04th week of 2014 patent applcation highlights part 61 |
Patent application number | Title | Published |
20140026160 | SYSTEMS, METHODS, AND APPARATUS FOR DELIVERING CONTENT - Systems, methods, and apparatus for delivering content are provided. A request for desired content may be received by a content management server from a customer device associated with a customer. The content management server may include one or more computers. Additionally, the content management server may determine whether the customer device is in communication with one or more additional devices associated with the customer. Based at least in part upon the communication determination, the content management server may determine whether the customer device is located within a subscription area for the customer. Based at least in part upon the determination of whether the customer device is located within the subscription area, the content management server may determine access rights to the desired content. | 2014-01-23 |
20140026161 | AUTHORIZATION METHOD AND SYSTEM FOR SMART TV AND SMART TV APPLYING THE SAME - An authorization method for a smart TV is provided. When an application is to be activated, it is determined whether machine authorization information is stored. When the machine authorization information is stored, a client certificate corresponding to the application is searched for. When the client certificate is found, it means the application is authorized. The application authorized by a server can then be activated. | 2014-01-23 |
20140026162 | METHOD OF PROVIDING CUSTOMIZED HOSPITALITY MEDIA FUNCTIONS AT A PLURALITY OF SET-TOP BOXES BEING CONNECTED TO AN RF COAX NETWORK, AND HOSPITALITY MEDIA SYSTEM THEREOF - A hospitality media system includes a plurality of set-top boxes (STBs) coupled to a radio frequency (RF) coax network. Each STB has an identifier for identifying the STB. A content source broadcasts media content to the STBs utilizing the RF coax network and an update server distributes software data to the STBs. The software data causes a particular STB to perform a media function customized for the particular STB according to the identifier of the particular STB. | 2014-01-23 |
20140026163 | System and Method of Presenting Media Content - A method includes monitoring media content at media content locations to identify media content items. The media content locations are identified in social network data stored by a set-top box device. The method includes receiving, at the set-top box device, a command to present image cells to a display device. The command is responsive to an alert sent from the set-top box device. The method also includes presenting the image cells at the display device. At least one of the image cells includes an image corresponding to an identified media content item. | 2014-01-23 |
20140026164 | CUSTOMIZED PROGRAM INSERTION SYSTEM - A customized consumer advertisement module and process are provided for inserting a user selected object into a user selected category of program. The user stores model objects locally at the user site, or communicates the model objects to a remotely located broadcaster for storage at a broadcaster site. The user selects categories of programs in which the model objects, or portions thereof, will be inserted. The customized consumer advertisement module inserts the model objects, or portions thereof, into the selected categories of programs. | 2014-01-23 |
20140026165 | SYSTEM AND METHOD FOR CONTROLLING ITV APPLICATION BEHAVIORS THROUGH THE USE OF APPLICATION PROFILE FILTERS - Controlling the admission of interactive television iTV applications to an iTV application distribution system is accomplished through the use of iTV application profiles that enumerate sets of allowed functions and behaviors for the iTV applications within the distribution system. In general, the profiles comprise filters that enable various functions within the distribution system, and may be applied to the iTV applications according to any of a number of bases. The distribution system includes an interface or console adapted to permit a system operator to create the application profiles and establish rules for attaching the profiles to the iTV applications, and an application profile engine configured to automatically validate the iTV applications against the profiles according to those rules. | 2014-01-23 |
20140026166 | METHOD FOR CONTROLLING A NETWORKED TV CAPABLE OF BOOKMARKING AT LEAST ONE OR MORE ITMES, AND NETWORKED TV - According to one embodiment of the present invention, a method for controlling a networked TV comprises the following steps: receiving a first command for setting a bookmark for an item currently being executed, and a second command for selecting the rating of the item for which the bookmark has been set; storing information for identifying the bookmarked item having the selected rating in a bookmark memory in accordance with the received first and second commands; receiving a third command for listing one or more bookmarked items; accessing the bookmark memory; and displaying a first item having a first rating and a second item having a second rating separately from each other on the basis of the ratings of the items stored in the bookmark memory. | 2014-01-23 |
20140026167 | DIFFERENTIATED PSIP TABLE UPDATE INTERVAL TECHNOLOGY - An apparatus, method and data structure for generating at least one table in a broadcast environment, are provided. The apparatus includes a generator to generate an event information table (EIT) and an extended text table (ETT). The ETT has program guide information for an n-hour span and has a transmission interval. The ETT has a transmission interval and program description information according to the EIT. The transmission interval of the EIT is shorter than the transmission interval of the ETT. | 2014-01-23 |
20140026168 | DIFFERENTIATED PSIP TABLE UPDATE INTERVAL TECHNOLOGY - An apparatus, method and data structure for generating at least one table in a broadcast environment, are provided. The apparatus includes a generator to generate an event information table (EIT) and an extended text table (ETT). The ETT has program guide information for an n-hour span and has a transmission interval. The ETT has a transmission interval and program description information according to the EIT. The transmission interval of the EIT is shorter than the transmission interval of the ETT. | 2014-01-23 |
20140026169 | Content Optimization Based On Real Time Network Dynamics - The specification and drawings present a new method, apparatus and software related product for adaptive content optimization based on real time network dynamics including at least a network load (congestion) status on a cell/access point (eNB) level and a UE subscription status. A network element of a network core such as PGW of an EPC can determine a load status of at least one access point (eNB,) using one of the two approaches described herein, and/or subscription information for one or more UEs served by the eNB. The EPC can enhance the existing protocol between the EPC and MCO by providing real time serving eNB load information and/or the UE subscription status along with a mobile content (e.g., video) request from a UE wirelessly communicating with the serving eNB to the MCO. This will allow the MCO to provide the mobile content (including bandwidth) sent to the UE. | 2014-01-23 |
20140026170 | SERVICE ENTRY DEVICE - A system is described in which, in some embodiments, a centralized service entry device may be used to coordinate communications going into and out of a home or premises. The service entry device may be physically connected to a plurality of external access networks, such as a cable television coaxial or fiber connection and a twisted-pair wire connection, and may coordinate access to those networks by a plurality of in-home devices. Within the home, the system may include a plurality of client devices to assist in the coordination of communications with devices in different rooms within the home. | 2014-01-23 |
20140026171 | METHOD OF DETERMINING AN UNUSUAL BEHAVIOUR OF AN ELECTRONIC APPARATUS, AND ELECTRONIC APPARATUS ABLE TO IMPLEMENT SUCH A METHOD - A method of determining an unusual behaviour of an electronic apparatus, the electronic apparatus carrying out an operation requiring the use of an item of information regarding an internal reference clock of the electronic apparatus, the method including comparing the internal reference clock information item with a span of temporal coherence of the electronic apparatus, the span of temporal coherence being determined on the basis of various temporal information items stored within the electronic apparatus; in the case of inconsistency between the internal reference clock information item and the coherence span, storing an information item relating to an unusual behaviour of the electronic apparatus. | 2014-01-23 |
20140026172 | METHOD FOR MAPPING BETWEEN SIGNALING INFORMATION AND ANNOUNCEMENT INFORMATION AND BROADCAST RECEIVER - A method for mapping signaling information to announcement information and a broadcast receiver are disclosed herein. A method of providing a Non-Real-Time (NRT) service, the method comprises extracting identification information of first signaling information and second signaling information based upon a program specific information/program and system information protocol (PSI/PSIP) table, receiving the first signaling information and second signaling information based upon the extracted identification information, constructing and displaying a service guide using the received first signaling information, acquiring first content identification information as a content selected from the displayed service guide, accessing a File Delivery over Unidirectional Transport (FLUTE) session using the received second signaling information, acquiring second content identification information matched with the acquired first content identification information from the accessed FLUTE session and receiving and storing one or more file constructing corresponding content based upon the acquired second content identification information. | 2014-01-23 |
20140026173 | VIDEO DISTRIBUTION SYSTEM REDUCING VIDEO DATA TRAFFIC AND A METHOD THEREFOR - In a video distribution apparatus, a memory caches segments of video data into which video data received from a communication network is sectioned on a basis of a predetermined unit and stores video identifying information of the segments of video data. A distribution controller derives, upon receipt of a cache distribution request from the network, video identifying information contained in a cache distribution request. A relay controller obtains segments of video data associated with the video identifying information from the memory to transfer the obtained segments of video data to a requester at a transfer rate defined on the segments of video data in the vicinity of a source of the video data. The video can be distributed at a transfer rate close to a transfer rate defined by a content distribution server while the video traffic can be diminished. | 2014-01-23 |
20140026174 | APPLYING HEURISTICS TO MANAGE MULTICAST SUBSCRIPTIONS WITHIN COMPUTER NETWORKS - An access node comprises a control unit that determines an anticipated working set of television channels based on a historically delivered working set of television channels to which a subscriber network has previously subscribed. The anticipated working set indicates a time at which the subscriber network is expected to subscribe to a different set of channels. The access node includes at least one interface that couples the access node to the subscriber network, that prior to the time at which the subscriber network is expected to subscribe to the different set of channels, subscribes to the different set of television channels in accordance with the anticipated working set such that media content associated with the different channels of the anticipated working set is available for delivery to the subscriber network at the time during which the access node expects the subscriber network to subscribe to the different set of channels. | 2014-01-23 |
20140026175 | ONLINE VIDEO DISTRIBUTION - Online video can now be supplied with hyperlinks that are associated with and move with objects in the video. However, online video players tend not to report an accurate frame number, and this results in poor synchronisation of the movement of the hyperlink and the object. We propose that a subset of the pixels in the frame be used to encode a numeric frame identifier. | 2014-01-23 |
20140026176 | NOISE SUPPRESSION IN A HYBRID FIBER COAXIAL NETWORK - A coupling device for use in a hybrid fiber coaxial (HFC) network may be configured to disable an upstream path through it when there is only noise incident on the upstream path, and enable the upstream path through it when a desired transmission from a cable modem downstream of the coupling device is incident on the upstream path. The coupling device may be a trunk amplifier, a distribution amplifier, a splitter, or the like. The coupling device may comprise a single upstream interface coupled to a plurality of downstream interfaces. The enabling and/or disabling may be in response to a signal strength indicated by the SSI being below a threshold and/or in response to one or more control messages indicating whether any downstream cable modem is, or will be, transmitting. | 2014-01-23 |
20140026177 | OPTICAL TRANSMISSION SYSTEM - According to the present invention, in an optical transmission system optically transmitting an optical signal between a first camera adaptor provided to a first video camera, a second camera adaptor provided to a second video camera, and a base station provided at a position remote from the video cameras, the first camera adaptor converts a first electric signal including a video signal component from the first video camera into a first optical signal and transmits the first optical signal to the second camera adaptor. The second camera adaptor receives the first optical signal, converts a second electric signal including a video signal from the second video camera into a second optical signal, and transmits the first and second optical signals to the base station. The base station receives the first and second optical signals, converts the received optical signals into the first and second electric signals, and outputs the electric signals to an external device. | 2014-01-23 |
20140026178 | Video processing system providing interactivity independent of service provider equipment and video output device - Described herein is a video display arrangement in which a video signal from a video source is intercepted and, in response to a command from a user, a desired video signal is obtained by at least one of substituting a different video signal for the video signal from the video source and augmenting the video signal from the video source to add interactivity information for display to the user. The desired video signal is applied to a display device and displayed to the user. The arrangement may use a smart cable or a small accessory. | 2014-01-23 |
20140026179 | DYNAMIC USER IDENTIFICATION AND POLICY ENFORCEMENT IN CLOUD-BASED SECURE WEB GATEWAYS - A cloud-based secure Web gateway, a cloud-based secure Web method, and a network deliver a secure Web gateway (SWG) as a cloud-based service to organizations and provide dynamic user identification and policy enforcement therein. As a cloud-based service, the SWG systems and methods provide scalability and capability of accommodating multiple organizations therein with proper isolation therebetween. There are two basic requirements for the cloud-based SWG: (i) Having some means of forwarding traffic from the organization or its users to the SWG nodes, and (ii) Being able to authenticate the organization and users for policy enforcement and access logging. The SWG systems and methods dynamically associate traffic to users regardless of the source (device, location, encryption, application type, etc.), and once traffic is tagged to a user/organization, various polices can be enforced and audit logs of user access can be maintained. | 2014-01-23 |
20140026180 | SECURITY IN WIRELESS COMMUNICATION SYSTEM AND DEVICE - A method of implementing security in a wireless communication device ( | 2014-01-23 |
20140026181 | DATA LOSS PREVENTION (DLP) METHODS AND ARCHITECTURES BY A CLOUD SERVICE - Embodiments of the present disclosure include data loss prevention (DLP) methods and architectures by a cloud-based service. The disclosed techniques of the cloud-based platform (e.g., collaboration platform in an enterprise environment) can detect (and may optionally prevent) violations to, e.g., corporate policies, which can be configurable by a corporate administrator, for example regarding the use, storage, or transmission of sensitive information. The types of sensitive information can include, for example, financial information—credit card and bank account numbers, Personally Identifiable Information (PII)—Social Security Number (SSN), health/healthcare information, Intellectual Property—earnings forecasts, sales pipeline, trade secrets, source code, etc. | 2014-01-23 |
20140026182 | DATA LOSS PREVENTION (DLP) METHODS BY A CLOUD SERVICE INCLUDING THIRD PARTY INTEGRATION ARCHITECTURES - Embodiments of the present disclosure include data loss prevention methods by a cloud-based service including third party integration architectures. The disclosed techniques of the cloud-based platform (e.g., collaboration platform in an enterprise environment) can detect (and may optionally prevent) violations to, e.g., corporate policies, which can be configurable by a corporate administrator, for example, regarding the use, storage, and/or transmission of sensitive information. The types of sensitive information can include, for example, financial information—credit card and bank account numbers, Personally Identifiable Information (PII)—Social Security Number (SSN), health/healthcare information, Intellectual Property—earnings forecasts, sales pipeline, trade secrets, source code, etc. | 2014-01-23 |
20140026183 | INFORMATION PROCESSING DEVICE AND COMPUTER PROGRAM PRODUCT - According to an embodiment, an information processing device includes a kernel configured to execute a system call, and a managing unit configured to determine whether or not to permit execution of the system call. The kernel includes a holding unit and a system call executing unit. The holding unit holds execution of the system call until a result of determination as to whether or not to permit execution of the system call is returned from the managing unit. The system call executing unit executes the system call. | 2014-01-23 |
20140026184 | METHOD FOR CONFIGURING PERSONAL DATA DISTRIBUTION RULES - The invention pertains to a method for configuring rules for distributing personal data of a social network user (U) with respect to a target contact (CC). The method consists of retrieving behavioral data of the target contact. Based on this retrieved behavioral data and a sensitivities profile defined by the user, an assessment grade is assigned to the target contact with respect to the danger that he or she represents of propagating the user's personal data. Based on the grade assigned to the target contact, a recommendation to configure the rules for distributing his or her personal data is issued to the user. | 2014-01-23 |
20140026185 | System, Method, and Apparatus for Modular, String-Sensitive, Access Rights Analysis with Demand-Driven Precision - A static analysis for identification of permission-requirements on stack-inspection authorization systems is provided. The analysis employs functional modularity for improved scalability. To enhance precision, the analysis utilizes program slicing to detect the origin of each parameter passed to a security-sensitive function. Furthermore, since strings are essential when defining permissions, the analysis integrates a sophisticated string analysis that models string computations. | 2014-01-23 |
20140026186 | WHITE LISTING DNS TOP-TALKERS - Systems and methods for creating a list of trustworthy resolvers in a domain name system. A computer receives a resolver profile for a resolver sending queries to a domain name server. The resolver profile is based on any, or a combination, of a top-talker status of the resolver, a normalcy of distribution of domain names queried, a continuity of distribution of query type, and a RD bit status, and information related to query traffic based on the topology of the domain name server. Resolver profiles can be compared to a trust policy to determine whether the resolver is trustworthy. Resolvers deemed trustworthy can be added to a list of trustworthy resolvers. Embodiments can detect the occurrence of a network-based attack. Embodiments can mitigate the effect of a network-based attack by responding only to queries from resolvers on the list of trustworthy resolvers. | 2014-01-23 |
20140026187 | SECURE DATA ACCESS FOR MULTI-PURPOSE MOBILE DEVICES - According to some embodiments, a proxy server comprises one or more processors operable to establish communication with a secure client application of a device. The client is configured with a partition that contains data received from the proxy server within the secure application. If the client passes authentication, the server communicates preview information to the client previewing files that the server received from a business server on behalf of the client. The client requests a selected file. The server renders the selected file into a first portion and a second portion based on the immediate display capabilities of the client. The server communicates the first portion, determines that a trigger point was reached, and then communicates the second portion in response to the trigger point being reached. The client is configured to delete the first portion and the second portion in response to a completion event. | 2014-01-23 |
20140026188 | SYSTEMS, METHODS, AND DEVICES FOR RESTRICTING USE OF ELECTRONIC DEVICES BASED ON PROXIMITY TO WIRELESS DEVICES - Systems, kits, methods, and software are disclosed for securing access to an electronic device such as a smartphone, tablet, e-reader, portable media player, and the like. The electronic device includes a security application and a network interface. The network interface is configured to be paired with or otherwise communicatively connect to a separate security device. If the application determines that communication is possible or occurring, access to the electronic device may be enabled. If the application determines that communication is not possible, some, all, or substantially all features of the electronic device may be disabled. The disabled device may be re-enabled manually using an override code, or automatically be re-initiating communication with the security device. | 2014-01-23 |
20140026189 | METHOD, CLIENT, SERVER AND SYSTEM OF LOGIN VERIFICATION - The present disclosure introduces a method, a client, a server and a system of login verification. When a user logins, the client obtains a login request from the user for logging into an under-protected account system, where the login request includes at least an account to be logged in, determines property information of a current related account system corresponding to the account to be logged in from property information stored in a current login host, generates login verification information including at least the property information of the current related account system, and sends the login verification information to a server. The server verifies a login activity of the user based on the pre-stored reliable property information corresponding to the account to be logged in. Thus, the login verification process is simplified and the efficiency of login verification using the server is enhanced. | 2014-01-23 |
20140026190 | MOBILE APPLICATION FOR ACCESSING A SHAREPOINT.RTM. SERVER - A method of and a mobile processing device for accessing a web application platform. The method includes installing an application configured to access a server hosting the web application platform, configuring the application, wherein configuring comprises generating at least one of a data capture list and a data lookup list available to the application, transferring authentication information to the server, receiving an indication of which application configurations the application is permitted to access based upon the authentication information, and displaying a set of one or more icons related to the application configurations the application is permitted to access. The mobile processing device includes various hardware components for performing the method. | 2014-01-23 |
20140026191 | SECURITY MODEL FOR A MEMORY OF A NETWORK INFORMATION SYSTEM - Systems and methods for providing information services are disclosed. A method includes passing an instance an object, invoked by a user, to a memory device at a hardware layer of a network information system, the object being hosted for a tenant of a network information service. The method further includes determining by a processing unit of the memory device that storage of the object is not authorized by the tenant based on a security map provided by the tenant and accessible by the processing unit within the hardware layer. The method further includes preventing storage of the instance in the memory device based on the result of the determining. | 2014-01-23 |
20140026192 | USER CONTROL OVER WIFI NETWORK ACCESS - A server system transfers display data for presentation to a user who selects multiple geographically-distributed WiFi access systems and a password. The server system receives user data that indicates the user-selected WiFi network access systems and the user-selected password. The server system stores an association between the user-selected WiFi network access systems and the user-selected password. The server system receives an access request for one of the user-selected WiFi network access systems using the user-selected password. The server system transfers a positive response to the access request based on the stored association between the user-selected WiFi network access systems and the user-selected password. | 2014-01-23 |
20140026193 | Systems and Methods of Using a Temporary Private Key Between Two Devices - A method executes at a personal user device associated with a user. The method receives a request from a shared user device, the request seeking access to personal information associated with the user. The personal information is stored at a resource server. The method receives access authentication information from the user. The method then sends the access authentication information to an authentication server, and receives an access token. The access token grants access privileges to the personal information. The method sends the access token to the shared user device, thereby permitting an application executing on the shared user device to use the access token for retrieving at least a portion of the personal information. The method detects a physical movement of the personal user device, then sends a message to the authentication server to revoke access privileges associated with the access token. | 2014-01-23 |
20140026194 | ePHI-COMPLIANT GATEKEEPER SYSTEM & METHODS - An ePHI-compliant gatekeeper system that provides single, controlled access, editable in real-time, to an individual patient's medical information that remains remotely stored within internal network architecture from a variety of disparate healthcare professionals, medical systems, and vendors networks. The ePHI-compliant gatekeeper system is an independent, cloud-based architecture to ensure that inherent infrastructure does not compromise existing privacy requirements and the proprietary interests of partnered platformed networks. The ePHI-compliant gatekeeper system includes user equipment and a cloud-based vetting system. The cloud-based vetting system includes a Software as a Service (SaaS) module and a Platform as a Service (PaaS) module. The SaaS module provides user authentication at login. The PaaS module electronically provides real-time updated, single controlled access to individual patients medical information, accordingly, the cloud-based vetting system provides an infrastructure application that is a plugin component to a plurality of network entities that maintain such medical information. | 2014-01-23 |
20140026195 | Enterprise-specific Functionality Watermarking and Management - A method, system and non-transitory computer-readable medium product are provided for enterprise-specific functionality watermarking and management. In the context of a method, a method is provided that includes identifying a request to perform at least one function of a user device associated with an enterprise and identifying at least one watermark template associated with an enterprise. The method further includes applying the at least one watermark template associated with the enterprise to at least one function of the user device associated with the enterprise and authorizing the request to perform the at least one function of the user device associated with the enterprise. | 2014-01-23 |
20140026196 | ANTI-CLONING SYSTEM AND METHOD - A method for authenticating a software application instance, the method includes a user device transmitting a request for access to a server device, wherein the request includes an App ID. The method further includes a server device transmitting a session ID to the user device and transmitting the session ID and the App ID to an anti-clone engine. The method further includes the anti-clone engine generating and transmitting a challenge token to the user device, and receiving and processing a response token to determine whether the user device is an authentic software application instance. The method further includes the anti-clone engine transmitting an authorization message to the server device. | 2014-01-23 |
20140026197 | COORDINATION BETWEEN SELF-ORGANIZING NETWORKS - A mechanism to handle conflict situations relating to a situation in which an intended SON operation at or near the domain's boundary (border area) may impact on one or more cells in a neighboring domain comprises a single-domain coordinator that assesses whether there may be an impact on the neighboring domain, and if yes, requests an inter-domain, coordinator to check and assess whether there is a conflict. | 2014-01-23 |
20140026198 | INFORMATION PROCESSING APPARATUS AND CONTROL METHOD - According to one embodiment, a control module detects each of a plurality of events. A management module transmits a determination result indicative of one of permission and prohibition of execution of a specific process to the control module when a second event of requesting execution of the specific process is detected before detection of a first event of requesting a connection to a specific external communication device. When the second event is detected after the detection of the first event, the management module transmits the other of permission and prohibition of the execution of the specific process to the control module. | 2014-01-23 |
20140026199 | Using Metadata In Security Tokens to Prevent Coordinated Gaming In A Reputation System - To prevent gaming of a reputation system, a security token is generated for a security module using metadata about the client observed during the registration of the security module. The registration server selects metadata for use in generating the security token. The generated security token is provided to identify the client in later transactions. A security server may conduct a transaction with the client and observe metadata about the client during the transaction. The security server also extracts metadata from the security token. The security server correlates the observed metadata during the transaction with the extracted metadata from the security token. Based on the result of the correlation, a security policy is applied. As a result, the metadata in the security token enables stateless verification of the client. | 2014-01-23 |
20140026200 | METHOD AND APPARATUS FOR PROVIDING SECRET DELEGATION - A method for providing secret delegation may comprise receiving a credential secret applied to an algorithm associated with a distributed application in a trusted execution environment, causing delegation of the credential secret from one communication device to at least one other communication device, and modifying the credential secret prior to transfer of a modified version of the credential secret to the at least one other communication device in a manner that enables a generation of the credential secret to be determined. An apparatus and computer program product corresponding to the method are also provided. | 2014-01-23 |
20140026201 | System And Method Of Sharing Content Consumption Information - The disclosure relates to identifying a user consuming content so that the user can share information on a social network communication service. Aspects of the disclosure relate to detecting reactions to the content and transmitting information to a social networking service associated with the user. | 2014-01-23 |
20140026202 | AUTHENTICATING A USER OF A SYSTEM USING NEAR FIELD COMMUNICATION - A system and machine-implemented method for providing a username and password to a system using a device, via establishing a near field communication link with the system; retrieving a username and password from storage on the device; and transmitting the username and password to the system via the near field communication link, wherein the username and password are configured to be used by the system to authenticate the user on the system. | 2014-01-23 |
20140026203 | AUTHENTICATING A USER FOR TESTING PURPOSES - Authenticating a user for testing purposes. A web server receives a request from a client that includes an authentication credential and that is formatted to be handled by a particular authentication module. The authentication module is configured to obtain authentication tokens based on authentication credentials included in requests, while refraining from generating any interactive authentication dialogue. Based on the request, the web server passes at least a portion of the request, including the authentication credential, to the authentication module. The authentication module determines that the request is formatted in a manner that triggers the authentication module. The authentication module obtains an authentication token from an identity provider based on the authentication credential, while refraining from generating any interactive authentication dialogue. The authentication module returns the authentication token to the web server. The web server returns the authentication token to the client. | 2014-01-23 |
20140026204 | METHOD AND SYSTEM FOR AUTHENTICATING ENTITIES BY MEANS OF TERMINALS - In the disclosed method, users are provided with sets of authentication codes, each set includes a secret, a private key container and a matching public key container, the private and public key container are generated from respectively a first string including a domain name of an authentication server system and a PKI private key and a second string including the same domain name and a matching PKI public key. Upon receipt on the authentication server system of the first strings as a result of a first user reading the respective private key container, an action definition procedure is performed in which the first user is requested to enter a secret of the same set of authentication codes. If a check returns a positive result, the first user can define a set of actions to be performed upon receipt of the second string belonging to the same set of authentication codes. | 2014-01-23 |
20140026205 | Federated Realm Discovery - A federated realm discovery system within a federation determines a “home” realm associated with a portion of the user's credentials before the user's secret information (such as a password) is passed to a non-home realm. A login user interface accepts a user identifier and, based on the user identifier, can use various methods to identify an account authority service within the federation that can authenticate the user. In one method, a realm list of the user device can be used to direct the login to the appropriate home realm of the user. In another method, an account authority service in a non-home realm can look up the user's home realm and provide realm information directing the user device to login at the home realm. | 2014-01-23 |
20140026206 | SYSTEM AND METHOD FOR SUPPORTING WEB AUTHENTICATION - A method is provided in one example embodiment and includes receiving a discover message over a network; determining that the discover message is associated with an unauthenticated client (e.g., identifying a media access control (MAC) address); communicating a proxy binding update (PBU) having a binding type value set to a temporary status; and establishing a bidirectional tunnel for transporting traffic for the client. | 2014-01-23 |
20140026207 | METHOD, DEVICE, AND COMMUNICATION SYSTEM FOR ESTABLISHING CONNECTION WITH NETWORK MANAGEMENT SYSTEM - The present disclosure relates to the field of communications technologies and discloses a method, a device, and a communication system for establishing a connection with a network management system. The method includes: obtaining, by a relay node, a first IP address of the relay node; obtaining, by the relay node, an IP address of a security gateway by using the first IP address of the relay node; establishing, by the relay node, an IP security tunnel with the security gateway according to the IP address of the security gateway; obtaining, by the relay node, a second IP address of the relay node and an IP address of the network management system through the IP security tunnel; and establishing, by the relay node, a connection with the network management system by using the second IP address of the relay node and the IP address of the network management system. | 2014-01-23 |
20140026208 | ELECTRONIC DEVICE SWITCHABLE TO A USER-INTERFACE UNLOCKED MODE BASED UPON SPOOF DETECTION AND RELATED METHODS - An electronic device may include a finger biometric sensor and a processor being switchable between a user-interface locked mode and a user-interface unlocked mode. The processor may cooperate with the finger biometric sensor to acquire spoof detection data based upon an object being placed adjacent the finger biometric sensor, and determine whether the acquired spoof detection data is representative of a live finger. The processor may also switch from the user-interface locked mode to the user-interface unlocked mode when the acquired spoof detection data is representative of a live finger, and cooperate with the finger biometric sensor to acquire biometric matching data. The processor may further perform finger matching based upon the acquired biometric matching data and stored biometric enrollment data. | 2014-01-23 |
20140026209 | DISTRIBUTION DEVICE, IMAGE FORMING DEVICE, SYSTEM, CONTROL METHOD AND STORAGE MEDIUM - A management server designates an image forming device to which import data including a plurality of setting values is distributed, and distributes the import data to the designated image forming device. When the distributed import data is reflected in the image forming device, the authentication information of the user who instructs the distribution of the import data is input, and a login by authentication processing using the input authentication information fails, the image forming device rolls back the settings for user authentication processing to the settings before the import data is reflected. | 2014-01-23 |
20140026210 | METHOD FOR AUTHENTICATING MOBILE DEVICES - A method for authenticating a mobile device, the method comprising: detecting an external input to the mobile device; when the external input is detected, displaying a screen lock pattern having at least two or more pattern points, each pattern point having an identifier; determining whether a touch input is conducted on the at least two or more pattern points in an UI (User Interface) locked state of the mobile device; and when the touch input conducted on the at least two or more pattern points is successively made in a preset sequenced combination of identifiers, unlocking the locked state of the mobile device. | 2014-01-23 |
20140026211 | STRONG PASSWORD ENTRY - A processor executing a password manager randomly selects a first requirement and a second requirement for creating a password from a set of requirements, wherein the second requirement is selected independently of the first requirement. The processor provides the first requirement for creating the password, receives characters for the password, determines whether the characters satisfy the first requirement, and provides information that indicates whether the characters satisfy the first requirement. Responsive to the characters satisfying the first requirement, the processor provides the second requirement for creating the password. | 2014-01-23 |
20140026212 | User Identification with Biokinematic Input - Systems and methods for user identification based on biokinematic input are disclosed herein. The system may include a multi-touch sensitive display including a sensor configured to receive biokinematic input including data representing detected positions of digit touches made by digits of a user, in each of a series of successive time intervals during a defined identification gesture. The system may further include a user identification module executed by a processor of the computing device. The user identification module may be configured to receive the biokinematic input from the sensor, and to compare relative positions of the digit touches and/or relative rates of change in said positions of the digit touches to a stored user template of verified biokinematic data for the user. If a match is determined, an indication that the user has been successfully identified may be displayed. | 2014-01-23 |
20140026213 | CARD FOR INTERACTION WITH A COMPUTER - A smart card comprising:
| 2014-01-23 |
20140026214 | Method of Securing Non-Native Code - A method to secure a non-native application. The non-native application is processed to obtain an application stub to be triggered within a virtual machine. The processing of the non-native application also provide a native code function upon which the application stub depends. The non-native function is part of a trusted module that extends security services from the trusted module to the virtual machine. The trusted module is a native code application that creates a trusted zone as a root of trustiness extending to the virtual machine by an execution-enabling mechanism between the application tab and the non-native function. | 2014-01-23 |
20140026215 | SYSTEM AND METHOD FOR DETECTION OF ABERRANT NETWORK BEHAVIOR BY CLIENTS OF A NETWORK ACCESS GATEWAY - A first network interface coupled to one or more clients. The first network interface analyzes received network communications to determine if a first rule of any of one or more rules corresponds to the received network communications associated with a first client. The network interface updates a first set of statistical information accumulated over a time period associated with the first client responsive to a determination that the first rule corresponds to the network communications. The network interface analyzes the first set of statistical information to determine if aberrant network behavior is occurring with respect to the first client by applying a set of conditions to the first set of statistical information. Each of the set of conditions corresponds to aberrant network behavior and comprises a threshold to be applied to at least a portion of the statistical information. | 2014-01-23 |
20140026216 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR DETECTING UNWANTED DATA BASED ON SCANNING ASSOCIATED WITH A PAYLOAD EXECUTION AND A BEHAVIORAL ANALYSIS - A system, method, and computer program product are provided for detecting unwanted data based on scanning associated with a payload execution and a behavioral analysis. In use, an execution of a payload is detected, utilizing interface monitoring. Additionally, process memory associated with the execution of the payload is scanned. Further, a behavioral analysis is performed. Still yet, unwanted data is detected based on the scanning and the performance of the behavioral analysis. | 2014-01-23 |
20140026217 | METHODS FOR IDENTIFYING KEY LOGGING ACTIVITIES WITH A PORTABLE DEVICE AND DEVICES THEREOF - A method, non-transitory computer readable medium, and apparatus that establishes a connection with a host computing device. One or more processes running on the host computing device are identified. One or more hooking operations performed in the one or more identified processes are identified. One or more suspected key logging actions are identified from the one or more identified hooking operations based on one or more of a first set of rules and output. | 2014-01-23 |
20140026218 | ROLLBACK FEATURE - A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file. | 2014-01-23 |
20140026219 | Ascertaining Domain Contexts - Various embodiments pertain to ascertaining domain contexts. In one embodiment, an application receives content that may contain a script (i.e. code). In this case, the domain context is ascertained and the script is executed in the context of the domain associated with the received content, rather than requiring the application or some other component to navigate to a location, such as a web location, to attempt to ascertain the domain context of the script. In another embodiment, third party objects or code are required to provide their domain context to an application in order for the application to make a security-based decision. | 2014-01-23 |
20140026220 | DETECTION OF SPOOFING OF REMOTE CLIENT SYSTEM INFORMATION - Digital fingerprint generation logic executed by a client device includes quirk-exposing logic configured to expose behavioral differences between various system configurations of client devices. The digital fingerprint generation logic queries a remote client device for system configuration, and generates a digital fingerprint of the client device that includes a system configuration characteristic reported by the client device in response to the query. Results of execution of the quirk-exposing logic are compared to expected results that are specific to the reported system configuration. If the results of execution do not match the expected results, the digital fingerprint is determined to have been spoofed. | 2014-01-23 |
20140026221 | DEFENSE AGAINST SEARCH ENGINE TRACKING - Techniques for enhancing electronic privacy utilize noise to prevent third parties from determining certain information based on search queries. Users submit search queries as part of their normal activities. For a user, the search queries submitted and information regarding search results used to generate additional search queries on different, but related topics. The generated additional search queries are submitted automatically on behalf of the user at a sufficient frequency to prevent high accuracy data analysis on search queries. | 2014-01-23 |
20140026222 | FRAMEWORK FOR PROVIDING ELECTRONIC LICENSES AND LICENSING PROGRAMS - Methods and system for providing licensing programs are provided. The electronic license may specify a number of available licenses based on the count property, a license model for calculating a number of used licenses based on the count type property, a number of available overdraft licenses based on the overdraft property, and an interval of available time within which return of a used license is accepted, based on the return interval property. The electronic license may then be distributed together with the licensing program to the licensee. A new electronic license can be deployed by the licensee without a need to update previously installed licensing program. The combination of count-related license properties may be applicable to a great variety of license models and deployments. | 2014-01-23 |
20140026223 | MOBILE DEVICE RECORDING - A method for recording between a first device and a second device includes, prior to establishing a connection for recording between the first and second devices, creating a list of trusted devices. Presence of the second device on the list indicates permission to record a communication between the first and second devices. The method further includes storing the list of trusted devices, wherein the list is accessible by the first device, establishing the connection for recording between the first and second devices, verifying by the first device that the second device is on the list of trusted second devices, and recording at least a portion of the communication between the first and second devices if indicated by a user of the first device without further input from a user of the second device. | 2014-01-23 |
20140026224 | ELECTRONIC DEVICE - An electronic device comprises an outer case, a wireless card reader and a signal processing device. The outer case comprises a door and a metal wall. The metal wall is disposed on a lateral side of the outer case and has an opening. The door is disposed on the metal wall and capable of covering the opening. The wireless card reader is inside the door and capable of transmitting wireless signals. The signal processing device has a case, a data storage device and a safety mechanism. The signal processing device is inside the outer case and is electrically connected to the wireless card reader. The signal processing device is capable of processing the data of wireless signals from the wireless card reader. When the case is dissembled, the safety mechanism destroys at least part of the data stored in the data storage device. | 2014-01-23 |
20140026225 | ELECTRONIC STORAGE DEVICE AND DATA PROTECTION METHOD THEREOF - An electronic storage device and a data protection method are provided. The electronic storage device is electrically connected to a host, and stores data of the host. The data protection method includes the following steps: providing a backup battery where the backup battery is configured inside the electronic storage device to provide electric power for an operation of the electronic storage device when the host does not provide electricity to the electronic storage device; setting a time setting value; transmitting a login event to the electronic storage device; and the electronic storage device determines whether to protect stored data in the electronic storage device according to the time setting value and the login event, wherein if a determination result is affirmative, the electronic storage device protects the stored data. | 2014-01-23 |
20140026226 | DEVICE, METHOD AND PROGRAM FOR PREVENTING INFORMATION LEAKAGE - Provided is a device for preventing information leakage including: a storage unit that stores message time, request source information, and request destination information in relation to each information requesting message; a unit that suspends a response message containing personal information in response messages in response to the information requesting messages, for a predetermined suspended time from a message time of the corresponding information requesting message; a unit that counts the number of information requesting messages transmitted from the same request source to the same destination and corresponding to the suspended response message on the basis of information stored in the storage unit; and a unit that, in the case where the counted number of the information requesting messages exceeds a predetermined threshold value, applies a protection process to the suspended response message so that the personal information contained in the suspended response message is not received by the request source. | 2014-01-23 |
20140026227 | METHOD FOR GENERATING A SECURE COPY OF MEDIA DATA - A system for transferring verified media data. The system comprising: an item of content storing the media data, and having an associated serial number; a computing device including a first storage device and a network interface; a secure copying application program; a secure copy of the media data generated by the secure copying application program and stored on the first storage device; a verification server including a serial number database and having a network connection to the computing device through the network interface, wherein the secure copying application program generates the secure copy after verifying the serial number is valid and active by communicating with the verification server; and a portable copy of the media data, including license information, generated from the secure copy by the secure copying application program. | 2014-01-23 |
20140026228 | INFORMATION PROCESSING APPARATUS AND CONTROL METHOD - According to one embodiment, an information processing apparatus includes a management module and a control module. The control module detects an event of requesting install of an application program, and transmits, prior to execution of the install, install event information including an application name of the application program to the management module. The management module notifies the install event information to a determination program, and transmits to the control module a determination result indicative of permission or prohibition of the install, the determination result being received from the determination program. | 2014-01-23 |
20140026229 | DELEGATION OF ACCESS RIGHTS TO AN ACCOUNT AFTER THE DISAPPEARANCE OF THE USER - A management process for access to secure data includes: storing secure data associated with a first user and authentication data of said first user, managing access to the secure data of the first user, as a function of the authentication data of this first user. The process includes: storing, in the secure data of the first user, a heritage rule and a list of at least one second user and, for each second user of said list, an rule for access to secure data of the first user, storing authentication data for each second user of said list, and when the heritage rule is satisfied, managing access, by said at least one second user, to the secure data of the first user, as a function of the authentication data of the second user and of the rule for access of the second user. | 2014-01-23 |
20140026230 | Method, System, Login Device, and Application Software Unit for Logging in to Document Management System - The present invention provides a method, system, login device, and application software unit for logging in to a document management system. | 2014-01-23 |
20140026231 | SELF-GENERATION OF VIRTUAL MACHINE SECURITY CLUSTERS - A method of operating a virtual computing system includes receiving at a security controller security data corresponding to a candidate virtual machine that is proposed to be included in a virtualization environment managed by a virtualization environment manager, comparing the security data of the candidate virtual machine to security data of other virtual machines in the virtualization environment, and in response to the comparison, recommending that the virtualization environment manager exclude the candidate virtual machine from the virtualization environment. Related systems and computer program products are disclosed. | 2014-01-23 |
20140026232 | NONVOLATILE MEMORY, READING METHOD OF NONVOLATILE MEMORY, AND MEMORY SYSTEM INCLUDING NONVOLATILE MEMORY - A nonvolatile memory device includes a memory cell array and a read/write circuit connected to the memory cell array through bit lines. The read method of the nonvolatile memory device includes receiving a security read request, receiving security information, and executing a security read operation in response to the security read request. The security read operation includes reading of security data from the memory cell array using the read/write circuit, storing of the read security data in a register, performing security decoding on the read security data stored in the register using the received security information, resetting the read/write circuit, and outputting a result of the security decoding. | 2014-01-23 |
20140026233 | TRANSGENIC PIG EXPRESSING STNFR1-FC GENES AND THE USES THEREOF - The present invention relates to a transgenic pig that expresses sTNFR1-Fc, wherein a gene encoding sTNFR1-Fc, which is a fusion protein of the extracellular domain of human soluble tumor necrosis factor receptor (sTNFR1) and an immunoglobulin Fc region, is introduced; a method for preparing the same; an organ isolated from the transgenic pig; a somatic donor cell line inserted with sTNFR1-Fc gene; a method for preparing a blood sample comprising sTNFR1-Fc; and a method for preparing human sTNFR1-Fc from the blood sample of the transgenic pig. As the transgenic pig can suppress immune response and inflammatory response by secreting an inhibitory substance that suppresses the activity of TNF-α in blood, it can be effectively used for xenograft. Furthermore, since the transgenic pig has a blood type O, it can be transplanted for suppressing inflammatory response, regardless of a blood type of recipient. | 2014-01-23 |
20140026234 | BIOMARKERS AND THEIR USES IN CANCER DETECTION AND THERAPY - Presented herein are novel protein biomarkers related to cancers with stromal components. These newly identified biomarkers create the basis for multiple (single) assays using traditional bioassay technologies and when used in combination yield exceptional clinical sensitivity and specificity in the determination of diagnosis and/or prognosis of cancer. A new genetic model able to identify potential genetic suppressors and/or potential therapeutic agents for treating stromal cancers is also described. Means and methods for evaluating data generated using multiple biomarkers in order to validate findings and further the use of the biomarkers and the genetic model system in clinical, diagnostic and therapeutic uses is also included. | 2014-01-23 |
20140026235 | SOYBEAN CULTIVAR S100168 - A soybean cultivar designated S100168 is disclosed. The invention relates to the seeds of soybean cultivar S100168, to the plants of soybean cultivar S100168, to the plant parts of soybean cultivar S100168, and to methods for producing progeny of soybean cultivar S100168. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S100168. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S100168, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S100168 with another soybean cultivar. | 2014-01-23 |
20140026236 | SOYBEAN CULTIVAR S100248 - A soybean cultivar designated S100248 is disclosed. The invention relates to the seeds of soybean cultivar S100248, to the plants of soybean cultivar S100248, to the plant parts of soybean cultivar S100248, and to methods for producing progeny of soybean cultivar S100248. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S100248. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S100248, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S100248 with another soybean cultivar. | 2014-01-23 |
20140026237 | SOYBEAN CULTIVAR S100324 - A soybean cultivar designated S100324 is disclosed. The invention relates to the seeds of soybean cultivar S100324, to the plants of soybean cultivar S100324, to the plant parts of soybean cultivar S100324, and to methods for producing progeny of soybean cultivar S100324. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S100324. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S100324, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S100324 with another soybean cultivar. | 2014-01-23 |
20140026238 | SOYBEAN CULTIVAR S100325 - A soybean cultivar designated S100325 is disclosed. The invention relates to the seeds of soybean cultivar S100325, to the plants of soybean cultivar S100325, to the plant parts of soybean cultivar S100325, and to methods for producing progeny of soybean cultivar S100325. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S100325. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S100325, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S100325 with another soybean cultivar. | 2014-01-23 |
20140026239 | SOYBEAN CULTIVAR S100321 - A soybean cultivar designated S100321 is disclosed. The invention relates to the seeds of soybean cultivar S100321, to the plants of soybean cultivar S100321, to the plant parts of soybean cultivar S100321, and to methods for producing progeny of soybean cultivar S100321. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S100321. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S100321, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S100321 with another soybean cultivar. | 2014-01-23 |
20140026240 | SOYBEAN CULTIVAR S110132 - A soybean cultivar designated S110132 is disclosed. The invention relates to the seeds of soybean cultivar S110132, to the plants of soybean cultivar S110132, to the plant parts of soybean cultivar S110132, and to methods for producing progeny of soybean cultivar S110132. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S110132. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S110132, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S110132 with another soybean cultivar. | 2014-01-23 |
20140026241 | SOYBEAN CULTIVAR 11263801 - A soybean cultivar designated 11263801 is disclosed. The invention relates to the seeds of soybean cultivar 11263801, to the plants of soybean cultivar 11263801, to the plant parts of soybean cultivar 11263801, and to methods for producing progeny of soybean cultivar 11263801. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar 11263801. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar 11263801, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar 11263801 with another soybean cultivar. | 2014-01-23 |
20140026242 | SOYBEAN CULTIVAR S110122 - A soybean cultivar designated S110122 is disclosed. The invention relates to the seeds of soybean cultivar S110122, to the plants of soybean cultivar S110122, to the plant parts of soybean cultivar S110122, and to methods for producing progeny of soybean cultivar S110122. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S110122. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S110122, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S110122 with another soybean cultivar. | 2014-01-23 |
20140026243 | SOYBEAN CULTIVAR S110123 - A soybean cultivar designated S110123 is disclosed. The invention relates to the seeds of soybean cultivar S110123, to the plants of soybean cultivar S110123, to the plant parts of soybean cultivar S110123, and to methods for producing progeny of soybean cultivar S110123. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S110123. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S110123, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S110123 with another soybean cultivar. | 2014-01-23 |
20140026244 | SOYBEAN CULTIVAR S110181 - A soybean cultivar designated S110181 is disclosed. The invention relates to the seeds of soybean cultivar S110181, to the plants of soybean cultivar S110181, to the plant parts of soybean cultivar S110181, and to methods for producing progeny of soybean cultivar S110181. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S110181. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S110181, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S110181 with another soybean cultivar. | 2014-01-23 |
20140026245 | SOYBEAN CULTIVAR XB36AX12 - A soybean cultivar designated XB36AX12 is disclosed. The invention relates to the seeds of soybean cultivar XB36AX12, to the plants of soybean cultivar XB36AX12, to the plant parts of soybean cultivar XB36AX12, and to methods for producing progeny of soybean cultivar XB36AX12. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar XB36AX12. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar XB36AX12, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar XB36AX12 with another soybean cultivar. | 2014-01-23 |
20140026246 | SOYBEAN CULTIVAR S110226 - A soybean cultivar designated S110226 is disclosed. The invention relates to the seeds of soybean cultivar S110226, to the plants of soybean cultivar S110226, to the plant parts of soybean cultivar S110226, and to methods for producing progeny of soybean cultivar S110226. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S110226. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S110226, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S110226 with another soybean cultivar. | 2014-01-23 |
20140026247 | SOYBEAN CULTIVAR S110126 - A soybean cultivar designated S110126 is disclosed. The invention relates to the seeds of soybean cultivar S110126, to the plants of soybean cultivar S110126, to the plant parts of soybean cultivar S110126, and to methods for producing progeny of soybean cultivar S110126. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S110126. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S110126, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S110126 with another soybean cultivar. | 2014-01-23 |
20140026248 | SOYBEAN CULTIVAR S100108 - A soybean cultivar designated S100108 is disclosed. The invention relates to the seeds of soybean cultivar S100108, to the plants of soybean cultivar S100108, to the plant parts of soybean cultivar S100108, and to methods for producing progeny of soybean cultivar S100108. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S100108. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S100108, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S100108 with another soybean cultivar. | 2014-01-23 |
20140026249 | SOYBEAN CULTIVAR S100106 - A soybean cultivar designated S100106 is disclosed. The invention relates to the seeds of soybean cultivar S100106, to the plants of soybean cultivar S100106, to the plant parts of soybean cultivar S100106, and to methods for producing progeny of soybean cultivar S100106. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S100106. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S100106, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S100106 with another soybean cultivar. | 2014-01-23 |
20140026250 | SOYBEAN CULTIVAR UA KIRKSEY - A soybean cultivar designated UA Kirksey is disclosed. The invention relates to the seeds of soybean cultivar UA Kirksey, to the plants of soybean cultivar UA Kirksey, to the plant parts of soybean cultivar UA Kirksey, and to methods for producing progeny of soybean cultivar UA Kirksey. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar UA Kirksey. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar UA Kirksey, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar UA Kirksey with another soybean cultivar. | 2014-01-23 |
20140026251 | SOY GENE CLUSTER REGIONS AND METHODS OF USE - Methods for conveying pathogen resistance into non-resistant soybean germplasm are provided. In some embodiments, the methods include introgressing pathogen resistance into a non-resistant soybean using one or more nucleic acid markers for marker-assisted breeding among soybean lines to be used in a soybean breeding program, wherein the markers are linked to and/or associated with pathogen resistance. Also provided are single nucleotide polymorphisms (SNPs) associated with resistance to pathogens; soybean plants, seeds, and tissue cultures produced by any of the disclosed methods; seed produced by the disclosed soybean plants; and compositions including amplification primer pairs capable of initiating DNA polymerization by a DNA polymerase on soybean nucleic acid templates to generate soybean marker amplicons. | 2014-01-23 |
20140026252 | MAYETIOLA DESTRUCTOR SUSCEPTIBILITY GENE ONE (MDS-1) AND ITS APPLICATION IN PEST MANAGEMENT - Plants having increased resistance to a pest relative to corresponding control plants are provided. The resistant plants have inhibited expression, activity, or function of a susceptibility gene, and thereby have decreased expression, activity, or function of the susceptibility gene in the presence of the pest as compared to a control plant in which the wild-type susceptibility gene is normally expressed in the presence of the pest. Methods of producing plants with increased resistance are also provided. The methods involve altering the expression, activity, or function of a susceptibility gene, such as Mds-1, in the plant. Isolated Mds-1 sequences are provided that can be manipulated to enhance pest resistance in modified plants. Modified plants, plant cells, tissues, seeds, and progeny are also provided having enhanced pest resistance. | 2014-01-23 |
20140026253 | INDUCED CHROMOSOME DOUBLING IN PLANTS - Methods to generate doubled haploid plants and plant components using low mammalian toxicity chromosome doubling agents are disclosed. Chromosome doubling agents provide low mortality rates and higher chromosome doubling rate in plants. | 2014-01-23 |
20140026254 | Gene Implicated in Drought Stress Tolerance and Transformed Plants with the Same - The present invention relates to a composition for improving drought stress tolerance in a plant, a transgenic plant with enhanced drought stress tolerance, and a method for preparing a transgenic plant. The novel functional plant having excellent drought stress-tolerance may be prepared using the composition for improving drought stress tolerance and a method for preparing a transgenic plant. | 2014-01-23 |
20140026255 | Transgenic Expression of Archaea Superoxide Reductase - This invention relates to compositions and methods for reducing reactive oxygen species in plants, yeast, algae or bacteria by transforming a plant, yeast or bacteria with a heterologous polynucleotide encoding a superoxide reductase from an archaeon species. The invention also provides methods for protecting a photosynthetic reaction center, for reducing photorespiration and/or for increasing the photosynthetic efficiency of plants or cyanobacteria as well as methods for increasing tolerance to abiotic stress in plants, yeast or bacteria by transforming a plant, yeast, or bacteria with a heterologous polynucleotide encoding a archaeon superoxide reductase. Methods for delaying senescence, reducing lignin polymerization and increasing accessibility of cell wall cellulose to an enzyme in a plant by transforming the plant with a heterologous polynucleotide encoding an archaeon superoxide reductase are also provided. Additionally, transformed plants, yeast and bacteria are provided as well as products produced from the transformed plants, yeast and bacteria. | 2014-01-23 |
20140026256 | Nematode-Resistant Transgenic Plants - The invention provides nematode-resistant transgenic plants and seed produced by expression of polynucleotides encoding certain plant polypeptides. The invention also provides methods of producing soybean cyst nematode-resistant transgenic plants in which those plant polynucleotides are expressed and expression vectors for use in such methods. | 2014-01-23 |
20140026257 | Plants Having Enhanced Yield-Related Traits and Method for Making the Same - The present invention relates generally to the field of molecular biology and concerns a method for enhancing various economically important yield-related traits in plants. More specifically, the present invention concerns a method for enhancing yield-related traits in plants by modulating expression in a plant of a nucleic acid encoding a WI12-like (WIL) polypeptide or a SAWADEE-like polypeptide or a POZ-like (Pox virus and Zn Finger) polypeptide. The present invention also concerns plants having modulated expression of a nucleic acid encoding a WIL polypeptide or a SAWADEE-like polypeptide or a POZ-like polypeptide, which have enhanced yield-related traits relative to control plants. The invention also provides hitherto unknown WIL-encoding nucleic acids, and constructs comprising the same, and hitherto unknown POZ-like encoding nucleic acids, and constructs comprising the same, useful in performing the methods of the invention. | 2014-01-23 |
20140026258 | BACTERIAL FORMULATION WHICH CAN BE USED FOR BIOLOGICALLY CONTROLLING PLANT DISEASES AND PROMOTING PLANT GROWTH - The present invention relates to bacterial formulation in vegetable fiber materials, which can be employed by incorporation into soils and by treating seeds, as well as in nutrient in hydroponic systems, for the promotion of plant growth and/or the biologic control of diseases. Preferably, the formulation of the present invention employs coconut fiber. | 2014-01-23 |
20140026259 | Method for the Production of Polyunsaturated Fatty Acids - The present invention relates to a process for producing polyunsaturated fatty acids in an organism by introducing nucleic acids into the organism which code for polypeptides having acyl-CoA:lysophospholipid a cyltransferase activity. Advantageously, these nucleic acid sequences may, if appropriate together with further nucleic acid sequences coding for biosynthesis polypeptides of the fatty acid or lipid metabolism, be expressed in the transgenic organism. The invention furthermore relates to the nucleic acid sequences, to nucleic acid constructs comprising the nucleic acid sequences of the invention, to vectors comprising the nucleic acid sequences and/or the nucleic acid constructs and to transgenic organisms comprising the abovementioned nucleic acid sequences, nucleic acid constructs and/or vectors. A further part of the invention relates to oils, lipids and/or fatty acids produced by the process of the invention and to their use. | 2014-01-23 |