Patents Issued in March 14, 2013
-
Publication number: 20130067562Abstract: A system, method and program product for managing e-mails from a source suspected of sending spam. The e-mails are received at a firewall or router en route to a mail server. A determination is made whether a source has sent an e-mail which exhibits characteristics of spam. In response, subsequent e-mails from the source destined for the mail server are rate-limiting at the firewall or router such that the firewall or router limits a rate at which the subsequent e-mails are forwarded from the firewall or router to the mail server. The rate is predetermined and less than a maximum rate at which the firewall or router can physically forward e-mails to the mail server absent the rate limit. A determination is made whether another source has sent another e-mail which exhibits more characteristics of spam than the first said e-mail. In response, subsequent e-mails from this other source are blocked at the firewall or router.Type: ApplicationFiled: March 8, 2012Publication date: March 14, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John Fred Davis, Kevin David Himberger, Clark Debs Jeffries, Garreth Joseph Jeremiah
-
Publication number: 20130067563Abstract: A method for managing permission information of an application in a mobile terminal includes detecting a reference event associated the application, determining a type of the reference event, determining permission information of the application, determining whether to execute an operation of the application based on the permission information, and storing operation performance information related to the operation of the application in a database. A terminal includes an application layer to detect an event associated with a change in permission information of a first application and a second application, and a framework layer to determine whether permission information of the first application is changed with respect to the second application, to determine an event type associated with the change in the permission information, to determine permission information of the first application and the second application, and to determine whether to execute a security program.Type: ApplicationFiled: March 23, 2012Publication date: March 14, 2013Applicant: PANTECH CO., LTD.Inventors: Se Moon PARK, Jae Sung PARK, Moo Gun AHN
-
Publication number: 20130067564Abstract: An access rights management system is presented in which a mobile device may be allowed to access corporately held data in a flexible manner but in which the security and integrity of the data is maintained. The mobile device is provided with a rights adjustment module which modifies the access rights for locally stored corporate data in dependence on the connectivity of the mobile device with a corporate server.Type: ApplicationFiled: April 18, 2011Publication date: March 14, 2013Applicant: NEC CORPORATIONInventors: Frederic Fok Ah Chuen, Benoit Lecroart, Olivier Perron
-
Publication number: 20130067565Abstract: An image forming apparatus provided with an interface for a portable information recording medium, has an access control part carrying out access control, for respective ones of a plurality of resources which the image forming apparatus has, based on access control information defining whether or not usage thereof by a user is allowed, wherein the access control part carries out access control based on the access control information stored in the portable information recording medium.Type: ApplicationFiled: November 2, 2012Publication date: March 14, 2013Inventor: Tsutomu OHISHI
-
Publication number: 20130067566Abstract: A device to authenticate a user includes a user interface unit to receive a password input; a surrounding information detecting unit to detect surrounding information of the device; and an authentication unit to authenticate the password input and to determine whether the surrounding information matches preset surrounding information. A method for performing authentication includes receiving an authentication input for authenticating a user; determining whether an authentication condition is satisfied, based on surrounding information of a device; and authenticating the authentication input.Type: ApplicationFiled: April 25, 2012Publication date: March 14, 2013Applicant: PANTECH CO., LTD.Inventor: Jeong-Won OH
-
Publication number: 20130067567Abstract: The invention relates to a chip for processing a content, comprising at least a microprocessor. Said chip includes an integrated non-volatile programmable memory for storing protection data and protected data, said protection data being intended to be used for authorizing/denying access to said protected data by said microprocessor under execution of a program. The invention allows to protect program and data dedicated to a chip-integrated conditional-access system and to protect features as external connections and downloaded data directly on the chip.Type: ApplicationFiled: September 10, 2012Publication date: March 14, 2013Applicant: ENTROPIC COMMUNICATIONS, INC.Inventors: Eric Desmicht, Stéphane Mutz, Christophe Tison
-
Publication number: 20130067568Abstract: Techniques for resource access authorization are described. In one or more implementations, an application identifier is used to control access to user resources by an application. A determination is made whether to allow the application to access the user resources by comparing an application identifier received from an authorization service with a system application identifier for the application obtained from a computing device on which the application is executing.Type: ApplicationFiled: September 12, 2011Publication date: March 14, 2013Inventors: Oludare V. Obasanjo, Stephen R. Gordon, Aleksandr Radutskiy, Philip J. Hallin, Atanas D. Oskov, Jeremy D. Viegas, Daniel C. Kitchener
-
Publication number: 20130067569Abstract: Methods and system for implementing a clustered storage solution are provided. One embodiment is a storage controller that communicatively couples a host system with a storage device. The storage controller comprises an interface and a control unit. The interface is operable to communicate with the storage device. The control unit is operable to identify ownership information for a storage device, and to determine if the storage controller is authorized to access the storage device based on the ownership information. The storage controller is operable to indicate the existence of the storage device to the host system if the storage controller is authorized, and operable to hide the existence of the storage device from the host system if the storage controller is not authorized.Type: ApplicationFiled: March 28, 2012Publication date: March 14, 2013Applicant: LSI CORPORATIONInventors: James A. Rizzo, Basavaraj G. Hallyal, Gerald E. Smith, Adam Weiner, Vinu Velayudhan
-
Publication number: 20130067570Abstract: Content inspection techniques are described. In one or more implementations, it is detected that an application executing on a computing device is calling a particular code element of a group of code elements to be used to process content. For example, the group of code elements can include a pre-specified group of code elements (e.g., functions and/or properties) that may enable access to particular functionalities of a computing device and thus are associated with a known security risk. It is then ascertained that the content is untrusted and, in response to ascertaining that the content is untrusted, the content is inspected to determine if the content is safe to be passed to the code element.Type: ApplicationFiled: September 8, 2011Publication date: March 14, 2013Applicant: Microsoft CorporationInventors: David L. Risney, JR., Scott B. Graham, David Andrew Ross, Mathias Jourdain
-
Publication number: 20130067571Abstract: A method and system for managing suspicious devices on a network. The method includes, setting based on a manager's input or selection a suspicious group corresponding to each of at least one suspicious management item for managing a plurality of devices on a network via a user interface; accessing the devices and reading information corresponding to the suspicious management item; determining whether each device is a suspicious device based on the information corresponding to the suspicious management item, and registering the device in the suspicious group if the device is determined as a suspicious device; checking whether an error of the device comprised in the suspicious group is resolved; and eliminating the device from the suspicious group if the error of the device is resolved.Type: ApplicationFiled: September 6, 2012Publication date: March 14, 2013Applicant: SAMSUNG ELECTRONICS CO., LTDInventors: Sung-woo LEE, Ji-yeon Han
-
Publication number: 20130067572Abstract: The security event monitoring device includes: a storage module which stores in advance a correlation rule; a log collection unit which receives each log from each monitoring target device; a correlation analysis unit which generates scenario candidates by associating each of the logs; a scenario candidate evaluation unit which calculates the importance degrees of each scenario candidate; and a result display unit which displays/outputs the scenario candidate of a high importance degree. The scenario candidate evaluation unit includes: a user association degree evaluation function which calculates user association degrees; an operation association degree evaluation function which calculates the operation association degrees; and a scenario candidate importance reevaluation function which recalculates the importance degrees of each of the scenario candidates by each user according to the user association degrees and the operation association degrees.Type: ApplicationFiled: September 10, 2012Publication date: March 14, 2013Applicant: NEC CORPORATIONInventor: Eiji Muramoto
-
Publication number: 20130067573Abstract: System, method and computer program product for verifying an avatar owner as a human user of an avatar in a virtual world environment in which humans interact through avatars via client devices in network communication with a server device. A request for challenging an avatar in the virtual world environment is received to determine whether that avatar is controlled by an application program user (bot). A user client device associated with a challenged avatar is identified and a Human Identification Proof (HIP) message for detecting a human user versus a bot controlling the challenged avatar is generated and communicated, for receipt at the identified user client device. It is determined from the response, whether the user is a bot or a human user. If a challenged avatar is determined to be a bot, then the server device prevents the challenged avatar from further interaction in the virtual world environment.Type: ApplicationFiled: September 12, 2012Publication date: March 14, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David F. Champion, Jeffrey J. Smith, Kevin J. Smith, David T. Windell
-
Publication number: 20130067574Abstract: A survivable network is described in which one or more network device includes enhanced functionality to fight through cyber attacks. A Fight-Through Node (FTN) is described, which may be a combined hardware/software system that enhances existing networks with survivability properties. A network node comprises a hardware-based processing system having a set of one or more processing units, and a hypervisor executing on each one of the processing units; and a plurality of virtual machines executing on each of the hypervisor. The network node includes an application-level dispatcher to receive a plurality of transaction requests from a plurality of network communication session with a plurality of clients and distribute a copy of each of the transaction requests to the plurality of virtual machines executing on the network node over a plurality of time steps to form a processing pipeline of the virtual machines.Type: ApplicationFiled: January 17, 2012Publication date: March 14, 2013Applicant: ARCHITECTURE TECHNOLOGY CORPORATIONInventors: Stephen K. Brueckner, Kenneth J. Thurber
-
Publication number: 20130067575Abstract: Computer program products and methods of inspecting a log of security records in a computer network are provided. The method includes retrieving a log record, processing the log record including deriving a key to a table, determining a data value from information in the log record and adding the data value to a list of data values associated with the key if the data value is unique. One or more entries of the table are evaluated based on predetermined criteria to detect attempted security breaches.Type: ApplicationFiled: September 14, 2012Publication date: March 14, 2013Applicant: JUNIPER NETWORKS, INC.Inventor: Nir ZUK
-
Publication number: 20130067576Abstract: In accordance with an example embodiment of the present invention, there is provided a method including: detecting a malware in a computer system and in response to the detection of the malware in the computer system initiating a deactivation of malware; detecting a file altered by the malware in response to a successful deactivation of the malware; and initiating a restoration of the altered file in response to the detection of the file altered by the malware.Type: ApplicationFiled: September 13, 2011Publication date: March 14, 2013Inventor: Jarno Niemelä
-
Publication number: 20130067577Abstract: According to a first aspect of the present invention there is provided a method of scanning a computer device in order to detect potential malware when an operating system running on the computer device prevents applications installed on the device from accessing installed files of other applications installed on the device. The method includes the steps of detecting installation of an application on the device, identifying one or more installation files that are required to perform the installation of the application, and performing a malware scan of the identified installation files and/or information obtained from the installation files.Type: ApplicationFiled: September 14, 2011Publication date: March 14, 2013Inventors: Pavel Turbin, Jani Jäppinen
-
Publication number: 20130067578Abstract: A technique for improving the installation of anti-malware software performs an analysis of a computer on which anti-malware software is to be installed prior to complete installation of the anti-malware software. If the analysis determines that the computer may already contain malware, then an attempt may be made to scan and clean the computer prior to the installation of a portion of the anti-malware software. Otherwise, the pre-installation scan and clean may be bypassed, allowing the installation of that portion of the anti-malware software.Type: ApplicationFiled: September 8, 2011Publication date: March 14, 2013Applicant: McAfee, Inc.Inventors: Jamie Dool, Vishnu Varadaraj, David Karl Juche
-
Publication number: 20130067579Abstract: In accordance with one embodiment of the present disclosure, a method for determining the similarity between a first data set and a second data set is provided. The method includes performing an entropy analysis on the first and second data sets to produce a first entropy result, wherein the first data set comprises data representative of a first one or more computer files of known content and the second data set comprises data representative of a one or more computer files of unknown content; analyzing the first entropy result; and if the first entropy result is within a predetermined threshold, identifying the second data set as substantially related to the first data set.Type: ApplicationFiled: September 14, 2011Publication date: March 14, 2013Inventors: David Neill Beveridge, Abhishek Ajay Karnik, Kevin A. Beets, Tad M. Heppner, Karthik Raman
-
Publication number: 20130067580Abstract: A method includes receiving a status update from a client device, the status update reflects at least one change associated with the client device, updating a model of the client deice based on the status update, receiving data to be screened for a virus, the data is received after an updating of the model of the client device, and screening the model of the client device for the virus. Systems and articles of manufacture are also disclosed.Type: ApplicationFiled: September 14, 2012Publication date: March 14, 2013Applicant: Auctnyc 8 LLCInventors: Edward J. Franczek, John Thomas Bretscher, Raymond Walden Bennett, III
-
Publication number: 20130067581Abstract: Apparatuses, computer readable media, methods, and systems are described for identifying risk assessment queries for assessing risk of a process, providing the identified risk assessment queries to a client device for presentation, receiving response data from the client device comprising responses to the risk assessment queries, determining response values for at least some of the risk assessment queries based on the received response data, and calculating a process risk metric based on the determined response values.Type: ApplicationFiled: September 9, 2011Publication date: March 14, 2013Applicant: BANK OF AMERICAInventor: Balaji Venketeshwar
-
Publication number: 20130067582Abstract: The present invention is a method to provide mechanisms and judgment to determine the ongoing veracity of “purported” devices (sometimes called spoofing) with such parameters as unique device ID, access history, paths taken and other environmental data (Device Authentication). This invention relies upon a previous invention “Reputation Database in the cloud and Internet”—the internet is comprised of collections of devices, data, applications and networks all dynamically exchanging information among users. We present a mechanism for real time observation, and putting or accessing those observations into a distributed virtual database for contextual evaluation and analysis of how the internet is being used or potentially subverted. This includes real time evaluation of DNS database changes, server logs, performance, path resolution, device logs, tip data and law enforcement data.Type: ApplicationFiled: November 8, 2011Publication date: March 14, 2013Inventors: John Joseph Donovan, Paul David Parisi, Svetlana I. Dotsenko
-
Publication number: 20130067583Abstract: A facility is described for analyzing access control configurations. In various embodiments, the facility comprises an operating system having resources and identifications of principals, the principals having access control privileges relating to the resources, the access control privileges described by access control metadata; an access control scanner component that receives the access control metadata, determines relationships between principals and resources, and emits access control relations information; and an access control inference engine that receives the emitted access control relations information and an access control policy model, analyzes the received information and model, and emits a vulnerability report.Type: ApplicationFiled: September 11, 2012Publication date: March 14, 2013Applicant: Microsoft CorporationInventors: Prasad G. Naldurg, Sriram K. Rajamani, Stefan Schwoon, John Lambert
-
Publication number: 20130067584Abstract: Methods and apparatus for network security content-checking, in particular simplifying the critical element of a content-checker so that it can be trusted and implemented in hardware logic. A method comprises determining whether a digitally encoded document contains any embedded documents; content-checking, by means of at least one hard-ware-implemented content-checker, at least one of the embedded documents separately from those parts of the digitally encoded document within which it was embedded; and releasing a version of the digitally encoded document responsive to the content-checking.Type: ApplicationFiled: May 19, 2011Publication date: March 14, 2013Applicant: QINETIQ LIMITEDInventor: Simon Robert Wiseman
-
Publication number: 20130067585Abstract: Various embodiments provide an ability to isolate execution of trusted content and/or script from execution of untrusted content and/or script. Separate contexts and/or execution environments can be used for the trusted content and untrusted content, respectively. A trusted context and/or execution environment associated with execution of trusted content can be configured to enable access to sensitive resources associated with a computing device. An untrusted context and/or execution environment associated with execution of untrusted content can be configured with limited and/or no access to the sensitive resources. Alternately or additionally, data generated within the untrusted context can be transferred to the trusted context in a benign manner.Type: ApplicationFiled: September 8, 2011Publication date: March 14, 2013Applicant: Microsoft CorporationInventors: Andy R. Sterland, David L. Risney, JR., Scott B. Graham
-
Publication number: 20130067586Abstract: A authentication system to avoid the consumption of counterfeit products comprising a method using the World Wide Web to verify each individual merchandise using a unique identification number and verifying the unique number against a database online. Further the authentication system comprises a loyalty program in order to encourage customers to use and to denounce counterfeit product sellers.Type: ApplicationFiled: September 9, 2011Publication date: March 14, 2013Inventor: Jorge Pagan
-
Publication number: 20130067587Abstract: An archive of an object set may include various security features that enable a detection of alterations of the contents of the objects. However, the security measures of an archive may fail to detect an inadvertent or intentional alteration of the structure of the object set, including the addition of new objects, changes to the metadata (e.g., the name, position within the object set, and location and size within the archive) of respective objects of the object set, and the deletion of directory entries for the objects. Therefore, an archive may be generated with verifiers (e.g., hashcodes) calculated not only for the contents of objects, but for the directory of the archive, and may be included in the signature of the archive. This verification may extend the detecting of alteration of the archive to include the structure of the archive as well as the contents of the objects contained therein.Type: ApplicationFiled: September 12, 2011Publication date: March 14, 2013Applicant: Microsoft CorporationInventors: Simon Wai Leong Leet, Sarjana Bharat Sheth, Patrick T. O'Brien, JR., Jack R. Davis
-
Publication number: 20130067588Abstract: A method for enhancing the privacy of individuals who may be tracked while visiting different sites on the Internet using conventional browsers is disclosed. The method is based on randomizing the information collected in cookies that are used for tracking by different websites.Type: ApplicationFiled: June 28, 2012Publication date: March 14, 2013Inventors: Sanjay K. Roy, Achyut K Roy
-
Publication number: 20130067589Abstract: Embodiments of the invention are directed to systems, methods, and computer program products configured to determine communities within an organization dynamically based on the distribution of entitlements within the organization.Type: ApplicationFiled: September 14, 2012Publication date: March 14, 2013Applicant: BANK OF AMERICA CORPORATIONInventors: Phillip L. Richards, David M. Andersen, Chadwick R. Renfro, Christopher P. Higgins
-
Publication number: 20130067590Abstract: In one embodiment, an internet monitor service may use a final content rating to determine access to a webpage. A monitor client 102 may generate a client content rating of a webpage 104. The monitor client 102 may factor the client content rating with a server content rating of the webpage 104 to determine a final content rating for the webpage 104.Type: ApplicationFiled: September 8, 2011Publication date: March 14, 2013Applicant: Microsoft CorporationInventors: Bryce Hutchings, Wei Jiang, Vladimir Rovinsky
-
METHOD FOR FILTERING WEB PAGE CONTENT AND NETWORK EQUIPMENT WITH WEB PAGE CONTENT FILTERING FUNCTION
Publication number: 20130067591Abstract: A method for filtering web page content is disclosed in this invention. In the method, a web page request to obtain a web page from a web server is received from a client through a network equipment after the client builds a connection with the web server. The network equipment transmits the web page request to a cloud server for determining if the web page needs to be blocked according to the web page request. A first disconnection request and a second disconnection request is generated according to the web page request if it is determined that the web page needs to be blocked. The first disconnection request is transmitted to the client and the second disconnection request is transmitted to the web server through the network equipment. Subsequently, the connection between the client and the web server is disconnected.Type: ApplicationFiled: September 29, 2011Publication date: March 14, 2013Applicants: PROSCEND COMMUNICATIONS INC., NATIONAL CENTRAL UNIVERSITYInventors: Li-Der CHOU, Hua-Rong CHU, Hsu-Chuan WEI, Neng-Hsing CHEN -
Publication number: 20130067592Abstract: A system and method for program access control includes, for a typestate, providing typestate properties and assigning a role to the typestate in a program in accordance with the typestate properties. Access to operations is limited for the typestate in the program based on the role assigned to the typestate and an access permission level.Type: ApplicationFiled: November 5, 2012Publication date: March 14, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: INTERNATIONAL BUSINESS MACHINES CORP
-
Publication number: 20130067593Abstract: The present embodiments provide methods, apparatuses, and systems to distribute content over a network. Some embodiments provide methods to distribute content within a local media network. These methods receive a request for a first content to be transferred to a sink device, request from the source an access criteria for a first content that is protected according to a first digital rights management (DRM), forward the access criteria to the sink device, receive an evaluation of the access criteria from the sink device regarding at least whether the sink device can interpret the first DRM, determine according to the evaluation received from the sink device whether the sink device can utilize the first content that is protected according to the first DRM, and initiate a transfer of the first content from the source device to the sink device when the sink device can utilize the first content.Type: ApplicationFiled: November 8, 2012Publication date: March 14, 2013Inventor: Brant Candelore
-
Publication number: 20130067594Abstract: Techniques for sharing of items from online storage (e.g., cloud storage) are described herein. In at least some embodiments, sharing links can be configured as one-time sharing links that provide recipients with limited, one-time access to a shared item for the purpose of selecting or registering an account to use for subsequent access to the item. Recipients are able to select accounts they find most convenient for accessing a shared item without the owner/sharer of the item necessarily having contact information for those accounts or sending a link to the accounts. Selection of a one-time link initiates an authentication sequence that selectively provides an option to select a particular account. Once the one-time sharing link is redeemed, the one-time sharing link is invalidated for subsequent access to the item.Type: ApplicationFiled: September 9, 2011Publication date: March 14, 2013Applicant: Microsoft CorporationInventors: Arcadiy G Kantor, Jonathan A. Bockelman, Jeffrey E. Steinbok, Sarah M. Filman
-
Publication number: 20130067595Abstract: A Data Isolation Service for data, information, and knowledge sharing giving organizations using any type of software solution the ability to provide the public with certain public declassified information using a public facing instance of the same software solution. The Data Isolation Service allows for sensitive data to remain secure using a hybrid data storage model. This hybrid model allows for all data to remain secure without the risk that the private data becomes compromised when sharing public data. The Data Isolation Service can be used with any software technology and application system. The Data Isolation Service is a technology service that keeps private and public data partitioned allowing for the transport of public declassified data from within the organization or private database to a public database for public use, then allowing the public declassified data to re-enter the private database for internal organization use.Type: ApplicationFiled: September 14, 2011Publication date: March 14, 2013Inventors: Lester S. Pierre, Nader A. Chouman
-
Publication number: 20130067596Abstract: A detection filter installed in an application server including a secure application is disclosed. In one embodiment, the filter includes a rules engine for receiving request data representing an access request for the secure application from a user. The engine applies at least one risk condition rule to the request data to generate a risk probability level, and detects at least one fraud condition when the risk probability level exceeds a threshold level, before passing the access request to the secure application.Type: ApplicationFiled: March 7, 2012Publication date: March 14, 2013Applicant: FMT Worldwide Pty LtdInventors: Constantine Siourthas, Bjarne Staugaard Matzen
-
Publication number: 20130067597Abstract: A system for controlling access to user resources and a method thereof are provided. The system includes a client device and a server. The client device receives an input of access regulations, which define an access level and access agent for first-user resources, from a first user, and transmits the received access regulations to the server. When a second user has access to the user resources, the server controls the access in compliance with the access regulations.Type: ApplicationFiled: August 24, 2012Publication date: March 14, 2013Inventors: Yoon-Chan Choi, Jin-Suk Lee
-
Publication number: 20130067598Abstract: Techniques are disclosed for presenting and collecting end user license agreement acceptance for software applications or firmware components executed on a computing appliance. A sentry component allows only certain commands to be executed before the relevant end user license agreements are accepted, e.g., commands to configure a network interface and web server on the appliance executed on a shell over a serial interface. Once configured the web server is used to provide a rich interface for presenting end user license agreements and obtaining acceptance thereof. Once the user accepts the terms of the relevant license agreements, then the appliance is made active and all configuration commands become operational, including commands needed to configure the device and start services which would otherwise be prohibited by the sentry component prior to license acceptance.Type: ApplicationFiled: September 12, 2011Publication date: March 14, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: WILLIAM V. DA PALMA
-
Publication number: 20130067599Abstract: Software update distribution techniques are disclosed. Authentication information is received, from a content source authenticator, by an update agent included in a client device. The authentication information comprises a list of a plurality of content sources, wherein the plurality of content sources have been verified by the content source authenticator as being authentic content sources for legitimate software applications. The update agent selects a first content source of the plurality of content sources, where the first content source is configured to provide updates for a first software application. The update agent checks the first content source for updates for the first software application.Type: ApplicationFiled: September 12, 2011Publication date: March 14, 2013Applicant: MICROSOFT CORPORATIONInventors: Hrishikesh S. Raje, Christopher S. Gouge, Rajasekaran Rangarajan, Leo Edwin Lie, Jimin Li
-
Publication number: 20130067600Abstract: Methods, systems, and computer program products are provided for enabling selective file system access by applications. An application is installed in a computing device. An application manifest associated with the application is received. The application manifest indicates one or more file types that the application is allowed to access. The indicated file type(s) are registered in a location accessible by a broker service. The application is launched as an application process. The application process is isolated in an application container. The application container prevents direct access by the application process to file system data. An access request related to first data of the file system data is received at the broker service from the application process. Access by the application process to the first data is enabled when the broker service determines that a file type of the first data is included in the registered file type(s).Type: ApplicationFiled: September 9, 2011Publication date: March 14, 2013Applicant: MICROSOFT CORPORATIONInventors: Scott Graham, Kavitha Radhakrishnan, Sermet Iskin, Katrina M. Blanch, Steven Ball, John Hazen, Tyler Kien Beam, Allen Kim, Guillermo Enrique Rueda Quintero
-
Publication number: 20130067601Abstract: One or more techniques and/or systems are disclosed for generating a developer license that allows a developer application to run on developer machine. A user identification (userID) used to register a user can be used by the user to register as a developer. The userID can be authenticated for the registered developer. Further, a machine used by the developer for the developer application can be registered, and a resulting hardware identification (hardwareID) can be authenticated for the registered developer machine. Additionally, a developer certificate can be generated for the registered developer. The developer certificate can be authenticated and used to sign the developer application. The developer license can be generated for the developer, allowing the developer machine to execute the developer application, based at least upon the authenticated userID, the authenticated hardwareID, and the authenticated developer certificate.Type: ApplicationFiled: September 11, 2011Publication date: March 14, 2013Applicant: Microsoft CorporationInventors: Sanjeev Dwivedi, Sunil Shankar Kadam, George Li, Ariye M. Cohen
-
Publication number: 20130067602Abstract: In accordance with an embodiment, a method, apparatus or tangible computer medium (which stores computer executable code or program code) performs or facilitates: determining one or more aspects of an unauthorized copy of electronic content accessible to or through a user device; and conducting a transaction between the user device and a legitimizing party to legitimize the electronic content in view of the determined aspect(s). The electronic content may be unsecured copyrighted content.Type: ApplicationFiled: September 13, 2012Publication date: March 14, 2013Applicant: Vringo Infrastructure, Inc.Inventor: Heikki Kokkinen
-
Publication number: 20130067603Abstract: Nucleic acid and protein sequences relating to a cation channel which is sperm-specific (CatSper4) are disclosed. The CatSper4 protein is shown to be specifically expressed in sperm. Nucleic acids, vectors, transformed cells, transgenic animals, polypeptides, and antibodies relating to the CatSper4 gene and protein are disclosed. Also provided are methods of in vitro fertilization and contraception, methods of identifying modulators of CatSper4 activity, methods of genotyping subjects with respect to CatSper4, and methods of diagnosing and treating CatSper4-mediated disorders, including infertility. Related business methods are also disclosed.Type: ApplicationFiled: February 10, 2012Publication date: March 14, 2013Inventors: Magdalene M. Moran, Jayhong A. Chong, Ian Scott Ramsey, David E. Clapham
-
Publication number: 20130067604Abstract: The present application relates to use of a Midkine family protein for growing hair on a mammal, or in the manufacture of a medicament for growing hair on a mammal, especially for treatment or prevention of different forms of alopecia.Type: ApplicationFiled: February 23, 2011Publication date: March 14, 2013Inventors: Sadatoshi Sakuma, Maria Halasz, Darren Jones
-
Publication number: 20130067605Abstract: A nucleic acid construct comprising a genetic engineered heterogeneous nuclear ribonucleoprotein (hnRNP) A1 gene is provided. A transgenic mouse in which the expression of hnRNP A1 gene has been disrupted is also provided. The mouse is useful for studying the role of hnRNP A1 gene in normal and disease states of a neurodegenerative disease or a cancer for developing therapies to treat any of these diseases. Therefore, a method of screening a compound for potential use in prevention and/or treatment of neurodegenerative disease or cancer is further provided.Type: ApplicationFiled: August 31, 2012Publication date: March 14, 2013Applicant: KAOHSIUNG MEDICAL UNIVERSITYInventors: Yung-Fu Chang, Ting-Yuan Liu, Yuh-Jyh Jong, Jan-Gowth Chang
-
Publication number: 20130067606Abstract: The present invention relates to methods of modulating traits, particularly production traits, in avians such as chickens. In particular, the invention relates to the in ovo delivery of a dsRNA molecule, especially siRNAs, to modify production traits in commercially important birds.Type: ApplicationFiled: September 4, 2012Publication date: March 14, 2013Applicants: Commonwealth Scientific and Industrial Research Organisation, AUSTRALIAN POULTRY CRC PTY LTDInventors: Timothy James DORAN, Robert John MOORE, John William LOWENTHAL, Craig Allen SMITH, Andrew Henrik SINCLAIR
-
Publication number: 20130067607Abstract: An I-CreI variant, wherein one of the I-CreI monomers has at least two substitutions, one in each of the two functional subdomains of the LAGLIDADG core domain situated respectively from positions 26 to 40 and 44 to 77 of I-CreI, said variant being able to cleave a DNA target sequence from a RAG gene. Use of said variant and derived products for the prevention and the treatment of a SCID syndrome associated with a mutation in a RAG gene.Type: ApplicationFiled: July 11, 2012Publication date: March 14, 2013Applicant: CELLECTIS S.A.Inventors: Sylvain ARNOULD, Sylvestre Grizot
-
Publication number: 20130067608Abstract: The present invention provides a method for diagnosing and detecting diseases associated with colon. The present invention provides one or more proteins or fragments thereof, peptides or nucleic acid molecules differentially expressed in colon diseases (CCAT) and antibodies binds to CCAT. The present invention provides that CCAT is used as targets for screening agents that modulates the CCAT activities. Further the present invention provides methods for treating diseases associated with colon.Type: ApplicationFiled: August 16, 2012Publication date: March 14, 2013Applicant: CELERA CORPORATIONInventors: Bruno DOMON, Aiqun LI, Tao HE, Ian MCCAFFERY
-
Publication number: 20130067609Abstract: The present invention relates to nucleic acid sequences and cellular proteins encoded by these sequences that are involved in infection or are otherwise associated with the life cycle of one or more pathogens.Type: ApplicationFiled: June 14, 2010Publication date: March 14, 2013Inventors: Donald Rubin, Robert Gilmore, Thomas Hodge, Natalie McDonald
-
Publication number: 20130067610Abstract: The invention provides seed and plants of broccoli hybrid RS05151611 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of broccoli hybrid RS05151611 and the parent lines thereof, and to methods for producing a broccoli plant produced by crossing such plants with themselves or with another broccoli plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants.Type: ApplicationFiled: March 13, 2012Publication date: March 14, 2013Inventor: Carl E. Mero
-
Publication number: 20130067611Abstract: A soybean cultivar designated S100319 is disclosed. The invention relates to the seeds of soybean cultivar S100319, to the plants of soybean cultivar S100319, to the plant parts of soybean cultivar S100319, and to methods for producing progeny of soybean cultivar S100319. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S100319. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S100319, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S100319 with another soybean cultivar.Type: ApplicationFiled: September 8, 2011Publication date: March 14, 2013Applicant: M.S. TECHNOLOGIES, L.L.C.Inventor: Justin T. MASON