current logical entitlements. | 2014-06-26 |
20140181913 | Verifying Separation-of-Duties at IAM System Implementing IAM Data Model - Systems and methods of verifying separation-of-duties (SoD) for requested access rights to physical computing resources are provided. An SoD verifier may receive and access request and obtain a set of current permissions associated with a requestee specified in the access request. The SoD verifier may also obtain a set of new permissions to provision for the requestee based on the access request. The SoD verifier may determine whether one of the current permissions is incompatible with one of the new permissions. The SoD verifier may provide an indication of whether the access request represents an SoD violation. | 2014-06-26 |
20140181914 | Reconciling Access Rights at IAM System Implementing IAM Data Model - Systems and methods for reconciling access rights provisioned for physical computing resources of a computer system are provided. A reconciler may identify current physical computing resources accessible to a user account of the computer system and a physical entitlement specification associated with the user account. The reconciler may determine whether adjustment of access rights is needed based on a comparison of the current physical computing resources to the physical entitlement specification. Access rights to at least one physical computing resource may be adjusted in response to a determination that adjustment of access rights is needed. | 2014-06-26 |
20140181915 | METHOD AND SYSTEM FOR NETWORK VALIDATION OF INFORMATION - Embodiments of the present application relate to a method for network validation of information, a system for network validation of information, and a computer program product for network validation of information. A method for network validation of information is provided. The method includes receiving verification information from a user, the verification information including a plurality of verification fields, determining a verification sequence of the plurality of verification fields based on a verification rule configuration and a verification scoring table, verifying a current verification field according to the verification sequence, verifying a next verification field in the event that the verification of the current verification field succeeds, and terminating verification in the event that the verification of the current verification field fails. | 2014-06-26 |
20140181916 | ELECTRONIC DEVICE, PERSONAL CLOUD APPARATUS, PERSONAL CLOUD SYSTEM AND METHOD FOR REGISTERING PERSONAL CLOUD APPARATUS IN USER PORTAL SERVER THEREOF - An electronic device, a personal cloud apparatus, a personal cloud system, and a method thereof for registering personal cloud apparatus are provided. The method of the electronic device for registering the personal cloud apparatus includes pairing with the personal cloud apparatus when an application is executed, acquiring information about an access point and transmitting the same to the personal cloud apparatus to connect the personal cloud apparatus to a network, and registering the personal cloud apparatus to a registration server, when the personal cloud apparatus is connected to the network via the access point. As a result, users are able to upload or download various contents using the personal cloud apparatus, inside or outside the house. | 2014-06-26 |
20140181917 | COMPUTER TELEPHONY SYSTEM, METHOD AND SERVER - A controller in a computer telephony system records a mapping linking a key and the identifier of a communications terminal previously associated with a user. The key selected by the controller is a parameter associated with the user in a second system external to the computer telephony system. The controller operates to receive a message from the second system comprising a command issued by the user and the key. The controller reads the received key and uses it to retrieve the identifier and then forwards the command together with the identifier to a communications controller for controlling operation of the communications terminal. | 2014-06-26 |
20140181918 | SYSTEM AND METHOD FOR PREVENTING ACCESS TO DATA ON A COMPROMISED REMOTE DEVICE - This invention discloses a system and method for selective erasure, encryption and or copying of data on a remote device if the remote device has been compromised or the level of authorization of a roaming user in charge of the remote device has been modified. | 2014-06-26 |
20140181919 | SYSTEM FOR SECURE ENROLLMENT AND SECURE VERIFICATION OF NETWORK USERS BY A CENTRALIZED IDENTIFICATION SERVICE - A system and method for providing, as a service over a computer network (especially a packet-switched computer network) to a body of merchants connected to the computer network, verification of consumer identification based on data provided over the computer network by scanning devices attached to the computers operated by consumers. | 2014-06-26 |
20140181920 | LOCKED ELEMENT FOR USE IN A GRAPHICAL MODELING ENVIRONMENT - In a graphical modeling environment, a method of providing varying levels of protection relating to functionalities associated with at least some elements of a block diagram model, the method including: receiving a selection of one of the elements; receiving an indication of a desired authorization required to use at least one function of the selected element; implementing the indicated authorization for the use of the at least one function; and preventing, without obtaining of the authorization, an attempted use of the at least one function. | 2014-06-26 |
20140181921 | AUDIO BASED HUMAN-INTERACTION PROOF - A method and system for allowing access to computer functions such as websites that utilizes a user's ability to recognize sounds is described. The method presents a user a series of sounds. Some of the sounds presented in the series are labeled as validation sounds. The user is asked to provide an input every time he or she hears the validation sound. The user must identify the sound within a specified length of time. The system disclosed comprises a user interface, a sound database module, a generation module, and a sound database module. The generation module creates the validation test file and expected answer. The answer confirmation module checks the input from the requesting computer and provides access to the computer function if the computer input from the requesting computer meets the required parameters. | 2014-06-26 |
20140181922 | SYSTEMS AND METHODS FOR DETERMINING A STRENGTH OF A CREATED CREDENTIAL - Devices, systems, and methods for determining a strength of a created credential are provided. The device includes one or more processors configured to decompose a created credential into credential components, parse the credential components using a limited dictionary, determine a probability of the credential components using a limited ruleset, and calculate a score of the created credential based on the determined probability. The device also includes a memory, the memory storing the limited dictionary and the limited ruleset, and a network interface component coupled to a network, the network interface component configured to transmit the created credential to a remote server over the network for a secondary credential strength determination if the calculated score is above a threshold. | 2014-06-26 |
20140181923 | Method and Apparatus For Monitoring Wireless Network Access - A system and method for monitoring wireless network access, and use of a detected wireless network connection are described. A client component (e.g., software component), or client, can be downloaded to a computing device, which leverages off of the computing device's ability to locate and establish a network connection. The client component listens for network connection activity, and determines whether the device has established a network connection with a network known to the client. If the client determines that a network connection has been established to a known network, the client uses the network connection to log the user onto the network. | 2014-06-26 |
20140181924 | INTELLIGENT ELECTRONIC DEVICE HAVING USER-AUTHENTICATING CAPABILITIES - An intelligent electronic device (IED) includes a user authentication module configured for authenticating authorized users of the IED and preventing an access by non-authorized personnel to a user-selectable portion of operational features of the IED. In exemplary embodiments, the user authentication module includes a database of information authenticating an authorized user and a sensor acquiring user-identifying information (e.g., a biometric sensor, a reader of magnetic, holographic, RFID, or smart ID cards, or a keypad). In one application, these techniques are implemented in IEDs such as electrical power and energy meters and used to control access to reset, configuration, billing, communication, and data acquisition/processing functions of the meters. | 2014-06-26 |
20140181925 | Privacy Enhanced Key Management For A Web Service Provider Using A Converged Security Engine - In an embodiment, a security engine of a processor includes an identity provider logic to generate a first key pair of a key pairing associating system user and a service provider that provides a web service and having a second system coupled to the system via a network, to perform a secure communication with the second system to enable the second system to verify that the identity provider logic is executing in a trusted execution environment, and responsive to the verification, to send a first key of the first key pair to the second system. This key may enable the second system to verify an assertion communicated by the identity provider logic that the user has been authenticated to the system according to a multi-factor authentication. Other embodiments are described and claimed. | 2014-06-26 |
20140181926 | METHOD AND MOBILE DEVICE FOR GENERATING A DATA AUTHENTICATION KEY - The invention relates to a method for generating a data authentication key for allowing data communication over a wireless channel between a first mobile device and a second mobile device, comprising: associating said mobile devices to each other by means of said key. The invention comprises: allowing a shared physical or mechanical condition to be applied generally simultaneously upon said devices; detecting, in said first mobile device, said condition; defining, in said first mobile device, said authentication key based on the detected condition; and transmitting said key to said second mobile device. The invention also relates to a mobile device configured for generating a data authentication key for allowing data communication over a wireless channel to a further mobile device. | 2014-06-26 |
20140181927 | FILE FORMAT AND PLATFORM FOR STORAGE AND VERIFICATION OF CREDENTIALS - In various embodiments, a computer-implemented method for generating and verifying officially verifiable electronic representations may be disclosed. The method may comprise receiving, by a credential database, a request for a credential action. The credential database may be configured to store one or more credentials comprising a status indicator. The method may further comprise determining, by the credential database, a response to the credential action based on the one or more user credentials stored in the credential database and transmitting, by the credential database, the response to a client device. | 2014-06-26 |
20140181928 | METHOD AND SYSTEM FOR PLANNING AND MANAGEMENT OF DIGITAL EVENTS - A method and system is provided that manages events involving an individual's digital assets and/or external services that the individual interfaces with using external service credentials. The method and system allow the individual to securely store digital assets and external service credentials used to login to external services. The method and system further allow the individual to create a plan of actions to be executed on specified dates, where the actions involve one or more of the individual's digital assets and/or involve one or more external services that the individual interfaces with using one or more external service credentials. The plan of actions takes the format of a timeline that includes one or more timeline events, where an action and a date are associated with a timeline event. | 2014-06-26 |
20140181929 | METHOD AND APPARATUS FOR USER AUTHENTICATION - The disclosure generally relates to methods and apparatuses for user authentication. According to embodiments of the present invention, authentication-related information may be encoded in an image such as a QR code. By communicating and decoding such image information and other authentication information between one or more devices of the user and an authentication server, the authentication server may perform an effective authentication to the user and his/her device. In the meantime, it is possible to avoid the risk of invalid authentication due to the disclosure of the password. Embodiments of the present invention may be used in combination with the existing static password and/or dynamic password authentication and thus they have a good compatibility. | 2014-06-26 |
20140181930 | METHOD, SYSTEM AND APPARATUS FOR PROTECTING ABSF ENTITY FROM ATTACK - A method, system and apparatus for protecting a bootstrapping service function (BSF) entity from attack includes: a first temporary identity and a second temporary identity are generated after a BSF entity performs a mutual authentication with a user equipment (UE) by using an initial temporary identity sent from the UE; the BSF entity receives a re-authentication request carrying the first temporary identity from the UE; and the UE sends a service request carrying the second temporary identity to a network application function (NAF) entity. The present disclosure prevents attackers from intercepting the temporary identity at the Ua interface and using the temporary identity to originate a re-authentication request at the Ub interface, thus protecting the BSF entity from attack and avoiding unnecessary load on the BSF entity and saving resources. | 2014-06-26 |
20140181931 | MULTI-PLATFORM USER DEVICE MALICIOUS WEBSITE PROTECTION SYSTEM - A security system for defending online users against fraudsters and malicious websites comprises a back-end network server and appropriate apps for each protected user device. An otherwise conventional network server is enhanced with application software instructions for a centralized software-as-a-service (SaaS) to respond to network requests from user devices operating variously under ANDROID-type, APPLE IOS-type, and MICROSOFT WINDOWS-type operating systems. The SaaS investigates, surveys, and watches websites. It calculates confidence scores related to financial fraud and the acceptability and risk to said users of visiting particular websites. It maintains a trusted network database of website URL's calculated to belong to financial websites that can be trusted and present acceptable levels of fraud and financial risk to its visitors. Each user device application provides for secure password management and access via a security browser to websites in the trusted network. | 2014-06-26 |
20140181932 | METHOD FOR MANAGING AND CHECKING DATA FROM DIFFERENT IDENTITY DOMAINS ORGANIZED INTO A STRUCTURED SET - The invention relates to a method and system for managing and checking different identity data relating to a person. According to the invention, a derived-identity management server generates for the person at least part of the identity data with which said person can be authenticated in relation to a service provider for the derived-identity domain, on the basis of information derived from identity data from parent domains. The identity data generation processing ensures that no link can be established from two authentications in two separate domains in the absence of link information. If necessary, said link information is transmitted by a parent domain to a derived-identity server so that the latter establishes the link between the identity data of the derived-identity domain and the identity data of the parent domain, e.g. for the cascade revocation of a person from various domains. | 2014-06-26 |
20140181933 | VERIFYING AN IDENTITY OF A MESSAGE SENDER - A system includes a gateway and a verification server. The gateway is configured to receive a first message from a client over a network; send a request to a verification server to generate a first credential based on the first message; and route the first message toward a remote device. The verification server is configured to receive the request from the gateway; generate the first credential in response to the request; store the first credential; receive a second message from the remote device, the message requesting the verification server to validate a second credential; determine whether the second credential is valid based on the first credential; and send a notification to the remote device indicating whether the second credential is valid. | 2014-06-26 |
20140181934 | SUPPORTING MULTIPLE MESSAGING SERVICES ON MOBILE DEVICES IN A SINGLE USER EXPERIENCE - A system is described that contains a device including a memory with a management application installed thereon. The management application contains a manager that generates a plurality of user accounts and associates at least one communication service as a messaging account with each user account, and an interface module that generates a user interface that presents the plurality of user accounts and that modifies the user interface based on the identification of the selected user account to present a selected account display. | 2014-06-26 |
20140181935 | SYSTEM AND METHOD FOR IMPORTING AND MERGING CONTENT ITEMS FROM DIFFERENT SOURCES - Systems, methods, and computer-readable storage media for importing and merging photos from different sources are disclosed. The system receives credentials from a user, who has an account with a content management system. The credentials are associated with content item storage entities such as photo repositories. The system accesses the photo repositories, using the plurality of credentials if authorization is required for data access. The system identifies source photo data in each of the photo repositories, and duplicates the source photo data in the content management system account to create consolidated photo data. | 2014-06-26 |
20140181936 | AUTOMATED TEST TO TELL COMPUTERS AND HUMANS APART - Example embodiments disclosed herein relate to an automated test to tell computers and humans apart. Building blocks are assembled to generate an image for a test. When the building blocks are configured in at least one orientation, the image includes a line. One or more of the building blocks can be rotated to generate the at least one orientation. The test can be sent to a device. The test is not oriented in the at least one orientation. | 2014-06-26 |
20140181937 | INPUT DEVICE, INPUT METHOD AND PROGRAM PRODUCT - According to one embodiment, an input device includes: a communication module configured to communicate with a different device connected to the input device; a detector configured to detect biological information of a user; an authentication module configured to check matching between the detected biological information and biological information which is stored in advance; and a controller configured to notify to the different device information indicating a device performing an operation input, and notify to the different device an input code formed as a predetermined input character string when the matching of the biological information is established. | 2014-06-26 |
20140181938 | PACKET PROCESSOR VERIFICATION METHODS AND SYSTEMS - Methods and systems for transmitting and receiving data using audio devices but without being detectable by a human ear are disclosed. For example, a device for transmitting data can include a modulator configured to transform digital data into a modulated signal having a frequency no less than about 20 kHz, and an audio transmitter coupled to an output of the modulator configured to transmit the modulated signal into a sound propagating medium without being detected by a human ear. The methods and systems can be used to perform two-factor authentication for permitting a user to access a remote server or other device. | 2014-06-26 |
20140181939 | CLOUD COMPUTING EXCHANGE FOR IDENTITY PROOFING AND VALIDATION - An architecture and method to provide a cloud based credential exchange wherein organizations and users can use the services of a centralized and streamlined credential clearing house. A user can provide credentials or verification from a third party credential provider to the credential exchange. The credential exchange can use the third party credentials to provide access to multiple networks affiliated with the credential exchange. | 2014-06-26 |
20140181940 | FILE MANAGEMENT METHOD AND SYSTEM AND STORAGE MEDIUMS - The invention provides a file management method includes the steps of: setting cloud copy buttons in right-click menus of files and/or file folders; acquiring clicking operations on the cloud copy buttons by a user; uploading files and/or file folders selected by the user onto a server in accordance with the clicking operations. With the above method, file management becomes more convenient. Furthermore, a tile management system and storage mediums are provided. | 2014-06-26 |
20140181941 | METHOD AND APPARATUS FOR A SECURE PUBLIC IDENTIFICATION TAG - A method and apparatus for a secure public identification tag on a sticker, bracelet or temporary tattoo, or other temporary tag. The tag includes a two-dimensional bar code with embedded public key and a removable or separable security code. The two-dimensional bar code, such as a QR code, a Maxicode, a High Capacity Color Bar Code, an Aztec Code, or any code capable of being scanned may be used. The two-dimensional bar code includes the URL address to a secure website and the public identification. When the bar code is scanned for the first time the user is provided with a registration screen to enter the security code and information that may be publicly viewed, as well as a time limit for expiration of the identification tag. When the identification tag is subsequently scanned only the public information may be viewed unless the security code is entered. | 2014-06-26 |
20140181942 | STARTUP METHOD AND APPARATUS, STARTUP-ACCEPTANCE METHOD AND APPARATUS, AND MUTUAL-STARTUP METHOD AND SYSTEM - The present invention provides startup method and apparatus, startup-acceptance method and apparatus, and mutual-startup method and system. The startup method includes steps of: receiving an instruction of a user terminal to start up a second application; obtaining a login-status information of the user terminal in a first application; generating a first startup command for starting up the second application; and starting up the second application through the first startup command, delivering the login-status information of the user terminal in the first application to the second application and thereby automatically logging the user terminal into the second application. | 2014-06-26 |
20140181943 | WIRELESS COMMUNICATION SYSTEM PROVIDED WITH WIRELESS COMMUNICATION TERMINAL APPARATUSES WIRELESSLY CONNECTED UNDER AUTHENTIFICATION - A first connection control part of a first wireless communication terminal apparatus compares a second network identification information included in a response frame with a first network identification information stored in a first connection information managing part in response to the response frame, and executes an authentication process with a second wireless communication terminal apparatus by using an authentication information stored in the first connection information managing part when a second network identification information included in the response frame is matched with the first network identification information stored in the first connection information managing part, and this leads to establishment of wireless connection with the second wireless communication terminal apparatus by a second communication system. | 2014-06-26 |
20140181944 | SINGLE SIGN-ON FOR A NATIVE APPLICATION AND A WEB APPLICATION ON A MOBILE DEVICE - A mobile device includes a session maintainer application, a native application and a shell application and a link to a web application. If a user is seeking to access a native application, and an active session has not been established, user login credential is obtained, a session token is obtained upon verification of the user login credential, and the obtained session token is provided to the native application. If the user is seeking to access a web application, and an active session has not been established, a session token is obtained upon verification of the user login credential and the obtained session token is provided to the shell application. If an active session has been established then the obtained session token is automatically provided to the native or shell application when the user subsequently seeks access to the respective application. | 2014-06-26 |
20140181945 | SINGLE-POINT LOGIN SYSTEM AND METHOD - When a server receives a request for accessing a first business system from a client and a first request data packet sent from another business system, the server determines that an access mode of the client is single-point login access. Then the server validates if the client has authority to access the first business system according to data in the first request data packet and data in an information list, and allows the client to access the first business system if the client has the authority, or rejects the client to access the first business system if the client does not have the authority. When receiving a request of switching the client from the first business system to a second business system, the server sends a second request data packet to the second business system. | 2014-06-26 |
20140181946 | SINGLE SIGN ON WITH MULTIPLE AUTHENTICATION FACTORS - The authentication of a client to multiple server resources with a single sign-on procedure using multiple factors is disclosed. One contemplated embodiment is a method in which a login session is initiated with the authentication system of a primary one of the multiple server resources. A first set of login credentials is transmitted thereto, and validated. A token is stored on the client indicating that the initial authentication was successful, which is then used to transition to a secondary one of the multiple resources. A second set of login credentials is also transmitted, and access to the secondary one of the multiple resources is granted on the basis of a validated token and second set of login credentials. | 2014-06-26 |
20140181947 | ADMINISTRATION OF WEB PAGE - Personalization and projection of television or other content related services is contemplated. Services may be personalized according to a user identifier or other identifier associated with a mobile device, a second screen device or other type of device. The personalized services may be projected, transferred or otherwise accessed through another device, such as but not necessarily limited to a computer, a television, a settop box (STB), a gateway, etc. | 2014-06-26 |
20140181948 | Authenticating Using Cloud Authentication - An authentication mechanism in a local area network may use a cloud authentication mechanism to allow or deny authentication requests. A user may gain access within a local area network by entering a cloud identification and password, which may be verified by a cloud authentication mechanism. If the authentication is successful from the cloud authentication mechanism, the user identification and password are stored locally for subsequent authentication requests. In some embodiments, the cloud password may be periodically flushed so that subsequent requests may be passed to the cloud authentication mechanism. The authentication mechanism may be used in both domain and workgroup local area networks, and may operate in parallel with other users who may have local area network or client credentials which may not be authenticated from the cloud. | 2014-06-26 |
20140181949 | METHODS AND SYSTEMS FOR A POWER FIREWALL - The present invention provides methods of and systems to create an infrastructure firewall for devices such as power systems that support personnel and systems. In accordance with an embodiment of the present invention, a system includes at least one infrastructure device, at least one data-gathering client, at least one server and at least one end-user client. The infrastructure device is secured by the data-gathering client having no ability to communicate with any device to which it does not initiate the communication. The data-gathering client makes use of a private network between itself and one or more infrastructure devices to which no one may interrupt the communications. The data-gathering client then securely pushes data received with respect to the cyber security, physical security and operating parameters of the infrastructure devices. If an alert exists with an infrastructure device, upon receiving information from the data-gathering client, the server opens a push-communications connection between itself and, ultimately, the end-user client. The end-user client displays data received from the server wherein the displayed data is derived from the data generated with respect to a task performed by the monitored device. | 2014-06-26 |
20140181950 | Performance Optimization in a Secured Computing Environment - Systems and methods for associating a first process with a first state and a first computing environment initialized according to a first set of parameters, wherein a first task is to be performed under a first security context. The method further comprising associating a second process with a second state and a second computing environment initialized according to a second set of parameters; in response to the first process submitting a first request, the second process spawning a third process which has the second state; wherein the third process sets a security context for the third process to the first security context and the third process sets the computing environment for the third process according to a first a set of parameters; executing the third process under the first security context and in association with the second state; and executing the first task in the first computing environment. | 2014-06-26 |
20140181951 | Method for Remotely Servicing a Field Device of Automation Technology - A method for remotely servicing a field device of automation technology located in a first network secured by a first firewall, wherein remote servicing occurs via a servicing device associated with a second network secured by a second firewall comprising the steps of: establishing a first communication connection between the field device and a gateway associated with the first network; establishing a second communication connection; reporting of the first gateway; granting a unique identifier by a broker server for the first communication connection; transmitting the unique identifier to a second gateway associated with the second network; establishing a third communication connection between the second gateway and the broker server using the unique identifier; and establishing a communication connection between the second gateway and the first gateway, wherein: the broker server logically connects the second communication connection and the third communication connection with one another, so that communication connection between the servicing device and the field device is produced. | 2014-06-26 |
20140181952 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PROVIDING DIAMETER SIGNALING ROUTER WITH FIREWALL FUNCTIONALITY - According to one aspect, the subject matter described herein includes a system for Diameter routing and firewall filtering. The system includes a Diameter signaling router comprising a network interface for receiving, from a first Diameter node, a first Diameter message having Diameter information. The Diameter signaling router also includes a firewall module for determining whether the first Diameter message satisfies a firewall policy. The firewall policy is based on at least a portion of the Diameter information in the first Diameter message. The Diameter signaling router further includes a routing module for forwarding at least a portion of the first Diameter message towards a second Diameter node in response to the first Diameter message satisfying the firewall policy. | 2014-06-26 |
20140181953 | Method and Apparatus for Best Effort Propagation of Security Group Information - A method and system for best effort propagation of security group information is disclosed. The method includes determining if a reserved group identifier is associated with a destination and, if the reserved group identifier is associated with the destination, indicating that a packet received at a network node can be sent to another network node. The packet includes destination information that identifies the destination as a destination of the packet. | 2014-06-26 |
20140181954 | SYSTEM FOR CONVEYING AN IDENTITY AND METHOD OF DOING THE SAME - A system is configured to communicate an identity and perform a physical task. The system has an application controlled identity device is configured to receive and to store a user identity. An application controlled detection device is communicatively coupled to the application controlled identity device. An actuator is communicatively coupled to the application controlled detection device. The application controlled detection device comprises computer code programmed to compare the identity with the stored identity. The application controlled detection device further comprises computer code programmed to activate the actuator when the identity matches the stored identity. | 2014-06-26 |
20140181955 | TWO FACTOR AUTHENTICATION USING NEAR FIELD COMMUNICATIONS - There is provided a method and apparatus for communications using short range communications such as Near Field Communications (NFC). A mobile device comprising an NFC subsystem provides a dynamic credential for use to login to a network requiring two factor authentication. A terminal used for logging in to the network is associated with an NFC reader, and bringing the NFC device in proximity to the NFC reader provides the terminal with the dynamic credential required for two factor authentication. | 2014-06-26 |
20140181956 | METHODS, SYSTEMS, AND MEDIA FOR MEASURING QUALITY OF GESTURE-BASED PASSWORDS - Methods, systems, and media for measuring gesture-based password quality are provided, the methods comprising: receiving a first image; receiving a proposed password; identifying points of interest in the image each associated with an attribute; receiving a gesture selection function sequence, with a plurality of gesture selection functions each associated with a gesture type and a point of interest attribute; determining that a subset of points of interest in the image have attributes corresponding to attributes associated of a gesture selection function sequence; generating a possible password based on the gesture selection function sequence; determining and presenting a relative strength of the proposed password based on whether the proposed password matches the possible password. | 2014-06-26 |
20140181957 | METHODS AND APPARATUS FOR AUTHENTICATING USER LOGIN - Example methods and apparatus for authenticating a user login are disclosed herein. An example method includes displaying an image and dynamically presenting symbols adjacent the image. The example method includes receiving a code, the code formed by an arrangement of one or more of the symbols on the image. The example method includes authenticating a user based on the code. | 2014-06-26 |
20140181958 | SECURE AND CONVENIENT AUTHENTICATION - The claimed subject matter provides an apparatus for facilitating no-look one-handed authentication. The apparatus includes logic to identify whether a user-manipulatable input is in one of a plurality of possible states for a time period, and authenticate a user based at least partially on identification that the user-manipulatable input is in the one of the plurality of possible states for the time period. | 2014-06-26 |
20140181959 | SECURE ELEMENT BIOMETRIC AUTHENTICATION SYSTEM - An input device may be in communication with an application processor, wherein the input device may be configured to receive an input and the application processor may be configured to translate the input to a received template. A secure element may be in communication with the application processor and configured to receive the received template from the application processor. The secure element may include a matcher and an enrolled template database. The matcher may be configured to compare the received template from the application processor with an enrolled template within the enrolled template database and return a match status based on the comparison. | 2014-06-26 |
20140181960 | METHODS AND APPARATUSES FOR CONTROLLING ACCESS TO COMPUTER SYSTEMS AND FOR ANNOTATING MEDIA FILES - Methods and apparatuses for controlling access to computer systems and for annotating media files. One embodiment includes a method including generating a challenge to a user, wherein the challenge includes a verify part and a read part. The methods also includes prompting the user to solve both the verify part of the challenge and the read part of the challenge; receiving input from the user; determining if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge; and identifying the input from the user relative to the read part of the challenge as an answer to the read part of the challenge, if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge. | 2014-06-26 |
20140181961 | ELECTRONIC DEVICE AND METHOD FOR UNLOCKING ELECTRONIC DEVICE - In a method for unlocking an electronic device, a plurality of icons are preset and an icon is designated to be an unlocking icon for unlocking the electronic device. When the electronic device is locked, the icons are moving on the display device, and the moving icons is highlighted one by one according to a moving direction and a time interval. When a highlighted icon is touched and the highlighted icon is the unlocking icon, the electronic device is unlocked. | 2014-06-26 |
20140181962 | APPLICATION EXECUTING METHOD USING FINGERPRINT RECOGNITION, DEVICE THEREFOR, AND COMPUTER READABLE RECORDING MEDIUM THEREFOR - An application-executing method using fingerprint recognition wherein an application-executing device executes an application using fingerprint recognition, includes recognizing a fingerprint from a fingerprint image obtained through a fingerprint sensor in a locking state of the application-executing device, activating a specific area that is part of a locking state screen of the application-executing device when the fingerprint is recognized, displaying a list of a plurality of applications in the specific area, receiving selection information of at least one application from the list of the plurality of applications, and executing an application according to the selected information. | 2014-06-26 |
20140181963 | ELECTRONIC DEVICE AND FILE PROTECTION METHOD - In a file protection method, when a request for opening a protected file is received, an environment image is captured, and character features in the environment image are extracted. The extracted character features are compared with character features of one or more authorized users that are pre-stored in a storage device, to determine if the environment image contains character features that match with the pre-stored character features of an authorized user. The content of the file is shown on the display device when the environment image contains character features that match with the pre-stored character features of an authorized user, and the file is forbidden to open when the environment image does not contain character features that match with the pre-stored character. | 2014-06-26 |
20140181964 | METHOD FOR MANAGING SECURITY FOR APPLICATIONS AND AN ELECTRONIC DEVICE THEREOF - Security management in an electronic device is provided. An method of the electronic device includes displaying an icon of an application having a first security level in a first region which occupies part of an interface, and displaying an icon of an application having a second security level in a second region which occupies an exclusive part of the first region. | 2014-06-26 |
20140181965 | Access Requests at IAM System Implementing IAM Data Model - Systems and methods are provided for provisioning access rights to physical computing resources using an IAM system implementing an IAM data model. The IAM data model may identify logical and physical computing resources. An access request handler may receive an access request and identify a set of logical permissions based on the access request. The access request handler may derive a set of logical entitlements based on the set of logical permissions. An entitlement translator may translate the set of logical entitlements to a physical entitlement specification based on a set of physical permission specifications associated with the set of logical permissions. A physical permission specification may be obtained by mapping a logical permission to one or more physical permissions. An access control manager may then provision access rights to at least one physical computing resource indicated in the physical entitlement specification. | 2014-06-26 |
20140181966 | CLOUD-BASED DISTRIBUTED DENIAL OF SERVICE MITIGATION - A method, performed by a computer device, may include receiving an indication of a distributed denial of service event at a front end system associated with a customer; generating one or more virtual front end systems for the customer, in response to receiving the indication of the distributed denial of service event; and redirecting traffic intended for the customer's front end system to the generated one or more virtual front end systems. The method may further include determining whether resource capacity of the generated one or more virtual front end systems has been reached; and generating an additional one or more virtual front end systems for the customer, in response to determining that the resource capacity of the generated one or more virtual front end systems has been reached. | 2014-06-26 |
20140181967 | PROVIDING-REPLAY PROTECTION IN SYSTEMS USING GROUP SECURITY ASSOCIATIONS - A method and apparatus is disclosed which enables detection of undesired packets received at a device in a network, where the device is a member of a group of devices in the network. A registration table stores transform identifiers for each member of a group and controls the forwarding of the transform identifiers to the members of the group as members are added and deleted. A transform identifier indicates a format or transformation of a packet transmitted by an associated member. The transform identifier can therefore be used at a receiving device to distinguish between transmissions by different members of the group, thereby enabling the receiving device to extract sequence information associated with the member from the packet. The sequence information can be compared against an expected sequence number for the member to determine whether the packet is an undesirable or rogue packet. | 2014-06-26 |
20140181968 | Monitoring Operational Activities In Networks And Detecting Potential Network Intrusions And Misuses - Concepts and technologies disclosed herein are for monitoring operational activities in networks and detecting potential network intrusions and misuses. According to one aspect disclosed herein, an intrusion detection system can collect logs from an authentication, authorization, and accounting system. The intrusion detection system can extract information from the logs, update intrusion detection information utilized by an intrusion detection rule based upon the information extracted from the logs, update a profile utilized by the intrusion detection rule, compare the profile and the intrusion detection rule against a running state of an on-going session, tag corresponding log entries with a threat score, calculate the threat scores from the corresponding log entries to create an aggregated threat score, and present the aggregated threat score. The intrusion detection system can also present an alarm if the aggregated threat score triggers an alarm condition. | 2014-06-26 |
20140181969 | System and Method for Uploading and Verifying a Document - An upload and verification system allows a user to upload files which the user would like to attached to the electronic record of a certain event associated with the company, for example, an insurance claim. A quarantine server may receive the uploaded file and scan the file for malicious code. The quarantine server may transmit the file to temporary storage server. The temporary storage server may receive the file, may convert the file to a file format supported by the company system and may compress the file. The temporary storage server may also transmit a preview of the file back to the client device, where the user can verify that the correct document has been uploaded and no mistakes have been made. | 2014-06-26 |
20140181970 | SYSTEM AND METHOD FOR IMPROVING THE EFFICIENCY OF APPLICATION EMULATION ACCELERATION - An improved emulator for analyzing software code, and associated method. The emulator includes a virtual execution environment in which a series of virtual processing states are represented during emulation of a first portion of the software code, and a hardware accelerator that performs an initialization of the computing hardware to directly execute a second portion of the software code under investigation without emulation thereof in the virtual execution environment. An efficiency assessment module determines a measure of efficiency of performing the executing of the second portion of the software code under investigation without emulation thereof, and an acceleration decision module performs selection of the second portion of the software code under investigation to be directly executed by the hardware accelerator module based on the determined measure of efficiency. | 2014-06-26 |
20140181971 | SYSTEM AND METHOD FOR DETECTING MALWARE THAT INTERFERES WITH THE USER INTERFACE - System and method for detecting ransomware. A current user behavior pattern is monitored based on user input via a user input device. The user behavior is compared against a reference set of behavior patterns associated with user frustration with non-responsiveness of the user interface module. A current status pattern of the operating system is also monitored. The current status pattern is compared against a reference set of operating system status patterns associated with predefined ransomware behavior. In response to indicia of current user frustration with non-responsiveness of the user interface, and further in response to indicia of the current status pattern having a correlation to the predefined ransomware behavior, an indication of a positive detection of ransomware executing on the computer system is provided. | 2014-06-26 |
20140181972 | PREVENTIVE INTRUSION DEVICE AND METHOD FOR MOBILE DEVICES - A method for providing an intrusion prevention system to prevent hacking into files located on enterprise users' endpoint devices functioning as mobile computing platforms. The method includes filtering low-level network packets for each of a plurality of received network packets, offloading the received packets to an inspecting processing module and marking suspicious packets based on at least one of a header and pattern of each of said received packets. The method also includes taking preventive measures by the system to ensure protection of the device and network, taking active steps by the system to block suspicious traffic and disconnecting the current connection by the system, when it detects suspicious traffic. | 2014-06-26 |
20140181973 | METHOD AND SYSTEM FOR DETECTING MALICIOUS APPLICATION - A malicious applications detection method is provided. The method includes: extracting a plurality of static features from a manifest file and a de-compiled code respectively obtained from a plurality of training malicious applications (APK files) and a plurality of training benign applications (APK files); generating at least one malicious application group using a clustering algorithm and generating at least one benign application group; generating application detecting models respectively representing the malicious and benign application groups based on static features of the training malicious and benign applications in each malicious application group and each benign application group; extracting target static features from a target manifest file and a target de-compiled code of a target application; using a classification algorithm, the target static features, and the application detecting models to determine whether the target application belongs to the malicious application group; and generating a warning message when a determination result is positive. | 2014-06-26 |
20140181974 | System and Method for Detecting Malware Using Isolated Environment - Disclosed system and methods for detecting malicious applications. The system provides a library of handler functions. The handlers functions control access of one or more applications to protected resources on a user device The system also modifies the one or more applications to access the library of handler functions instead of corresponding application program interface (API) functions of the user device. The handler functions receive API function calls from a modified application. The system analyzes the received API function calls for malicious behavior characteristics. When the. API function calls do not exhibit malicious behavior characteristics, the handier functions perform the API function calls to the protected resources. When the API function calls exhibit malicious behavior characteristics, the system prevents access of the modified application to the protected resources. | 2014-06-26 |
20140181975 | METHOD TO SCAN A FORENSIC IMAGE OF A COMPUTER SYSTEM WITH MULTIPLE MALICIOUS CODE DETECTION ENGINES SIMULTANEOUSLY FROM A MASTER CONTROL POINT - A multi-engine malicious code scanning method for scanning data sets from a storage device is provided. The method includes, among other steps obtaining at least one data set from a storage device and generating a single forensic image of the data set and also applying a recover data application to the data set to generate a single recovered data set. A scanning is initiated of the single forensic image and the single recovered data set using the selected plurality of malware engines, where each of the malware engines, installed on the independent operating systems of the virtual operating system may be run concurrently on the single forensic image and the single recovered data set. A report is generated combining each of the malware engines reporting the results of the scans. | 2014-06-26 |
20140181976 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR DETECTING INJECTED MACHINE CODE - According to one aspect, the subject matter described herein includes a method for detecting injected machine code. The method includes extracting data content from a buffer. The method also includes providing an operating system kernel configured to detect injected machine code. The method further includes executing, using the operating system kernel, the data content on a physical processor. The method further includes monitoring, using the operating system kernel, the execution of the data content to determine whether the data content contains injected machine code indicative of a code injection attack. | 2014-06-26 |
20140181977 | HANDLING POTENTIALLY MALICIOUS COMMUNICATION ACTIVITY - At least some incoming traffic is distributed into a first set of traffic groups according to a first grouping scheme. Communication activity from a potentially malicious source may be grouped in a given traffic group in which communication activity from an acceptable source is also grouped. Potentially malicious communication activity is detected in the given traffic group. Traffic in the given traffic group is processed using a first traffic processing mode associated with potentially malicious communication activity, in which at least some traffic that is distributed into the given traffic group is discarded. In response to a dynamic trigger the grouping scheme is altered to one or more further grouping schemes in order that the communication activity from the acceptable source is likely to be subsequently grouped into a traffic group which is different to a group into which the communication activity from the potentially malicious source is subsequently grouped. | 2014-06-26 |
20140181978 | DESIGN AND EVALUATION OF A FAST AND ROBUST WORM DETECTION ALGORITHM - A method and computer product are presented for identifying Internet worm propagation based upon changes in packet arrival rates at a network connection. First, unsolicited (i.e., packets that were not requested by the receiver) traffic is separated from solicited traffic at the network connection. The unsolicited traffic arrival patterns are monitored and analyzed for any changes. Once changes in the unsolicited traffic arrival patterns are detected, the changes are mathematically analyzed to detect growth trends. The presence of growth trends that follow certain key characteristics indicate whether the changes are due to worm propagation. | 2014-06-26 |
20140181979 | CONTENT FILTERING OF REMOTE FILE-SYSTEM ACCESS PROTOCOLS - Methods and systems for content filtering of remote file-system access protocols are provided. According to one embodiment, a remote file-system access protocol request issued by a client to a server is received at a network device logically interposed between the client and the server. The request is issued to the server by the network device. A single shared holding buffer, used for both read and write accesses to the file and used by multiple processes running on the client, is implemented by the network device for the file during a remote file-system access protocol session. Data being read from or written to the file as a result of the request is buffered into the buffer. Responsive to a predetermined event in relation to the remote file-system access protocol or the buffer, the existence or non-existence of malicious, dangerous or unauthorized content is determined by performing content filtering on the buffer. | 2014-06-26 |
20140181980 | SYSTEM AND METHOD FOR PROTECTION FROM BUFFER OVERFLOW VULNERABILITY DUE TO PLACEMENT NEW CONSTRUCTS IN C++ - Systems and methods for protection from buffer overflow vulnerability due to placement new constructs in C++ are provided. A system for protecting from buffer overflow vulnerability due to placement new constructs, comprises a compiler which is capable of receiving a program including a placement new instruction, and runtime which is capable of receiving binary code from the compiler and determining whether the program includes the placement new instruction and whether the placement new instruction would lead to buffer overflow, wherein the runtime is linked to a library including methods for preventing the buffer overflow, and selects a method for preventing the buffer overflow if the runtime determines that the placement new instruction would lead to the buffer overflow. | 2014-06-26 |
20140181981 | SYSTEM AND METHOD FOR PROTECTION FROM BUFFER OVERFLOW VULNERABILITY DUE TO PLACEMENT NEW CONSTRUCTS IN C++ - Systems and methods for protection from buffer overflow vulnerability due to placement new constructs in C++ are provided. A system for protecting from buffer overflow vulnerability due to placement new constructs, comprises a compiler which is capable of receiving a program including a placement new instruction, and runtime which is capable of receiving binary code from the compiler and determining whether the program includes the placement new instruction and whether the placement new instruction would lead to buffer overflow, wherein the runtime is linked to a library including methods for preventing the buffer overflow, and selects a method for preventing the buffer overflow if the runtime determines that the placement new instruction would lead to the buffer overflow. | 2014-06-26 |
20140181982 | METHOD AND SYSTEM FOR DATA PROTECTION - Embodiments of the present invention relate to a method and system for data protection. A data protection method comprises: receiving at least one event prediction message from at least one message source, the at least one event prediction message being associated with an event that is predicted to occur in a future period of time; analyzing information, which is relevant to the event, included in the at least one event prediction message, so as to determine a risk level of the event with respect to the data to be protected; and determining a data protection operation at least based on the risk level and a predetermined event handling policy. There is further disclosed a corresponding data protection system. According to the embodiments of the present invention, it is enabled to voluntarily, dynamically, and flexibly handle high-risk events potentially damaging data, thereby better guaranteeing data security. | 2014-06-26 |
20140181983 | IDENTIFYING PRIMARILY MONOSEMOUS KEYWORDS TO INCLUDE IN KEYWORD LISTS FOR DETECTION OF DOMAIN-SPECIFIC LANGUAGE - Techniques are described for generating a monosemous (i.e., single sense) keyword list associated with a particular domain (e.g., a medical or financial domain) for document classification. An input term frequency dictionary, a candidate keyword list, and a document corpus may be used to generate the keyword list. A collection of documents is divided into two sets, one related to a target domain and one not. A statistical approach may be used to evaluate each term in the candidate list to determine a measure of how monosemous each remaining candidate term is, i.e., how strongly the term (or short phrase) identifies with a single sense. Terms with a primarily single sense related to the target domain are added to the monosemous keyword list. The keyword list may be used to identify documents associated with the domain, allowing, the appropriate protections to be applied to the document (e.g., do not send outside an enterprise boundary or permit copying). | 2014-06-26 |
20140181984 | METHOD AND APPARATUS FOR AUTHENTICATION OF SOLUTION TOPOLOGY - A computer implemented method is provided to verify an integrity of a solution. The computer implemented method comprises hashing, by a computer, a set of virtual machine instances in a solution topology of the solution. The computer hashes a set of connections in the solution topology. The set of connections comprising a connection between ones of the set of virtual machine instances, a connection between a first component of a first one of the set of virtual machine instances and a second component of a second one of the set of virtual machine instances, and combinations thereof. The computer hashes a set of solution-specific information, and then signs the hashes to create a first signed topology. | 2014-06-26 |
20140181985 | Content Specific Data Scrambling - An electronic device may include multiple modules that share access to a common memory. The electronic device may include content access logic that selective allows a module to access target data in the memory. When writing data into the memory, the content access logic may determine an access restriction associated with the write data, where the access restriction specifies one or more modules that can access the write data. The content access logic may scramble the write date using an access key, and configure the access key such that only authorized modules can use the access key when retrieving data from the memory. The content access logic may then store the scrambled data in the memory. | 2014-06-26 |
20140181986 | UNIQUE AND UNCLONABLE PLATFORM IDENTIFIERS USING DATA-DEPENDENT CIRCUIT PATH RESPONSES - A method and apparatus are provided for generating a unique identifier. One or more tests are performed over one or more data-dependent circuit paths for one or more circuits. The one or more tests are then repeated over the one or more data-dependent circuit paths for the one or more circuits while adjusting an operating frequency and/or operating voltage for each of the one or more circuits. A threshold frequency and/or threshold voltage is ascertained for each of the one or more data-dependent circuit paths. An identifier may then be generated based on a plurality of the threshold frequencies and/or threshold voltages ascertained for the one or more data-dependent circuit paths. | 2014-06-26 |
20140181987 | SECURE STORAGE AND RETRIEVAL OF CONFIDENTIAL INFORMATION - A secure information storage management system may securely manage the storage of confidential information. A randomizer module may randomly generate a schema that specifies a random number of pieces, a random size for each piece, a random sequence for the pieces, and/or a random location where each piece is to be stored. The randomizer module may divide the confidential information into pieces that collectively constitute the confidential information in conformance with the schema. A storage management module may cause each piece of confidential information to be stored at a different, non-contiguous storage location. When present, the storage management module may cause each piece to be stored at the location for it that is specified in the schema. | 2014-06-26 |
20140181988 | INFORMATION PROCESSING TECHNIQUE FOR DATA HIDING - A disclosed method includes: receiving one or plural processing instructions, each of which includes a result of an anonymizing processing, which is performed based on whether or not a plurality of data blocks that have a predetermined relationship exist, and a processing content to cause the result to be reflected, wherein each of the one or plural processing instructions is to be performed for a data block, for which the anonymizing processing has been performed; determining whether or not processing instructions, which include the one or plural received processing instructions, before outputting satisfy a predetermined condition; upon determining that the processing instructions before outputting satisfy the predetermined condition, outputting the processing instructions before outputting; and upon determining that the processing instructions before outputting do not satisfy the predetermined condition, keeping the processing instructions before outputting. | 2014-06-26 |
20140181989 | INFORMATION PROCESSING APPARATUS, COMMUNICATION TERMINAL APPARATUS, AND STORAGE MEDIUM - There is provided an information processing apparatus including a storage controller configured to perform control in a manner that a log of a user is stored in a storage, a determination part configured to determine whether a position of the user is within a set area, and an erasure controller configured to substantially erase, when the determination part determines that the position of the user is not within the set area, at least data capable of identifying the user individually among the log of the user stored in the storage. | 2014-06-26 |
20140181990 | METHOD AND APPARATUS FOR SYNCHRONIZING AN ADAPTABLE SECURITY LEVEL IN AN ELECTRONIC COMMUNICATION - A method of communicating in a secure communication system, comprises the steps of assembling as message at a sender, then determining a security level, and including an indication of the security level in a header of the message. The message is then sent to a recipient. | 2014-06-26 |
20140181991 | ADVANCED MULTI-CHANNEL WATERMARKING SYSTEM AND METHOD - A method, computer program product, and computing device for modifying a first channel portion of a digital media data file to include at least a first primary watermark. A second channel portion of the digital media data file is modified to include at least a first secondary watermark, wherein the first secondary watermark is the complement of the first primary watermark. | 2014-06-26 |
20140181992 | MULTI-TENANT CONTENT PROVIDER - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving a user login request originating from a user device, the user login request including a user identifier; authenticating, based on the user identifier, the user as having access to information associated with a particular tenant of a plurality of tenants; identifying a tenant specified theme associated with the particular tenant of a plurality of tenant themes, the theme being specified by the tenant for use in presenting data to authenticated users; obtaining data associated with the particular tenant; and providing the data associated with the particular tenant to the user device for presentation, wherein the data is presented on a user interface of the user device, the data being formatted based on the identified tenant theme. | 2014-06-26 |
20140181993 | Storage Device and Method for Using a Common Digital Rights Management Module to Enforce an Association between Content and a User Interface Application - A storage device, host device, and method are provided for using a common digital rights management (DRM) module to enforce an association between content and a user interface application. In one embodiment, a storage device is provided with a DRM module that receives a request from a user interface application to play back content protected by DRM. The DRM module determines if the user interface application is authorized to play back the content and also if rights associated with the content are valid. If the DRM module determines both that the user interface application is authorized to play back the content and that the rights associated with the content are valid, the DRM module provides the content to a playback module for playback. In another embodiment, the DRM module is located in the host device. Other embodiments are possible, and each can be used alone or in combination. | 2014-06-26 |
20140181994 | LINKING TOKEN DETECTION AT A SINGLE COMPUTING PLATFORM WITH A USER IDENTIFICATION TO UNLOCK CONTENT IN VIRTUAL SPACE INSTANCES PRESENTED VIA MULTIPLE COMPUTING PLATFORMS - Token detection at a single computing platform may be linked with a user identification to unlock content and/or effectuate modifications in virtual space instances presented via multiple computing platforms, in accordance with one or more implementations. Exemplary implementations may enhance consistency in a user's experiences of a virtual space across multiple computing platforms. | 2014-06-26 |
20140181995 | PUBLICATION AND REMOVAL OF ATTRIBUTES IN A MULTI-USER COMPUTING SYSTEM - Embodiments of the present disclosure are directed toward publication and/or removal of attributes in a multi-user computing environment. In some embodiments, a consumer information manager (CIM) associated with a user of a multi-user computing system may receive a notification, from a dimension authority (DA), of a decrease in a population count of users of the computing system who have published an attribute within the computing system, and may determine whether the user has published the attribute. In response to receiving the notification of the decrease and determining that the user has published the attribute, the CIM may determine a likelihood that continued publication of the attribute will enable identification of the user, compare the likelihood to a threshold, and, when the likelihood exceeds the threshold, remove the attribute from publication. Other embodiments may be disclosed and/or claimed. | 2014-06-26 |
20140181996 | COMPUTER READABLE STORAGE MEDIUM FOR STORING APPLICATION PROGRAM FOR NETWORK CERTIFICATION - The present invention discloses a computer readable storage medium for storing an application program for network certification. The application program is implemented by an electrical device to execute a network certification process. The network certification process includes the following steps: a network module of the electrical device is driven to receive a certification code, which is broadcasted by a network access point (AP). Determine if the certification code is in an identified list. When the certification code is not in the identified list, the application program executes an action to limit communication between the electrical device and the network AP. | 2014-06-26 |
20140181997 | Private Queue Indicator - Embodiments provided herein involve connected states between a mobile device and one or more zones in a network media system and different interactions between the mobile device and the network media system involving the connected states. The connected states may be established between the mobile device and the one or more zones such that further actions taken on media items identified in the playlist on the mobile device may also be taken on corresponding media items in a playback queue associated with the one or more zones. The interface on the mobile device may display various graphical representations to indicate the different interactions involving the connected states, including when a connected state is established, when a connected state is lost, and when a reconnected state is reestablished. The interface may further provide selectable icons to allow a user to navigate among the different media playback options involving the connected states. | 2014-06-26 |
20140181998 | AUTOMATIC SANITIZATION OF DATA ON A MOBILE DEVICE IN A NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes establishing a network connection to a central security system in a central network, receiving a message from the central security system, activating a grace window based on the message, and determining whether the grace window has expired. The method further includes deleting, when the grace window expires, one or more objects from the mobile device based on a sanitization policy. In specific embodiments, the network connection is terminated before the grace window expires, and the grace window expires unless the mobile device establishes another network connection with the central security system. In further embodiments, the method includes receiving the sanitization policy from the central security system. The sanitization policy identifies the one or more objects to be deleted from the mobile device when the grace window expires. | 2014-06-26 |
20140181999 | System and Method for Creating Conditional Immutable Objects in a Storage Device - A data storage system includes a storage device and a data handler that receives an object, creates metadata for the object that includes a key and an authorization, stores the object on the storage device, receives a request for the object, determines if the request includes the key, and, if the request has authorization information, permits access to the object. The data handler receives another request for the object, determines if the request includes the key, and, if the request does not have the authorization information, denies access to the object. | 2014-06-26 |
20140182000 | OPERATION APPARATUS, CONTENT PARENTAL LOCK SETTING METHOD, AND ELECTRONIC APPARATUS - An operation apparatus includes a communication section to communicate with an electronic apparatus capable of communicating, through a first transmission medium, with an accumulation apparatus capable of accumulating contents, the communication section communicating with the electronic apparatus through a second transmission medium, a content selection section to select a content to which a parental lock is to be set from among the contents accumulated in the accumulation apparatus, a release key setting section to set a key for releasing the parental lock for the content selected, a storage section to associate identification information of the content selected with the key set by the release key setting section and stores the identification information and the key associated with each other, and a parental lock notification section to notify the accumulation apparatus in which the content is accumulated of the identification information of the content to which the parental lock is set. | 2014-06-26 |
20140182001 | Service Management Apparatus, Program, and Service Management Method - A service management apparatus is provided that allows management of a shared license among devices, including a user storage unit storing a user and at least one associated terminal; a license information storage unit storing a license including a terminal to be permitted to use a predetermined service and license information for identifying a setting limitation; a setting request reception unit receiving a setting request for the license including information for identifying the terminal that has issued the setting request and the user; an associated terminal identification processing unit identifying the terminal that is associated with the user included in the request; a license identification processing unit identifying the license that each terminal to be identified is permitted to use and is settable to the terminal that has issued the request; and a license setting processing unit setting the identified license to the terminal that has issued the request. | 2014-06-26 |
20140182002 | PROCESS FOR CAPTURING AND TRANSMITTING WINDOW SCREEN DISPLAY DATA - A process is disclosed for capturing screenshots on an electronic device of a user, and for transmitting representations of the captured screenshots to a monitoring system for storage. The captured screenshot data may, for example, be used to recover a device that is lost or stolen. | 2014-06-26 |
20140182003 | ANIMAL MODELS AND THERAPEUTIC MOLECULES - The invention discloses methods for the generation of chimaeric human—non-human antibodies and chimaeric antibody chains, antibodies and antibody chains so produced, and derivatives thereof including fully humanised antibodies; compositions comprising said antibodies, antibody chains and derivatives, as well as cells, non-human mammals and vectors, suitable for use in said methods. | 2014-06-26 |
20140182004 | MOUSE MODEL OF RETINAL DEGENERATION - The invention is directed to a method of producing a non-human mammal having one or more pathological characteristics of retinal degeneration and/or age-related macular degeneration. In particular, the invention provides a method of producing a non-human mammal having age-related macular degeneration (AMD). The invention is also directed to non-human animals produced by the methods described herein. Methods of identifying an agent for use in inhibiting one or more pathological characteristics of retinal degeneration and/or AMD is also encompassed by the invention. Also provided is a method of treating AMD in an individual in need thereof comprising, administering to the individual an agent identified herein. | 2014-06-26 |
20140182006 | Hybrid carrot varity NUN 89201 - The present invention relates to plants of a carrot variety NUN 89201 and seeds and progeny thereof. The invention further relates to methods for producing a carrot plant by traditional breeding methods. The invention further relates to a method for producing a carrot plant containing in its genetic material one or more transgenes. | 2014-06-26 |
20140182007 | Hybrid carrot variety nun 85021 cac - The present invention relates to plants of a carrot variety NUN 85021 CAC and seeds and progeny thereof. The invention further relates to methods for producing a carrot plant by traditional breeding methods. The invention further relates to a method for producing a carrot plant containing in its genetic material one or more transgenes. | 2014-06-26 |
20140182008 | Pygmy Sesame Plants for Mechanical Harvesting - Methods for improved sesame agriculture comprising growing a pygmy sesame line homozygous for the py/py recessive pygmy allele and a character selected from non-dehiscence or improved non-dehiscence are disclosed. | 2014-06-26 |
20140182009 | GENETIC LOCI ASSOCIATED WITH SOYBEAN CYST NEMATODE RESISTANCE AND METHODS OF USE - Various methods and compositions are provided for identifying and/or selecting soybean plants or soybean germplasm with improved resistance to soybean cyst nematode. In certain embodiments, the method comprises detecting at least one marker locus that is associated with resistance to soybean cyst nematode. In other embodiments, the method further comprises detecting at least one marker profile or haplotype associated with resistance to soybean cyst nematode. In further embodiments, the method comprises crossing a selected soybean plant with a second soybean plant. Further provided are markers, primers, probes and kits useful for identifying and/or selecting soybean plants or soybean germplasm with improved resistance to soybean cyst nematode. | 2014-06-26 |
20140182010 | YIELD TRAITS FOR MAIZE - Methods for introgressing an allele of interest of a locus associated with a yield trait into | 2014-06-26 |
20140182011 | Methods Using Acyl-Coenzyme A-Binding Proteins to Enchance Drought Tolerance in Genetically Modified Plants - ACBP2 can be used to enhance drought tolerance in genetically modified plants. ACBP2 was observed to be expressed in guard cells, and ACBP2-overexpressing transgenic | 2014-06-26 |