16th week of 2014 patent applcation highlights part 75 |
Patent application number | Title | Published |
20140109223 | PROVIDING A REAL-TIME ANOMALOUS EVENT DETECTION AND NOTIFICATION SERVICE IN A WIRELESS NETWORK - A method and apparatus for providing a notification service in a wireless network are disclosed. For example, the method registers a mobile device associated with a customer for the notification service, collects traffic data related to the mobile device of the customer, determines if an anomaly is detected for the traffic data that is collected for the mobile device, and provides a notification to the mobile device of the customer, if the anomaly is detected for the traffic data that is collected for the mobile device. | 2014-04-17 |
20140109224 | Method for Detecting Eavesdropping Activity and Terminal Device - A method for detecting an eavesdropping activity and a terminal device. The method includes determining whether a terminal device is in a conversation; when the terminal device is in a conversation, determining whether the terminal device has an application that starts a recording function; and when the terminal device has an application that starts a recording function, sending out an eavesdropping alarm prompt. By adopting the technical solutions of the present invention, an eavesdropping activity in a manner of recording may be detected. | 2014-04-17 |
20140109225 | Identifying a Denial-of-Service Attack in a Cloud-Based Proxy Service - A cloud-based proxy service identifies a denial-of-service (DoS) attack including determining that there is a potential DoS attack being directed to an IP address of the cloud-based proxy service; and responsive to determining that there are a plurality of domains that resolve to that IP address, identifying the one of the plurality of domains that is the target of the DoS attack. The domain that is under attack is identified by scattering the plurality of domains to resolve to different IP addresses, where a result of the scattering is that each of those domains resolves to a different IP address, and identifying one of those plurality of domains as the target of the DoS attack by determining that there is an abnormally high amount of traffic being directed to the IP address in which that domain resolves. | 2014-04-17 |
20140109226 | Kernel-Level Security Agent - A kernel-level security agent is described herein. The kernel-level security agent is configured to observe events, filter the observed events using configurable filters, route the filtered events to one or more event consumers, and utilize the one or more event consumers to take action based at least on one of the filtered events. In some implementations, the kernel-level security agent detects a first action associated with malicious code, gathers data about the malicious code, and in response to detecting subsequent action(s) of the malicious code, performs a preventative action. The kernel-level security agent may also deceive an adversary associated with malicious code. Further, the kernel-level security agent may utilize a model representing chains of execution activities and may take action based on those chains of execution activities. | 2014-04-17 |
20140109227 | TRANSFORMING UNIT TESTS FOR SECURITY TESTING - A method, computer program product, and system for transforming unit tests is described. A unit test associated with one or more software units is identified. A first input parameter of the unit test is identified. A substitute parameter value is determined, wherein the substitute parameter value is associated with a security test for the one or more software units. A value of the first input parameter in the unit test is replaced with the substitute parameter value. The unit test including the substitute parameter value is implemented for the one or more software units. A first security issue associated with the one or more software units is identified, based upon, at least in part, replacing the first input parameter of the unit test with the substitute parameter value and implementing the unit test including the substitute parameter value. | 2014-04-17 |
20140109228 | TRANSFORMING UNIT TESTS FOR SECURITY TESTING - A method, computer program product, and system for transforming unit tests is described. A unit test associated with one or more software units is identified. A first input parameter of the unit test is identified. A substitute parameter value is determined, wherein the substitute parameter value is associated with a security test for the one or more software units. A value of the first input parameter in the unit test is replaced with the substitute parameter value. The unit test including the substitute parameter value is implemented for the one or more software units. A first security issue associated with the one or more software units is identified, based upon, at least in part, replacing the first input parameter of the unit test with the substitute parameter value and implementing the unit test including the substitute parameter value. | 2014-04-17 |
20140109229 | SECURITY SCANNING SYSTEM AND METHOD - The present disclosure provides a computer-readable medium, method and system for determining security vulnerabilities for a plurality of application programs used to provide television services to a customer device over a communications network. The method includes running a first scanning program against a first application program relating to a control panel for the customer device; running a second scanning program against a second application program that provides Internet content to the customer device; running a third scanning program against a third application program that relates to a component management system of customer premises equipment; and correlating security vulnerabilities identified utilizing the first, second, and third scanning programs. | 2014-04-17 |
20140109230 | REAL-TIME VULNERABILITY MONITORING - A security information management system is described, wherein client-side devices preferably collect and monitor information describing the operating system, software, and patches installed on the device(s), as well as configuration thereof A database of this information is maintained, along with data describing vulnerabilities of available software and associated remediation techniques available for it. The system exposes an API to support security-related decisions by other applications. For example, an intrusion detection system (IDS) accesses the database to determine whether an actual threat exists and should be (or has been) blocked. | 2014-04-17 |
20140109231 | IMAGE PROCESSING DEVICE, IMAGE PROCESSING SYSTEM, IMAGE PROCESSING METHOD, AND PROGRAM - There is provided an image processing device including a photographic subject position acquisition unit that acquires position information of a photographic subject corresponding to a person image included in a photographic image, a transmission unit that transmits the position information of the photographic subject to an information processing device that compares the position information of the photographic subject with position information of a communication terminal transmitted from the communication terminal, and a determination unit that determines whether a process of protecting the person image is performed based on information according to a result of the comparison received from the information processing device. | 2014-04-17 |
20140109232 | METHOD AND APPARATUS FOR PROVIDING DRM SERVICE - An apparatus for providing a Digital Rights Management (DRM) service is provided. The apparatus includes a Media Presentation Description (MPD) information configurer for determining a DRM system required in each of representations of content provided by an adaptive streaming service, classifying the representations into one or more groups according to predetermined criteria, and configuring MPD information by inserting content protection information including representation group information representing classified groups and information about DRM systems corresponding to the representation group information; and a communication unit for transmitting the MPD information to a user terminal receiving the content. | 2014-04-17 |
20140109233 | RIGHTS OBJECT ACQUISITION METHOD OF MOBILE TERMINAL IN DIGITAL RIGHT MANAGEMENT SYSTEM - A rights objects acquisition method of a mobile terminal in a digital right management system is provided for acquiring multiple rights objects in a composite manner. An objects right acquisition method of a mobile terminal may include generating, in response to a group rights object (RO) acquisition command, a group rights object acquisition request with content identifiers assigned to individual contents corresponding to the rights objects indicated by the group rights object acquisition command, sending the group rights object acquisition request to a rights issuer; and receiving an group rights object acquisition response containing rights object identifiers assigned to the rights objects from the rights issuer. The present invention streamlines the RO acquisition process, especially when acquiring multiple ROs. | 2014-04-17 |
20140109234 | SYSTEMS AND METHODS FOR LIMITING THE NUMBER OF ELECTRONIC DEVICES ACCESSING DIGITAL RIGHTS MANAGEMENT (DRM) CONTENT IN A PORTABLE MEMORY DEVICE - A system for managing access to DRM content is provided with a portable memory device and an electronic device coupled to the portable memory device. The portable memory device includes a public area for storing software and the DRM content, and a hidden area for storing data on predetermined addresses among all addresses in the hidden area. The software is executed by the electronic device for obtaining a first identification associated with an electronic device in response to the portable memory device being coupled to the electronic device, and only allowing the electronic device to access the DRM content in response to the first identification being equal to the data on one of the predetermined addresses, or the first identification being different from the data on the predetermined addresses and the data on one of the predetermined addresses being equal to a predetermined number. | 2014-04-17 |
20140109235 | Directing Users to Preferred Software Services - A mechanism is provided for directing users to preferred software services. An indication from a user for a software service that provides a function identified by the user is identified. One or more software services that provide the function identified by the user are identified and a determination is made as to whether an existing subscription is in place for a subset of the one or more software services. Responsive to the existing subscription being in place for the subset of the one or more software services, the subset of software services that have existing subscriptions are presented to the user. | 2014-04-17 |
20140109236 | LICENSE INFORMATION ACCESS BASED ON DEVELOPER PROFILES - Disclosed herein are systems, methods, and software for facilitating application licensing. In at least one implementation, license information for an application is identified based at least in part on a developer profile associated with the application and a state of a license for the application identified from at least a portion of the license information. Presentation of the application in accordance with the state of the license for the application can then be initiated. | 2014-04-17 |
20140109237 | APPLICATION MODES DETERMINED FROM PREVIOUS AND CURRENT STATES OF A LICENSE - Disclosed herein are systems, methods, and software for facilitating application licensing. In at least one implementation, a previous state of a license for an application is identified upon launching or otherwise engaging the application. In addition, a current state of the license for the application is identified. A determination is made with respect to in which mode to present the application based on the previous state and the current state. Presentation of the application in the determined mode may then be initiated. | 2014-04-17 |
20140109238 | Business Partner Data Deletion For Privacy - Various embodiments illustrated and described herein include at least one of systems, modules, processes, methods, and software that operate to keep customer, vendor, and business partner private information private. | 2014-04-17 |
20140109239 | Collaborative cloud-based sharing of medical imaging studies with or without automated removal of protected health information - The present invention teaches a method wherein medical imaging studies are transformed from Identifiable Imaging Studies into Cleared Imaging Studies that can be legally and securely shared, either by automated removal of protected health information (PHI) or by verification that the studies belong to a Patient or Patient's Legal Representative and that a valid effective waiver, such as a HIPAA Waiver, is on file. Cleared Imaging Studies are shared by cloud-based storage and transmission to one or more Third Parties using one or more network-enabled devices. Methods are also provided for one or more users of network-enabled devices to view medical imaging studies simultaneously, with caching of imaging studies in local devices and separation of additional data streams used for collaborative image viewing to ensure that medical images are not degraded. | 2014-04-17 |
20140109240 | SECURING ACCESS OF REMOVABLE MEDIA DEVICES - A securing apparatus includes a security adapter configured to be engaged with an electronic device. The security adapter includes an interface to couple to a host device. The securing apparatus further includes a securing structure that is lockable. When the security adapter is engaged with the electronic device, the securing structure is configurable to transition from an unlocked configuration to a locked configuration to constrain communication of one or more requests from the host device for read access or write access to the electronic device, such that the communication between the host device and the electronic device occurs via the security adapter. | 2014-04-17 |
20140109241 | Data Protection Method and Electronic Device - A data protection method for an electronic device is disclosed. The data protection method includes setting a log-in password for a private file stored in a public folder, creating a private folder having a same folder name as the public folder to store the private file in the private folder, and comparing an input password with the log-in password for the private folder to determine to display the private folder or the public folder. | 2014-04-17 |
20140109242 | DATA PROTECTING METHOD, MOBILE COMMUNICATION DEVICE, AND MEMORY STORAGE DEVICE - A data protecting method for a mobile communication device is provided. The data protecting method includes storing first authentication information into a hidden area of a memory storage device coupled to the mobile communication device. The data protecting method also includes receiving a data packet containing a data security instruction and second authentication information via a mobile communication data network or a wireless network and determining whether the second authentication information obtained from the data packet matches the first authentication information stored in the hidden area. The data protecting method further includes, when the second authentication information obtained from the data packet matches the first authentication information stored in the hidden area, performing a data protecting operation on data stored in a storage area to prevent the data from being read. Thereby, the data can be effectively protected when the mobile communication device is lost. | 2014-04-17 |
20140109243 | SECURE ACCESS SUPERSESSION ON SHARED WORKSTATIONS - Transitions between users at shared workstations that permit access to private health information or other secure data may be handled, without incurring unnecessary delays due to shut-down of all applications used by the departing user, by selectively hiding applications with sensitive information on a shared desktop while allowing temporary system access for the interrupting user. | 2014-04-17 |
20140109244 | MMTV-SV40-Spy1A and Spy1A-pTRE transgenic mouse models - In one aspect, the invention provides a transgenic non-human animal model havings germ cells and somatic cells containing an endogenous MMTV-SV40-Spy1A gene sequence introduced into said animal model, or an ancestor of said animal model at an embryonic stage, wherein said gene sequence comprises a mouse mammary tumor virus gene (MMTV), a functionally disrupted SV40 gene (SV40) and a human Spy1A gene. In another aspect, the present invention provides a transgenic non-human animal model whose germ cells and somatic cells contain an endogenous Spy1A-pTRE-Tight gene sequence introduced into said animal model or an ancestor of said animal model at an embryonic stage. Preferably, the Spy1A-pTRE-Tight animal model expresses the Spy1A and develop cancer, preferably breast cancer, when administered with tetracycline, preferably doxycycline. | 2014-04-17 |
20140109245 | PROSTATE CANCER CELL LINES, GENE SIGNATURES AND USES THEREOF - The present disclosure, in part, is directed to a mammalian prostate cancer cell line comprising at least one or a set of primary mammalian epithelial cells which have been infected with a retroviral vector carrying an oncogene selected from the group consisting of c-Myc, Ha-Ras, NeuT, c-Src and combinations thereof and in which said gene is expressed. Applications of the pro-state cell lines, including immune competent animal models of prostate cancer, a method for the in vitro production of immortalized primary mammalian epithelial cells, a method of determining whether a human subject having prostate cancer is suffering from or at risk for developing metastasis, a method of preventing cancer or inhibiting metastasis of cancer susceptible to treatment in a subject at risk for developing cancer or metastasis of cancer, and method of identifying a candidate compound that selectively interferes with proliferation or viability of a cancer cell that has elevated levels of CCR5 and/or of at least one of its ligands. | 2014-04-17 |
20140109246 | METHODS OF GENERATING XENOCHIMAERIC MICE WITH TUMOR AND HEMATOPOIETIC SYSTEM FROM THE SAME HETEROLOGOUS SPECIES - The present invention provides methods for the generation of xenochimaeric animals; for example, xenochimaeric mice, comprising bone marrow progenitor cells and tumors from a heterologous animal. In some aspects, the invention provides xenochimaeric mice bearing humanized bone marrow and human tumors. Such animals are a model system for the study of human tumor stroma, for drug discovery, and for the treatment of human cancers. | 2014-04-17 |
20140109247 | RAT EMBRYONIC STEM CELL - The present invention provides a rat embryonic stem cell characterized by having the following properties of (a) expressing Oct3/4 gene and Nanog gene, (b) positive for alkaline phosphatase activity, (c) having an embryoid body forming ability, (d) expressing SSEA (Stage-Specific Embryonic Antigen)-1 and SSEA-4, (e) having the same number of chromosomes as does a normal rat cell, (f) capable of being subcultured and holding the undifferentiated state, (g) having in vitro pluripotency, (h) having a potential to differentiate for cells of three embryonic germ lineages, (i) having teratoma formation ability, and (j) having an ability to produce a chimeric rat, a method of establishing the aforementioned rat embryonic stem cell and the like. | 2014-04-17 |
20140109248 | NEW CULTIVAR, METHOD FOR DIFFERENTIATING PLANT CULTIVARS, AND METHOD FOR CAUSING EARLIER MATURING OF RICE INDIVIDUAL - An object of the present invention is to provide a new rice cultivar that matures earlier than the original cultivar, and a method for causing a rice individual to mature earlier. The present invention relates to a rice cultivar Koshihikari kazusa no. 5 having the cultivar registration application number 25586, a progeny individual obtained by crossbreeding two individuals selected from the group consisting of an individual of the aforementioned cultivar and a progeny individual thereof, and a method for causing a rice individual to mature earlier that comprises replacing a region corresponding to a region containing base number 31,720,064 to base number 31,724,043 of the third chromosome of rice cultivar Nipponbare with a chromosome fragment composed of the corresponding region of rice cultivar Koshihikari kazusa no. 5 or rice cultivar Habataki in the third chromosome of the rice individual. | 2014-04-17 |
20140109249 | SCREENING METHODS - The present invention relates to methods for the screening, identification and/or application of microorganisms of use in imparting beneficial properties to plants. | 2014-04-17 |
20140109250 | TRANSGENIC MAIZE EVENT MON 87427 AND THE RELATIVE DEVELOPMENT SCALE - The invention provides transgenic maize event MON 87427 and plants, plant cells, seeds, plant parts, and commodity products derived from event MON 87427. The invention also provides nucleotides specific for transgenic maize event MON 87427 and plants, plant cells, seeds, plant parts, and commodity products comprising nucleotides specific for transgenic maize event MON 87427. The invention also provides methods related to transgenic maize event MON 87427 and to the Roundup® Hybridization System (RHS). The invention also provides a Relative Development Scale useful for monitoring and determining reproductive development in maize that reconciles developmental differences across various maize varieties. This is useful for determining the optimal timing of a treatment regimen in which tassel development stage is an important factor, including various methods in making hybrid seed. | 2014-04-17 |
20140109251 | MELON VARIETY NUN 26171 MEM - The invention relates to the field of | 2014-04-17 |
20140109252 | MELON VARIETY NUN 26191 MEM - The invention relates to the field of | 2014-04-17 |
20140109253 | TOMATO VARIETY N 6407 - The invention provides a new and distinct hybrid variety of tomato, N 6407 or NUN 00193 TOP which is especially useful as processing tomato. | 2014-04-17 |
20140109254 | TOMATO VARIETY N 6416 - The invention provides a new and distinct hybrid variety of tomato, N 6416 or NUN 00210 TOP which is especially useful as processing tomato. | 2014-04-17 |
20140109255 | Soybean Cultivar 131TD735 - A soybean cultivar designated 131TD735 is disclosed. The invention relates to the seeds of soybean cultivar 131TD735, to the plants of soybean 131TD735, to plant parts of soybean cultivar 131TD735 and to methods for producing a soybean plant produced by crossing soybean cultivar 131TD735 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars or breeding cultivars and plant parts derived from soybean cultivar 131TD735, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 131TD735 and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants and plant parts produced by crossing the cultivar 131TD735 with another soybean cultivar. | 2014-04-17 |
20140109256 | GLYPHOSATE-TOLERANT WHEAT GENOTYPES - The present invention provides methods for producing glyphosate-tolerant wheat genotypes by mutagenesis, glyphosate wheat plants produced by such methods, and related compositions and methods. | 2014-04-17 |
20140109257 | RESISTANCE TO GRAY LEAF SPOT IN MAIZE - The present invention is in the field of plant breeding and disease resistance. More specifically, the invention includes a method for breeding corn plants containing quantitative trait loci that are associated with resistance to gray leaf spot, a fungal disease associated with | 2014-04-17 |
20140109258 | RNA CONSTRUCTS - The present invention concerns concatemer and/or stabilized RNA constructs capable of forming dsRNA, optionally comprising a sequence capable of protecting the dsRNA against RNA processing in a host cell. The invention also relates to methods of producing these constructs and to methods for using these constructs. The constructs according to the present invention are particularly useful in plant pest control. | 2014-04-17 |
20140109259 | Guard Cell Promoters and Uses Thereof - Compositions and methods for regulating expression of heterologous nucleotide sequences in a plant are provided. Compositions include nucleotide sequences encompassing a guard-cell-preferred promoter which drives preferential expression of gene products in guard cells. Also provided is a method for expressing a heterologous nucleotide sequence in a plant using a promoter sequence disclosed herein. | 2014-04-17 |
20140109260 | In vivo Assembly of Transcription Units - Methods of providing gene suppression DNA in a eukaryotic organism comprising introducing a first DNA segment and at least one second DNA segment into the genome of the organism. One of the DNA segments contains a promoter and a transcribable DNA. Another DNA segment contains at least part of the transcribable DNA. When inserted in tandem, the DNA segments are assembled in vivo forming a recombinant transcription unit. RNA transcribed from the transcription unit can form double-stranded RNA. | 2014-04-17 |
20140109261 | PLANT REGULATORY ELEMENTS AND USES THEREOF - The present invention provides novel regulatory elements for use in plants. The present invention also provides DNA constructs containing these novel regulatory elements; transgenic cells, plants, and seeds containing these novel regulatory elements; and methods for preparing and using the same. | 2014-04-17 |
20140109262 | Processing Cocoa Beans And Other Seeds - A method of treating seeds includes piercing a multiplicity of seeds such that shells of a majority of the seeds are pierced, aerating the pierced seeds, and reducing a water content of the pierced seeds. Another method of treating seeds includes placing a bulk quantity of seeds in a container, forming a mass of seeds and liquid in the container, sealing the container to create a substantially closed environment inside the container, and fermenting the mass in the sealed container. Another method of treating seeds includes placing a multiplicity of pierced seeds in a ventilated enclosure, forcing air through the enclosure such that the seeds are exposed to the air, and mixing the seeds. | 2014-04-17 |
20140109263 | USE OF Cry1Ea IN COMBINATIONS FOR MANAGEMENT OF RESISTANT FALL ARMYWORM INSECTS - The subject invention includes methods and plants for controlling fall armyworm lepidopteran insects, said plants comprising a Cry1Ea insecticidal protein and a second insecticidal protein selected from the group of Cry1Ab, Cry1Be, Cry1Ca, Cry1Da, and Vip3Ab to delay or prevent development of resistance by the insects. | 2014-04-17 |
20140109264 | BLUEBERRY PLANT NAMED "BB07-210FL-18" - A new and distinct cultivar of blueberry plant named BB07-210FL-18 as described and shown herein. BB07-210FL-18 is a new and distinct low chill tetraploid Southern highbush blueberry ( | 2014-04-17 |
20140109265 | BLUEBERRY PLANT NAMED "BB05-58GA-1" - A new and distinct cultivar of blueberry plant named BB05-58GA-1 as described and shown herein. BB05-58GA-1 is a new and distinct low chill tetraploid Southern highbush (Vaccinium) variety of complex ancestry, based largely on | 2014-04-17 |
20140109266 | BLUEBERRY PLANT NAMED "BB06-540FL-12" - A new and distinct cultivar of blueberry plant named BB06-540FL-12 as described and shown herein. BB06-540FL-12 is a new and distinct low chill tetraploid, as illustrated and described, Southern highbush blueberry ( | 2014-04-17 |
20140109267 | BLUEBERRY PLANT NAMED "BB05-61GA-61" - A new and distinct cultivar of blueberry plant named BB05-61GA-61 as described and shown herein. BB05-61GA-61 is a new and distinct low chill tetraploid Southern highbush ( | 2014-04-17 |
20140109268 | BLUEBERRY PLANT NAMED "BB05-185GA" - A new and distinct cultivar of blueberry plant named BB05-185GA as described and shown herein. BB05-185GA is a new and distinct low chill tetraploid Southern highbush blueberry ( | 2014-04-17 |
20140109269 | BLUEBERRY PLANT NAMED "BB05-274MI-139" - A new and distinct cultivar of blueberry plant named BB05-274MI-139 as described and shown herein. BB05-274MI-139 is a new and distinct high chill tetraploid Northern highbush blueberry ( | 2014-04-17 |
20140109270 | BLUEBERRY PLANT NAMED "BB06-507MI-15 - A new and distinct cultivar of blueberry plant named BB06-507MI-15 as described and shown herein. BB065-507MI-15 is a new and distinct high chill tetraploid Northern highbush blueberry (Vaccinium) variety of complex ancestry, based largely on | 2014-04-17 |
20140109271 | BLUEBERRY PLANT NAMED "BB05-251MI-14" - A new and distinct cultivar of blueberry plant named BB05-251MI-14 as described and shown herein. BB05-251MI-14 is a new and distinct high chill tetraploid Northern highbush blueberry ( | 2014-04-17 |
20140109272 | Tradescantia plant named 'Radtrad' | 2014-04-17 |
20140109273 | Verbena Plant Named 'KLEVP12446' - A new and distinct variety of | 2014-04-17 |
20140109274 | Echinacea plant named 'Sunbird' - A new and distinct | 2014-04-17 |
20140109275 | Echinacea plant named 'Supreme Flamingo' - A new and distinct | 2014-04-17 |
20140109276 | Echinacea plant named 'Supreme Elegance' - A new and distinct | 2014-04-17 |
20140109277 | Echinacea plant named 'Supreme Cantaloupe' - A new and distinct | 2014-04-17 |
20140109278 | Lobelia plant named 'KLELE12472' - A new and distict lobelia plant named ‘KLELE12472’ particularly distinguished by dark blue flowers and a medium compact, mounding growth habit, is disclosed. | 2014-04-17 |
20140109279 | Sedum plant named 'Thunderhead' - A new and distinct hybrid of | 2014-04-17 |