20th week of 2010 patent applcation highlights part 36 |
Patent application number | Title | Published |
20100125901 | AUTOMATIC INVOCATION OF DTN BUNDLE PROTOCOL - A system and method for providing DTN services to legacy applications is provided. According to one example, a method for providing delay tolerant networking (DTN) services to legacy applications includes acts of intercepting a packet addressed to a software application, the packet including a payload, the software application being resident on a first computer, determining suitability of the packet for DTN processing and encoding the payload into a DTN bundle. According to another example, a system for providing delay tolerant networking (DTN) services to legacy applications includes a network interface, a memory and a controller coupled to the network interface and the memory. In this example, the controller is configured to intercept a packet addressed to a software application, the packet including a payload, the software application being resident on a computer, determine suitability of the packet for DTN processing and encode the payload into a DTN bundle. | 2010-05-20 |
20100125902 | SEAMLESS DATA NETWORKING - A roaming client in communication with an enterprise site through a virtual private network (VPN) gateway maintains an address for a virtual network interface upon becoming a resident client at the enterprise site. A physical interface for the resident includes two valid addresses. Seamless data networking is achieved while promoting routing efficiency by reducing the amount of local traffic addressed to and from the virtual address that is unnecessarily routed through VPN gateways. | 2010-05-20 |
20100125903 | TRAFFIC REDIRECTION IN CLOUD BASED SECURITY SERVICES - Systems, methods and apparatus for tunneling in a cloud based security system. Management of tunnels, such as data tunnels, between enterprises and processing nodes for a security service is facilitate by the use of virtual gateway nodes and migration failover to minimize traffic impacts when a tunnel is migrated from one processing node to another processing node. | 2010-05-20 |
20100125904 | COMBINING A MOBILE DEVICE AND COMPUTER TO CREATE A SECURE PERSONALIZED ENVIRONMENT - A mobile device, such as a mobile phone, smart phone, personal music player, handheld game device, and the like, when operatively combined with a PC, creates a secure and personalized computing platform through configuration of the mobile device's CPU (central processing unit) and OS (operating system) to function as an immutable trusted core. The trusted core in the mobile device verifies the integrity of the PC including, for example, that its drivers, applications, and other software are trusted and unmodified, and thus safe to use without presenting a threat to the integrity of the combined computing platform. The mobile device can further optionally store and transport the user's personalization data—including, for example, the user's desktop, applications, data, certificates, settings, and preferences—which can be accessed by the PC when the devices are combined to thus create a personalized computing environment. | 2010-05-20 |
20100125905 | Method and Apparatus for Associating User Identity - In accordance with an example embodiment of the present invention, an apparatus, comprising a processor configured to associate a first virtual screen with a first user identity receive input for transitioning from the first virtual screen to a second virtual screen, and associate the second virtual screen with a second user identity based at least in part on the input is disclosed. | 2010-05-20 |
20100125906 | RESETTING A FORGOTTEN PASSWORD USING THE PASSWORD ITSELF AS AUTHENTICATION - One embodiment of the present invention provides a system for resetting a user's forgotten password. During operation, the system receives a user's request for resetting the user's forgotten password and derives one or more challenges from the user's forgotten password. The system then presents the derived challenges to the user and receives a response from the user to the challenges. The system further compares the user's response to the one or more challenges with the user's forgotten password, thereby facilitating password resetting. | 2010-05-20 |
20100125907 | UPnP CDS USER PROFILE - In one embodiment, an apparatus includes a hierarchy of authentication folders configured in a control directory server (CDS) of a Universal Plug and Play (UPnP) network, a personal identification number (PIN) code associated with a user and comprising of identifiers, and non-public media content organized in the CDS to provide selective service to users, where the non-public media content is made accessible to the user when the user is authenticated with a selection of the hierarchy of authentication folders. | 2010-05-20 |
20100125908 | STORAGE DEVICE, INFORMATION PROCESSOR, AND INFORMATION PROCESSING SYSTEM - According to one embodiment, a storage device includes a storing module, a determining module, and a releasing module. The storing module stores generated authentication information generated by a host connected to the storage device and set as authentication information for releasing access restriction to a storage module in the storage module. The determining module determines, when the storage device is turned on upon the host resuming from suspend mode and receives generated authentication information from the host in a state where access to the storage module is restricted, whether the generated authentication information matches the generated authentication information stored by the storing module in the storage module. The releasing module releases, when the determining module determines that the generated authentication information received from the host matches the generated authentication information stored by the storing module in the storage module, the access restriction to the storage module. | 2010-05-20 |
20100125909 | MONITOR DEVICE, MONITORING METHOD AND COMPUTER PROGRAM PRODUCT THEREOF FOR HARDWARE - A monitor device, a monitor method and a computer program product thereof for hardware are disclosed. The hardware comprises a central processing unit (CPU) and a storage module. The monitor device comprises a retrieval module and an analysis module. The retrieval module is configured to retrieve the entry point information of a process before the process is executed, wherein the process comprises at least one instruction from the hardware. The analysis module is configured to retrieve an address corresponding to the process according to the entry point information. When the CPU executes the at least one instruction, the storage module records the at least one instruction according to the address. | 2010-05-20 |
20100125910 | Systems and methods for media authentication - A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates, and does not necessarily require the retrying of data reads, nor does the process require the media to exhibit fatal errors, as in conventional approaches. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes. Theft, distribution, and piracy of digital content on optical media, such as computer software (also games, video, audio, e-book content), is often accomplished by copying it directly to another disc using commonly available copy tools and recordable optical media, or the replication of media to another mass manufactured disc. The present invention, which helps to irrefutably identify a unit of optical media as the original, and can correspondingly identify any copy made by any currently available means as such a copy, may prevent an unauthorized individual from making use of any unauthorized copies. This offers significant advantages to content creators who wish to protect their products. | 2010-05-20 |
20100125911 | Risk Scoring Based On Endpoint User Activities - Disclosed herein is a computer implemented method and system for ranking a user in an organization based on the user's information technology related activities and arriving at an end risk score used for determining the risk involved in activities performed by the user and for other purposes. Group risk ranking profiles and security policies for usage of the organization's resources are created. The user is associated with one or more group risk ranking profiles. A security client application tracks the user's activities. Points are assigned to the user's tracked activities based on each of the associated group risk ranking profiles. The assigned points are aggregated to generate a first risk score. The assigned points of the user's tracked activities are modified at different levels based on predefined rules. The modified points are aggregated to generate the end risk score which is used for compliance and governance purposes, optimizing resources, etc. | 2010-05-20 |
20100125912 | ESTIMATING AND VISUALIZING SECURITY RISK IN INFORMATION TECHNOLOGY SYSTEMS - Security risk for a single IT asset and/or a set of IT assets in a network such as an enterprise or corporate network may be estimated and represented in a visual form by categorizing risk into different discrete levels. The IT assets may include both computing devices and users. The risk categorization uses a security assessment of an IT asset that is generated to indicate the type of security problem encountered, the severity of the problem, and the fidelity of the assessment. The asset value of an IT asset to the enterprise is also assigned. Security risk is then categorized (and a numeric risk value provided) for each IT asset for different problem types by considering the IT asset value along with the severity and fidelity of the security assessment. The security risk for the enterprise is estimated using the numeric risk value and then displayed in visual form. | 2010-05-20 |
20100125913 | System and Method for Run-Time Attack Prevention - Preventing attacks on a computer at run-time. Content that is configured to access at least one function of a computer is received by the computer. Protections corresponding to the function are added to the content, wherein the protections override the function. The content and the protections are then transmitted to the computer. The function may expose a vulnerability of the computer, and arguments passed to the function may exploit that vulnerability. The protections are executed when the content is executed, and determine whether the arguments the content passed into the function represent a threat. In response to determining that the arguments represent a threat, execution of the content is terminated without executing the function. | 2010-05-20 |
20100125914 | PROTECTED INFORMATION STREAM ALLOCATION USING A VIRTUALIZED PLATFORM - A protected stream manager includes one or more subsystems to receive a content stream in a virtual environment, obfuscate the content stream, and prioritize use of a processor to process the content stream. | 2010-05-20 |
20100125915 | Secure Computer Architecture - A secure computer architecture is provided. With this architecture, data is received, in a component of an integrated circuit chip implementing the secure computer architecture, for transmission across a data communication link. The data is converted, by the component, to one or more first fixed length frames. The one or more first fixed length frames are then transmitted, by the component, on the data communication link in a continuous stream of frames. The continuous stream of frames includes one or more second fixed length frames generated when no data is available for inclusion in the frames of the continuous stream. | 2010-05-20 |
20100125916 | APPARATUS AND METHOD FOR CONTROLLING CONTENT - An apparatus and method for controlling content are provided. A memory which stores storage medium information regarding a storage medium, and a main control unit which groups a plurality of contents in the storage medium into a plurality of groups, allocates a group nonce to each group, stores the group nonce in the storage medium, and if a move of at least one content item of the plurality of content items is requested, controls the move of the content item based on whether the storage medium information contains an identifier or a group nonce of a first target group including the requested content item. | 2010-05-20 |
20100125917 | TRANSGENIC NON-HUMAN MAMMAL WITH AN ONCOGENIC MUTANT OF THE c-Raf-1 GENE - The invention relates to a transgenic non-human mammal whose cells express a constitutively active oncogenic mutant of the kinase-domain of the Raf-1 gene or a protein coded by a corresponding normal allele or derivative of the A, B, or c-Raf-1 gene. | 2010-05-20 |
20100125918 | ENTEROVIRUS TYPE 71 PROTEIN AND METHOD FOR PRODUCTION - The invention provides a new type of a capsid protein VP1 of human enterovirus 71, named as MEL701-VP1 and functional/structural variants thereof, which is used for protection against enterovirus. The transgenic animal producing the protein, the composition comprising the protein and the method for production thereof are also provided. | 2010-05-20 |
20100125919 | METHODS AND COMPOSITIONS FOR MODULATING THE MIRNA PATHWAY - A specific spectrum of plant and animal miRNAs confer enhanced resistance to virulent pathogens. Plants deficient in miRNA accumulation are hyper-susceptible to non-virulent bacterial pathogens, and virulent bacteria suppress miRNA pathways by means of injected type-III secreted (TTS) proteins. Methods and compositions for modulating the miRNA pathway in plants and animals are disclosed whereby adverse effects on plant and animal development are avoided or minimized. | 2010-05-20 |
20100125920 | ROSA HYBRIDA SHRUB NAMED 'AUSVIBRANT' - A variety of rose plant of the shrub class, named ‘AUSvibrant’ is disclosed. The ‘AUSvibrant’ rose is a plant suitable for repeat flowering production having large deeply cupped blooms having a color blend of deep magenta, pink and red, with an unusual fragrance which develops from Tea into Old Rose. | 2010-05-20 |
20100125921 | ROSA HYBRIDA SHRUB NAMED 'AUSBREEZE' - A variety of rose plant of the shrub class, named ‘AUSbreeze’ is disclosed. The ‘AUSbreeze’ rose is a plant suitable for repeat flowering production having blooms that are a very pure soft pink formed in a perfect rosette formation, and having a fresh, fruity fragrance with hints of raspberry and tea. In addition, the growth of the ‘AUSbreeze’ variety is vigorous, tall and elegant with flowers produced along the stem. | 2010-05-20 |
20100125922 | Mandarin Tree Named 'LB8-9' - A new Mandarin hybrid tree particularly distinguished by having dense foliage, “wilted-leaf” appearance, fruit that is attractive in appearance with excellent eating quality, and upright, vigorous plant habit, obloid tree shape and matures early in central Florida, is disclosed. | 2010-05-20 |