11th week of 2014 patent applcation highlights part 68 |
Patent application number | Title | Published |
20140075539 | PACKET CLASSIFICATION IN A NETWORK SECURITY DEVICE - Methods and apparatuses are described for inspecting data packets in a computer network. One or more data packets through the network have associated header data and content. One method includes receiving a data packet, examining the data packet to classify the data packet including classifying the data packet using information included in the header and content, determining flow instructions for processing the packet based on both the header information and the content and processing of the packet using the flow instructions. | 2014-03-13 |
20140075540 | GEOGRAPHIC FILTER FOR REGULATING INBOUND AND OUTBOUND NETWORK COMMUNICATIONS - A system and method for regulating and analyzing inbound and outbound communications in and between computer networks on the basis of geographic security assertions are provided. Geographic information is collected, optimized, and shared between network objects to enforce network access control on the basis of configurable security assertions. Security assertions are configured and metrics displayed using maps and other geographic data in a graphical user interface. | 2014-03-13 |
20140075541 | SYSTEMS AND METHODS FOR ACCESSING RESOURCES THROUGH A FIREWALL - Systems, methods, and computer-readable storage media for providing access to a firewalled resource are provided. A system includes a controller configured to be positioned outside of the firewall and configured to receive connection information from the resource through the firewall. The controller is configured to generate instructions for establishing a connection between the client device and the resource through the firewall based on the connection information received from the resource. The controller is configured to transmit the instructions to the client device. The client device is configured to open a connection between the client device and the resource through the firewall based on the instructions transmitted to the client device from the controller. | 2014-03-13 |
20140075542 | SNIPPET MATCHING IN FILE SHARING NETWORKS - Techniques for matching information representing private files against files obtained from a public network. | 2014-03-13 |
20140075543 | BIOS PROTECTION DEVICE - A boot program held in a BIOS memory device of a processing system is authenticated. At system start-up, a BIOS protection device temporarily prevents execution of the boot program by the central processor of the processing system by control of address and data paths. The BIOS protection device interrogates the contents of the BIOS memory device to establish authentication. If the contents of the BIOS memory device are not authentic, execution of the boot program is prevented. | 2014-03-13 |
20140075544 | DEVICE AND METHOD FOR AUTHENTICATING CONTENTS-PROTECTED INFORMATION - Provided are an authentication method that includes connecting an optical disc drive (ODD) for driving a medium and a host device for reproducing contents stored in the medium using an interface. An authentication for reproducing the contents is performed by mutually exchanging data between the host device and the ODD via the authentication area of the ODD for storing the data. Accordingly, the ODD may convert a file from the optical disc, which is in an intrinsic format, into a format that is recognizable by a host device. | 2014-03-13 |
20140075545 | SECURELY EXECUTING AN APPLICATION ON A COMPUTER SYSTEM - A method of and system for securely executing an application on a computer system such that a user of the computer system cannot access or view unauthorized content available on the computer system or accessible using the computer system. Such system and method may terminate any unauthorized processes detected during execution of the application, and may disable any functions of the computer system that are capable of accessing unauthorized content, including disabling any functions capable of initiating processes on the computer system. Securely executing an application may be used for any of a variety of purposes, including, among other purposes, to assist preventing students from cheating on exams, to assist preventing students from not paying attention in class, to assist preventing employees from wasting time at work, and to assist preventing children from viewing content that their parents deem inappropriate. | 2014-03-13 |
20140075546 | METHOD AND DEVICE FOR CONTROLLING INVOCATION OF AN APPLICATION PROGRAMMING INTERFACE - A computer-implemented method for controlling invocation of application programming interface (API) is provided. The method includes categorizing a plurality of APIs according to a plurality of API categories. The API categories are categorized by an API function through which user information is obtained. The method further includes setting a default invoking permission for a respective API category, and detecting, in real time, an attempt by an application to invoke an API in the respective API category. Upon detecting the attempted invocation of the API in the API category by the application, the method further includes controlling the invoking behavior of the API by the application in accordance with the default invoking permission for the API category. | 2014-03-13 |
20140075547 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER READABLE MEDIUM - There is provided an information processing apparatus including: a display unit that displays an input interface which includes a plurality of identification information figures corresponding to identification information used to identify an individual, and a reference figure functioning as a reference for arrangement of the identification information figures; a display control unit that hides the identification information figures, which are targets of an operation performed by a user, or changes display positions of the identification information figures with regard to the reference figure, in accordance with the operation performed by the user on the input interface; and an identification information specifying unit that specifies the identification information which is used for a certification process from among a plurality of pieces of identification information in accordance with the operation performed by the user on the input interface. | 2014-03-13 |
20140075548 | GESTURE- AND EXPRESSION-BASED AUTHENTICATION - A user can define a gesture-based input mode with respective input value to establish an authentication protocol to unlock a computer or govern other computer behavior. As an alternative or in addition, the user can define a second input mode based on face recognition plus IR sensing satisfying a threshold to ensure a live person is being imaged for authentication, and/or face recognition plus a particular facial expression such as a smile and wink. | 2014-03-13 |
20140075549 | SYSTEM AND METHOD FOR PROVIDING GESTURE-BASED USER IDENTIFICATION - A mechanism for allowing a user to prove their identity on touch-based devices employing the use of a touch surface in firmware-controlled environments is discussed. The user may prove his or her identity by entering a series of strokes on the touch-based device to form a word or image. Characteristics of the entered strokes such as stroke order and stroke direction are compared to stored stroke characteristics that were gathered from a drawing of the same word or image during a user enrollment process. If the stroke characteristics comparison is acceptable, the user identity is verified. | 2014-03-13 |
20140075550 | HARDWARE-ENFORCED ACCESS PROTECTION - The present disclosure is directed to systems and methods related to hardware-enforced access protection. An example device may comprise a login agent module (LAM), an operating system login authentication module (OSLAM) and a secure user authentication module (SUAM). The LAM may be configured to cause a prompt requesting login information to be presented by the device. The LAM may then provide the login information to the OSLAM, which may be configured to authenticate the login information using known user information. If authenticated, the OSLAM may generate and transmit a signed login success message to the SUAM using a private key. The SUAM may be secure/trusted software loaded by device firmware, and may be configured to authenticate the signed login success message. If authenticated, the SUAM may transmit an encrypted authentication message to the OSLAM. If the encrypted authentication message is authenticated, the OSLAM may grant access to the device. | 2014-03-13 |
20140075551 | METHOD AND APPARATUS TO MANAGE USER ACCOUNT OF DEVICE - A method and apparatus to manage a user account. The method includes: setting a plurality of authorization accounts defining usage right regarding functions of the device; mapping at least one of the plurality of authorization accounts to a user authentication account of the device, based on an input of a user; and executing an application installed in the device using a result of the mapping the authorization account and the user authentication account, without stopping running of an operation system of the device. | 2014-03-13 |
20140075552 | AUTHENTICATION USING MULTI-TIER MULTI-CLASS OBJECTS - The invention provides a method and apparatus for authenticating a user in a touchscreen environment. A first tier may be defined having at least one object, and a destination tier may be defined having at least one bin. An authentication-key may be registered, the authentication-key comprising a length defining a number of nodes and a correct sequence of nodes, each node specifying a movement of one object from the first tier to one bin of the destination tier. A user sequence of at least one touchscreen gestures is received, each gesture specifying that one object from the first tier should be moved to one bin of the destination tier. Access is permitted if the at least one touchscreen gestures corresponds to the length, the correct sequence, and the movement of the authentication-key. | 2014-03-13 |
20140075553 | DOMAIN NAME SYSTEM REBINDING ATTACK PROTECTION - A network-enabled electronic system is arranged to determine whether a subsequent DNS request uses a selected domain name of a previous DNS request. A protective action is taken in response to an indication that the subsequent DNS request uses the selected domain name of a previous DNS request. The protective action can include flushing state information that could be used to generate a request using an address that is (maliciously, for example) rebound to the selected domain name. | 2014-03-13 |
20140075554 | SYSTEMS AND METHODS FOR PERFORMING SELECTIVE DEEP PACKET INSPECTION - A computer-implemented method for performing selective deep packet inspection may include 1) identify a traffic flow that includes a stream of data packets, 2) sample at least one packet from the stream of data packets, 3) analyze the sampled packet using a computing resource to determine whether the traffic flow is trustworthy, 4) determine that the traffic flow is trustworthy based on analyzing the sampled packet, and 5) divert the traffic flow to a hardware accelerator in response to determining that the traffic flow is trustworthy. Various other methods, systems, and computer-readable media are also disclosed. | 2014-03-13 |
20140075555 | System and method for protecting computer systems from malware attacks - The malware protection system provides a virtual logon session which runs in the background invisible to the user. The virtual logon session is created on a computer system with the help of the operating system using a separate/partitioned kernel resources such as a desktop, that provides a limited access environment under the context of a logged-on user. The system is configured to run applications inside virtual logon sessions under the logged-on user's credentials with limited access. The system also includes an interceptor module that launches the web browser or web application inside the virtual logon session. The interceptor module intercepts every URL passing through the web browser or web application being run in the virtual logon session. The module checks if the primary web URL is infected by malware and adds the malicious URL to a malicious URL database and a non-malicious URL to a non-malicious URL database. | 2014-03-13 |
20140075556 | Threat Detection for Return Oriented Programming - Techniques for detecting security exploits associated with return-oriented programming are described herein. For example, a computing device may determine that a retrieved count is indicative of malicious activity, such as return oriented programming The computing device may retrieve the count from a processor performance counter of prediction mismatches, the prediction mismatches resulting from comparisons of a call stack of the computing device and of a shadow call stack maintained by a processor of the computing device. In response to determining that the count indicates malicious activity, the computing device may perform at least one security response action. | 2014-03-13 |
20140075557 | Streaming Method and System for Processing Network Metadata - An improved method and system for processing network metadata is described. Network metadata may be processed by dynamically instantiated executable software modules which make policy-based decisions about the character of the network metadata and about presentation of the network metadata to consumers of the information carried by the network metadata. The network metadata may be type classified and each subclass within a type may be mapped to a definition by a unique fingerprint value. The fingerprint value may be used for matching the network metadata subclasses against relevant policies and transformation rules. For template-based network metadata such as NetFlow v9, an embodiment of the invention can constantly monitor network traffic for unknown templates, capture template definitions, and informs administrators about templates for which custom policies and conversion rules do not exist. Conversion modules can efficiently convert selected types and/or subclasses of network metadata into alternative metadata formats. | 2014-03-13 |
20140075558 | AUTOMATION DISCOVERY TO IDENTIFY MALICIOUS ACTIVITY - Systems and methods may use automation discovery to identify malicious activity. An automation discovery system comprising a processor in communication with a network and in communication with a database may receive potentially automated network traffic data. The system may analyze the potentially automated network traffic data to determine whether the potentially automated network traffic data is likely to be automated. When the potentially automated network traffic data is not likely to be automated, the system may generate a low automation confidence score associated with the potentially automated network traffic data. When the potentially automated network traffic data is likely to be automated, the system may generate a high automation confidence score associated with the potentially automated network traffic data. | 2014-03-13 |
20140075559 | METHOD AND DEVICE FOR PROCESSING VIRUS-INFECTED APPLICATIONS - The present disclosure relates to a virus-infected application processing method. The method comprises: obtaining identification information associated with a virus-infected application; cleaning the virus-infected application; sending the identification information to a recommended application search module; receiving recommendation information from the recommended application search module, the recommendation information comprising introduction to one or more applications relevant to the virus-infected application; and displaying the recommendation information. According to the virus-infected application processing method, relevant applications are recommended to a user at the same time as the virus-infected application is cleaned, thereby allowing the user to easily install a same but virus-free application or a similar substitute application. The entire operational process is simple and convenient, and can effectively make up for the functional loss due to the cleaning of the virus-infected application. In addition, the present disclosure provides a virus-infected application processing device. | 2014-03-13 |
20140075560 | AUTOMATIC CLASSIFICATION OF SECURITY VULNERABILITIES IN COMPUTER SOFTWARE APPLICATIONS - Automatically classifying security vulnerabilities in computer software applications by identifying candidate security vulnerabilities in a learning set including at least a first computer software application, classifying each of the candidate security vulnerabilities using predefined classifications, determining, for each of the candidate security vulnerabilities, values for predefined properties, creating a set of correlations between the property values and the classifications of the candidate security vulnerabilities, identifying a candidate security vulnerability in a second computer software application, determining, for the candidate security vulnerability in the second computer software application, values for the predefined properties, and using the set of correlations to classify the candidate security vulnerability in the second computer software application with a classification from the predefined classifications that best correlates with the property values of the candidate security vulnerability in the second computer software application. | 2014-03-13 |
20140075561 | STATIC SECURITY ANALYSIS USING A HYBRID REPRESENTATION OF STRING VALUES - Methods for creating a hybrid string representations include receiving string information as input; parsing the string information to produce one or more string components; determining string components that may be represented concretely by comparing the one or more components to a set of known concretizations; abstracting all string components that could not be represented concretely; and creating a hybrid string representation that includes at least one concrete string component and at least one abstracted string component. | 2014-03-13 |
20140075562 | STATIC SECURITY ANALYSIS USING A HYBRID REPRESENTATION OF STRING VALUES - Systems for constructing hybrid string representations include a string parser configured to parse received string information to produce one or more string components, a database configured to store a set of known concretizations, and a processor configured to compare the one or more string components to the set of known concretizations to determine string components that may be represented concretely, to abstract all string components that could not be represented concretely, and to create a hybrid string representation that includes at least one concrete string component and at least one abstracted string component. | 2014-03-13 |
20140075563 | AUTOMATED SECURITY TESTING - A method of automated security testing includes recording a macro. The recorded macro is played and a web request is intercepted while playing the macro. The web request may be attacked and sent to a web server. A response from the web server based on the web request is received, and the response of the web server is processed to determine any vulnerabilities. | 2014-03-13 |
20140075564 | NETWORK ASSET INFORMATION MANAGEMENT - A network asset information management system ( | 2014-03-13 |
20140075565 | MULTI-TENANCY IDENTITY MANAGEMENT SYSTEM - A multi-tenant identity management (IDM) system enables IDM functions to be performed relative to various different customers' domains within a shared cloud computing environment and without replicating a separate IDM system for each separate domain. The IDM system can provide IDM functionality to service instances located within various different customers' domains while enforcing isolation between those domains. A cloud-wide identity store can contain identity information for multiple customers' domains, and a cloud-wide policy store can contain security policy information for multiple customers' domains. The multi-tenant IDM system can provide a delegation model in which a domain administrator can be appointed for each domain, and in which each domain administrator can delegate certain roles to other user identities belong to his domain. Service instance-specific administrators can be appointed by a domain administrator to administer to specific service instances within a domain. | 2014-03-13 |
20140075566 | Computer-Implemented Method and Apparatus for Encoding Natural-Language Text Content And/Or Detecting Plagiarism - A computer-implemented letter-based method of encoding a length-significant portion of natural language text to generate a letter-based fingerprint of the text portion, the method including detecting letter-based locations of occurrences of pre-determined single-letter and/or multi-letter pattern(s) within the length-significant portion, the detecting being carried out such that at least some occurrences are detected in a word-boundary independent manner that does not depend on locations of word-word boundaries, for a pattern occurrence letter-position signal which describes letter positions of the occurrences of the patterns within the text portion, computing frequency-dependent absolute or relative magnitudes of signal strength for a plurality of frequencies, the computed magnitudes representing letter-based frequencies of the pattern occurrences within the natural language text portion, and storing the computed signal strength magnitudes at the plurality of frequencies, the generated fingerprint comprising the stored signal strength magnitudes. Related apparatus and methods are also described. | 2014-03-13 |
20140075567 | Service Processor Configurations for Enhancing or Augmenting System Software of a Mobile Communications Device - A device comprising non-volatile memory capable of being partitioned into first and second partitions, the first partition for storing device system software, the second partition for storing a service processor and having one or more system execution properties for enhancing or augmenting the device system software, and comprising one or more processors for verifying integrity of the device system software using a first security element, verifying integrity of the service processor using a second security element, obtaining the service processor from the non-volatile memory, executing the obtained service processor, and updating, installing, removing, or modifying the service processor in the second partition of the non-volatile memory without affecting the device system software in the first partition. | 2014-03-13 |
20140075568 | Security Layer and Methods for Protecting Tenant Data in a Cloud-Mediated Computing Network - A system for protecting data managed in a cloud-computing network from malicious data operations includes an Internet-connected server and software executing on the server from a non-transitory physical medium, the software providing a first function for generating one or more security tokens that validate one or more computing operations to be performed on the data, a second function for generating a hash for each token generated, the hash detailing, in a secure fashion, the operation type or types permitted by the one or more tokens, a third function for brokering two-party signature of the one or more tokens, and a fourth function for dynamically activating the one or more signed tokens for a specific time window required to perform the operations permitted by the token. | 2014-03-13 |
20140075569 | DISPLAY APPARATUS AND DISPLAY PROGRAM - Provided are a display apparatus and a display program that may prevent data for personal use from becoming known to a third party, when the third party unexpectedly appears while a user is using the display apparatus. The display apparatus includes a display unit configured to display a screen based on specific data of a specific user for personal use; a detection unit configured to detect a person and determine whether the detected person is the specific user or a third party other than the specific user; and a display control unit configured to convert the screen of the display unit into a screen hiding the specific data when the third party is detected by the detection unit. | 2014-03-13 |
20140075570 | METHOD, ELECTRONIC DEVICE, AND MACHINE READABLE STORAGE MEDIUM FOR PROTECTING INFORMATION SECURITY - An embodiment of the invention provides an electronic device. The electronic device is configured to protect a set of private data of an authorized user of the electronic device. The electronic device includes a biometric sampler, a biometric authenticator, and a data provider. The biometric sampler is configured to covertly collect a set of biometric samples from a current user of the electronic device. The biometric authenticator is configured to covertly use the set of biometric samples of the current user and a set of biometric data of the authorized user to verify whether the current user is the authorized user. The data provider is configured to give the current user access to a set of fake data instead of the set of private data if the current user is not the authorized user. | 2014-03-13 |
20140075571 | Role-oriented database record field security model - A database management system implements a role-oriented authorization scheme that facilitates operating system (OS) supported encrypted field access for a table in the database. A security model provides for various roles that have varying responsibilities and rights with respect to the database tables and the data supported therein. In this approach, data that is considered sensitive is encrypted. A system administrator role is authorized to create, update, and maintain a table but is not authorized to view sensitive field data, i.e., data stored in encrypted columns of the table. A security administrator role is authorized to define column masks with OS-enforced security access control to the sensitive field data. By separating (fencing) these responsibilities, the security model enforces end-to-end encryption across the entire database management system. | 2014-03-13 |
20140075572 | RFID SYSTEM WITH SEGMENTED RFID DATA OWNERSHIP - A method according to one embodiment includes receiving data from a radio frequency identification (RFID) tag; receiving waypoint information relating to the RFID tag; setting ownerships of discrete portions of the data based at least in part on the waypoint information; allowing an owner of one of the discrete portions of the data to view the discrete portion of the data owned by the owner, or derivative thereof; and not allowing the owner to view discrete portions of the data that are not owned by the owner. | 2014-03-13 |
20140075573 | PRIVILEGED ACCESS TO MANAGED CONTENT - Privileged access to managed content is disclosed. In some embodiments, a privileged portion of application code manages user access to managed content at a level of access greater than the user would otherwise be afforded. The privileged code moves a content management session up or down in levels of access as required to allow a user to perform through the application one or more specific actions it is desired to permit the user to do in a particular context (e.g., at a particular time in the lifecycle of an item of content and/or a particular point in a business process or work flow), including to permit the user to perform an action it is not desired to let the user perform in other contexts, such as write a particular value to a content item it is not desired to allow the user to write to otherwise. | 2014-03-13 |
20140075574 | API MONITORING METHOD AND DEVICE THEREFOR - Embodiments of the present invention provide an API monitoring method and device. The API monitoring method includes steps such as identifying a plurality of APIs as privacy-sensitive APIs; in response to detecting an invocation of one of the privacy-sensitive API by an application, determining whether the invoked API and the application satisfy a predefined condition; and if the invoked API and the application satisfy the predefined condition, suspending the invocation of the API by the application, displaying a message, wherein the message indicates that the application attempts to invoke the privacy-sensitive API; and determining whether or not to resume the invocation of the API based on a user response to the message. The device may be used to carry out the method. | 2014-03-13 |
20140075575 | CONTENT DELIVERY SYSTEM WITH AN IDENTIFICATION MECHANISM AND METHOD OF OPERATION THEREOF - A method of operation of a content delivery system includes: compiling a detected device ensemble; detecting user information to develop a profile; and retrieving a content with an access level matching the profile and compatible with the detected device ensemble for displaying on a device. | 2014-03-13 |
20140075576 | METHOD AND SYSTEM FOR AUTHORIZING PLAYBACK FROM MULTIPLE DEVICES - A system and method for using content on multiple devices includes a head end associating a first user device and a second user device with a user account and authorizing the first user device and the second user device to receive content. The first user device forms a selection signal corresponding to a first content. The head end communicates the first content to the first user device corresponding to the selection signal. The first user device displays the first content on a first display associated therewith. The second user device receives the first content and displays the first content on a second display associated with the second user device. | 2014-03-13 |
20140075577 | FILE SECURITY CONTROL SYSTEM AND METHOD - A server sets security configuration information and inserts the security configuration information into a file. The server generates a new file according to the security configuration information and the file, and displays content of the new file and operates the new file, in response to a determination that the client has authority to access and operate the new file. The server updates the security configuration information in the new file after the new file has been operated by the client. | 2014-03-13 |
20140075578 | METHOD FOR PROVIDING LICENSE CORRESPONDING TO ENCRYPTED CONTENTS TO CLIENT APPARATUS AND DIGITIAL RIGHTS MANAGEMENT CONVERSION SYSTEM USING THE METHOD - Disclosed are a method for providing a license corresponding to encrypted contents to a client apparatus, which provides a license in response to a request of the license corresponding to contents super-distributed to a third person in a DRM conversion system, and a DRM conversion system using the same. First digital rights contents type first contents and a first license corresponding to the first contents are digital rights management converted to generate second digital rights contents type second contents and a second license corresponding to the second contents. A license request corresponding to the second contents super-distributed to a third person is received. A second license corresponding to the second contents super-distributed is requested from a server corresponding to the second digital right management. The second license corresponding to the second contents super-distributed is received and transmitted to the third person. | 2014-03-13 |
20140075579 | METHOD TO ENABLE DEVELOPMENT MODE OF A SECURE ELECTRONIC CONTROL UNIT - A system and method for installing software on a secure controller without requiring the software to be properly signed. The method includes determining whether a by-pass flag has been set in the controller that identifies whether a file validation procedure is required to install the file and performing a pre-check operation to determine whether predetermined parameters of the file have been satisfied. The method also includes installing the file into a memory in the controller if the pre-check operation has been satisfied. The method further includes determining whether the file has a proper signature and indicating that the signature is proper if the by-pass flag is set and the file does not include a proper signature, and allowing the file to be installed if the signature has been indicated as being proper. | 2014-03-13 |
20140075580 | Address Exchange System and Methods - The present disclosure provides systems and methods for an address exchange system including a controller configured to provide an API configured to receive an identifier from a user and further configured not to receive a physical address from the user, wherein the user provides an item for shipment to the physical address. In response to receiving the identifier, the controller is further adapted to request the physical address from a data storage system wherein the data storage system stores an association between the identifier and the physical address and further stores one or more permission settings defining situations in which the physical address is to be provided in response to receipt of the identifier. In response to receipt of the identifier, the data storage system tests the permission settings to determine whether or not to provide the associated physical address. | 2014-03-13 |
20140075581 | SECURE MECHANISM TO SWITCH BETWEEN DIFFERENT DOMAINS OF OPERATION IN A DATA PROCESSOR - A data processing apparatus including processing circuitry having a secure domain and a further different secure domain and a data store for storing data and instructions. The data store includes a plurality of regions each corresponding to a domain, and at least one secure region for storing sensitive data accessible by the data processing circuitry operating in the secure domain and not accessible by the data processing circuitry operating in the further different secure domain and a less secure region for storing less sensitive data. The processing circuitry is configured to verify that a region of the data store storing the program instruction corresponds to a current domain of operation of the processing circuitry and, if not, to verify whether the program instruction includes a guard instruction and, if so, to switch to the domain corresponding to the region of the data store storing the program instruction. | 2014-03-13 |
20140075582 | METHOD FOR PLAYING DIGITAL CONTENTS PROTECTED WITH A DRM (DIGITAL RIGHTS MANAGEMENT) SCHEME AND CORRESPONDING SYSTEM - The method and system are for playing digital contents protected by a DRM scheme, wherein the digital contents are stored in a server and downloaded or streamed to a user device. The approach includes executing a DRM application inside the user device implementing a proxy between the server and a native player of the user device, and connecting the DRM proxy application to the server, selecting a digital content to be downloaded and retrieving a corresponding remote playlist. Also, the approach includes transforming the remote playlist into a local playlist having a format readable from the native player and executing a plurality of local packets of the local playlist inside the native player. | 2014-03-13 |
20140075583 | MANAGEMENT OF MEDIA ITEMS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for making policy decisions relating to when to sync and when to default to cloud storage and for addressing the need for solutions relating to how to share media items between overlapping user accounts | 2014-03-13 |
20140075584 | SECURITY APPARATUS AND METHOD - A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the computer. This security system causes the client computer to periodically and conditionally call a host system to report its serial number via an encoded series of dialed numbers. A host monitoring system receives calls from various clients and determines which calls to accept and which to reject by comparing the decoded client serial numbers with a predefined and updated list of numbers corresponding to reported stolen computers. The host also concurrently obtains the caller ID of the calling client to determine the physical location of the client computer. The caller ID and the serial number are subsequently transmitted to a notifying station in order to facilitate the recovery of the stolen device. The security system remains hidden from the user, and actively resists attempts to disable it. | 2014-03-13 |
20140075585 | Tetraspanin CD82 as a Diagnostic and/or Therapeutic Module for Xenograft Recognition and/or Rejection - The present invention relates to CD82 polypeptides of the mammalian tetraspanin CD82 protein family for use in the diagnosis, prevention and/or treatment of xenograft recognition and/or rejection. The present invention furthermore relates to CD82 knockout and transgenic animals and their cells, tissues and organs. The present invention furthermore relates to antibodies against a CD82 polypeptide, pharmaceutical compositions comprising at least one inhibitor of a CD82 polypeptide or comprising cells, tissues and organs of animals in which the CD82 level, expression and/or activity is modified, and their use in the diagnosis, prevention and/or treatment of xenograft recognition and/or rejection. The present invention furthermore relates to methods of diagnosing xenograft recognition and/or rejection and methods for the prevention and/or treatment of xenograft recognition and/or rejection as well as methods of xenotransplantation. | 2014-03-13 |
20140075586 | Parental Cell Lines for Making Cassette-Free F1 Progeny - Non-human totipotent or pluripotent cells are provided comprising at a genomic locus a self-excisable, recombinase expression cassette flanked with recombination recognition sites, wherein a recombinase gene is operably linked to a promoter that is active in a post-meiotic spermatid stage when cytoplasmic bridging occurs between spermatids. Compositions and methods are provided for making cassette-deleted F1 non-human animals, wherein the methods comprise employing totipotent or pluripotent cells containing a self-excisable, recombinase expression cassette. | 2014-03-13 |
20140075587 | BROCCOLI HYBRID RX 05991199 - The invention provides seed and plants of broccoli hybrid RX 05991199 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of broccoli hybrid RX 05991199 and the parent lines thereof, and to methods for producing a broccoli plant produced by crossing such plants with themselves or with another broccoli plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants. | 2014-03-13 |
20140075588 | RICE HYBRID HR120001 - A rice hybrid designated HR120001 (ATCC PTA-13290) is disclosed. The invention relates to the seeds of rice hybrid HR120001, to the plants of rice hybrid HR120001 and to methods for producing a rice plant produced by crossing the hybrid HR120001 with itself or another rice plant. The invention further relates to hybrid rice seeds and plants produced by crossing the hybrid HR120001 with another rice plant. This invention further relates to growing and producing blends of rice seeds comprised of seeds of rice hybrid HR120001 with rice seed of one, two, three, four, or more of another rice hybrid, rice variety or rice inbred. | 2014-03-13 |
20140075589 | RICE HYBRID HR120002 - A rice hybrid designated HR120002 (ATCC PTA-13291) is disclosed. The invention relates to the seeds of rice hybrid HR120002, to the plants of rice hybrid HR120002 and to methods for producing a rice plant produced by crossing the hybrid HR120002 with itself or another rice plant. The invention further relates to hybrid rice seeds and plants produced by crossing the hybrid HR120002 with another rice plant. This invention further relates to growing and producing blends of rice seeds comprised of seeds of rice hybrid HR120002 with rice seed of one, two, three, four, or more of another rice hybrid, rice variety or rice inbred. | 2014-03-13 |
20140075590 | BRASSICA OLERACEA PLANTS WITH IMPROVED NUTRITIONAL VALUE - The invention provides compositions and methods relating to the elevation of glucoraphanin compared to standard | 2014-03-13 |
20140075591 | ENGINEERING LIPIDS IN VEGETATIVE TISSUES OF PLANTS - The present invention discloses gene targets and methods for the genetic control of lipid accumulation in vegetative (non-seed) portions of plants. Enhanced lipid, e.g. triacylglycerol (TAG), accumulation in vegetative portions of plants may be obtained by down-regulation of activity of At4g24160 or a homolog thereof. Plants, plant parts, seeds comprising down-regulated AT4G24160 activity, or activity of a homolog thereof, are also provided, as well as products prepared therefrom. | 2014-03-13 |
20140075592 | Intercellular Transfer of Organelles in Plants for Horizontal Transfer of DNA Expressing Proteins of Interest - Compositions and methods for effecting horizontal gene transfer in plants are disclosed. | 2014-03-13 |
20140075593 | FLUORESCENCE ACTIVATED CELL SORTING (FACS) ENRICHMENT TO GENERATE PLANTS - An Engineered Transgene Integration Platform (ETIP) is described that can be inserted randomly or at targeted locations in plant genomes to facilitate rapid selection and detection of a GOI that is perfectly targeted (both the 3′ and 5′ ends) at the ETIP genomic location. One element in the invention is the introduction of specific double stranded breaks within the ETIP. In some embodiments, an ETIP is described using zinc finger nuclease binding sites, but may utilize other targeting technologies such as meganucleases, TALs, CRISPRs, or leucine zippers. Also described are compositions of, and methods for producing, transgenic plants wherein the donor or payload DNA expresses one or more products of an exogenous nucleic acid sequence (e.g. protein or RNA) that has been stably-integrated into an ETIP in a plant cell. In embodiments, the ETIP facilitates testing of gene candidates and plant expression vectors from ideation through Development phases. | 2014-03-13 |
20140075594 | USE OF AT(n) INSERTIONS IN PROMOTER ELEMENTS FOR CONTROLLING THE EXPRESSION LEVELS OF CODING SEQUENCES IN PLANTS - The present invention refers to the use of AT(n) insertions in promoter elements for controlling the expression levels of coding sequences in plants. The expression levels of the heat shock protein (Gmhsp17.6-L), when compared in resistant and susceptible individuals in the population, demonstrated that the largest expression levels per quantitative PCR were present in the individuals that contained the largest AT insertions in the promoter region. The invention also refers to gene expression cassettes containing promoter regions of the gene with different numbers of AT insertions fused to the GUS protein, for transforming soybean embryos. | 2014-03-13 |
20140075595 | PLANT SEEDS WITH ALTERED STORAGE COMPOUND LEVELS, RELATED CONSTRUCTS AND METHODS INVOLVING GENES ENCODING OXIDOREDUCTASE MOTIF POLYPEPTIDES - This invention is in the field of plant molecular biology. More specifically, this invention pertains to isolated nucleic acid fragments encoding ORM proteins in plants and seeds and the use of such fragments to modulate expression of a gene encoding ORM protein activity in a transformed host cell. | 2014-03-13 |
20140075596 | siRNAS Compositions and Method for Manipulating Berry Ripening - The present invention provides a method and compositions of regulating plant development and secondary metabolite biosynthesis by providing one or more plant cells; providing a small interfering RNAs (ta-siRNAs) to the one or more plant cells; targeting a transcription factor to affect the plant development and/or secondary metabolite biosynthesis. | 2014-03-13 |
20140075597 | COMPOSITIONS AND METHODS COMPRISING MALE FERTILITY SEQUENCES - Compositions and methods for modulating male fertility in a plant are provided. Compositions comprise nucleotide sequences, and active fragments and variants thereof, which modulate male fertility. Further provided are expression cassettes comprising the male fertility polynucleotides, or active fragments or variants thereof, operably linked to a promoter, wherein expression of the polynucleotides modulates the male fertility of a plant. Various methods are provided wherein the level and/or activity of the sequences that influence male fertility is modulated in a plant or plant part. | 2014-03-13 |
20140075598 | ICE RECRYSTALLISATION INHIBITION PROTEIN OR ANTIFREEZE PROTEINS FROM DESCHAMPSIA, AND FESTUCA SPECIES OF GRASS - The present invention relates to nucleic acids or nucleic acid fragments encoding amino acid sequences for polypeptides involved in tolerance to freezing and/or low temperature stress in plants. More particularly, the present invention relates to nucleic acids or nucleic acid fragments encoding amino acid sequences for ice recrystallisation inhibition proteins (IRIPs) in plants, and the use thereof for the modification of plant response to freezing and/or low temperature stress. Even more particularly, the present invention relates to polypeptides involved in tolerance to freezing and/or low temperature stress in | 2014-03-13 |
20140075599 | PLANTS WITH ALTERED PHYTOCHROMES - Polynucleotides encoding polypeptides that increase the light sensitivity of plants were identified. Introduction of the polynucleotides into plants produces plants having altered characteristics, such as decreased height, decreased diameter, decreased petiole length, decreased internode length, decreased hypocotyl length, increased hyponasty or enhanced germination. | 2014-03-13 |
20140075600 | VALENCENE SYNTHASE - The present invention relates to a valencene synthase, to a nucleic acid encoding such valencene synthase, to a host cell comprising said encoding nucleic acid sequence and to a method for preparing valencene, comprising converting farnesyl diphosphate to valencene in the presence of a valencene synthase according to the invention. | 2014-03-13 |
20140075601 | Alpha-Amylases - The present invention relates to alpha-amylases, nucleic acids encoding the alpha-amylases, methods of producing the alpha-amylases, and methods of using the alpha-amylases. | 2014-03-13 |
20140075602 | Method for Dressing Seeds - The present invention relates to a method comprising treating plant propagation material with at least sticker selected from specific acrylate co-copolymers, to seed dressing formulations comprising such stickers and to plant propagation material coated with such stickers. | 2014-03-13 |
20140075603 | Polypeptides having cellulolytic enhancing activity and polynucleotides encoding same - The present invention relates to isolated polypeptides having cellulolytic enhancing activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides. | 2014-03-13 |
20140075604 | METHOD FOR MAKING A TURF OF STOLONIFEROUS OR RHIZOMATOUS PLANT SPECIES - Method for per to provide a turf for sports, ornamental or recreational use, comprising the steps of: selecting a stoloniferous and/or rhizomatous plant species; cultivating a plurality of mother plants belonging to said stoloniferous and/or rhizomatous species up to reach a predetermined vegetative development, said mother plants comprising stolons and/or rhizomes having a plurality of nodes, wherein two successive nodes are connected by plant portions, or internodes; preparing at least one cutting from each mother plant of said plurality of mother plants, said cutting comprising at least one node and an internode, wherein said internode has a length set between 1 mm and 10 mm; and carrying out a vegetative propagation of a plurality of said cuttings in a desired site then obtaining said turf. | 2014-03-13 |
20140075605 | Rosa hybrida shrub named 'AUSNOBLE' - A variety of rose plant of the shrub class, named ‘AUSnoble’, suitable for repeat flowering production having a vigorous upright growth that is very healthy with light green foliage that is almost thornless, and that produces beautifully rounded flowers with neatly placed petals making a perfect rosette, with buds that are lightly tinged yellow, but with flowers that open to become pure white, and that produce a light apple fragrance. | 2014-03-13 |
20140075606 | Rosa hybrida shrub named 'AUScousin' - A variety of rose plant of the shrub class, named ‘AUScousin’, suitable for repeat flowering production having blooms of rich salmon color that commence as a red bud and open to pretty cups that then develop into perfectly formed rosettes having a medium-strong myrrh fragrance. | 2014-03-13 |
20140075607 | Shrub rose plant named 'Harpballred' - A new and distinct shrub rose plant is provided that abundantly forms in clusters attractive small cup-like bright red blossoms with a white eye that drop their petals well upon full maturity. The plant exhibits vigorous vegetation and a mounding growth habit. The foliage is dark green with a glossy finish on the upper surface. The plant is well suited for growing as attractive ornamentation in the landscape. The plant is particularly well suited for growing in smaller areas as a ground cover or as a mass planting. Alternatively, the plant can be grown in containers. | 2014-03-13 |
20140075608 | Hybrid Tea Rose plant named 'J.C.'s Pride' - A new variety of Hybrid Tea rose suitable for garden decoration, having flowers of red coloration. | 2014-03-13 |
20140075609 | Hybrid tea rose plant named' MOJAVE SUNSET' - A new variety of Hybrid Tea rose suitable for garden decoration, having flowers of orange coloration. | 2014-03-13 |
20140075610 | Hybrid tea rose plant named 'Jim Jimmy James' - A new variety of Hybrid Tea rose suitable for garden decoration, having flowers of orange coloration. | 2014-03-13 |
20140075611 | Hybrid tea rose plant named 'Party Hardy' - A new variety of Hybrid Tea rose suitable for garden decoration, having flowers of red and white coloration. | 2014-03-13 |
20140075612 | Hybrid Tea Rose Plant Named 'Flirty Girl' - A new variety of Hybrid Tea rose suitable for garden decoration, having flowers of pink and light yellow coloration. | 2014-03-13 |
20140075613 | Hybrid Tea Rose plant named 'Velvet Orange' - A new variety of Hybrid Tea rose suitable for garden decoration, having flowers of orange blend coloration. | 2014-03-13 |
20140075614 | Floribunda Rose Plant Named 'Isle of View' - A new variety of Floribunda rose suitable for garden decoration, having flowers of red coloration. | 2014-03-13 |
20140075615 | Floribunda Rose Plant Named 'Pat's Pink' - A new variety of Floribunda rose suitable for garden decoration, having flowers of pink coloration. | 2014-03-13 |
20140075616 | Blueberry plant named 'Drisbluefive' - A new and distinct variety of blueberry plant named ‘DrisBlueFive’ particularly distinguished by having a very low chilling requirement, early harvest season with medium to high productivity, and firm, sweet berries with aromatic flavor, is disclosed. | 2014-03-13 |
20140075617 | Blueberry plant named 'DrisBlueFour' - A new and distinct variety of blueberry plant named ‘DrisBlueFour’ particularly distinguished by having a very low chilling requirement, high productivity and firm, sweet berries with intense blue color and aromatic flavor, is disclosed. | 2014-03-13 |
20140075618 | Variety of prunus rootstock named 'Aprimed' - A new and distinct hybrid plum-apricot plant used as a rootstock that exhibits root-knot nematode resistance, high tolerance to root asphyxia, and compatibility with apricot and plum varieties. | 2014-03-13 |
20140075619 | Strawberry plant named 'DrisStrawThirtyThree' - A new and distinct variety of strawberry plant named ‘DrisStrawThirtyThree’ particularly characterized by large, orange-red colored, very glossy fruit with sweet flavor is disclosed. | 2014-03-13 |
20140075620 | STRAWBERRY PLANT NAMED 'DRISSTRAWTHIRTYFOUR' - A new and distinct variety of strawberry plant named ‘DrisStrawThirtyFour’ particularly characterized by a very early harvest maturity, medium sized fruit, and very glossy fruit with sweet flavor, is disclosed. | 2014-03-13 |
20140075621 | Buddleia Plant Named 'Hinebud3' | 2014-03-13 |
20140075622 | ARTICHOKE PLANT NAMED 'SJ215' - A new cultivar of artichoke named ‘SJ215’ that is distinguishable by the color of the edible immature flower buds as red. This trait set ‘SJ215’ apart from all other existing varieties of | 2014-03-13 |
20140075623 | Leucanthemum plant named 'Goldfinch' - A new and distinct | 2014-03-13 |
20140075626 | SANSEVERIA PLANT NAMED 'SAN201202' - A new and distinct | 2014-03-13 |
20140075627 | Sanseveria Plant Named 'SAN201201' - A new and distinct | 2014-03-13 |
20140075628 | Arundo plant named 'Nile Fiber' - ‘Nile Fiber’ is a new and unique cultivar characterized by its lack of serrated leaf margins, vigorous growth, dark purple bands below node sections, thick wall, ease in propagation, and usefulness in biomass production such as producing superior fiber for making pulp and paper. | 2014-03-13 |
20140075629 | Echinacea plant named 'Colorburst Orange' - A new and distinct | 2014-03-13 |
20140075630 | ECHINACEA PLANT NAMED 'GLOWING DREAM' - A new and distinct | 2014-03-13 |
20140075631 | ECHINACEA PLANT NAMED 'FERRIS WHEEL' - A new and distinct | 2014-03-13 |
20140075632 | Echinacea plant named 'Chiquita' - A new and distinct | 2014-03-13 |
20140075633 | Echinacea plant named 'Cinnamon Cupcake' - A new and distinct | 2014-03-13 |
20140075634 | Echinacea plant named 'Rosita' - A new and distinct | 2014-03-13 |
20140075635 | ECHINACEA PLANT NAMED 'SECRET AFFAIR' - A new and distinct | 2014-03-13 |
20140075636 | Echinacea plant named 'Secret love' - A new and distinct | 2014-03-13 |
20140075637 | LOBELIA PLANT NAMED 'KLELE12471' - A new and distinct | 2014-03-13 |