04th week of 2013 patent applcation highlights part 56 |
Patent application number | Title | Published |
20130024878 | SPINDLE MOTOR - Disclosed herein is a spindle motor including: a turn table made of a deformable iron based material; a turn table inner diameter part provided at the center of the turn table, having a hollow part, and including a coupling part formed in an inner peripheral surface thereof; and a shaft inserted into the hollow part of the turn table inner diameter part to thereby contact the coupling part and rotate in an axial direction. | 2013-01-24 |
20130024879 | Measuring Television Advertisement Exposure Rate and Effectiveness - In one embodiment, a social networking system models a number of exposures to an advertisement for a concept for a set of users, sample from the set of users attitudinal data toward the concept, and determine effectiveness of the advertisement by evaluating the attitudinal data against the number of exposures to the advertisement. | 2013-01-24 |
20130024880 | WEB-BASED MUSIC PARTNER SYSTEMS AND METHODS - Systems and methods for media content development and deployment are disclosed. An example system includes a development platform and content delivery platform, the platforms including a processor and a memory. The example development platform is to provide an interface to accept media content from a provider to be certified for delivery via the delivery platform. The example development platform is to facilitate testing of the media content by the provider via the interface according to testing tools and an application programming interface provided in conjunction with the development platform. The example development platform is to process the media content for monitored beta test by users via the content delivery platform. The example development platform is to evaluate the monitored beta test to determine suitability of the media content for release. The example development platform is to facilitate release of the media content for general availability via the content delivery platform. | 2013-01-24 |
20130024881 | ELECTRONICALLY CLIPPING COUPONS - Methods, systems, computer readable media, and apparatuses for electronically clipping coupons are presented. In one aspect, a user request to electronically clip a vendor coupon may be received at a user device, where the vendor may be different from a supplier of the content. Account information associated with the user may be identified. Thereafter, information identifying the electronically clipped coupon and the account information may be transmitted to the vendor. The vendor subsequently may allow the user to redeem the clipped coupon the next time that the user visits the vendor and presents matching account information to the vendor. | 2013-01-24 |
20130024882 | ELECTRONIC DEVICE AND SOCIAL COMMERCE SERVER FOR PERFORMING COUPON SEARCH - Disclosed is an electronic device. The electronic device may include a communication unit and a control unit. The communication unit may provide access to at least one network. The control unit extracts a search keyword from contents received through the communication unit, searches for a coupon for at least one product corresponding to the search keyword in a social commerce network, and transmits a result of the coupon search to another predetermined electronic device. | 2013-01-24 |
20130024883 | SYSTEM AND METHOD FOR ACCESS OVER A CABLE TELEVISION NETWORK - A system and method for allowing a computing device to associate wirelessly with one or more access points that are connected to a cable TV network when such device is in a range of such access point, even though such wireless device would not generally be authorized to receive content or data from the access point. Signals to and from the wireless device are carried over the cable TV network and transmitted to other devices associated with other access points attached to the cable TV network. | 2013-01-24 |
20130024884 | SYSTEM AND METHOD FOR APPLYING TV SETTINGS TO PLURAL TVS THROUGH A NETWORK - A system includes plural TVs, with a master TV accepting user input to establish TV settings. The system also includes a server accessing the TV settings from the master TV to send the settings to at least some of the other plural TVs over a network to establish respective TV settings on the other TVs. | 2013-01-24 |
20130024885 | WATERMARKED MEDIA CONTENT IN IPTV OR iTV NETWORKS - A method that incorporates teachings of the present disclosure may embedding a watermark in media content for presentation at a rendering device using an editor to associate the watermark with one or more metadata pointers that point to additional media content according to an embedded link of the watermark to generate a group of one or more metadata pointers where the watermark includes an embedded link to additional media content used to modify the media content based on a content exchange between the rendering device and a computer. The method may further include storing the group of one or more metadata pointers, where a selection of the watermark invokes access to the altered media content containing the additional media content associated with the watermark, thereby producing the altered media content at the one or more user devices. Other embodiments are disclosed. | 2013-01-24 |
20130024886 | MODULAR BROADCAST RECEIVER SYSTEM AND METHOD - The construction of a receiving apparatus for receiving a broadcast from a plurality of broadcasting providers is simplified. In a receiving apparatus for receiving a broadcast from a plurality of broadcasting providers, of the function blocks which constitute the receiving apparatus, a block used in common irrespective of the broadcasting provider is formed as a common block, and a block different from one broadcasting provider to another is formed as an independent block. These blocks are connected to each other through an IEEE1394 interface, and the common block is shared among the plurality of blocks which are not used in common, so that a receiving process is performed. | 2013-01-24 |
20130024887 | USING COMPANION ADS IN ADLITE RICH MEDIA - The present invention provides techniques relating to rich media advertising. Techniques are provided in which an advertiser-provided image-based component of an advertisement creative is matched with an advertiser-provided audio component of the advertisement creative. A rich media advertisement may be served that includes the image-based component and a synchronously presented audio component. The image-based component and the audio-based component may be elements of a companion advertisement. | 2013-01-24 |
20130024888 | Inserting Advertisement Content in Video Stream - A system and method for inserting advertising content in a video stream are provided. A screen layout includes a plurality of sections is determined with reference to user-designated parameters or with reference to pre-set rules. An output video stream is generated, in which an input video stream received through an input port is shown in one of the sections of the screen layout and supplemental content comprising advertising received through a content port is shown one or more other sections of the screen layout. The output video signal is then output to a display device through a video output port. | 2013-01-24 |
20130024889 | METHOD, APPARATUS, AND SYSTEM FOR PLAYING TARGETED ADVERTISEMENT - Embodiments of the present invention disclose a method, an apparatus and a system for playing a targeted advertisement. An access switch receives an IGMP join packet sent by a user end, snoops the IGMP join packet, and obtains a first mapping relationship; establishes a first multicast forwarding entry according to the first mapping relationship and a pre-saved second mapping relationship between the access port and a virtual local area network of a targeted advertisement user group; and receives an advertisement media stream sent by an access router, and forwards the advertisement media stream to the targeted advertisement user group by using the access port corresponding to the virtual local area network of the targeted advertisement user group according to the first multicast forwarding entry. In this way, the problems that placing precision of a region-targeted advertisement is low and audience rating is poor in the prior art is solved. | 2013-01-24 |
20130024890 | APPARATUS AND METHOD FOR THE COMPULSORY VIEWING OF ADVERTISEMENTS - An apparatus and method for the compulsory viewing of advertisements in conjunction with a DRM technique for protecting a multimedia service by obligating a user to view advertisements on the device of the user includes, upon receipt of a request for the provision of content, determining whether or not information on compulsory advertisement viewing is included in a rights object for the requested content, if information on compulsory advertisement viewing is included, detecting the advertisement relevant to the requested content, playing the detected advertisement for a predetermined compulsory playback time, and providing the requested content upon the completion of the playback of the advertisement. | 2013-01-24 |
20130024891 | INTERACTIVE MAP AND RELATED CONTENT FOR AN ENTERTAINMENT PROGRAM - A system and method for providing interactive content that is correlated to events of an entertainment program. | 2013-01-24 |
20130024892 | DIGITAL BROADCAST RECEIVING DEVICE HAVING AN ELECTRONIC PROGRAM GUIDE - The present invention relates to a digital broadcast receiving device ( | 2013-01-24 |
20130024893 | CLIENT-SERVER BASED INTERACTIVE TELEVISION GUIDE WITH SERVER RECORDING - An interactive television program guide system is provided. An interactive television program guide provides users with an opportunity to select programs for recording on a remote media server. Programs may also be recorded on a local media server. The program guide provides users with VCR-like control over programs that are played back from the media servers and over real-time cached copies of the programs. The program guide also provides users with an opportunity to designate gift recipients for whom programs may be recorded. | 2013-01-24 |
20130024894 | METHOD, COMPUTER PROGRAM, RECEPTION APPARATUS, AND INFORMATION PROVIDING APPARATUS FOR TRIGGER COMPACTION - A method, computer program, and reception apparatus, and information providing apparatus. The method includes receiving a trigger parameters table (TPT). The TPT is associated with a triggered declarative object (TDO) and includes at least one parameter associated with a trigger event. The TPT is stored in a first memory of the reception apparatus. The TDO is executed by a processor of the reception apparatus and is stored in a second memory of the reception apparatus. The reception apparatus receives a trigger associated with the trigger event. At least one parameter associated with the trigger event is retrieved from the TPT based on information included in the trigger. Further, a function is performed based on the retrieved at least one parameter. | 2013-01-24 |
20130024895 | Interface for Watching a Stream of Videos - A computing device provides a display of a plurality of channel previews for a plurality of channels in a channel control area in a user interface, the display distinguishing a first channel preview of the plurality of channel previews that pertains to a first channel of the plurality of channels. The computing device further provides a display of a first set of video previews for a first set of videos in a video control area in the user interface, the first set of video previews being associated with the first channel preview. Responsive to the computing device receiving an input identifying a second channel preview of the plurality of channel previews that pertains to a second channel of the plurality of channels, the computing device replaces the first set of video previews in the video control area with a second set of video previews associated with the second channel preview. | 2013-01-24 |
20130024896 | SYSTEM AND METHOD FOR GENERATING VIDEO TAPING REMINDERS - Electronic Guide products give the user the ability to videotape selected programs. Once a program has successfully been taped a message is displayed, reminding the viewer that they have taped it. (E.g. “You taped ______; have you watched it yet?”) Information comprising information that shows are taped, the particular shows taped and viewer profiles allow advertisements targeted to the viewer who typically records a given type of programming to be presented. | 2013-01-24 |
20130024897 | EXTENSIONS TO TRIGGER PARAMETERS TABLE FOR INTERACTIVE TELEVISION - A method, computer program, and reception apparatus, and information providing apparatus. The method includes receiving content from a content source, and displaying the received content on a display. A first trigger is extracted from closed caption data associated with the received content. The reception apparatus retrieves a trigger parameters table (TPT) based on the extracted first trigger. The TPT includes at least one event associated with one or a combination of a trigger identifier and a first media time of the received content, and is stored in a memory of the reception apparatus. Further, the reception apparatus processes the event based on one or a combination of a second trigger including the trigger identifier and the first media time equaling a current media time of the received content. | 2013-01-24 |
20130024898 | CONTENT PLAYBACK DEVICE, CONTENT PLAYBACK METHOD, CONTENT PLAYBACK PROGRAM, AND CONTENT PROVIDING SYSTEM - To provide a content playback device capable of, when playing back a content distributed in a streaming format via a network whose view mode is selectable among a plurality of view modes, presenting to a user the switchability between the view modes, thereby to improve the user's convenience. The content playback device includes a reception unit that receives, from the content distribution system, control information indicating a plurality of view modes selectable for viewing the video content, a presentation unit that presents, to a user, the view modes as options of a view mode for viewing the video content, an input reception unit that receives an input selecting one view mode among the view modes from the user; and a request unit that requests the content distribution system to distribute the video content in the streaming format, by transmitting information indicating the selected view mode to the content distribution system. | 2013-01-24 |
20130024899 | LOGICAL NODE IDENTIFICATION IN AN INFORMATION TRANSMISSION NETWORK - A system for generating and sending a Logical Node identification signal as part of a data stream is disclosed. The system also includes subscriber stations capable of receiving and extracting Logical Node identification information from a data stream. The subscriber stations create new messages including the Logical Node identification signal and send the message to the transmission network system control, such that switching of data streams to an appropriate channel over the information transmission network is done consistent with the network topology. | 2013-01-24 |
20130024900 | METHOD AND APPARATUS FOR PROCESSING NON-REAL-TIME BROADCAST SERVICE AND CONTENT TRANSMITTED BY BROADCAST SIGNAL - The present invention relates to a method and an apparatus for delivering an NRT service or NRT content through a broadcast signal. According to one embodiment of the present invention, the method for processing the NRT broadcast service comprises the steps of: receiving a broadcast signal including an IP multicast stream transmitted through a particular Internet protocol (IP) address; parsing a service map table (SMT) for signaling a non-real-time (NRT) service from the IP multicast stream included in the received broadcast signal; parsing a language information descriptor indicative of language information of an element associated with the NRT service at the parsed service map table; parsing, in the parsed language information descriptor, a language type field indicative of the type of language used in the NRT service and an element type field indicative of the type of element associated with the NRT service; and identifying that the language indicated by the language type field is used in the element associated with the NRT service indicated by the parsed element type field, wherein said element type field identifies one of elements which are associated with the NRT service and include a caption element of the NRT service and a text element of the NRT service. | 2013-01-24 |
20130024901 | METHOD AND SYSTEM FOR PROCESSING MULTI-MEDIA CONTENT - A method and system for micro-cloud computing is described. An application serving node, which is a specifically configured piece of customer premises equipment such as a set-top box, is the server for a micro-cloud network. Various user devices that form part of the micro-cloud network, such as television sets and smart phones, communicate with the application serving node. The application serving node is configured with software that allows various heterogeneous types of data to be obtained and streamed to the user devices in multiple ways. The application serving node performs much of the processing necessary for such content streaming itself and thus represents an edge-based network architecture. | 2013-01-24 |
20130024902 | SOURCE RATE AND CHANNEL RATE MATCHING FOR SCALABLE VIDEO TRANSMISSON - A source rate associated with a video bit stream ( | 2013-01-24 |
20130024903 | STREAM CONDITIONING FOR SEAMLESS SWITCHING OF ADDRESSABLE CONTENT ACROSS TRANSPORT MULTIPLEX, USING LOCAL STORED CONTENT AS PRE-ROLL AND POST-ROLL BUFFERS; IN DIGITAL TELEVISION RECEIVERS - A system, method and apparatus to enable addressable advertising content delivery in which multiple addressable content streams are sent in a transport multiplex, Addressable Content Channel Multiplex, different from the Primary Channel Multiplex on which the Primary Channel is delivered. The Primary Channel is network stream onto which the addressable content is to be inserted. Seamless switch between the Primary Channel and the addressable content streams on the Addressable Content Channel Multiplex is accomplished by using Receiver stored content as interim buffers to which the switching happens prior to switching to a different transport multiplex. These buffers feed the audio and video decoders with content, during the time it takes for the tuner to switch to a different transport multiplex. Pre-roll and Post-roll content buffers are used during switching, one from Primary Channel Multiplex to Addressable Content Channel Multiplex and from Addressable Content Channel Multiplex to Primary Channel Multiplex. | 2013-01-24 |
20130024904 | System and Method to Manage a Content Stream - A method of managing bandwidth usage at a customer premises includes receiving a content stream at a set-top box device coupled to a display device. The method also includes receiving a signal at the set-top box device from an external power interface. The signal indicates that a low power state has been detected at a power outlet of the external power interface, the power outlet associated with the display device. Further, the method includes sending a signal to a source of the content stream in response to receiving the signal indicating the low power state. The signal indicates that the source is to cease sending the content stream to the set-top box device. | 2013-01-24 |
20130024905 | EXTENSIBLE ENCODING FOR INTERACTIVE EXPERIENCE ELEMENTS - Detailed herein is a technology which, among other things, allows for storage and playback of interactive user elements in a television stream. In one approach to this technology, a content data stream, including a television program and a user experience element, is received. This content data stream is transformed, and the transformed data stream is examined, to identify which packets are associated with the user experience element. Those packets are then passed to a handler appropriate for the user experience element. | 2013-01-24 |
20130024906 | SYSTEM AND METHOD FOR CONSTRUCTION, DELIVERY AND DISPLAY OF ITV CONTENT - iTV content is created and deployed using a server component adapted to allow content developers to create applications according to an authoring specification that describes a framework for same; a transport component including an operator-deployed application management system configured to optimize and deliver the aplications to one or more clients; and a client component adapted to render the applications through a television so as to permit user interaction therewith. The authoring specification provides for the presentation of content through one or more templates defined therein, allowing application definition and behavior to remain common across multiple client device types, middleware platforms, and/or iTV operating environments. The framework for applications accommodates advertising, promotions, content placement packages and/or programming campaign definitions, so as to permit a selection of a specific advertisement, promotion or content at a time of preparation of the iTV content by the server, and/or a time of execution of the applications by the client. | 2013-01-24 |
20130024907 | INTEGRATING SUDO RULES WITH ENTITIES REPRESENTED IN AN LDAP DIRECTORY - A method and apparatus for integrating Sudo rules into a Lightweight Directory Access Protocol (LDAP) repository. An LDAP directory server receives a request to add a sudo rule to the LDAP repository. The sudo rule defines at least one sudo command and one or more entities associated with the execution of the sudo command. The LDAP directory server creates an LDAP entry for the sudo rule, and links in the LDAP entry of the sudo rule an LDAP entry of the sudo command and LDAP entries of the entities associated with the execution of the sudo command. | 2013-01-24 |
20130024908 | SYSTEM AND METHOD FOR APPLICATION-INTEGRATED INFORMATION CARD SELECTION - A selector daemon can run in the background of a computer. Applications that are capable of processing information cards directly, without requiring the use of a card selector, can request the selector daemon to list information cards that satisfy security policy. Upon receiving such a request, selector daemon can determine the information cards available on the computer that satisfy the security policy, and can identify these information cards to the requesting application. The applications can then use the identified information cards in any manner desired, without having to use a card selector: for example, by requesting a security token based on one of the information cards directly from an identity provider. | 2013-01-24 |
20130024909 | ACCESS CONTROL PROGRAM, SYSTEM, AND METHOD - Authority permission grants/denials associated with each of a plurality of roles (R1, R2, . . . , Rm) assigned to one subject are derived by inheritance based on a subject assignment associating a role and a subject, an authority permission assignment associating a role, an authority permission, and a grant/denial, and a role hierarchy indicating an inheritance relation between roles. Among the derived authority permission grants/denials, grants/denials of authority permissions (A1, A2, . . . , An) which are each derived from two or more different roles (R1, R2, . . . , Rm) and which are each granted to one of the plurality of roles R1, R2 . . . Rm but denied to another one of the plurality of roles R1, R2 . . . Rm are determined in accordance with an input. As exceptional authority permission assignment for a virtual exceptional role constituted of a combination of roles (R1, R2, . . . , Rm), authority permission grants/denials associated with each role (R1, R2, . . . , Rm) are derived by inheritance based on the role hierarchy, authority permission assignment, and the exceptional authority permission assignment. | 2013-01-24 |
20130024910 | COMPUTER IMPLEMENTED METHODS AND APPARATUS FOR INTEGRATING A SOCIAL NETWORK INFORMATION FEED WITH A NETWORK COMMUNICATIONS APPLICATION - Disclosed are systems, apparatus, and methods for integrating an information feed. In various implementations, an identity of a user may be determined based on authentication information, where the authentication information identifies a user profile. In some implementations, profile information is identified based on the determined identity, where the profile information identifies one or more entities tracked using one or more information feeds associated with the user profile, and where the one or more information feeds comprises one or more feed items stored in a database system. In various implementations, the identified profile information is associated with a user account provided by a network communications application. | 2013-01-24 |
20130024911 | EXTENSIBLE ACCESS CONTROL ARCHITECTURE - Software for managing access control functions in a network. The software includes a host that receives access control commands or information and calls one or more methods. The methods perform access control functions and communicate access control results or messages to be transmitted. The host may be installed in a network peer seeking access to the network or in a server controlling access to the network. When installed in a peer, the host receives commands and exchanges information with a supplicant. When installed in an access control server, the host receives commands and exchanges information with an authenticator. The host has a flexible architecture that enables multiple features, such as allowing the same methods to be used for authentication by multiple supplicants, providing ready integration of third party access control software, simplifying network maintenance by facilitating upgrades of authenticator software and enabling access control functions other than peer authentication. | 2013-01-24 |
20130024912 | APPARATUS AND METHOD FOR PROVIDING AUTHORIZATION BASED ENHANCED ADDRESS BOOK SERVICE IN MOBILE COMMUNICATION SYSTEM - Method and apparatus providing Enhanced Address Book (EAB) service in a mobile communication system includes performing an authorization procedure to share information with at least one other user; when sharing information of a user of the terminal is updated, identifying at least one other user authorized to receive the information of the user; and transmitting the updated information to a terminal of the at least one identified other user. | 2013-01-24 |
20130024913 | HOST DEVICE, MANAGING SERVER AND METHOD OF CONTROLLING IMAGE FORMATION THEREOF - A host device includes a user interface to receive user information to log in a managing server, a communication interface to transmit the user information to the managing server, a display unit, and a controller that, if login to the managing server is performed, controls the display unit to display information corresponding to an image forming apparatus connected to the host device. | 2013-01-24 |
20130024914 | AUTOMATIC DEVICE AUTHENTICATION AND ACCOUNT IDENTIFICATION WITHOUT USER INPUT WHEN APPLICATION IS STARTED ON MOBILE STATION - Disclosed procedures automatically identify a carrier-authorized mobile station and verify an account related identifier associated with the device, in response to start-up of an application in the device. Application start-up causes the device to send a request to an application server, with the device's current IP address, MTN and a device identifier such as MEID or ESN. The server queries an AAA system of the network to retrieve the MTN that has been assigned the IP address. If the retrieved MTN matches the MTN passed to the server in the request, the server queries a network database such as DMD for the device identifier associated with the MTN. A match of the device identifier retrieved from the network database with that passed to the server via the request indicates authenticity of the requesting device and its MTN. | 2013-01-24 |
20130024915 | Systems and Methods for Authenticating Users Accessing Unsecured WiFi Access Points - Systems and methods system for a user accessing an unsecure Wifi access point are provided. In an embodiment, the present invention requests that the customer perform authentication of the access point to which he is connected. On initial connection to the access point, the customer provides his username/password and chooses a memorable information element (e.g., image or phrase). A site specific cookie is delivered to the customer device after a successful authentication. On subsequent connections, the site specific cookie is validated and the MAC address of the customer device is used to retrieve the memorable information element. If the customer recognizes his memorable image, he confirms that he is on a bona fide access point. In a further embodiment, if the customer connects at a location and/or time of day which breaks a previously observed pattern, MAC authentication is not accepted and a full authentication (e.g., user/password) is required. | 2013-01-24 |
20130024916 | System and Method for Verification, Authentication, and Notification of Transactions - A system and method are provided for verifying, authenticating, and providing notification of a transaction such as a commercial or financial transaction, with and/or to at least one party identified as engaging in the transaction and/or identified as having a potential interest in the transaction or type of transaction. | 2013-01-24 |
20130024917 | MEMO SYNCHRONIZATION SYSTEM, MOBILE SYSTEM, AND METHOD FOR SYNCHRONIZING MEMO DATA - Provided is a memo synchronization system, a mobile system, and a method for synchronizing memo data. The memo synchronization system includes a storage device, an authentication unit configured to authenticate a user by receiving authentication information of the user from a mobile terminal via a memo application installed in the mobile terminal, and a synchronization unit stored on the storage device and configured to synchronize memo data stored in the mobile terminal with memo data stored in a web storage space of an online memo service based on a request for synchronization transmitted from the mobile terminal through the memo application. The request for synchronization includes a synchronization request generated by the memo application according to an event set by the user. | 2013-01-24 |
20130024918 | METHODS AND SYSTEMS FOR AUTHENTICATING USERS OVER NETWORKS - A method for authenticating users over networks includes requesting a one-time password, entering a personal identification number into a communications device, and retrieving a replaceable shared secret stored in the communications device. Moreover, the method includes generating a hashed personal identification number from the entered personal identification number, combining the hashed personal identification number with the replaceable shared secret to generate a modified shared secret, and generating a one-time password with the modified shared secret and the time of requesting the one-time password. | 2013-01-24 |
20130024919 | CLOUD SERVICE AUTHENTICATION - One or more techniques and/or systems are provided for obtaining access to a cloud service. In particular, a user may log into a client device using an operating system (OS) cloud login ID. The user may access cloud services (e.g., a music streaming service, a data storage service, etc.) through applications executing on the client device using merely the OS cloud login ID without providing additional login credentials specific to the cloud services. A client side application may request a token to access a cloud service. The token may be generated by an identity provider based upon the identity provider verifying an application ID identifying the application, a cloud service ID identifying the cloud service and/or OS cloud credentials. In this way, the application may present the token to a cloud service provider for verification to gain access to the cloud service hosted by the cloud service provider. | 2013-01-24 |
20130024920 | VIRTUAL COMPUTER AND SERVICE - A virtual computer service includes receiving, at a network server computer over a network, an encrypted image and user credentials for a user of a computer, and storing the encrypted image and the user credentials in an image repository that is communicatively coupled to the network server computer. The virtual computer service also includes receiving a request to initiate a session, the request including the user credentials. Upon successful validation of the user credentials, the virtual computer service includes selecting the encrypted image from the image repository, decrypting the encrypted image, activating a session for a virtual computer associated with the computer, and synchronizing session details of the session, once completed, with the image and storing a synchronized image in the image repository. | 2013-01-24 |
20130024921 | SECURE ON-LINE SIGN-UP AND PROVISIONING FOR WI-FI HOTSPOTS USING A DEVICE-MANAGEMENT PROTOCOL - Embodiments of a mobile device and method for secure on-line sign-up and provisioning of credentials for Wi-Fi hotspots are generally described herein. In some embodiments, the mobile device may be configured to establish a transport-layer security (TLS) session with a sign-up server through a Wi-Fi Hotspot to receive a certificate of the sign-up server. When the certificate is validated, the mobile device may be configured to exchange device management messages with the sign-up server to sign-up for a Wi-Fi subscription and provisioning of credentials, and retrieve a subscription management object (MO) that includes a reference to the provisioned credentials for storage in a device management tree. The credentials are transferred/provisioned securely to the mobile device. In some embodiments, an OMA-DM protocol may be used. The provisioned credentials may include certificates in the case of certificate-based credentials, machine-generated credentials such as username/password credentials, or SIM-type credentials. | 2013-01-24 |
20130024922 | VIRTUAL COMPUTER AND SERVICE - A virtual computer service includes receiving, at a network server computer over a network, an encrypted image and user credentials for a user of a computer, and storing the encrypted image and the user credentials in an image repository that is communicatively coupled to the network server computer. The virtual computer service also includes receiving a request to initiate a session, the request including the user credentials. Upon successful validation of the user credentials, the virtual computer service includes selecting the encrypted image from the image repository, decrypting the encrypted image, activating a session for a virtual computer associated with the computer, and synchronizing session details of the session, once completed, with the image and storing a synchronized image in the image repository. | 2013-01-24 |
20130024923 | METHOD FOR MUTUAL AUTHENTICATION OF A USER AND SERVICE PROVIDER - The present invention relates to a method and system for mutual authentication of a user and service provider, said method comprising acts of: authenticating an event by a key generation module (KGM), said event is generated on a computing device by a user, sending a shared secret of registered user for the event by an authentication server to the key generation module (KGM), generating one time key by the KGM for the event, transmitting the one time key by appending the shared secret to registered user mobile device, and performing at least one of: authenticating the user for said event by the KGM when a registered user enters the one-time key on the computing device within a predetermined time period, or terminating the event upon receipt of predefined key sequence from the mobile device. | 2013-01-24 |
20130024924 | Aggregation of Emailed Product Order and Shipping Information - Product order and shipping information received via email messages is automatically aggregated for ready user review. Once the user is authenticated, authorization to access their email mailbox is obtained and the email message headers of their mails are analyzed to identify those messages of interest. The bodies of the email messages of interest are parsed to extract the product order and shipping information which is stored and presented for display to the user typically grouped by individual product thus greatly simplifying user review of orders. | 2013-01-24 |
20130024925 | LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL (LDAP) PROXY - Two factor LDAP authentication systems and methods are presented. In one embodiment, implementation of a method for authenticating a user through a two factor process includes: at an LDAP proxy server, receiving a BIND request from a client, wherein the BIND request is for authenticating a user associated with a username to an LDAP server, and wherein the BIND request comprises a password comprising a first factor security code and a second factor security code; stripping the second factor security code from the password; reconfiguring the BIND request with the password that is stripped of the second factor security code; forwarding the reconfigured BIND request to the LDAP server for authentication of the username using the first factor security code; performing authentication of the second factor security code; and positively authenticating the username to the LDAP server when the first factor security code and the second factor security code are authenticated in connection with the username. | 2013-01-24 |
20130024926 | AUTHENTICATION APPARATUS, SERVICE PROVIDING SYSTEM, AND COMPUTER READABLE MEDIUM - An authentication apparatus includes following components. In an authentication table, first authentication information, login information, and second authentication information are associated. A communication unit communicates with another apparatus. A first login processing unit compares identification information with the first authentication information, and rewrites the login information to a logged in state and notifies the other apparatus of successful authentication when the identification information matches the first authentication information. The logout processing unit compares identification information with the first authentication information, and rewrites the login information to a logged out state when the identification information matches the first authentication information. The second login processing unit compares the identification information with the second authentication information, and notifies the other apparatus of successful authentication when the identification information matches the second authentication information and the corresponding login information indicates the logged in state. | 2013-01-24 |
20130024927 | SYSTEM AND METHOD FOR AUTOMATICALLY ESTABLISHING NEW SESSION WITH INTERACTIVE SERVICE AFTER PREVIOUS SESSION EXPIRATION - A system includes a video display and a processor controlling the display. The processor accesses computer readable instructions to cause the processor to access a server associated with the service over a network responsive to viewer selection of a service. The processor then, without any viewer interaction, executes authentication with the server. Thereafter, responsive to successful authentication, the processor provides the service to a viewer at least in part by presenting an image associated with the service on the display. Responsive to the server indicating that a session for which the authentication is valid is expired, the processor automatically and without viewer input executes authentication with the server to establish a new session. | 2013-01-24 |
20130024928 | SECURE NETWORK COMMUNICATIONS FOR METERS - A system and method are provided for secure network communications. A proxy server receives meter data, from a meter of a set of meters via a local network, for an energy management server. The proxy server uses secure communications to send the meter data via a non-secure network to the energy management server. | 2013-01-24 |
20130024929 | TRUST LEVEL ACTIVATION - An isolation execution environment provides an application with limited resources to execute an application. The application may require access to secured resources associated with a particular trust level that are outside of the isolation execution environment. A trust activation engine determines the trust level associated with a request for a resource and operates differently based on the trust level. A broker process may be used to execute components providing access to resources having a partial trust level in an execution environment that is separate from the isolation execution environment. | 2013-01-24 |
20130024930 | Executing Functions of a Secure Program in Unprivileged Mode - Executing functions of a secure program in unprivileged mode. A program may be executed in a supervisory mode. The program may call multiple functions. Each function may be executed in a unprivileged mode. Additionally, each function may be executed in a respective constrained environment or sandbox. Each constrained environment may be dedicated to or customized for the respective function. For example, each constrained environment may have a set of privileges that are based on the respective function executing within the constrained environment. | 2013-01-24 |
20130024931 | DOWNLOADABLE COMMUNICATION SOFTWARE TOOL FOR FLASH MEMORY DEVICE - A flash memory device is provided that includes an operating system. The operating system has security features such as password protection and/or encryption. Further, the host computer to which the flash memory device is removably attached does not retain any electronic trail of the attachment, usage, communication, or other activity by the flash memory device. The operating system operates on the host computer without the host computer being able to detect and store information related to the operation of the flash memory device. An email service is also provided including timed deletion of emails between registered users. A browser is provided that has auto-populating multi-search, as well as tabbing capabilities. Cloud capabilities are provided, including a desktop run from the cloud as well as a browser run from the cloud. A clickless user interface is provided. | 2013-01-24 |
20130024932 | ENHANCED SECURITY FOR BLUETOOTH-ENABLED DEVICES - In one embodiment, a method includes determining a location of a device relative to a reference, and identifying a first password from a plurality of passwords for use to unlock the device based on the location of the device relative to the reference. The plurality of passwords includes at least one complex password and at least one simple password. The method also includes prompting for input arranged to unlock the device, obtaining the input, and determining when the input matches the first password. When it is determined that the input matches the first password, the device is unlocked. | 2013-01-24 |
20130024933 | AUDITING A DEVICE - The auditing of a device that includes a physical memory is disclosed. One or more hardware parameters that correspond to a hardware configuration is received. Initialization information is also received. The physical memory is selectively written in accordance with a function. The physical memory is selectively read and at least one result is determined. The result is provided to a verifier. | 2013-01-24 |
20130024934 | CLASSIFICATION OF SOFTWARE ON NETWORKED SYSTEMS - A method and system for the classification of software in networked systems, includes: determining a software received by a sensor is attempting to execute on a computer system of the sensor; classifying the software as authorized or unauthorized to execute, and gathering information on the software by the sensor if the software is classified as unauthorized to execute. The sensor sends the information on the software to one or more actuators, which determine whether or not to act on one or more targets based on the information. If so, then the actuator sends a directive to the target(s). The target(s) updates its responses according to the directive. The classification of the software is definitive and is not based on heuristics or rules or policies and without any need to rely on any a priori information about the software. | 2013-01-24 |
20130024935 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR CONDITIONALLY PERFORMING A SCAN ON DATA BASED ON AN ASSOCIATED DATA STRUCTURE - A system, method, and computer program product are provided for conditionally performing a scan of data based on an associated data structure. In use, at least one aspect is identified for each of a first plurality of scanners utilized to perform a scan on data at a first network device. Additionally, at least one data structure is associated with the data, where the at least one data structure reflects the at least one aspect of each of the first plurality of scanners. Furthermore, a subsequent scan on the data is conditionally performed utilizing each of a second plurality of scanners at a second network device, based on the at least one data structure. | 2013-01-24 |
20130024936 | AUDITING A DEVICE - The auditing of a device that includes a physical memory is disclosed. One or more hardware parameters that correspond to a hardware configuration is received. Initialization information is also received. The physical memory is selectively written in accordance with a function. The physical memory is selectively read and at least one result is determined. The result is provided to a verifier. | 2013-01-24 |
20130024937 | Intrusion detection using taint accumulation - A method operable in a computing device adapted for handling security risk can use taint accumulation to detect intrusion. The method can comprise receiving a plurality of taint indicators indicative of potential security risk from a plurality of distinct sources at distinct times, and accumulating the plurality of taint indicators independently using a corresponding plurality of distinct accumulation functions. Security risk can be assessed according to a risk assessment function that is cumulative of the plurality of taint indicators. | 2013-01-24 |
20130024938 | SYSTEM AND METHOD FOR SECURING DATA TO BE PROTECTED OF A PIECE OF EQUIPMENT - A system and method for securing data to be protected of a piece of equipment are provided. The equipment comprises: a space; at least one device for processing the data; a safety module comprising at least one controller connected to at least one memory for sensitive data, the sensitive data giving access to the data; and at least one supervision sensor. The method comprises: transmitting at least one signature through the sensor(s), to the safety module, the signature being based on a signal received by the respective sensor and giving information on the physical condition of the space; comparing in the safety module at least one of the signatures and/or a value inferred from at least one of the signatures with at least one reference value and/or at least one reference signature; limiting access to the data being based on the comparison of at least one of the signatures. | 2013-01-24 |
20130024939 | Conditional security response using taint vector monitoring - An embodiment or embodiments of a computing system can conditionally trap based on a taint vector. A computing system can comprise at least one taint vector operable to list at least one of a plurality of taints indicative of potential security risk originating from at least one of a plurality of resources, and response logic operable to monitor the at least one taint vector and respond to a predetermined taint condition. | 2013-01-24 |
20130024940 | OFFLOADING OPERATIONS TO A REPLICATE VIRTUAL MACHINE - A method for detecting malicious code within a first virtual machine comprising creating a snapshot of the first virtual machine and transferring the snapshot to a second machine. A scan operation is run on the snapshot using resources of the second machine. In response to detecting malicious code during the scan operation, action is taken at the first virtual machine to address the detection of the malicious code. Thus, the action in response to detecting the malicious code may include placing the first virtual machine in quarantine. | 2013-01-24 |
20130024941 | WINDOWS REGISTRY MODIFICATION VERIFICATION - A method and system is provided by which unauthorized changes to the registry may be detected and that provides the capability to verify whether registry, or other system configuration data, changes that occur on a computer system are undesirable or related to possible malware attack before the changes become effective or are saved on the system. A method for verifying changes to system configuration data in a computer system comprises generating an identifier representing an entry in the system configuration data, packaging the identifier, and sending the packaged identifier to a client for verification. The identifier may be generated by hashing the first portion of the entry and the second portion of the entry to generate the identifier, or by filtering the first portion of the entry and hashing the filtered first portion of the entry and the second portion of the entry to generate the identifier. | 2013-01-24 |
20130024942 | SYSTEM AND METHOD FOR DETECTING DATA EXTRUSION IN SOFTWARE APPLICATIONS - Comprehensive techniques identify data leaks in software applications using Asset Flow Analysis (AFA) to determine whether critical data leaves a system through an exit point such that the data is no longer protected by mechanisms of the system. A novel data extrusion mechanism makes use of a relevant subset of all the possible data paths detected by AFA using a knowledge base of critical business functions and critical database content. The system checks if any code performs read access to critical business data and subsequently transfers this data beyond the control limits of the target system. The knowledge base can be extended by configuring which database content is to be regarded as critical in any given organization. The approach is particularly valuable in protecting systems that manipulate, distribute, or store sensitive information associated with financial, business, or personal data, including SAP® ABAP™ software applications. | 2013-01-24 |
20130024943 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR SECURING DATA ON A SERVER BASED ON A HEURISTIC ANALYSIS - A system, method, and computer program product are provided for securing data on a server based on a heuristic analysis. In use, information associated with attempts to access data on a server is recorded. Additionally, the information is heuristically analyzed. Further, the data is secured on the server based on the heuristic analysis. | 2013-01-24 |
20130024944 | CONFIDENTIAL INFORMATION LEAKAGE PREVENTION SYSTEM, CONFIDENTIAL INFORMATION LEAKAGE PREVENTION METHOD AND CONFIDENTIAL INFORMATION LEAKAGE PREVENTION PROGRAM - Provided are first monitoring unit | 2013-01-24 |
20130024945 | MAKING SYSTEM CONSTRAINTS OF A SPECIFIED PERMISSION IN DIGITAL RIGHTS MANAGEMENT - A method and a terminal device for making multi-system constraint of a specified permission in a digital rights. A rights object related to content object is obtained by an executing device. The specific permission descriptions of the rights object include system constraint descriptions of a plurality of systems of the same type. The executing device obtains a corresponding system information in the device according to the system constraint descriptions and compares the system information in the device with the system information in the system constraint descriptions, so as to judge whether there is any system permitted in system constraint descriptions. If yes, it determines to permit executing the specific permission for the content object; otherwise, it determines not to permit executing said specific permission for the content object. | 2013-01-24 |
20130024946 | METHOD AND SYSTEM FOR STREAMLINING VOTING PROCESS - A method and system for streamlining a voting process performed by a web application is provided. As the web application may require that a voting action is effectuated after the user is registered to vote and also has supplied valid credentials, a voting application may be configured to intercept a request from a user to effectuate voting process directed to the web application, access credentials of the user stored by the web-based social networking application, and provide these credentials to the web application, such that the web application can process the request to effectuate voting process by registering the user to vote and storing the vote information for the user. | 2013-01-24 |
20130024947 | METHODS AND SYSTEMS FOR REPLACING SHARED SECRETS OVER NETWORKS - A method for replacing a shared secret over a network is provided that includes determining that a security breach could have occurred, determining that a shared secret of a user is to be replaced, and transmitting a renewal message to an authentication system requesting a new shared secret and an associated effective life for the user. Moreover, the method includes generating a new shared secret and an associated effective life at the authentication system for the user, and replacing the shared secret and associated effective life in an enrollment data record of the user with the new shared secret and associated effective life. Furthermore, the method includes transmitting the new shared secret and associated effective life to a communications device associated with the user, and replacing a shared secret and associated effective life stored in the communications device with the new shared secret and associated effective life. | 2013-01-24 |
20130024948 | SYSTEM FOR ENTERPRISE DIGITAL RIGHTS MANAGEMENT - The present subject matter relates to devices and methods for enterprise digital rights management. In one implementation, a device includes a security module configured to generate a security key. The security module encrypts at least one document of a user, using the security key, to generate a protected document. Further, the device includes an access control module configured to assign an access right to one or more users within an enterprise for accessing the protected document. The access control module is further configured to delegate the access right from the user to another user. The access control module is furthermore configured to lock at least one of the user and the protected document. | 2013-01-24 |
20130024949 | Presentity Authorization of Buddy Subscription in a Communication System - A server, computer readable medium and method for accessing buddy data related to a first user (presentity) that is connected to a START communication network that includes a server, the data being accessed by a second user (watcher) connected to the communication network. The method including storing, at a server, information associated with a plurality of users associated with the presentity as the buddy data, receiving, at the server, a request from a watcher for buddy data of the presentity, authorizing, at least in part by the server, the request for buddy data, and transmitting, by the server, the buddy information to the watcher. | 2013-01-24 |
20130024950 | SYSTEMS AND METHODS FOR CHALLENGE-RESPONSE ANIMATION AND RANDOMIZATION TESTING - Systems and methods are provided for challenge/response animation. In one implementation, a request for protected content may be received from a client, and the protected content may comprise data. A challenge phrase comprising a plurality of characters may be determined, and a computer processor may divide the challenge phrase into at least two character subsets selected from the characters comprising the challenge phrase. Each of the at least two character subsets may include less than all of the characters comprising the challenge phrase. The at least two character subsets may be sent to the client in response to the request; and an answer to the challenge phrase may be received from the client in response to the at least two character subsets. Access to the protected content may be limited based on whether the answer correctly solves the challenge phrase. | 2013-01-24 |
20130024951 | Method and Device for Imposing Usage Constraints of Digital Content - A method for imposing one or more usage constraints on digital content, the method comprising communicating a digital content data item to a digital content receiver system; wherein the digital content data item includes the digital content and a usage constraint data item different from a digital license data item, or a reference to said usage constraint data item, the use case item being indicative of the one or more usage constraints. | 2013-01-24 |
20130024952 | Detecting a Security Breach of an Electronic Device - A system and method for detecting a security breach of an electronic device are provided. The system includes a sensor assembly having at least one IR LED which outputs IR light, and an IR sensor which detects the IR light output by the IR LED and outputs corresponding IR detection signals. The system further includes a processor which generates an IR profile of an interior of the enclosure with reference to the IR detection signals output by the IR sensor. The processor determines that there has been a security breach of the enclosure at least in response to detecting IR activity in the enclosure from the IR detection signals that does not correspond to the IR profile. Output signals from a various other sensors may be used to confirm whether the security breach has occurred. | 2013-01-24 |
20130024953 | Methods of Treating Disorders Associated with Protein Aggregation - The present invention relates to methods of treatment of clinical disorders associated with protein aggregation comprising administering, to a subject, an effective amount of an anti-protein aggregate (“APA”) compound selected from the group consisting of pimozide, fluphenazine (e.g., fluphenazine hydrochloride), tamoxifen (e.g., tamoxifen citrate), taxol, cantharidin, cantharidic acid, salts thereof and their structurally related compounds. It is based, at least in part, on the discovery that each of the aforelisted compounds were able to promote degradation of aggregated ATZ protein in a | 2013-01-24 |
20130024954 | Human Age-Related Neurodegenerative Nematode Model and Methods - Genetically modified nematodes and methods for using the same are provided. | 2013-01-24 |
20130024955 | METHOD FOR DETERMINING GENOTOXICITY USING NON-FLUORESCENT PROTEINS - The present invention relates to a method for determining a genotoxicity of a test substance, comprising the steps of: (a) transforming a fish with a nucleotide sequence encoding a non-fluorescent fluorescence protein with a mutation; (b) treating a test substance to the transformed fish; and (c) measuring a fluorescence in the test substance-treated fish, wherein the fluorescence is generated by reversion of the non-fluorescent fluorescence protein to the fluorescence protein due to a back mutation of the nucleotide sequence in the test substance-treated fish. According to the present invention, MutaFish system, Zebrafish ( | 2013-01-24 |
20130024956 | ANTIBODIES TO CD40 - The present invention relates to antibodies and antigen-binding portions thereof that specifically bind to CD40, preferably human CD40, and that function as CD40 agonists. The invention also relates to human anti-CD40 antibodies and antigen-binding portions thereof. The invention also relates to antibodies that are chimeric, bispecific, derivatized, single chain antibodies or portions of fusion proteins. The invention also relates to isolated heavy and light chain immunoglobulins derived from human anti-CD40 antibodies and nucleic acid molecules encoding such immunoglobulins. The present invention also relates to methods of making human anti-CD40 antibodies, compositions comprising these antibodies and methods of using the antibodies and compositions for diagnosis and treatment. The invention also provides gene therapy methods using nucleic acid molecules encoding the heavy and/or light immunoglobulin molecules that comprise the human anti-CD40 antibodies. The invention also relates to transgenic animals comprising nucleic acid molecules of the present invention. | 2013-01-24 |
20130024957 | GENETICALLY MODIFIED MICE AND ENGRAFTMENT - A mouse with a humanization of the mIL-3 gene and the mGM-CSF gene, a knockout of a mRAG gene, and a knockout of a mII2rg subunit gene; and optionally a humanization of the TPO gene is described. A RAG/II2rg KO/hTPO knock-in mouse is described. A mouse engrafted with human hematopoietic stem cells (HSCs) that maintains a human immune cell (HIC) population derived from the HSCs and that is infectable by a human pathogen, e.g., | 2013-01-24 |
20130024958 | LENTIVIRAL VECTORS THAT PROVIDE IMPROVED EXPRESSION AND REDUCED VARIEGATION AFTER TRANSGENESIS - The present invention provides new lentiviral vectors that include an anti-repressor element (ARE) and, optionally, a scaffold attachment region (SAR). The lentiviral vectors provide expression of a heterologous nucleic acid in at least 50% of the cells of multiple cell types when used for lentiviral transgenesis. In certain embodiments of the invention the heterologous nucleic acid encodes an RNAi agent such as an shRNA. The invention further provides transgenic nonhuman animals generated using a lentiviral vector that includes an ARE and optional SAR. In addition, the invention provides a variety of methods for using the vectors including for achieving gene silencing in eukaryotic cells and transgenic animals, and methods of treating disease. The invention also provides animal models of human disease in which one or more genes is functionally silenced using a lentiviral vector of the invention. | 2013-01-24 |
20130024959 | CONDITIONAL EXPRESSION OF TRANSGENES IN VIVO - The present invention relates to a method of producing a cell comprising a conditionally active transgene in its genome, the method comprising (a) introducing into the cell a targeting vector, wherein the targeting vector comprises (i) a 5′ recombinase recognition site specifically recognised by a first recombinase, wherein the first recombinase is endogenously present in the cell or wherein the first recombinase or a nucleic acid molecule encoding said first recombinase in expressible form is introduced into the cell; followed by (ii) a 5′ recombinase recognition site specifically recognised by a second recombinase, wherein the second recombinase is not endogenously present or is not active in the cell; followed by (iii) a selection cassette comprising a positively selectable marker gene; followed by (iv) a 3′ recombinase recognition site specifically recognised by a third recombinase, wherein the third recombinase is not endogenously present or is not active in the cell; followed by (v) the transgene; followed by (vi) a 3′ recombinase recognition site specifically recognised by a fourth recombinase, wherein the fourth recombinase is endogenously present in the cell or wherein the fourth recombinase or a nucleic acid molecule encoding said fourth recombinase in expressible form is introduced into the cell; wherein the genome of the cell comprises a 5′ recombinase recognition site and a 3′ recombinase recognition site that are identical to the recombinase recognition sites of (i) and (vi), and wherein said recombinase recognition sites comprised in the genome of the cell are located 3′ of an endogenous cellular promoter such that introduction of the targeting vector into the genome by site specific recombination results in the promoter being operatively linked to the selectable marker gene; and (b) culturing the cell in the presence of a selection medium specific for the selectable marker encoded by the selectable marker gene of (iii). The present invention further relates to a method of producing a conditional transgenic non-human mammalian animal as well as to a conditional transgenic non-human mammalian animal obtainable by said method. The present invention also relates to a transgenic TDP-43 mouse, comprising a transgenic cassette in intron 1 of the mouse Tardbp gene. | 2013-01-24 |
20130024960 | OPTIMISED CODING SEQUENCE AND PROMOTER - An optimized coding sequence of human blood clotting factor eight (VIII) and a promoter may be used in vectors, such as rAAV, for introduction of factor VIII, and/or other blood clotting factors and transgenes. Exemplary of these factors and transgenes are alpha-1-antitrypsin, as well as those involved in the coagulation cascade, hepatocye biology, lysosomal storage, urea cycle disorders, and lipid storage diseases. Cells, vectors, proteins, and glycoproteins produced by cells transformed by the vectors and sequence, may be used in treatment. | 2013-01-24 |
20130024961 | Methods of Modulating Thrombocytopenia and Modified Transgenic Pigs - The application provides methods of modulating platelet uptake by liver sinusoidal endothelial cells and of modulating thrombocytopenia. Transgenic pigs modified to bind fewer platelets are provided. | 2013-01-24 |
20130024962 | Pepper Hybrid E 490264 - A pepper hybrid designated E 490264 is disclosed. The invention relates to the seeds of pepper hybrid E 490264, to the plants of pepper hybrid E 490264, and to methods for producing a hybrid plant, either inbred or hybrid, by crossing the pepper hybrid E 490264 with itself or another pepper plant. The invention further relates to methods for producing a pepper plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other pepper lines, cultivars or hybrids derived from the pepper hybrid E 490264. | 2013-01-24 |
20130024963 | PEPPER HYBRID PS11447353 - The invention provides seed and plants of pepper hybrid PS11447353 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of pepper hybrid PS11447353 and the parent lines thereof, and to methods for producing a pepper plant produced by crossing such plants with themselves or with another pepper plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2013-01-24 |
20130024964 | SOYBEAN VARIETY A1024299 - The invention relates to the soybean variety designated A1024299. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1024299. Also provided by the invention are tissue cultures of the soybean variety A1024299 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1024299 with itself or another soybean variety and plants produced by such methods. | 2013-01-24 |
20130024965 | SOYBEAN VARIETY A1024710 - The invention relates to the soybean variety designated A1024710. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1024710. Also provided by the invention are tissue cultures of the soybean variety A1024710 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1024710 with itself or another soybean variety and plants produced by such methods. | 2013-01-24 |
20130024966 | SOYBEAN VARIETY A1025921 - The invention relates to the soybean variety designated A1025921. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1025921. Also provided by the invention are tissue cultures of the soybean variety A1025921 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1025921 with itself or another soybean variety and plants produced by such methods. | 2013-01-24 |
20130024967 | SOYBEAN VARIETY A1024328 - The invention relates to the soybean variety designated A1024328. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1024328. Also provided by the invention are tissue cultures of the soybean variety A1024328 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1024328 with itself or another soybean variety and plants produced by such methods. | 2013-01-24 |
20130024968 | SOYBEAN VARIETY A1025934 - The invention relates to the soybean variety designated A1025934. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1025934. Also provided by the invention are tissue cultures of the soybean variety A1025934 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1025934 with itself or another soybean variety and plants produced by such methods. | 2013-01-24 |
20130024969 | SOYBEAN VARIETY A1025937 - The invention relates to the soybean variety designated A1025937. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1025937. Also provided by the invention are tissue cultures of the soybean variety A1025937 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1025937 with itself or another soybean variety and plants produced by such methods. | 2013-01-24 |
20130024970 | SOYBEAN VARIETY A1025947 - The invention relates to the soybean variety designated A1025947. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1025947. Also provided by the invention are tissue cultures of the soybean variety A1025947 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1025947 with itself or another soybean variety and plants produced by such methods. | 2013-01-24 |
20130024971 | SOYBEAN VARIETY A1025957 - The invention relates to the soybean variety designated A1025957. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1025957. Also provided by the invention are tissue cultures of the soybean variety A1025957 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1025957 with itself or another soybean variety and plants produced by such methods. | 2013-01-24 |
20130024972 | SOYBEAN VARIETY A1025962 - The invention relates to the soybean variety designated A1025962. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1025962. Also provided by the invention are tissue cultures of the soybean variety A1025962 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1025962 with itself or another soybean variety and plants produced by such methods. | 2013-01-24 |
20130024973 | SOYBEAN VARIETY A1025967 - The invention relates to the soybean variety designated A1025967. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1025967. Also provided by the invention are tissue cultures of the soybean variety A1025967 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1025967 with itself or another soybean variety and plants produced by such methods. | 2013-01-24 |
20130024974 | SOYBEAN VARIETY A1025977 - The invention relates to the soybean variety designated A1025977. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1025977. Also provided by the invention are tissue cultures of the soybean variety A1025977 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1025977 with itself or another soybean variety and plants produced by such methods. | 2013-01-24 |
20130024975 | SOYBEAN VARIETY A1025983 - The invention relates to the soybean variety designated A1025983. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1025983. Also provided by the invention are tissue cultures of the soybean variety A1025983 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1025983 with itself or another soybean variety and plants produced by such methods. | 2013-01-24 |
20130024976 | SOYBEAN VARIETY A1026009 - The invention relates to the soybean variety designated A1026009. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1026009. Also provided by the invention are tissue cultures of the soybean variety A1026009 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1026009 with itself or another soybean variety and plants produced by such methods. | 2013-01-24 |
20130024977 | SOYBEAN VARIETY A1026010 - The invention relates to the soybean variety designated A1026010. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1026010. Also provided by the invention are tissue cultures of the soybean variety A1026010 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1026010 with itself or another soybean variety and plants produced by such methods. | 2013-01-24 |