27th week of 2012 patent applcation highlights part 70 |
Patent application number | Title | Published |
20120174184 | Method and Apparatus for Enabling Enhanced Control of Traffic Propagation Through a Network Firewall - A distributed firewall system is used to implement a network firewall with enhanced control over network traffic to allow policy to be implemented on a per-user basis, a per-application basis, a per-user and application basis, and to allow ports to be dynamically opened and closed as needed by the applications. The distributed firewall system may include application identifiers associated with applications running on a network element, one or more firewall agents instantiated on the network element hosting the applications, and a firewall configured to interface with the firewall agents. Communications between the distributed components are secured to allow the firewall to detect if an agent has been compromised, and to allow the firewall agent to determine if the application has been compromised. The distributed firewall system may work in a VPN environment, such as in connection with a VPN server, to implement firewall policy at the point where VPN traffic enters the protected network. | 2012-07-05 |
20120174185 | GENERALIZED IDENTITY MEDIATION AND PROPAGATION - Provided are techniques for providing security in a computing system with identity mediation policies that are enterprise service bus (EBS) independent. A mediator component performs service-level operation such as message brokering, identity mediation, and transformation to enhance interoperability among service consumers and service providers. A mediator component may also delegate identity related operations to a token service of handler. Identity mediation may include such operations as identity determination, or “identification,” authentication, authorization, identity transformation and security audit. | 2012-07-05 |
20120174186 | Policy Based Capture with Replay to Virtual Machine - A suspicious activity capture system can comprise a tap configured to copy network data from a communication network, and a controller. The controller is coupled to the tap and is configured to receive the copy of the network data from the tap, analyze the copy of the network data to flag the network data as suspicious, and simulate transmission of the network data to a destination device. | 2012-07-05 |
20120174187 | SYSTEMS AND METHODS FOR PROVIDING PHYSICAL LAYER SECURITY - The present invention describes systems and methods for providing physical layer security. An exemplary embodiment of the present invention provides a method of providing physical layer security involving receiving message data at a pre-processing device in a wireless transmission device. Furthermore, the method of providing physical layer security involves pre-processing the message data into channel data with the pre-processing device and transmitting the channel data from the wireless transmission device over a wireless transmission link having a path loss. Subsequently, the method of providing physical layer security involves receiving the channel data at a post-processing module in a reception device. Additionally, the method involves post-processing the channel data into the message data with the post-processing module, such that an unauthorized reception device is unable to post-process the channel data when a path loss experienced over the transmission link is greater than a predetermined value. | 2012-07-05 |
20120174188 | REMOVABLE DEVICES - Methods and removable devices are provided. Some such removable devices may include a secure partition and a public partition. The secure partition is not accessible by an operating system of a host for some embodiments. The secure partition is configured to store information so that formatting/reformatting does not alter the stored information for other embodiments. | 2012-07-05 |
20120174189 | SYSTEM AND METHOD FOR MANAGING OTA PROVISIONING APPLICATIONS THROUGH USE OF PROFILES AND DATA PREPARATION - A method using a non-transitory processor for providing an application product including receiving an application profile, a key profile, a secure element (SE) profile, and a mobile terminal profile; establishing a link between the received profiles, in which the link is established for assembling the application product; and applying a limitation to the application product, in which the applied limitation determines whether the application product is accessible to a user. A method using a non-transitory processor for data preparation in a Trusted Service Manager (TSM) including receiving data from a service provider, in which the received data is in a Data Grouping Identifier (DGI) format or a raw data format; and processing the data using at least one of a logical data preparation and a physical data preparation. | 2012-07-05 |
20120174190 | System and Methods for Network Authentication - Exemplary systems and methods for network authentication are provided. Exemplary systems include an application program interface configured for receiving a request for an authentication code, a code generator in communication with the application program interface, the code generator configured to generate the authentication code, and the application program interface further configured to receive the generated authentication code and allow an application to communicate digital data with a web-based social network. Further systems include the generated authentication code being received from a network device without an Internet browser and the received generated authentication code allowing an application to communicate digital data with a web-based social network for an extended period of time. Exemplary methods include receiving a request for an authentication code, generating the authentication code, receiving the generated authentication code, and allowing an application to communicate digital data with a web-based social network. | 2012-07-05 |
20120174191 | METHOD FOR SECURE EXCHANGE OF CONTEXT DATA BETWEEN USERS AND DEVICES - A method for secure exchange of context data between users and devices is generally presented. In this regard, a method is introduced comprising receiving context data over a network link from a first device registered by a user, and selectively forwarding the context data without user input based on permissions previously established by the user. Other embodiments are also disclosed and claimed. | 2012-07-05 |
20120174192 | Displaying A Known Sender's Identifier To A Recipient Of A Joint Senders' Message - An approach is provided in which a request is received from a requestor to send a new email message to one or more recipients on behalf of a selected joint sender group (JSG). The selected JSG includes multiple JSG members with one of the JSG members being the requestor. Permissions corresponding to the JSG are then retrieved and compared to the requestor and the contents of the new email message are identified. The new email message is then sent to the recipients in response to determining, based on the comparison, that the requestor has permission to send the new email message on behalf of the selected JSG. On the other hand, the sending of the new email message is inhibited in response to determining that the requestor lacks permission to send the new email message on behalf of the selected JSG. | 2012-07-05 |
20120174193 | METHOD FOR READING ATTRIBUTES FROM AN ID TOKEN - The invention relates to a method for reading at least one attribute stored in an ID token ( | 2012-07-05 |
20120174194 | ROLE SETTING APPARATUS, AND ROLE SETTING METHOD - A role setting apparatus includes: an ACL classifying section configured to output an access rule category in which at least one permission and a plurality of user IDs are related to each other, wherein the permission is a combination of a resource ID used to identify a resource as an access object and an action defining permission or non-permission of an operation to the resource, and the plurality of user IDs identify a plurality of users that are access subjects; and an ID attribute storage section configured to store the plurality of user IDs and a plurality of attribute elements, which are related to each other; an role definition storage section configured to store the plurality of attribute elements and a plurality of role definition names, which are related to each other. A role mapping section is configured to acquire a common attribute. which is common to the plurality of user IDs, from the plurality of attribute elements stored in the ID attribute storage section based on the plurality of user IDs of the access rule category, acquire a first role definition name from the plurality of role definition names stored in the role definition storage section based on the common attribute, and relate the access rule category and the first role definition name. | 2012-07-05 |
20120174195 | FUNCTION MODULE DISPATCHER - Disclosed are methods and systems for function module dispatcher. The methods and systems involve generating a multi tenant enabled function module by adding a logical tenant access parameter to a function to be executed in a tenant system. The methods and systems further include receiving access data associated with a central tenant system and input parameters for executing the function module on one or more tenant systems, accessing a central tenant system based on the access data, retrieving tenant access data associated with the tenant system by matching a logical tenant access parameter data received in the input parameters to the multi tenant function call with the tenant access parameter data stored in a destination map and dispatching the call to execute the function module on a respective tenant based on the tenant access data retrieved from the destination map. | 2012-07-05 |
20120174196 | ACTIVE VALIDATION FOR DDOS AND SSL DDOS ATTACKS - Methods and systems for detecting and responding to Denial of Service (“DoS”) attacks comprise: detecting a DoS attack or potential DoS attack against a first server system comprising one or more servers; receiving, at a second server system comprising one or more servers, network traffic directed to the first server system; subjecting requesting clients to one or more challenge mechanisms, the challenge mechanisms including one or more of challenging requesting clients to follow through HTTP redirect responses, challenging requesting clients to request Secure Sockets Layer (SSL) session resumption, or challenging requesting clients to store and transmit HTTP cookies; identifying one or more non-suspect clients, the one or more suspect clients corresponding to requesting clients that successfully complete the one or more challenge mechanisms; identifying one or more suspect clients, the one or more suspect clients corresponding to requesting clients that do not successfully complete the one or more challenge mechanisms; and forwarding, by the second server system, traffic corresponding to the one or more non-suspect clients to the first server system. Once a client has been validated, clients may communicate directly with application servers in a secure manner by transparently passing through one or more intermediary proxy servers. | 2012-07-05 |
20120174197 | PUSH BUTTON CONFIGURATION OF MULTIMEDIA OVER COAX ALLIANCE (MOCA) DEVICES - A first device coupled to a multimedia over coax alliance (MoCA) network may receive, from a second device, an indication that a configuration button on the second device has been pushed. The first device may receive, from a third device, an indication that a configuration button on the third device has been pushed. The first device may allow the second device to be authenticated on the MoCA network if the configuration buttons of the second and third devices were both pushed within a determined amount of time. The first device may prevent the second device from being authenticated on the MoCA network if the configuration button of the second device and the configuration button of the third device were not pushed within a determined amount of time. The indication from the third device may comprise a layer 2 management entity (L2ME) message or a Protocol Information element. | 2012-07-05 |
20120174198 | Shared Registration Multi-Factor Authentication Tokens - A system and method for more efficiently establishing a chain of trust from a registrant to a registry. A registrant credential is associated with a Shared Registration command and is sent by a registrar to a registry. Upon successful validation, a token is generated and bound to a registrant identifier. The token is included along with the registrant identifier in subsequent discrete Shared Registration commands submitted to the registry on behalf of the registrant. The registrant thus needs to submit its credential only once for changes that require several discrete commands. Also, it is more efficient for the Shared Registration System to validate a token for a set of commands than to validate different registrant credential for each discrete command. | 2012-07-05 |
20120174199 | PAIRING OF BASE AND DETACHABLE DEVICE - An apparatus and method for pairing a base and a detachable device. A query module queries a detachable device in response to the detachable device connecting to a base. The detachable device provides a display for the base if the detachable device and base are connected. A determination module determines if the detachable device is paired with the base. A credential module obtains a pairing credential for a pairing in response to the determination module determining that the detachable device is unpaired with the base. | 2012-07-05 |
20120174200 | DIGITAL IDENTITY MANAGEMENT - One aspect relates to a process and associated device for managing digital ID lifecycles for application programs, and abstracting application programs for multiple types of credentials through a common Digital Identity Management System (DIMS) and Application Programming Interface (API) layer. | 2012-07-05 |
20120174201 | System and Method for Managing Feature Enablement in an Information Handling System - A system to manage a key license includes an information handling system having non-volatile memory accessible to a processor. The non-volatile memory stores feature enablement information related to a feature that the information handling system is adapted to provide. The non-volatile memory stores instructions that are accessible to the processor and executable by the processor to send the feature enablement information to an external system after the information handling system is deployed, and to request the feature enablement information, or other feature enablement information, from the external system in response to receiving a request for the information handling system to provide the feature. | 2012-07-05 |
20120174202 | METHODS AND SYSTEMS FOR PROVIDING DATA OBJECTS ON A TOKEN - A computer system, method and/or computer-readable medium provide independent data objects to a token in compressed form. The independent data objects are representative of security information associated with the token. The system includes an interface operable to communicate with a token, and a processor cooperatively operable with the interface. The processor is configured to determine a set of independent data objects that are associated with the token, and to aggregate the set of independent data objects associated with the token into a group. Also, the processor is configured for compressing the group into a unit of contiguous data, and writing the unit of contiguous data to the token via the interface. | 2012-07-05 |
20120174203 | IDENTIFYING A USER ACCOUNT IN A SOCIAL NETWORKING SYSTEM - Locating social networking system accounts for user of the social networking system permits the users to locate and access their accounts even if they cannot provide a user login ID or a login email address associated with their social networking system account. The social networking system locates a user account by receiving a user name associated with the user and a friend name of a friend connected to the user in the social networking system and identifying a user account wherein the identified user account has a user name matching the received user name and the identified user account is connected with another user in the social networking system who has a user name matching the received friend name. | 2012-07-05 |
20120174204 | MONETIZED ONLINE CONTENT SYSTEMS AND METHODS AND COMPUTER-READABLE MEDIA FOR PROCESSING REQUESTS FOR THE SAME - One aspect of the invention provides a computer system having processing and memory means operable to provide a monetized online content system. The computer system is coupled to one or more resource modules each having data in the memory means and includes: an interceptor module configured to receive a request from a client for one or more resources available from one or more resource modules, refer the request to one or more of the resource modules configured to fulfill the request, receive one or more responses from one or more of the resource modules, at least one of said one or more responses having one or more events associated therewith, and transform the one or more responses by removing the one or more events associated with the one or more responses prior to presentation of the one or more responses to the client. | 2012-07-05 |
20120174205 | USER PROFILE AND USAGE PATTERN BASED USER IDENTIFICATION PREDICTION - Embodiments of the present invention provide method, system and computer program product for user profile and usage pattern based user ID prediction. In accordance with an embodiment of the invention, a user can request a user ID to access a portion of a computing system. One or more characteristics of the user, such as a role or location can be determined and correlated to one or more different additional user ID options. In this regard, the additional user ID options can be a suggested alternative user ID for use by the user commensurate with the role or location of the user, or with past patterns of other users considered similar to the user based upon the characteristics of the user. In this way, the predictive nature of the foregoing methodology can assist the user in requesting a most appropriate user ID based upon the characteristics of the user and also in requesting a user ID which may be required in the future by the user based upon predictive patterns of system usage of other like users so as to save time and improve work efficiency. | 2012-07-05 |
20120174206 | SECURE COMPUTING ENVIRONMENT - Techniques and apparatus are provided for a secure computing environment. In particular, in some embodiments a secure computing environment is provide by requesting, by a processor, booting of a virtual machine on a first computing device. A hash value of the virtual machine is verified and it is determined whether an external storage device is present. The result of the verification is written to an environment variable. Additionally, it is determined if the external storage device is paired with the first computing device and the result of the determination is written to an environment variable. The virtual machine is then booted by the first computing device. | 2012-07-05 |
20120174207 | DISTRIBUTED SINGLE SIGN ON TECHNOLOGIES INCLUDING PRIVACY PROTECTION AND PROACTIVE UPDATING - Technologies for distributed single sign-on operable to provide user access to a plurality of services via authentication to a single entity. The distributed single sion-on technologies provide a set of authentication servers and methods for privacy protection based on splitting secret keys and user profiles into secure shares and periodically updating shares among the authentication servers without affecting the underlying secrets. The correctness of the received partial token or partial profiles can be verified with non-interactive zero-knowledge proofs. | 2012-07-05 |
20120174208 | Device API for Securely Monitoring and Managing Mobile Broadband Devices - There is provided a device application programming interface (API) for securely monitoring and managing mobile broadband devices. There is provided a client device with a processor configured to detect, using an API, the WWAN device, wherein the WWAN device conforms to the API, to perform a mutual authentication with the WWAN device by using a digital certificate of the WWAN device and a client digital certificate of the client device, to establish a secure connection with the WWAN device upon a successful authentication of the mutual authentication with the WWAN device. Moreover, the processor may be configured to issue, using the API, various commands to the WWAN device to monitor and manage the WWAN device. | 2012-07-05 |
20120174209 | Method and Device for Detecting Validation of Access Control List - A method for detecting validation of an Access Control List (ACL) is disclosed in the present invention, when an action part of an ACL rule is performed each time, a counter attached to the currently performed ACL rule is started in accordance with an attachment mode, wherein the counter counts in accordance with a preset counting mode; whether the ACL rule takes effect or not is judged according to whether there is a count value or not by reading the count value stored in the counter. An apparatus for detecting validation of an ACL is also disclosed in the present invention. The apparatus can implement neither increasing the network load nor impacting the safety of a Central Processing Unit (CPU) in a device while judging whether an ACL rule takes effect or not. | 2012-07-05 |
20120174210 | Trusted Communications With Child Processes - A method to identify a child process to a parent process in an operating system includes obtaining a token and login identifier from the operating system. The parent process creates a remote procedure call communications endpoint to communicate with the child process. Thereafter, a child process is spawned by the parent process. A child-initiated request to communicate with the parent process is then received by the parent process. In order to verify the identity of the child-initiated request, the parent process impersonates the child process and receives as identifier that identifies the requestor child process. The requestor process identifier and the spawned child identifier are compared. Based on the comparison, the parent process responds to the child-initiated request. In another embodiment, process identifiers are used by the parent process to verify the identity of a child process the requests communication with the parent process. | 2012-07-05 |
20120174211 | INFORMATION PROCESSING DEVICE - An information processing device includes a processing unit which performs user authentication. The processing unit includes a setting part that determines setting of operation of a target device using the user authentication. An authentication information setting part determines user authentication information. A password generation part generates a one-time password partially or fully. A transmission part transmits the setting of operation of the target device and the one-time password to the target device. | 2012-07-05 |
20120174212 | CONNECTED ACCOUNT PROVIDER FOR MULTIPLE PERSONAL COMPUTERS - A connected account provider system allows a user of multiple electronic devices to set up a user account on one device with the device's settings saved in the cloud for application across different devices. A user can obtain secure access to the saved settings using a second (or subsequent) device and can select settings from the initial device to be synchronized to the second device. The system employs client account provider (CAP) software that can be obtained from an independent software provider and is installed on different devices of a user. The CAP client software creates an architecture on a user's device with a CAP client software layer conceptually separate from the device's operating system software. The CAP client software provides extension points for facilitating connection between connected user devices' operating systems and a cloud services layer typically provided by the CAP client software vendor. | 2012-07-05 |
20120174213 | USER IDENTIFICATION WITH BIOKINEMATIC INPUT - Systems and methods for user identification based on biokinematic input are disclosed herein. The system may include a multi-touch sensitive display including a sensor configured to receive biokinematic input including data representing detected positions of digit touches made by digits of a user, in each of a series of successive time intervals during a defined identification gesture. The system may further include a user identification module executed by a processor of the computing device. The user identification module may be configured to receive the biokinematic input from the sensor, and to compare relative positions of the digit touches and/or relative rates of change in said positions of the digit touches to a stored user template of verified biokinematic data for the user. If a match is determined, an indication that the user has been successfully identified may be displayed. | 2012-07-05 |
20120174214 | ENHANCING BIOMETRIC SECURITY OF A SYSTEM - In one embodiment, a method includes receiving an ordered sequence of biometric inputs from a user via a biometric sensor, determining if each of the ordered sequence matches a corresponding entry stored in a table that includes a stored ordered sequence of biometric inputs corresponding to a password pattern of the user, and if so, enabling the user to access the processing system, otherwise preventing the user from accessing the processing system. Other embodiments are described and claimed. | 2012-07-05 |
20120174215 | CLIENT-SIDE CAPTCHA CEREMONY FOR USER VERIFICATION - A facility for performing a local human verification ceremony to obtain user verification is provided. Upon determining that user verification is needed to perform an action on a computer system, the facility presents a CAPTCHA challenge requesting verification that the user wants the action performed on the computer system. Upon receiving a response, the facility compares the received response to an expected correct response. If the received response is the correct response, the facility authorizes the action to be performed. | 2012-07-05 |
20120174216 | SECURITY PROTOCOL PROCESSING FOR ANTI-REPLAY PROTECTION - Described embodiments provide a network processor that includes a security protocol processor to prevent replay attacks on the network processor. A memory stores security associations for anti-replay operations. A pre-fetch module retrieves an anti-replay window corresponding to a data stream of the network processor. The anti-replay window has a range of sequence numbers. When the network processor receives a data packet, the security hardware accelerator determines a value of the received sequence number with respect to minimum and maximum values of a sequence number range of the anti-replay window. Depending on the value, the data packet is either received or accepted. The anti-replay window might be updated to reflect the receipt of the most recent data packet. | 2012-07-05 |
20120174217 | NETWORK SECURITY MANAGEMENT - A method may include receiving session control messages and counting the session control messages of a same type having a same transaction identifier (ID). The method may further include blocking the session control messages of the same type having the same transaction ID when the count exceeds a threshold number. The method may further include determining whether the blocked session control messages are associated with an anomalous event and, when the blocked session control messages are not associated with the anomalous event, increasing the threshold number. | 2012-07-05 |
20120174218 | Network Communication System With Improved Security - A computer network communication method and system wherein software rendering software is interposed in the data communication path between a browser running on a user computer and the internet data sources (for example, internet-accessible server computers) that the user browser wants to receive information from. The software rendering application gets data from internet data sources, but this data may contain malware. To provide enhanced security, the software rendering application renders this data to form a new browser readable code set (for example, an xml page with CSS layers), and this new and safe browser readable code set is sent along to the browser on the user computer for appropriate presentation to the user. As part of the rendering process, dedicated and distinct virtual machines may be used to render certain portion of the data, such as executable code. These virtual machines may be watched, and quickly destroyed if it is detected that they have encountered some type of malware. | 2012-07-05 |
20120174219 | IDENTIFYING MOBILE DEVICE REPUTATIONS - Methods and systems for operation upon one or more data processors for assigning a reputation to a messaging entity by analyzing the attributes of the entity, correlating the attributes with known attributes to define relationships between entities sharing attributes, and attributing a portion of the reputation of one related entity to the reputation of the other related entity. | 2012-07-05 |
20120174220 | DETECTING AND MITIGATING DENIAL OF SERVICE ATTACKS - Embodiments of this invention provide methods for detecting a denial of service attack (DoS) and isolating traffic that relates to the attack. The method may begin by collecting network traffic data by observing individual packets carried over the network. The data may then be compiled into a time series comprising network traffic data relating successive time-intervals. A difference value based upon the entry in the time series for a large time-window and for a small time-window. A deviation score may then be determined by calculating the ratio of the difference values. The deviation score may indicate whether an attack occurred. In an embodiment of the invention, an attack is deemed to occur if the deviation score is between 0.6 and 1.4. | 2012-07-05 |
20120174221 | Apparatus and method for blocking zombie behavior process - Provided are an apparatus and method for blocking a zombie behavior process. The apparatus includes a security policy storage configured to store zombie-behavior-type-specific traffic characteristics and security policies, a traffic monitor configured to monitor traffic generated on the computer and detect abnormal traffic exceeding a predetermined reference value, a process and traffic analyzer configured to find an abnormal process causing the abnormal traffic and detect a zombie behavior type associated with the abnormal process by analyzing the abnormal traffic on the basis of the zombie-behavior-type-specific traffic characteristics stored in the security policy storage, and a process handler configured to handle the process whose zombie behavior type has been detected according to a security policy defined for the detected zombie behavior type. Also, the apparatus according to another aspect includes a system process monitor and handler configured to detect whether or not a file associated with a system process is modified and block the system process. | 2012-07-05 |
20120174222 | METHOD FOR THE SAFETY OF NETWORK TERMINAL DEVICES - The present invention provides a method for the safety of network terminal devices that utilizes the basic operations in network terminal devices (NTDs) and a network security center (NSC), as well as the analyzing and processing ability provided by the NSC to solve network security issues based on hierarchical network security structure of client request-server response. In the NSC, the solution is broken into a plurality of basic operations with their respective corresponding parameters. Each basic operation is encoded according to an operation code table (OCT) and encapsulated in a network security suspicion information packet (NSSIP). The NSC sends the NSSIP to the NTD. The NTD receives and splits the network security solution packet (NSSP) to get the plurality of operation codes and their respective corresponding parameters. The NTD retrieves a plurality of call interfaces from the OCT according to the plurality of operation codes. The plurality of call interfaces and their respective corresponding parameters is combined together to form a completely local solution to replace traditional patch and anti-virus module. Using this invention, the requirements on hardware are released so to fit well for various small-sized NTDs. | 2012-07-05 |
20120174223 | SYSTEMS AND METHODS FOR DETECTION OF SESSION TAMPERING AND FRAUD PREVENTION - The invention provides methods and apparatus for detecting when an online session is compromised. A plurality of device fingerprints may be collected from a user computer that is associated with a designated Session ID. A server may include pages that are delivered to a user for viewing in a browser at which time device fingerprints and Session ID information are collected. By collecting device fingerprints and session information at several locations among the pages delivered by the server throughout an online session, and not only one time or at log-in, a comparison between the fingerprints in association with a Session ID can identify the likelihood of session tampering and man-in-the middle attacks. | 2012-07-05 |
20120174224 | Systems and Methods for Malware Detection and Scanning - Systems and methods are provided for malware scanning and detection in a computing system. In one exemplary embodiment, the method includes launching, in a computing device of the computing system, a virtual machine, and launching, in the virtual machine of the computing device, an internet browser. The method also includes requesting, by the internet browser, data from a web page, and performing, using one or more analysis tools, analysis on the web page. In the method, performing analysis on the web page includes performing monitoring and recording of system application programming interface (API) calls, and creating software objects associated with the web page. The method also includes performing antivirus scanning of the software objects, de-obfuscating JavaScript associated with the software objects, and correlating data associated with the performed analysis to determine if the web page is a malicious web page. | 2012-07-05 |
20120174225 | Systems and Methods for Malware Detection and Scanning - Systems and methods are provided for malware scanning and detection. In one exemplary embodiment, the method includes a hub computing device that receives, from a controller computing device, a scan request, and identifies spoke computing devices for performing the scan request. The method performed by the hub computing device also includes sending to the identified spoke computing devices, the scan request, receiving, from the spoke computing devices, results associated with the scan request, and sending, to the controller computing device, the results associated with the scan request. | 2012-07-05 |
20120174226 | System and Methods for Launching Antivirus Application Tasks during Computer Downtime - Disclosed are systems, methods and computer program products that enable deployment of an antivirus application on a computer system in a manner that reduce interference of the antivirus application with activities of system users. In particular, the computers system is provided with a plurality of detection devices that may be used to detect when the computers system is being used by the user or when it is in downtime mode. The detection devices may include data input device, such as a mouse or keyboard, temperature sensors, pressure sensors, digital camera, sound wave source and sound wave receiver or other detection devices. The computer system also includes a software agent associated with an antivirus application. The software agent collects and analyses data from the detection devices, determines when the computer system is in a downtime mode, and then launches various antivirus application tasks. | 2012-07-05 |
20120174227 | System and Method for Detecting Unknown Malware - The present disclosure relates generally to the field of computer security and, in particular, to systems for detecting unknown malware. A method comprises generating genes for known malicious and dean objects; analyzing object genes using different malware analysis methods; computing a level of successful detection of malicious objects by one or a combination of malware analysis methods based on analysis of genes of the known malicious objects; computing a level of false positive detections of malicious objects by one or a combination of malware analysis methods based on analysis of genes of known clean objects; measuring effectiveness of each one or the combination of malware analysis methods as a function of the level of successful detections and the level of fake positive detections; and selecting one or a combination of the most effective malware analysis methods for analyzing unknown object for malware. | 2012-07-05 |
20120174228 | METHODS AND SYSTEMS FOR INTEGRATING RECONNAISSANCE WITH SECURITY ASSESSMENTS FOR COMPUTING NETWORKS - A reconnaissance and assessment (RA) tool can receive base information about the network, such as basic network information and details about an entity and personnel associated with network. The RA tool can utilize the base information to perform reconnaissance procedures on the network to identify the attack surface of the network. The RA tool can perform reconnaissance on the network, itself, and on other external sources, such as third party databases, search engines, and partner networks. Once the attack surface is identified, the RA tool can automatically perform appropriate security assessments on the attack surface. Additionally, if additional information is determined about the network during the security assessments, the RA tool can perform additional reconnaissance and security assessments based on the additional information. | 2012-07-05 |
20120174229 | Runtime Enforcement Of Security Checks - A method is disclosed that includes tracking untrusted inputs through an executing program into a sink, the tracking including maintaining context of the sink as strings based on the untrusted inputs flow into the sink. The method also includes, while tracking, in response to a string based on an untrusted input being about to flow into the sink and a determination the string could lead to an attack if the string flows into a current context of the sink, endorsing the string using an endorser selected based at least on the current context of the sink, and providing the endorsed string to the sink. Computer program products and apparatus are also disclosed. | 2012-07-05 |
20120174230 | System and Method for Management of Vulnerability Assessment - A system and method for an optimization of fulfillment workflow is disclosed. In accordance with embodiments of the present disclosure, a method may include: (i) receiving application data; (ii) determining that an application in scope for vulnerability assessment based at least in part on the application data; (iii) receiving assessment information from an assessor related to an assessment of the application, the assessment indentifying at least one vulnerability; (iv) communicating the information regarding the assessment to a remediator; (v) receiving one or more remediation tasks associated with the assessment, the one or more remediation tasks designed to remedy the at least one vulnerability; (vi) receiving an indication of performance of a remediation task of the one or more remediation tasks; (vii) communicating an indication that a remediation task has been completed based at least in part on the indication of performance of the remediation task; and (viii) receiving an indication of whether the remediation task remedied the at least one vulnerability. | 2012-07-05 |
20120174231 | Assessing System Performance Impact of Security Attacks - A method for assessing an impact of a security attack on a system includes defining a system affecting metric for an observation period as a fraction of time the system satisfies a defined specification, defining a resource failure based model and a resource usage based model for the system, obtaining results for each of a plurality of states of the resource failure based model and the resource usage based model, solving the resource failure based model and the resource usage based model and obtaining a term fraction of time each model spends on each of the plurality of states, obtaining a state probability according to the term fraction, and obtaining a measure of the system affecting metric according to the state probability. | 2012-07-05 |
20120174232 | MECHANISM FOR EMBEDDING DEVICE IDENTIFICATION INFORMATION INTO GRAPHICAL USER INTERFACE OBJECTS - A mechanism for protecting software and computing devices from unintentional pre-release disclosure (“leak”) is provided that includes applying a security enhancement to an object on the graphical user interface of the computing device such that the object can be used to visually determine the origin of the leak without obstructing the user's experience or being easily detected or defeated. | 2012-07-05 |
20120174233 | SECURITY METHODS AND SYSTEMS - A system/method for preventing a computer virus from accessing message addresses is described. The system comprises an interception component or client plug-in that communicates with a messaging client and a messaging server. The interception component alters messages from the server and destined for the client. The interception component replaces message addresses in incoming messages with a unique identifier. The interception component also alters messages from the client destined for the server. The interception component replaces a unique identifier with a message addresses. A system/method for preventing keyboard sniffer programs from intercepting input, a system for preventing a computer virus from activating a send confirmation of a messaging client and a method for altering displayed objects to show encrypted data in decrypted form are also described and claimed. A system/method for reducing the impact of keyboard sniffer programs by altering keyboard input. | 2012-07-05 |
20120174234 | COUNTERMEASURE METHOD AND DEVICE FOR PORTECTING DATA CIRCULATING IN AN ELECTRONIC COMPONENT - The disclosure relates to a countermeasure method in an electronic component, wherein binary data are transmitted between binary data storage units, binary data being transmitted in several transmission cycles comprising a first cycle comprising: randomly selecting bits of the data, transmitting the selected bits and transmitting bits, each having a randomly chosen value, instead of transmitting non-selected bits of the data. A last transmission cycle comprises transmitting bits of the data that have not been transmitted during a previous cycle. | 2012-07-05 |
20120174235 | DETECTING A PHISHING ENTITY IN A VIRTUAL UNIVERSE - An invention for detecting a phishing virtual entity in a virtual universe is disclosed. A virtual entity may be registered as authentic and be identified with multiple physical characteristics thereof. Another virtual entity will be monitored to detect whether it includes a physical characteristic that is sufficiently similar to that of a registered virtual entity to cause confusion. A phishing virtual entity is detected based on the monitoring and phishing prevention processes may be implemented on the phishing virtual entity. | 2012-07-05 |
20120174236 | Online Privacy Management - A privacy management system (PMS) is disclosed for a Chief Privacy Officer (CPO) or other user to use in monitoring and/or controlling in realtime the flow of data (e.g., outflow) about the user and his/her online experience. The PMS may provide a dashboard displaying a whitelist and/or blacklist indicating what destinations/sources are blocked or allowed. The PMS includes browser-client scripting code and may also include a PMS-certified verification icon for display on webpages being monitored/controlled in realtime by the PMS. | 2012-07-05 |
20120174237 | LOCATION AWARE SELF-LOCKING SYSTEM AND METHOD FOR A MOBILE DEVICE - A mobile device includes a protected mode in which the device automatically locks itself after a period of inactivity. In the protected mode, the device can determine whether it is in a trusted location. If the device is not in a trusted location, the device continues in the protected mode. If the device is within a trusted location, the device can alter the protected mode, such as by disabling the protected mode. Alternatively, a parameter associated with the protected mode can be changed. For instance, the period of inactivity before the device automatically self locks can be increased. The trusted location can be defined by a specific network, specific wireless access point, specific geographic coordinates or an express user indication. Such a device can avoid the frustration of repeatedly locking and unlocking the device if the user is located in an environment in which privacy and security concerns are minimized. | 2012-07-05 |
20120174238 | METHOD AND SYSTEM FOR COORDINATING CLIENT AND HOST SECURITY MODULES - A system and methods for coordinating the operation of a client security module and a host security module on a mobile electronic device. The modules communicate with each other through a platform abstraction layer using application programming interfaces to coordinate their activities. In particular, the client security module instructs the host security module when to lock and unlock the device, and the host security module alerts the client security module to attempts by the user to lock or unlock the device. | 2012-07-05 |
20120174239 | Novel PRO1199 gene disruptions, and methods relating thereto - The present invention relates to transgenic animals, as well as compositions and methods relating to the characterization of gene function. Specifically, the present invention provides transgenic mice comprising disruptions in PRO224, PRO9783, PRO1108, PRO34000, PRO240, PRO943, hu A33, PRO230, PRO178, PRO1199, PRO4333, PRO1336, PRO19598, PRO1083, hu TRPM2 or PRO1801 genes. | 2012-07-05 |
20120174240 | ROLE OF PROTEOGLYCANS IN DRUG DEPENDENCE - The invention provides methods of preventing or treating drug addiction, or ameliorating the craving for an addictive drug, as well as compounds, peptides, and pharmaceutical compositions that may be used to prevent or treat drug addiction or ameliorate the craving for an addictive drug. The invention also provides methods for identifying agents that may be used to prevent or treat drug addiction, or ameliorate the craving for an addictive drug. | 2012-07-05 |
20120174241 | Mouse model for diagnosis of T cell acute lymphoblastic leukemia and for screening of therapeutic agents, and methods of use therefor - The invention provides mutant or transgenic animals and cells derived from the mutant or transgenic animals, and particularly a transgenic mouse, that is useful, among other things, for the study, prognosis and diagnosis of hematological malignancies, including T-cell acute lymphoblastic leukemia (T-ALL). Methods are provided for using the mouse model or mutant animal cells to assist in the discovery and identification of genes that may promote lymphomagenesis, to prognose and diagnose disease, and to screen for potential therapeutic agents or drugs. | 2012-07-05 |
20120174242 | OPLOPHORUS-DERIVED LUCIFERASES, NOVEL COELENTERAZINE SUBSTRATES, AND METHODS OF USE - An isolated polynucleotide encoding a modified luciferase polypeptide and substrates. The OgLuc variant polypeptide has at least 60% amino acid sequence identity to SEQ ID NO: 1 and at least one amino acid substitution at a position corresponding to an amino acid in SEQ ID NO: 1. The OgLuc variant polypeptide has at least one of enhanced luminescence, enhanced signal stability, and enhanced protein stability relative to the corresponding polypeptide of the wild-type | 2012-07-05 |
20120174243 | SOGA Polynucleotides and Polypeptides and Uses Thereof - The present invention relates to the identification of polynucleotides and polypeptides involved in insulin and adiponectin signaling and regulation of glucose production. The invention further relates to the use of the identified polynucleotides and polypeptides, and inhibitors of the polynucleotides and polypeptides, in the regulation of glucose production and the monitoring and treatment of metabolic disorders such as diabetes. | 2012-07-05 |
20120174244 | PROFILING FRAGMENTS OF ELASTIC FIBERS AND MICROFIBRILS AS BIOMARKERS FOR DISEASE - The present invention makes use of immunoassays, such as sandwich ELISAs, to profile the circulating concentration of elastic fiber and microfibril fragments in samples from individuals with diseases associated with elastic fiber and/or microfibril degradation. Examples of such diseases include, Marfan's syndrome, aortic aneurysm, and scleroderma. Profiling the concentration of such fragments can be used to diagnose disease and monitor disease progression. | 2012-07-05 |
20120174245 | TRANSPOSITION OF MAIZE AC/DS ELEMENTS IN VERTEBRATES - The present invention is directed to the use of the maize Ac/Ds transposable elements in vertebrates. | 2012-07-05 |
20120174246 | METHODS OF IDENTIFYING APHID RESISTANT SOYBEANS - This invention relates to methods of identifying and/or selecting soybean plants or germplasm that display improved antibiosis and/or antixenosis resistance to one or more biotypes of soybean aphid. In certain examples, the method comprises detecting at least one Rag haplotype that is associated with improved soybean aphid resistance. In other examples, the method further comprises detecting a marker profile comprising two or more Rag haplotypes. | 2012-07-05 |
20120174247 | TOMATO HYBRID PS02450650 AND PARENT LINES THEREOF - The invention provides seed and plants of tomato hybrid PS02450650 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid PS02450650 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2012-07-05 |
20120174248 | TOMATO HYBRID PS02326502 - The invention provides seed and plants of tomato hybrid PS02326502 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid PS02326502 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2012-07-05 |
20120174249 | SEEDLESS WATERMELON HAVING SMALL FRUIT - The present invention is a novel method which results in the production of small seedless watermelon fruit having an average fruit weight of less than 12.0 pounds. The novel method involves using small tetraploid parental lines to produce small triploid hybrid seed. | 2012-07-05 |
20120174250 | CANOLA CULTIVAR CL31613 - The present invention relates to a new and distinctive canola cultivar, designated CL31613. Also included are seeds of canola cultivar CL31613, to the plants, or plant parts, of canola CL31613 and to methods for producing a canola plant produced by crossing the canola CL31613 with itself or another canola cultivar, and the creation of variants by mutagenesis or transformation of canola CL31613. | 2012-07-05 |
20120174251 | CANOLA CULTIVAR DN040244A - The present invention relates to a new and distinctive canola cultivar, designated DN040244A. Also included are seeds of canola cultivar DN040244A, to the plants, or plant parts, of canola DN040244A and to methods for producing a canola plant produced by crossing the canola DN040244A with itself or another canola cultivar, and the creation of variants by mutagenesis or transformation of canola DN040244A. | 2012-07-05 |
20120174252 | CANOLA CULTIVAR DN040845A - The present invention relates to a new and distinctive canola cultivar, designated DN040845A. Also included are seeds of canola cultivar DN040845A, to the plants, or plant parts, of canola DN040845A and to methods for producing a canola plant produced by crossing the canola DN040845A with itself or another canola cultivar, and the creation of variants by mutagenesis or transformation of canola DN040845A. | 2012-07-05 |
20120174253 | GENERATION OF HIGH POLYHYDROXYBUTRATE PRODUCING OILSEEDS - Transgenic oilseed plants, plant material, plant cells, and genetic constructs for synthesis of polyhydroxyalkanoates (“PHA”) are provided. In a preferred embodiment, the transgenic oilseed plants synthesize (poly)3-hydroxybutyrate (“PHB”) in the seed. Genes utilized include phaA, phaB, phaC, all of which are known in the art. The genes can be introduced in the plant, plant tissue, or plant cell using conventional plant molecular biology techniques. | 2012-07-05 |
20120174254 | Maize genomic marker set - Maize markers useful for genotyping and association studies, e.g. association with oil content QTLs in populations derived from the Illinois High Oil and Illinois Low Oil maize lines. Primers and hybridization probes for Taqman™ assays are provided for 488 SNP markers in 484 loci. | 2012-07-05 |
20120174255 | Gene and Variations Associate with BM1 Phenotype, Molecular Markers, and their Use - This disclosure concerns specific naturally-occurring mutant maize cad2 genes, which altered genes contribute to the bm1 maize phenotype in particular maize lines. In some embodiments, compositions and methods are provided that utilize a nucleic acid molecule comprising a mutant cad2 gene, and/or markers linked to a mutant cad2gene. | 2012-07-05 |
20120174256 | RECOMBINANT DNA MOLECULE ENCODING 5' UTR CAPABLE OF PREVENTING INHIBITION OF TRANSLATION UNDER ENVIRONMENTAL STRESSES - An object of the present invention is to identify sequence features of the 5′ UTR, which are involved in changes in the translational state of plants under environmental stresses, and to provide a recombinant DNA molecule, an expression vector, a transformant, and the like, having the above sequence features. The present invention provides a recombinant DNA molecule encoding mRNA containing the 5′ UTR (a) or (b) defined below, a vector obtained by ligating the recombinant DNA molecule to a site immediately downstream of the transcription initiation point of a promoter, and a transformant comprising the vector: | 2012-07-05 |
20120174257 | USE OF GENE INVOLVED IN ACCUMULATION OF CADMIUM IN PLANTS - Identifying a gene responsible for the accumulation of cadmium in plants, the present invention provides a method for using such a gene. A polynucleotide encoding a polypeptide consisting of the amino acid sequence of SEQ ID NO: 1, a polynucleotide encoding a polypeptide in which one or several amino acids are substituted, deleted, and/or added in the amino acid sequence of SEQ ID NO: 1 and which has activity to change the localization of cadmium accumulation, a polynucleotide encoding a polypeptide consisting of the amino acid sequence of SEQ ID NO: 2, or a polynucleotide encoding a polypeptide in which one or several amino acids are substituted, deleted, and/or added in the amino acid sequence of SEQ ID NO: 2 and which has activity to change the localization of cadmium accumulation is introduced into a plant such that the polynucleotide is able to be expressed. | 2012-07-05 |
20120174258 | NUCLEIC ACID MOLECULES THAT CONFER RESISTANCE TO COLEOPTERAN PESTS - This disclosure concerns nucleic acid molecules and methods of use thereof for control of coleopteran pests through RNA interference-mediated inhibition of target coding and transcribed non-coding sequences in coleopteran pests. The disclosure also concerns methods for making transgenic plants that express nucleic acid molecules useful for the control of coleopteran pests, and the plant cells and plants obtained thereby. | 2012-07-05 |
20120174259 | NUCLEIC ACID MOLECULES THAT TARGET THE VACUOLAR ATPASE C SUBUNIT AND CONFER RESISTANCE TO COLEOPTERAN PESTS - This disclosure concerns nucleic acid molecules and methods of use thereof for control of coleopteran pests through RNA interference-mediated inhibition of target coding and transcribed non-coding sequences in coleopteran pests. The disclosure also concerns methods for making transgenic plants that express nucleic acid molecules useful for the control of coleopteran pests, and the plant cells and plants obtained thereby. | 2012-07-05 |
20120174260 | NUCLEIC ACID MOLECULES THAT TARGET THE RHO1 SMALL GTP-BINDING PROTEIN AND CONFER RESISTANCE TO COLEOPTERAN PESTS - This disclosure concerns nucleic acid molecules and methods of use thereof for control of coleopteran pests through RNA interference-mediated inhibition of target coding and transcribed non-coding sequences in coleopteran pests. The disclosure also concerns methods for making transgenic plants that express nucleic acid molecules useful for the control of coleopteran pests, and the plant cells and plants obtained thereby. | 2012-07-05 |
20120174261 | PLANT SEEDS WITH ALTERRED STORAGE COMPOUND LEVELS, RELATED CONSTRUCTS AND METHODS INVOLVING GENES ENCODING CYTOSOLIC PYROPHOSPHATASE - This invention is in the field of plant molecular biology. More specifically, this invention pertains to isolated nucleic acid fragments encoding cytosolic pyrophosphatase proteins in plants and seeds and the use of such fragments to modulate expression of a gene encoding cytosolic pyrophosphatase activity in a transformed host cell. | 2012-07-05 |
20120174262 | METHODS AND COMPOSITIONS FOR A SOYBEAN IN-PLANTA TRANSIENT EXPRESSION SYSTEM - This invention provides methods of transiently expressing a nucleotide sequence in one or more cells of a soybean plant, comprising: a) abrading the surface of a soybean plant and/or intact part thereof; and either (b1) immersing the abraded plant and/or abraded intact part thereof in a solution comprising | 2012-07-05 |
20120174263 | PRODUCTION OF VIRAL CAPSIDS - The invention provides methods of producing “empty” RNA virus capsids (e.g. from Cowpea mosaic virus) by assembly of viral small (S) and large (L) coat proteins in such a way that encapsidation of native viral RNA is avoided. Aspects of the invention employ in planta expression of capsid components from DNA vectors encoding the S and L proteins or S-L polyproteins including them. Such capsids have utility for the encapsidation or presentation of foreign proteins or desired payloads. | 2012-07-05 |
20120174264 | Uses of Yerba Santa - Methods of in vitro propagation of plants of the genus | 2012-07-05 |
20120174265 | BROCCOLI PLANTS TOLERANT TO HOLLOW/SPLIT STEM DISORDER - The invention provides broccoli seed and plants that combine high yield and quality with tolerance to hollow/split stem disorder. The invention further provides seed and plants of the broccoli lines designated BRM53-3915 and BRM53-3916 and progeny produced with at least one of these plants as a parent. The invention also relates to the plants, seeds and tissue cultures of hybrid broccoli variety RX05951180. | 2012-07-05 |
20120174266 | NOVEL CANOLA CULTIVARS HAVING HIGH YIELD AND STABILIZED FATTY ACID PROFILES - According to the invention, there are provided novel canola cultivars, seeds of canola cultivars, to the plants, or plant parts, of novel canola cultivars and to methods for producing a canola plants produced by crossing the novel canola cultivars with themselves or another canola cultivar, and the creation of variants by mutagenesis or transformation of the canola cultivars. The novel canola cultivar(s) include canola plants having a desired trait that includes an oleic acid value of about 70% and a yield greater than about 2100 kg/ha, and oils canola seeds having an oleic acid content of greater than about 70% and an α-linolenic acid value of less than about 3%. | 2012-07-05 |
20120174267 | CORN EVENT 5307 - A novel transgenic corn event designated 5307, is disclosed. The invention relates to DNA sequences of the recombinant constructs inserted into the corn genome and of genomic sequences flanking the insertion site that resulted in the 5307 event. The invention further relates to assays for detecting the presence of the DNA sequences of event 5307, to corn plants and corn seeds comprising the genotype of and to methods for producing a corn plant by crossing a corn plant comprising the event 5307 genotype with itself or another corn variety. | 2012-07-05 |
20120174268 | ASSEMBLY OF MICROCANTILEVER-BASED SENSORS WITH ENHANCED DEFLECTIONS - An assembly of microcantilever-based sensors with enhanced deflections. A deflection profile of an ε-assembly can be compared with that of a rectangular microcantilever and a modified triangular microcantilever. Various force-loading conditions can also be considered. A theorem of linear elasticity for thin beams is utilized to obtain the deflections. The obtained defections can be validated against an accurate numerical solution utilizing a finite element method with a maximum deviation of less than 10 percent. The ε-assembly produces larger deflections than the rectangular microcantilever under the same base surface stress and same extension length. Also, the ε-microcantilever assembly produces a larger deflection than a modified triangular microcantilever. The deflection enhancement increases as the ε-assembly's free length decreases for various types of force loading conditions. The ε-microcantilever can be utilized in microsensing applications to provide a favorable high detection capability with a reduced susceptibility to external noises. | 2012-07-05 |
20120174269 | METAL TIP FOR SCANNING PROBE APPLICATIONS AND METHOD OF PRODUCING THE SAME - A metal tip ( | 2012-07-05 |
20120174270 | NECTARINE TREE NAMED 'PEARLICIOUS II' - The present invention relates to a new and distinct variety of nectarine tree, | 2012-07-05 |
20120174271 | Hydrangea plant named 'Grace' - A new and distinct cultivar of | 2012-07-05 |
20120174272 | Dracaena reflexa plant named 'IDEA1010' - A new and distinct | 2012-07-05 |