39th week of 2014 patent applcation highlights part 66 |
Patent application number | Title | Published |
20140289789 | CLOUD BASED REAL TIME APP PRIVACY DASHBOARD - A method of operating an electronic device comprises detecting access to private information stored in memory of the electronic device. The detecting is performed by a privacy management module downloadable to the electronic device as object code for execution on the electronic device and the access is performed by a client application program. The method further comprises tracking, using the privacy management module, the private information being accessed by the client application program, and reconfiguring the electronic device, using the privacy management module, to change the access to the private information by the client application program according to at least one privacy access policy stored in the electronic device. | 2014-09-25 |
20140289790 | SYSTEM AND METHOD FOR ADAPTIVE APPLICATION OF AUTHENTICATION POLICIES - A system, apparatus, method, and machine readable medium are described for adaptively implementing an authentication policy. For example, one embodiment of a method comprises: detecting a user of a client attempting to perform a current interaction with a relying party; and responsively identifying a first interaction class for the current interaction based on variables associated with the current interaction and implementing a set of one or more authentication rules associated with the first interaction class. | 2014-09-25 |
20140289791 | NETWORK-LEVEL ACCESS CONTROL MANAGEMENT FOR THE CLOUD - A cloud access manager obtains input regarding access control for at least one application deployed on a plurality of virtual machine instances in a cloud computing environment; the virtual machine instances are divided into at least first and second access zones. A cloud access manager registrar located in the cloud computing environment registers internet protocol addresses of external clients as seen from the cloud computing environment; at least some of the addresses are assigned to the clients via network address translation (NAT). Session traversal utility for NAT (STUN) is carried out to determine public internet protocol addresses assigned to the clients via NAT. The cloud access manager controls (i) access of the external clients to the plurality of virtual machine instances; and (ii) access of the plurality of virtual machine instances to each other, based on the registered internet protocol addresses, in accordance with the access zones. | 2014-09-25 |
20140289792 | SYSTEMS AND METHODS FOR UTILIZING UNI-DIRECTIONAL INTER-HOST COMMUNICATION IN AN AIR GAP ENVIRONMENT - A request message is generated with a trusted network entity executing trusted code on a first network layer. The request message to target a non-trusted network entity executing non-trusted code on a second network layer. The request message is transmitted from the trusted network entity to the non-trusted network entity through at least a policy enforcement entity. The policy enforcement entity applies one or more network traffic rules to enforce a unidirectional flow of traffic from the first network layer to the second network layer. A response check message is generated with the trusted network entity. The response check message to determine whether response information is available on the non-trusted network entity in response to the request message. The response check message is transmitted from the trusted network entity to the non-trusted network entity through at least the policy enforcement entity. The response check message to determine whether the response information is stored in a conceptual mailbox on the non-trusted network entity. | 2014-09-25 |
20140289793 | GRANULAR RISK EXPRESSION - Systems and methods for granularly expressing risk associated with computing resources of a computing system are described. A resource detail interface may be provided that includes a permission list identifying a permission to a computing resource of the computing system. A review flag of the permission is configurable at the resource detail interface in response to input received at the interface. The review flag may be set based on the input received at the resource detail interface to indicate whether review of the permission is required. A resource review interface may display a list of pending reviews of access rights, and a decision for a review may be received at the resource review interface. A review of an access right may be created in response to a determination that a computing resource permission associated with the access right requires review. | 2014-09-25 |
20140289794 | COMMUNICATIONS DEVICE WITH SECURE DATA PATH PROCESSING AGENTS - A network system comprising memory configured to store a device communication activity policy, and a policy verification processor configured to (a) receive a device data record over a trusted communication link between the network system and a device data record generator on a communications device, the device data record comprising information about a data communications activity by the communications device, the information configured to assist the policy verification processor in determining whether the communications device is operating or has operated in accordance with the device communication activity policy, (b) determine, based on the device data record, whether the communications device is operating or has operated in accordance with the device communication activity policy, and (c) upon determining that the communications device is not operating or has not operated in accordance with the device communication activity policy, initiate an error handling action. | 2014-09-25 |
20140289795 | UPDATING SYSTEM BEHAVIOR DYNAMICALLY USING FEATURE EXPRESSIONS AND FEATURE LOOPS - Behavior of an online system is modified dynamically using feature expressions and feature loops. A feature expression can be expressed as a combination of other features or feature expressions, thereby allowing specification of complex features. The sets of feature expressions and policies of an online system can be modified while the online system is running. Feature loops aggregate values of a feature expression across a plurality of actions, for example, number of occurrences of an event over a time interval. The online system evaluates a set of feature expressions in response to actions performed by users. Feature expressions are used to specify policies that determine how the online system reacts to certain types of user actions. The ability to dynamically modify the feature expressions and policies of the online system allows the online system to adapt to attacks by malicious users in a timely manner. | 2014-09-25 |
20140289796 | RECONCILIATION OF ACCESS RIGHTS IN A COMPUTING SYSTEM - Systems and methods are provide for reconciling access rights of a computing system are described. Access right information that respectively corresponds to access rights of a computing system may be obtained and evaluated. Reconciliation tasks may be performed using the access right information, and a reconciliation report may be generated during performance of at least one of the reconciliation tasks. The reconciliation report may indicate that one or more of the access rights should either be provisioned or revoked at the computing system. | 2014-09-25 |
20140289797 | Networked Security System with Translating Router - A system and method for protocol translation between security devices in a security network using a transforming router. The router utilizes protocol templates to identify the protocols that encapsulate messages sent by the devices, and to determine the format of the messages. Using the protocol templates, the router translates the messages from protocols of source security devices to an intermediate protocol, translates the messages in the intermediate protocol into destination protocols for destination security devices, and forwards the messages to the destination security devices. | 2014-09-25 |
20140289798 | INFORMATION PROCESSING APPARATUS, COMMUNICATION SYSTEM, AND COMPUTER-READABLE MEDIUM - An information processing apparatus includes a request information reception unit that receives a request for information processing from a client apparatus, an inquiry information transmission unit that inquires about the presence of authentication information for the information processing, first and second determination units, a prompt information transmission unit, an acquisition information reception unit, and a process start unit. If the first determination unit determines that any piece of the authentication information is missing, using a response to the inquiry, the second determination unit determines whether a second apparatus is to be prompted to obtain the missing authentication information, based on predetermined information. If the determination result is positive, the prompt information transmission unit transmits a prompt to the second apparatus. When the acquisition information reception unit receives an acquisition notification of the missing authentication information from the second apparatus, the process start unit starts the information processing. | 2014-09-25 |
20140289799 | COMMUNICATION APPARATUS, AUTHENTICATION SYSTEM AND AUTHENTICATION METHOD - A communication apparatus transmits an authentication frame to an authentication apparatus and receiving a response frame for response to the authentication frame from the authentication apparatus so that an authentication process is performed for the communication apparatus by the authentication apparatus. The communication apparatus includes a receiving section which receives a communication frame transmitted from another apparatus, and an authentication processing section which determines whether the received communication frame is a frame of EAP-response (Extensible Authentication Protocol-response) or not. The authentication processing section discards the received communication frame if it is determined that the received communication frame is the frame of EAP-response. | 2014-09-25 |
20140289800 | SYSTEM AND METHOD FOR FILTERING NETWORK TRAFFIC - Protocol status information is used to perform traffic filtering by dropping messages that are not consistent with the protocol status information. In one embodiment, a method involves comparing message information and protocol status information. The message information is associated with a first message. The protocol status information is obtained in response to one or more second messages, which are conveyed according to a protocol used to assign network addresses to clients. The method also involves determining whether to discard the first message, based on an outcome of the comparison of the message information and the protocol status information. For example, it can be determined that the first message should be discarded, if the message information does not match the protocol status information. | 2014-09-25 |
20140289801 | CONTENT CUSTOMIZATION PORTAL FOR MEDIA CONTENT DISTRIBUTION SYSTEMS AND METHODS - An exemplary system includes a content delivery subsystem configured to receive media content from a content provider and transmit the media content over a network to a content processing subsystem configured to process and provide the media content for presentation to an end user. The content delivery subsystem is further configured to maintain resource data associated with at least one of the media content and the content provider, make at least a subset of the resource data available to the content processing subsystem for inclusion in an end user interface, provide a content customization portal for access by the content provider, authenticate the content provider accessing the content customization portal, receive custom content from the authenticated content provider via the content customization portal, and provide the custom content to the content processing subsystem for inclusion in the end user interface. | 2014-09-25 |
20140289802 | MULTIMEDIA MESSAGE SERVICE METHOD AND SYSTEM - Disclosed is a method of sharing multimedia contents, by a server, including storing the multimedia contents, receiving an establishment request configured to establish one of a plurality of access modes for the multimedia contents from a first terminal, establishing an access mode according to the establishment request for the multimedia contents, receiving an access request for the multimedia contents stored in the server from at least one second terminal, determining whether the at least one second terminal is allowed to access the multimedia message based on the access mode, and transmitting the multimedia contents, wherein the access mode includes at least one of a private mode for access by only the first terminal, a restricted mode for access by the at least one second terminal, and a public mode for access by all terminals. | 2014-09-25 |
20140289803 | CDR FILTERING FOR VIRTUAL OPERATORS - Systems and methods that filter Charging Data Records (CDRs) before sending the CDRs to a virtual operator, such as a Network Unaffiliated Virtual Operator (NUVO). In one embodiment, a communication network provides services to subscribers of a virtual operator. The communication network includes a reporting entity comprising a CDR database configured to store CDRs for subscribers of the virtual operator. The reporting entity also includes a filtering node configured to filter the CDRs to remove fields that are not authorized to be shared with the virtual operator, and to report the filtered CDRs to the virtual operator. | 2014-09-25 |
20140289804 | SEGMENTED ACCESS OF REMOTELY STORED BIOGRAPHICAL DATA TO A CLIENT DEVICE - Methods and systems of segmented access of remotely stored biographical data to a client device are disclosed. In one embodiment, a biographical information is obtained from a vocational collateral such as a business card. In this embodiment, a method and system includes extracting a biographical data from a digital identifier of the vocational collateral. The method and system includes assigning at least one of an access privilege and a security privilege to the biographical data extracted from the digital identifier. The method and system further includes storing the biographical data comprising at least one of the access privilege and the security privilege in a repository of a cloud computing environment accessible to a number of client devices through a network connection. Finally, the method and system includes permitting the number of client devices access to the biographical data based on the access privilege and/or the security privilege. | 2014-09-25 |
20140289805 | METHODS AND SYSTEMS FOR MANAGING USER PRIVILEGES - A method and system for managing user privileges are disclosed. The method includes the steps of receiving a first user's request to publish information and receiving groups of users defined by the first user, the groups of users having access to the to be published information. The method further includes the step of submitting the first user's request to a server, the request including an identity of the first user, information to be published, and the definition of the groups of users having access to the information. The method and system consistent with the present disclosure may improve the information dissemination process by enabling a user to proactively manage user privileges. | 2014-09-25 |
20140289806 | METHOD, APPARATUS AND ELECTRONIC DEVICE FOR ENABLING PRIVATE BROWSING - The present disclosure discloses a method, apparatus, browser, electronic device and computer readable storage medium for enabling private browsing, and belongs to the field of computer technology. The method includes receiving user identification information for enabling a private browsing mode of the browser; checking whether the user identification information is matched with the prestored user identification information; and enabling the private browsing mode of the browser if the checking result is that the user identification information is matched with a prestored user identification information. By setting the user identification information for the private browsing mode of the browser, the private browsing mode of the browser can be used only when a legitimate user inputs the correct user identification information, thereby it is avoided that other users perform operations which infringe on the legitimate user's rights and interests or privacy, so that security risks are greatly reduced. | 2014-09-25 |
20140289807 | RESOURCE MANAGEMENT IN A PROCESSOR - A processor system is arranged to execute user selected applications. A manager module is configured to detect a user selection of an application and configured to initiate a launch process. A supervisor module is configured to intercept the launch process initiated by the manager module and detect whether the application is a trusted application or an untrusted application. Trusted applications have a privilege to access resources without authorization, and untrusted applications do not have the privilege. The supervisor module has the privilege to access the resources. When the application is untrusted, the application is launched in a container, and at least one of the resources is delivered to the untrusted application in the container. | 2014-09-25 |
20140289808 | SYSTEM AND METHOD FOR COLLECTING AND UTILIZING CLIENT DATA FOR RISK ASSESSMENT DURING AUTHENTICATION - A system, apparatus, method, and machine readable medium are described for performing client risk assessment for authentication. For example, one embodiment of an apparatus comprises: a client risk assessment agent to perform an assessment of client configuration data to determine a risk level associated with a client device; and an authentication engine to performing authentication for a particular transaction in accordance with the risk level. | 2014-09-25 |
20140289809 | Cell-Phone-and Watermark-Dependent Authentication - An improved authentication system is disclosed. In one class of embodiments, the system utilizes the distance between a user's cell phone and client's computer as an authenticating factor in an access control mechanism. Users attempting to log on to a system without their cell phone being nearby are granted low or zero usage rights, while users attempting to log on to a system when their cell phone is nearby are granted high or full rights. In some embodiments, an image that contains encoded information unique to that company's website is served to the user for use in verifying the authenticity of a website. In a class of embodiments, the system is programmed to restrict access if a correct response to a cryptographic authentication challenge is not provided. A non-binary authentication system is also disclosed. This non-binary system allows users to have partial access to a system. | 2014-09-25 |
20140289810 | SHARABLE CONTENT ITEM LINKS WITH USE RESTRICTIONS - Sharable content item links with use restrictions. In one embodiment, for example, a method comprises: receiving, from a client computing device used by an authenticated link submitter, a first request to access a server-stored content item at a sharable link; wherein the link submitter is authenticated according to a first authentication factor; responsive to receiving the first request, prompting the link submitter to enter/submit a second authentication factor; and providing access to the server-stored content item at the shareable link responsive to receiving the second authentication factor from the link submitter. | 2014-09-25 |
20140289811 | ELECTRONIC MEDIA CREATION AND DISTRIBUTION - An aspect of electronic media creation and distribution includes receiving an electronic media collection including pre-assembled media content generated by a service provider computer, modified pre-assembled media content generated by a subscriber entity, and custom generated media content from end user computers associated with the subscriber entity. A further aspect includes receiving a media content item, as the custom generated media content, from one of the end user computers, receiving a request from the end user computer to publish the media content item, determining a content channel selected by the subscriber entity, and determining a frame associated with the content channel. A further aspect includes integrating the media content item with the pre-assembled media content and the modified pre-assembled media content, and distributing the electronic media collection to at least one other end user computer for presentation on a display device. | 2014-09-25 |
20140289812 | REMOTE CONTROL OF DIALYSIS MACHINES - This disclosure relates to remote control of dialysis machines. In certain aspects, a method includes receiving a request for a network connection from a dialysis machine and establishing the network connection with the dialysis machine. The method also includes receiving, from a client device, a request to access the dialysis machine, authorizing the client device to access the dialysis machine, receiving, from the dialysis machine, information pertaining to an operation of the dialysis machine, and providing, to the client device, the received information. | 2014-09-25 |
20140289813 | System and Method for Controlling Multicast Geographic Distribution - A content distribution network includes first and second controllers, and multicast enabled routers. The first controller is configured to select a multicast channel for distributing content, to determine that the content has a geographic restriction associated with a restricted area in the content distribution network, to link an exclusion policy for the content to the multicast channel while the multicast channel provides the content, and to deny a request for the content from a client system within the restricted area based on the exclusion policy. The second controller is configured to distribute the exclusion policy to the multicast enabled routers including a first router configured to store the exclusion policy, and to ignore a multicast join message from the client system within the restricted area based on the exclusion policy. | 2014-09-25 |
20140289814 | PERSONAL VIDEO CHANNELS - Systems and methods provide personal channels from a network-capable user terminal. A first user terminal may receive a request from a second user terminal for access to a personal channel created by a user and stored on the first user terminal in association with media content. In response to the request, the first user terminal may access the media content associated with the requested personal channel and provide the media content to the first user terminal over the network. A data center accessible by both the first and second user terminals may facilitate the access to the personal channel by storing information associated with the personal channel, including terminal identifiers and metadata, and providing a searchable catalog interface to identify personal channels to view. | 2014-09-25 |
20140289815 | Authorization and Authentication Based on an Individual's Social Network - In particular embodiments, a method includes receiving a request for a first user to access a loan from a lender, the request identifying a user identifier (ID) of the first user; determining whether the first user is authorized to access the loan based at least in part on a gray list comprising user IDs of the users who are not authorized to access loans, wherein the gray list is based on a black list; and permitting the loan to be accessed by the first user if the first user is authorized to access the loan based on the gray list. | 2014-09-25 |
20140289816 | Mediating Resource Access Based on a Physical Location of a Mobile Device - One or more techniques are provided for causing a location of a screen image associated with a resource to be adjusted on a display device. The adjustment may be based at least in part on determining that a control element receives focus. The resource may be associated with an application, such as an email application that may be hosted remotely from a client device. Access to one or more resources may be controlled or mediated. Access rights may be based at least in part on a determination of a geographic location of a client device. When the client device is located in a safe area, the client device may be provided access to the resource. When the client device is not located in a safe area, the client device might not be provided access to the resource or might not be provided full access to the resource. | 2014-09-25 |
20140289817 | IMAGE DISPLAY APPARATUS, IMAGE DISPLAY SYSTEM, AND IMAGE DISPLAY METHOD - An image display apparatus includes a location information generating unit that generates location information of index information stored in the server apparatus and location information of image data stored in the server apparatus; an index obtaining unit that obtains the index information from the server apparatus using the location information of the index information; a list screen generating unit that generates a list screen including information on the image data stored in the server apparatus using the index information and displays the list screen on a display unit; an image data obtaining unit that obtains the image data from the server apparatus using the location information of the image data that is selected by an operator from the list screen; and a display screen generating unit that generates a display screen of the obtained image data and displays the display screen on the display unit. | 2014-09-25 |
20140289818 | VIDEO MANAGEMENT METHOD AND VIDEO MANAGEMENT SYSTEM - A video management method includes: associating video information to be uploaded to a moving image distribution server by a user with user information indicating the user; storing the video information uploaded via the Internet into a storage unit; authorizing a different user to view the video information stored in the storage unit; and causing the user to select one process to be executed, at withdrawal of the user from a group, on the video information that the different user belonging to the group is authorized to view, the process being selected from among (i) deleting the video information; (ii) associating the video information with user information indicating the different user belonging to the group; and (iii) associating the video information with administrator information indicating a virtual administrator of the group. | 2014-09-25 |
20140289819 | SYSTEM AND METHOD FOR NON-INTRUSIVE, PRIVACY-PRESERVING AUTHENTICATION - A system, apparatus, method, and machine readable medium are described for non-intrusive privacy-preserving authentication. For example, one embodiment of a method comprises: entering into a legitimate user state on a client device for a time period following an explicit authentication by an end user; recording reference data related to user behavior while in the legitimate user state; measuring user behavior when outside of the legitimate user state and arriving at an authentication assurance level based on a distance between the measured user behavior and the recorded reference data; in response to an authentication request within the legitimate user state, providing an authentication assurance level at or above a defined threshold, the authentication assurance level being sufficient to authenticate the user to a relying party; and in response to an authentication request while outside of the legitimate user state, providing the authentication assurance level based on a distance between the measured user behavior and the recorded reference data. | 2014-09-25 |
20140289820 | SYSTEM AND METHOD FOR ADAPTIVE USER AUTHENTICATION - A system, apparatus, method, and machine readable medium are described for adaptive authentication. For example, one embodiment of an apparatus comprises: an adaptive authentication module to receive a client request to perform a transaction which requires authentication; a risk engine to analyze first data related to a client to determine a risk value associated with the client; an assurance level gain analysis module to determine an assurance level required for allowing the client to complete the transaction and to determine an assurance level gain required to arrive at the assurance level based on the risk value; the adaptive authentication module to select one or more authentication techniques based at least in part on the indication of the assurance level gain. | 2014-09-25 |
20140289821 | SYSTEM AND METHOD FOR LOCATION-BASED AUTHENTICATION - A system, apparatus, method, and machine readable medium are described for location-aware authentication. For example, one embodiment of a location-aware method for user authentication comprises: determining a current location of a mobile device; identifying a location class corresponding to the current location; selecting a set of one or more authentication techniques to provide a sufficient level of user authentication for a current transaction based on the identified location class. | 2014-09-25 |
20140289822 | SYSTEM AND METHOD FOR CONFIRMING LOCATION USING SUPPLEMENTAL SENSOR AND/OR LOCATION DATA - A system, apparatus, method, and machine readable medium are described for performing authentication using environmental data. For example, one embodiment of a method comprises: collecting environmental sensor data from one or more sensors of a client device; using a geographical location reported by the device to collect supplemental data for the location; comparing the environmental sensor data with the supplemental data to arrive at a correlation score; and responsively selecting one or more authentication techniques for authenticating a user of the client device based on the correlation score. | 2014-09-25 |
20140289823 | METHODS AND APPARATUS FOR NON-CONTACT RADIO FREQUENCY DETECTION AND AUTOMATIC ESTABLISHMENT OF CORRESPONDING COMMUNICATION CHANNEL - Methods and apparatus for establishing secure communications are disclosed. An identifier is received from a personal object such as a ring. This identifier is received, for example, through a non-contact near field communication. The identifier is recognized and associated to a mobile terminal device of a user, the mobile terminal device being separate from the object. Then, a secure communication channel is established with the mobile terminal device over another connection that preferably provides a secure communication channel. | 2014-09-25 |
20140289824 | SHARING AUTHENTICATION PROFILES BETWEEN A GROUP OF USER DEVICES - Technology is disclosed for sharing an authentication profile of a user between a group of user devices for accessing an access restricted computing environment (“the technology”). The access restricted computing environment can require the user to input authentication information, such as a username, password, or answers to challenge questions, to authenticate the user. For example, to access a wireless network on a first user device, a user may have to input a password for the wireless network. To access the same wireless network on a second user device, the user may have to input the password again on the second user device. The technology facilitates the user to obtain the authentication information required to access the wireless network from another user device, e.g., a device from which the user has accessed the wireless network previously. This can eliminate the need for the user to manually input the authentication information repeatedly. | 2014-09-25 |
20140289825 | CONNECTING TO WI-FI NETWORK BASED OFF APPROVAL FROM ANOTHER USER DEVICE - Technology is disclosed for sharing an authentication profile for accessing a Wi-Fi network between multiple devices. To access a particular Wi-Fi network on a first device and a second device, authentication information, e.g., a password for the Wi-Fi network, may have to be input on both the devices. In some embodiments, the technology facilitates obtaining an approval for accessing the Wi-Fi network on the second device from the first device. Upon receiving a request from a user of the second device to access the Wi-Fi network on the second device, the second device requests if any of the devices, e.g., devices in proximity, can approve the access request. A notification is displayed on the first device regarding the access request. The user associated with first device can then approve the access request, which causes authentication information for accessing the Wi-Fi network to be transmitted to the second device. | 2014-09-25 |
20140289826 | ESTABLISHING A COMMUNICATION SESSION - A secure communication session is established between a first endpoint and a second endpoint. The first endpoint can contact the second endpoint via a first communication network and via a second communication network. The first communication network is more trusted than the second communication network. The first endpoint determines that a secure communication session is required. A security association is established between the endpoints for the communication session on a connection via the first communication network. Service is received on a connection via the second communication network using the previously established security association. The step of establishing a security association can comprise authenticating the second endpoint and negotiating a shared secret and the step of receiving service on a connection via the second communication network can occur without any further negotiation of key material or authentication between the endpoints via the second communication network. | 2014-09-25 |
20140289827 | DYNAMIC ADJUSTMENT OF AUTHENTICATION MECHANISM - According to one aspect of the present disclosure, a method and technique for dynamic adjustment of authentication mechanism is disclosed. The method includes: collecting location data of one or more agents relative to an agent attempting to authenticate to a data processing system; determining if the location data meets a threshold value; and responsive to the location data meeting the threshold value, relaxing an authentication scheme for the attempting agent to authenticate to the data processing system. | 2014-09-25 |
20140289828 | Progressive Pictorial & Motion Based CAPTCHAs - A CAPTCHA system uses images/pictures and/or motion for granting access to a computing system. The images can be culled from examples used in pictorial games, and can progressively presented to increase the strength of the CAPTCHA challenges. Speech recognition, motion and touch sensing can also be employed as parts of the challenge. | 2014-09-25 |
20140289829 | Computer account management system and realizing method thereof - The present invention relates to a field of computer application technology, and more particularly to a computer account management system and a realizing method thereof. The computer account management system includes: an account management subsystem; an information asset management subsystem; an authentication (integrated) subsystem; a service (integrated) subsystem; and an account portal subsystem; wherein the account management subsystem manages information of physical accounts and logical account numbers; wherein the information asset management subsystem manages data information resources generated by network activities of physical account information; wherein the authentication subsystem provides an authentication integrated interface to the physical account numbers; wherein the service subsystem is a customizable interface which is open to internet or local network; wherein the account portal provides interfaces and tools of login, service list management of services subscribed or bought by the account, account information management and information asset management. The present invention provides a universal computer account system which is not bundled with the service, seamlessly integrated with the user information asset and is lifetime-valid. The system can be used in account management of the internet. | 2014-09-25 |
20140289830 | METHOD AND SYSTEM OF A SECURE ACCESS GATEWAY - In one exemplary embodiment, a computer-implemented method of a secure-access gateway to a destination device in a protected computer network include the step of receiving a request from a remote user to access the destination device in the protected computer network. A session for the remote user is registered. The session includes an access to the destination device by the remote user according to a set of specified parameters controlled by the secure access gateway. The session is created. When the remote user connects and authenticates, the secure access gateway establishes the connection to the destination device on behalf of the remote user. The session is monitored according to the set of specified parameters. The session is monitored to determine if at least one specified parameters is achieved. The session between the remote user and the destination device is when terminated when the at least one specified parameters is achieved. | 2014-09-25 |
20140289831 | WEB AUTHENTICATION USING CLIENT PLATFORM ROOT OF TRUST - Systems and methods for performing web authentication using a client platform root of trust are disclosed herein. Website and user validity and integrity may be authenticated based on the user device's attempt to access the website. A user device may securely access the website once the user device is successfully authenticated with a server. In an embodiment, the user device may perform an authentication of the website to ensure the website is a valid entity. | 2014-09-25 |
20140289832 | System, Method, And Apparatus For Using A Virtual Bucket To Transfer Electronic Data - A method for transferring data between a first and a second computer system by way of a storage location in a third computer system. When needed for a transfer, the third computer system creates the storage location associated with the first computer system. Using the association, the first computer is able to access the storage location. The second computer system reads access information from a close proximity identification medium, where the information is associated with the storage location. Using the information, the second computer system is able to access the storage location. In a data transfer, one of the first and second computer system stores information in the storage location and the other of the first and second computer systems reads the data from the storage location. Once the data has been transferred from the storage location, the storage location is deleted. | 2014-09-25 |
20140289833 | ADVANCED AUTHENTICATION TECHNIQUES AND APPLICATIONS - A system, apparatus, method, and machine readable medium are described for performing advanced authentication techniques and associated applications. For example, one embodiment of a method comprises: receiving a policy identifying a set of acceptable authentication capabilities; determining a set of client authentication capabilities; and filtering the set of acceptable authentication capabilities based on the determined set of client authentication capabilities to arrive at a filtered set of one or more authentication capabilities for authenticating a user of the client. | 2014-09-25 |
20140289834 | SYSTEM AND METHOD FOR EYE TRACKING DURING AUTHENTICATION - A system, apparatus, method, and machine readable medium are described for performing eye tracking during authentication. For example, one embodiment of a method comprises: receiving a request to authenticate a user; presenting one or more screen layouts to the user; capturing a sequence of images which include the user's eyes as the one or more screen layouts are displayed; and (a) performing eye movement detection across the sequence of images to identify a correlation between motion of the user's eyes as the one or more screen layouts are presented and an expected motion of the user's eyes as the one or more screen layouts are presented and/or (b) measuring the eye's pupil size to identify a correlation between the effective light intensity of the screen and its effect on the user's eye pupil size. | 2014-09-25 |
20140289835 | Devices, Systems and Methods for Security Using Magnetic Field Based Identification - Devices, systems and methods are disclosed for determining an electromagnetic signature for authenticating a device, a user, and/or a location. In exemplary embodiments, a magnetometer captures an electromagnetic signature which is then compared with one or more authorized electromagnetic signatures. If the electromagnetic signature matches an authorized electromagnetic signature, then access is granted. The magnetometer is integrated into a communication device having a processor and a logic. The magnetometer captures an electromagnetic signature of a surrounding environment and detects motion of the communication device through the captured electromagnetic signature. The logic on the communication device locks or unlocks features of the device based upon the captured electromagnetic signature. In further embodiments of the subject disclosure, the magnetometer is in communication with a server which authenticates a user or communication device to provide access to a remote location. | 2014-09-25 |
20140289836 | DOCUMENT, METHOD FOR AUTHENTICATING A USER, IN PARTICULAR FOR RELEASING A CHIP CARD FUNCTION, AND COMPUTER SYSTEM - A document having a non-volatile memory area for storing a secret identifier that has a first n-digit character sequence from a predefined character set; a random generator for selecting at least one character from the predefined character set for replacement of at least one character of the first character sequence, such that a second n-digit character sequence is defined as a result of this replacement; a volatile memory area for storing the at least one selected character; a display device for displaying the at least one selected character; an interface for inputting a third character sequence; and a processor element for authenticating the user to the document, wherein the processor element is configured to access the non-volatile memory area and the volatile memory area in order to read the second character sequence and check for a match between the second and third character sequences in order to authenticate the user. | 2014-09-25 |
20140289837 | AUTHENTICATING SYSTEM, INFORMATION PROCESSING DEVICE, AUTHENTICATING METHOD AND NON-TRANSITORY COMPUTER READABLE RECORDING MEDIUM - An authenticating system comprises an information processing device and an authentication server connected over a network. The information processing device includes: a storage part for storing user registration information with which the identification information of each user and authentication information other than a password are registered; an authentication information acquiring part for acquiring the authentication information based on receiving a user's instruction; an identification information acquiring part for acquiring the identification information corresponding to the authentication information by running a search through the user registration information; an authentication requesting part for generating the authentication request including the identification information and sending the generated authentication request to the authentication server; a receiving part for receiving the result of the authentication from the authentication server; and a controlling part for putting the information processing device into a logged-in state in accordance with the result of the authentication. | 2014-09-25 |
20140289838 | SYSTEM AND METHOD FOR PROVIDING A REST-BASED MANAGEMENT SERVICE IN A TRAFFIC DIRECTOR ENVIRONMENT - Described herein are systems and methods for providing software administration tools, for use in administering server configurations, such as in a traffic director or other type of server environment. In accordance with an embodiment, the system comprises a traffic director having one or more traffic director instances, which is configured to receive and communicate requests, from clients, to origin servers having one or more pools of servers. An administration server can be used to manage the traffic director, including a REpresentational State Transfer (REST) infrastructure and management service which maps REST calls to mbeans or other management components registered on the administration server, for use in managing the traffic director. | 2014-09-25 |
20140289839 | RESOURCE CONTROL METHOD AND APPARATUS - Embodiments of the present invention disclose a resource control method and apparatus. A client sends an authorization request message to a content provider. The content provider sends an authorization response message to the client according to a user identifier carried in the authorization request message, where the authorization response message carries an authorized access token. The client sends a content request message to a storage server corresponding to the content provider, where the content request message carries an identifier of content requested by the client and the authorized access token. The client receives the content sent by the storage server according to the authorized access token. The present invention is applied to the field of network resource management. | 2014-09-25 |
20140289840 | SYSTEM AND METHOD FOR INTEGRATED HEADER, STATE, RATE AND CONTENT ANOMALY PREVENTION FOR SESSION INITIATION PROTOCOL - Methods and systems for an integrated solution to the rate based denial of service attacks targeting the Session Initiation Protocol are provided. According to one embodiment, header, state, rate and content anomalies are prevented and network policy enforcement is provided for session initiation protocol (SIP). A hardware-based apparatus helps identify SIP rate-thresholds through continuous and adaptive learning. The apparatus can determine SIP header and SIP state anomalies and drop packets containing those anomalies. SIP requests and responses are inspected for known malicious contents using a Content Inspection Engine. The apparatus integrates advantageous solutions to prevent anomalous packets and enables a policy based packet filter for SIP. | 2014-09-25 |
20140289841 | AUTHENTICATION PROCESSING DEVICE FOR PERFORMING AUTHENTICATION PROCESSING - The present invention is to enable a user to input authentication information without burden, such that the user only has to memorize part of the authentication information even when inputting lengthy authentication information in order to ensure high-level security. When an operation of inputting and arranging authentication information in an information arrangement region is performed in a state where an arrangement status of a specified portion in the information arrangement region is set in advance as partial-authentication reference information in a reference authentication information memory, a CPU detects an arrangement status of the specified portion from an overall arrangement status in the information arrangement region, and performs, as partial authentication, processing of matching the detected arrangement status of the specified portion and the arrangement status of the specified portion set as the partial-authentication reference information. | 2014-09-25 |
20140289842 | SYSTEM AND METHOD FOR USER ENROLLMENT IN A SECURE BIOMETRIC VERIFICATION SYSTEM - A computer-implemented method and system for verifying the identity of a user in an identity authentication and biometric verification system which includes collecting information from the user regarding the user's identity, which is then electronically authenticated. Upon authentication, personal information regarding the verified identity of the user is retrieved from a source database which is used to verify the identity of the user, via user interaction. Upon successful verification and authentication, biometric data regarding the user is electronically collected. | 2014-09-25 |
20140289843 | METHOD OF UNLOCKING ELECTRONIC DEVICE BY DISPLAYING UNLOCKING OBJECTS AT RANDOMIZED/USER-DEFINED LOCATIONS AND RELATED COMPUTER READABLE MEDIUM THEREOF - A method of unlocking an electronic device having a touch-sensitive display includes at least the following steps: controlling the touch-sensitive display to have unlocking objects displayed at different locations for different time points; and when at least one contact is detected on the touch-sensitive display, determining whether to unlock the electronic device by referring to a contact status on the touch-sensitive display. Besides, a computer readable medium storing a program code is also provided, where the program code causes a processor to perform following steps when executed by the processor: controlling the touch-sensitive display to have unlocking objects displayed at different locations for different time points; and when at least one contact is detected on the touch-sensitive display, determining whether to unlock an electronic device by referring to a contact status on the touch-sensitive display. | 2014-09-25 |
20140289844 | Smartcard, Smartcard System and Method for Configuring a Smartcard - According to an aspect of the invention, a smartcard is conceived that comprises at least two pre-installed applications and an application user interface selector, wherein said application user interface selector is arranged to select and configure a specific authentication user interface corresponding to a specific one of the pre-installed applications in dependence on encoded information received from a host application. | 2014-09-25 |
20140289845 | Security Token, Data Processing System and Method of Processing Data - According to an aspect of the invention, a security token is conceived, in particular a smart card, comprising a tactile sensing user interface, wherein said tactile sensing user interface is adapted to capture a stream of position data corresponding to a sequence of positions of a finger engaging with said tactile sensing user interface and representing a stream of input data for a data processing device, said security token being adapted to transmit said stream of position data to a host system for further processing. | 2014-09-25 |
20140289846 | FACILITATING REVIEW OF ACCESS RIGHTS IN A COMPUTING SYSTEM - Systems and methods for facilitating reviews of IAM information are described. A list of pending reviews of respective access rights of a computing system may be provided to a display device for presentation at a display interface. A review decision for one of the pending reviews may be received such that the pending review becomes a completed review. The review decision and a date the review decision was received may be stored at a data store. An access right associated with the completed review may be selected in response to a review event that requires review of that access right. It may then be determined whether the completed review is accreditable to review of the access right selected for the review event based on the date the review decision was received for the completed review. | 2014-09-25 |
20140289847 | SYSTEMS AND METHODS FOR SCALABLE NETWORK MONITORING - A network security device may gather a large amount of metadata pertaining to the connections being managed thereby. A refinement module may filter and/or aggregate the connection metadata. The metadata may be refined on the network security device. The refined metadata may be provided for display on a terminal. The refined metadata may include a subset of the larger connection metadata, which may reduce the overhead required to display and/or transmit monitoring information to the terminal device. The refined metadata may comprise connection groups, which may be formed based on aggregation criteria, such as connection source, destination, application, security policy, protocol, port, and/or the like. The connection groups may be ranked in accordance with ranking criteria. | 2014-09-25 |
20140289848 | METHOD FOR CLASSIFYING PACKING ALGORITHMS USING ENTROPY ANALYSIS - A method for classifying packed executable is provided. The method includes unpacking an input packed executable by using a decompression module included in the packed executable; calculating an entropy value of a memory space on which decompressed code is mounted in the unpacking step; converting the entropy value into symbolic representations; and classifying packing algorithms of the packed executables based on the entropy value converted into symbolic representations. The step of classifying includes inputting the entropy value converted into symbolic representations to a packing classifier which classifies packing algorithms of the packed executables based on similarity between a pattern of the packing classifier and the data converted into the symbolic representations. | 2014-09-25 |
20140289849 | APPLICATION SELECTION USING CURRENT DETECTION INTELLIGENCE - Selecting one or more applications from the plurality of similar or near redundant applications to activate. A method includes retrieving information about current characteristics of one or more applications. The method further includes retrieving information about a current computing operational landscape. Based on the information about current characteristics of one or more applications and the information about a current computing operational landscape, the method further includes creating a ranking of applications. The rankings are made available to a system with a plurality of applications with similar or near redundant functionality. At the system, one or more of the applications in the plurality of applications are selected to activate based on the ranking of applications. | 2014-09-25 |
20140289850 | AUTOMATIC APPROACH FOR THE PERSONALIZED PRIVACY RECOMMENDATION RELATED TO THE LOCATION - A method for personalized location privacy recommendation comprises: obtaining information of one or more locations for a user; collecting features of the one or more locations; and recommending respective privacy levels of the one or more locations automatically based at least in part on the information and the features. | 2014-09-25 |
20140289851 | Malware Discovery Method and System - A process for identifying potentially harmful malware, comprises the steps of: a) identifying an executable that is about to run; b) providing a monitoring agent that monitors all threads that are descendent of a thread initiated by the process of said executable; and c) configuring said monitoring agent to conclude that a high probability of malware presence exists, if one of said descendent threads reaches a target process in which suspicious patches are created. | 2014-09-25 |
20140289852 | SYSTEMS AND METHODS FOR REMOTE MONITORING, SECURITY, DIAGNOSTICS, AND PROGNOSTICS - A system includes a physical analysis module, a cyber analysis module, and a determination module. The physical analysis module is configured to obtain physical diagnostic information, and to determine physical analysis information using the physical diagnostic information. The cyber analysis module is configured to obtain cyber security data of the functional system, and to determine cyber analysis information using the cyber security data. The determination module is configured to obtain the physical analysis information and the cyber analysis information, and to determine a state of the functional system using the physical analysis information and the cyber analysis information. The state determined corresponds to at least one of physical condition or cyber security threat. The determination module is also configured to identify if the state corresponds to one or more of a non-malicious condition or a malicious condition. | 2014-09-25 |
20140289853 | REMOTE MALWARE REMEDIATION - An opportunity to assist with remediation of a file at a remote particular host device is identified. One or more remediation techniques are identified that can be applied to assist with remediation of the file at the particular host device. In one aspect, one or more remediation scripts are identified from a plurality of remediation scripts for remediation of the file and provided to the particular host device for execution on the particular host device. In another aspect, a remediation tool is identified and launched on a computing device remote from the particular host device with operations of the remediation tool applied to resources of the particular host device. In another aspect, at least a portion of the remediation techniques are remotely initiated to be performed locally at the particular host device. | 2014-09-25 |
20140289854 | METHOD FOR THWARTING APPLICATION LAYER HYPERTEXT TRANSPORT PROTOCOL FLOOD ATTACKS FOCUSED ON CONSECUTIVELY SIMILAR APPLICATION-SPECIFIC DATA PACKETS - The present invention provides a methodology to thwart attacks that utilize consecutive hypertext transport protocol packets with similar structures, arriving from a plurality of computer systems on a network, such as the Internet, destined for a single or more computer systems on a secondary network, at such a rate with sufficient complexity to produce an effect on the target computer system or systems such that legitimate clients are denied access to requested services, thus creating a “denial of service” situation. The methodology focuses on the dynamic and proactive reassessment of data packet payload content to maintain a running value of similarity or dissimilarity, thus permitting intermediary apparatuses that are performing this computation to create distinction between legitimate clients and illegitimate clients. | 2014-09-25 |
20140289855 | DETECTING WEB BROWSER BASED ATTACKS USING BROWSER DIGEST COMPUTE TESTS USING DIGEST CODE PROVIDED BY A REMOTE SOURCE - The detection of web browser-based attacks using browser tests launched from a remote source is described. In one example, a digest is computed based on the content of an HTTP response message. The message is modified and sent to a client device that also computes a digest. The digests are compared to determine whether content has been modified by malware on the HTTP client. The results of the test are analyzed and defensive measures are taken. | 2014-09-25 |
20140289856 | Method and Device for Optimizing and Configuring Detection Rule - A method and a device for optimizing and configuring a detection rule, where the method includes: a network entity receives network traffic; extracts a packet from the network traffic, and identifies, according to a feature of the packet, protocol related information used in the network; saves the protocol related information and correspondence between pieces of information in the protocol related information to a first learning association table; and matches a corresponding rule from a vulnerability rule base according to the protocol related information to generate a first compact rule set. Through the generated compact rule set in the present invention, subsequent protocol detection is performed only for a protocol threat that may occur in a live network; therefore, content that needs to be detected subsequently is reduced, the detection efficiency is improved, and unnecessary performance consumption is avoided at the same time. | 2014-09-25 |
20140289857 | COMPUTER VIRUS PROTECTION - A network is protected from e-mail viruses through the use of a sacrificial server. Any executable programs or other suspicious parts of incoming e-mail messages are forwarded to a sacrificial server, where they are converted to non-executable format such as Adobe Acrobat PDF and sent to the recipient. The sacrificial server is then checked for virus activity. After the execution is completed, the sacrificial server is rebooted. | 2014-09-25 |
20140289858 | ANTIVIRUS SCAN DURING A DATA SCRUB OPERATION - For an antivirus scan during a data scrub operation, an antivirus scan is concurrently performed as an overlap with the data scrub operation, wherein the data scrub operation periodically inspects and corrects memory errors. The antivirus scan concurrently performing as an overlap with the data scrub operation is increased if a reduction in disk access by a host application is detected. A number of antivirus scan input/output (I/O) operations and data scrub I/O operations is reduced. | 2014-09-25 |
20140289859 | MOBILE APPLICATION SECURITY SCORE CALCULATION - The security or other attributes of mobile applications may be assessed and assigned a security score. In one implementation, a device may obtain information relating to the mobile applications, and may determine, for each of the mobile applications, a number of security scores. Each of the security scores may define a level of risk for a security category relating to a mobile application. The device may further combine the security scores, for each of the mobile applications, to obtain, for each of the mobile applications, a final security score. | 2014-09-25 |
20140289861 | SYSTEM AND METHOD FOR PROVISIONING LICENSE KEYS - Systems and method for provisioning license keys are disclosed. The systems and methods may include receiving an entitlement data set from a license manager, the entitlement data set associated with a plurality of entitlements, receiving a host data set from an access controller, the host data set associated with a plurality of components, assigning a subset of the plurality of entitlements based at least on the host data set, communicating a binding data set to the license manager, the binding data set associated with the subset, and communicating a license data set to the access controller, the license data set based at least on the binding data. | 2014-09-25 |
20140289862 | SYSTEMS AND METHODS FOR MANAGING DATA ASSETS ASSOCIATED WITH PEER-TO-PEER NETWORKS - A system and method for targeting content to BitTorrent users is presented. The system searches torrent file websites for a torrent file according to specified search criteria and verifies that the torrent file corresponds to a media file containing the copyrighted work. The system obtains tracker server information from the torrent file and obtains the IP addresses of participants currently connected to the torrent file from the tracker server, attempts to establish a connection with a participant based on an IP address selected from the IP addresses and, if successful, receives a data piece with a cryptographic hash from the participant. The cryptographic hash is verified to correctly match with the torrent file. The system provides for correlation of information about participants in the peer-to-peer network and using the information to provide targeted campaign to each user based on the user's preferences. | 2014-09-25 |
20140289863 | FILTER FOR A DISTRIBUTED NETWORK - A filter for a distributed network may include receiving index requests from indexing nodes over a network and providing over the network index responses to the indexing nodes in response to the index requests. The index responses may instruct a receiving indexing node to index or not index a specified file. The method may be implemented in software and executed on a computer. | 2014-09-25 |
20140289864 | METHOD AND APPARATUS FOR SECURING A COMPUTER - A computer system ( | 2014-09-25 |
20140289865 | CIRCUIT DEVICE AND A COMMUNICATION APPARATUS - An application program relating to a process of an integrated circuit is stored in a virtual integrated circuit storage area server apparatus. Following a mutual authentication between the IC and the virtual storage area server apparatus through a portable communication function unit, the server apparatus executes the application program. Additionally, through the IC, the portable communication function unit, a wireless communication line, and a network, communicate with an IC_R/W apparatus and perform a process relating to a service in collaboration with each other. | 2014-09-25 |
20140289866 | METHOD AND SYSTEM FOR MOBILE OPERATING SYSTEM TAKEOVER - A software system stored in a memory in a mobile device for preventing access to software applications, said mobile device containing a plurality of software applications, the software system comprising means for allowing a first user to toggle the mobile device between a regular mode and a safe mode; means for identifying, based on information received over a communications network or based on selections by the first user, one or more of the software applications as restricted software applications and one or more of the software applications as safe software applications; means for preventing a second user different from the first user from accessing the restricted software applications while the mobile device operates in the safe mode by displaying a safe mode desktop that excludes icons for the restricted software applications; and means for allowing the first user to access the restricted software applications by displaying a regular desktop having icons for both the restricted software applications and the safe software applications while the mobile device operates in the regular mode. | 2014-09-25 |
20140289867 | Automatic Learning Multi-Modal Fraud Prevention (LMFP) System - A computerized learning multi-modal fraud prevention system and method for generating a data signature of a user, such as one engaged in electronic commerce, to prevent fraudulent activities by machines and persons imitating the user. Steps comprise: fetching a signal of a user's signature stored in memory; generating at least one challenge sequence based on the signal to create a second signature; presenting the generated challenge sequence to the user; collecting the user's challenge response to the generated challenge sequence; computing a quality factor between the user's challenge response and the generated challenge sequence; computing a transaction quality factor and content quality factor and reporting an impostor or re-challenging if the quality factor is below a threshold. Lastly, generating a new signature based on any portion of a user's challenge response and/or any portion of the previously generated signature and/or any portion of collectable information from the user's device memory. | 2014-09-25 |
20140289868 | SHARABLE CONTENT ITEM LINKS WITH USE RESTRICTIONS - Shareable content items links with use restrictions. In one embodiment, for example, a method comprises: receiving, from a client computing device used by a link submitter, a request to access a server-stored content item at a sharable link; denying the access requested by the link submitter based on one or more use restrictions associated with the shareable link; prompting the link submitter to request approval to access to the server-stored content item at the shareable link; responsive to receiving approval for the link submitter to access the server-stored content item at the shareable link, modifying the use restrictions associated with the shareable link to allow the link submitter to access the server-stored content item at the shareable link. | 2014-09-25 |
20140289869 | SYSTEM AND METHOD FOR PROCESSING USER INTERFACE EVENTS - A system and method to detect and prevent non-human interaction between a client and a web server invokes an effect to change the event generation behavior at the client. Subsequent event streams from the client to the server are analyzed to determine whether the event streams contain events corresponding to expected reactions of a human operator at the client to the effect. Indications of non-human behavior may invoke more direct human testing, for example using a dynamic CAPTCHA application, or may cause a termination of the client/URL interaction. | 2014-09-25 |
20140289870 | APPARATUS AND METHODS FOR OBTAINING A PASSWORD HINT - A method and apparatus for obtaining a password hint is disclosed. In some embodiments, the method includes: receiving a spatial pattern from a user; obtaining a password comprising a plurality of characters; obtaining a password hint comprising an arrangement of characters, wherein the arrangement of characters includes the plurality of characters of the password and additional characters, and the plurality of characters of the password are located within the arrangement of characters according to the received spatial pattern. The method may also include storing the password hint or providing the password hint to the user. | 2014-09-25 |
20140289871 | METHOD, SYSTEM, AND DEVICE FOR VERIFYING AUTHORIZED ISSUANCE OF A RIGHTS EXPRESSION - A method, system, and device for verifying authorized issuance of a statement or expression, including determining if a statement or expression is associated with a statement of trusted issuance; determining if the statement of trusted issuance applies; determining if issuance of the statement of trusted issuance is authorized; and verifying that the issuance of the statement or expression was authorized, if the statement of trusted issuance applies, and the issuance of the statement of trusted issuance is authorized. | 2014-09-25 |
20140289872 | DATA SHARING CONTROL METHOD AND DATA SHARING CONTROL TERMINAL - Provided is a method and apparatus to detect and control flow of data shared in a terminal. A method to control data sharing may include accessing a program that shares a type of data with a terminal, displaying the accessed program on a screen organized by the type of data; and controlling the data to be shared with the accessed program in response to a control signal input on the screen. | 2014-09-25 |
20140289873 | SYSTEM AND METHOD FOR AUTOMATED LICENSING IDENTIFICATION AND VERIFICATION - A system for license identification and verification uses watermarking technology to embed license information in the medium itself. Various techniques for the creation of the license are described. The Platform on which the media will be used can extract the watermark data and thereby identify and verify the license. The watermark data includes a certain minimal amount of license data. If further information is required, the Platform can use the watermark data to request additional license details from a Licensor or from a license server. Using this approach, the Platform can readily identify and verify that the media in its possession is properly licensed. | 2014-09-25 |
20140289874 | INTEGRATED CIRCUIT (IC) CHIP AND METHOD OF VERIFYING DATA THEREOF - Provided are an IC chip and a method of verifying data thereof. The present invention verifies integrity of data by comparing an integrity verifying value generated from data using an integrity verifying value generating algorithm before a write operation for storing data in a storing unit is performed and an integrity verifying value generated from data stored in the storing unit using the integrity verifying value generating algorithm after the write operation is completed. According to the present invention, the present invention can confirm whether data stored in the IC chip is normally stored when manufacturing/issuing the IC chip and whether data stored in the IC chip is normally stored during the IC chip is used. | 2014-09-25 |
20140289875 | METHOD AND SYSTEM FOR ENSURING SENSITIVE DATA ARE NOT ACCESSIBLE - A method and an analysis system that help ensure that sensitive data, including in particular patient data, are not accessible to unauthorized persons is presented. The method and system help prevent sensitive data stored on portable devices from being transported along with a portable device to a location outside of a security perimeter. By determining if a portable device is outside of the security perimeter and then automatically erasing the sensitive data stored on the portable device if that is the case, the method and system help prevent disclosure of sensitive data to unauthorized persons. | 2014-09-25 |
20140289876 | MICE THAT MAKE HEAVY CHAIN ANTIBODIES - Genetically modified non-human animals and methods and compositions for making and using them are provided, wherein the genetic modification comprises a deletion in an immunoglobulin constant region CH1 gene (optionally a deletion in a hinge region) of an IgG, IgA, IgD, and/or IgE, and wherein the mouse is capable of expressing a functional IgM. Genetically modified mice are described, including mice having a functional IgM gene and modified to have a deletion of a CH1 domain and a hinge region in a heavy chain constant domain that is not an IgM, e.g., in an IgG heavy chain constant domain. Genetically modified mice that make human variable/mouse constant chimeric heavy chain antibodies (antibodies that lack a light chain), fully mouse heavy chain antibodies, or fully human heavy chain antibodies are provided. | 2014-09-25 |
20140289877 | METHOD FOR PRODUCING TISSUE AND ORGAN - The present invention provides a means for reconstituting tissues and organs having mature functions. | 2014-09-25 |
20140289878 | METHOD FOR PRODUCING MODEL ANIMAL, AND MODEL ANIMAL - A method for producing a model animal which has a desired lifetime, and in which a predetermined biological reaction can be induced, and a model animal are provided. The present invention produces a first individual in which a gene of interest is heterozygously deficient using a first ES cell from a non-human mammalian animal. Meanwhile, a fragment containing a homologous gene that has homology to the gene of interest is made, a second ES cell constituted so that a predetermined region on X chromosome of the animal can be substituted is used, and the fragment is introduced into the second ES cell to generate a substituted ES cell in which the predetermined region has been substituted with the fragment. A second individual is produced using the substituted ES cell. The first individual and the second individual are mated with each other to produce a model animal. | 2014-09-25 |
20140289879 | Production of Transgenic Avians Using Improved Retroviral Vectors - A transgenic avian containing in its genome an exogenous nucleotide sequence which includes a promoter component and a vector with reduced promoter interference wherein the exogenous nucleotide sequence is integrated into the genome and the avian. | 2014-09-25 |
20140289880 | TRANSGENIC CHICKENS - The present invention is transgenic chickens obtained from long-term cultures of avian PGCs and techniques to produce and transgenic birds derived from prolonged PGC cultures. In some embodiments, these PGCs can be transfected with genetic constructs to modify the DNA of the PGC, specifically to introduce a transgene encoding an exogenous protein. When combined with a host avian embryo by known procedures, those modified PGCs are transmitted through the germline to yield transgenic offspring. This invention includes compositions comprising long-term cultures of PGCs that can be genetically modified by gene targeting, that can accept large amounts of foreign DNA and that contribute to the germline of recipient embryos. | 2014-09-25 |
20140289881 | DOUBLE-STRANDED RNA - The present disclosure provides methods and compositions relating to a polynucleotide comprising a dsRNA region that is complementary to a particular region of the NS1 gene segment in the influenza virus genome that targets a sequence comprising two overlapping reading frames, one encoding NS1 and the second encoding the NEP polypeptide. Thus, the polynucleotide of the invention is able to target two message RNAs and is effective at inhibiting the replication of influenza virus in a cell. | 2014-09-25 |
20140289882 | COMPOSITIONS AND METHODS FOR RE-PROGRAMMING CELLS WITHOUT GENETIC MODIFICATION FOR REPAIRING CARTILAGE DAMAGE - The present inventions are directed to compositions and methods regarding the reprogramming of other cells (such as embryonic stem cells (ESCs), induced pluripotent stem cells (iPSCs), MSCs, fibroblasts, hematopoietic stem cells, endothelian stem cells, adipocytes, chondrocytes, osteoblasts, osteoclasts and endothelial cells) into chondrogenic cells without introducing exogenous genes to the samples. In particular, the present inventions are directed to transducible materials that are capable of transducing into the biological samples but are not genes or causing genetic modifications. The present inventions also are directed to methods of reprogramming the path of biological samples or treating diseases using the tranducible compositions thereof. | 2014-09-25 |
20140289883 | LETTUCE VARIETY MULTIGREEN 50 - The present invention relates to plants of a lettuce variety NUN 09050 LT (referred to as “MULTIGREEN 50”) and, seeds and progeny thereof. The invention further relates to methods for producing a lettuce plant by traditional breeding methods. Moreover, the invention relates to a method for producing a lettuce plant containing in its genetic material one or more transgenes. | 2014-09-25 |
20140289884 | NUCLEOTIDE SEQUENCES AND CORRESPONDING POLYPEPTIDES CONFERRING IMPROVED NITROGEN USE EFFICIENCY CHARACTERISTICS IN PLANTS - Methods and materials for modulating low-nitrogen tolerance levels in plants are disclosed. For example, nucleic acids encoding low nitrogen tolerance-modulating polypeptides are disclosed as well as methods for using such nucleic acids to transform plant cells. Also disclosed are plants having increased low-nitrogen tolerance levels and plant products produced from plants having increased low-nitrogen tolerance levels. | 2014-09-25 |
20140289885 | FRUITS OF THE GENUS CAPSICUM WITH IMPROVED TASTE AND ENHANCED NUTRITIONAL VALUE - The present invention relates to a method for obtaining fruits of plants of the genus | 2014-09-25 |
20140289886 | SOYBEAN CULTIVAR HI1112509 - The present invention is in the field of soybean variety HI1112509 breeding and development. The present invention particularly relates to the soybean variety HI1112509 and its progeny, and methods of making HI1112509. | 2014-09-25 |
20140289887 | SOYBEAN CULTIVAR HI1114914 - The present invention is in the field of soybean variety HI1114914 breeding and development. The present invention particularly relates to the soybean variety HI1114914 and its progeny, and methods of making HI1114914. | 2014-09-25 |
20140289888 | SOYBEAN CULTIVAR AR1111559 - The present invention is in the field of soybean variety AR1111559 breeding and development. The present invention particularly relates to the soybean variety AR1111559 and its progeny, and methods of making AR1111559. | 2014-09-25 |
20140289889 | SOYBEAN CULTIVAR AR1111955 - The present invention is in the field of soybean variety AR1111955 breeding and development. The present invention particularly relates to the soybean variety AR1111955 and its progeny, and methods of making AR1111955. | 2014-09-25 |