41st week of 2013 patent applcation highlights part 57 |
Patent application number | Title | Published |
20130268956 | REAL-TIME COLLECTION OF AUDIENCE FEEDBACK OF A TELEVISION OR RADIO SHOW - Systems and methods for the real-time collection of audience feedback of a television or radio show in the form of a preference or a vote or an answer to a question, the feedback collection being synchronous or substantially synchronous with the television or radio show are provided. | 2013-10-10 |
20130268957 | METHOD FOR SCHEDULING TELEVISION PROGRAM RECORDINGS FOR A USER - The invention pertains to a method for scheduling television program recordings for a user ( | 2013-10-10 |
20130268958 | Efficient Authorization System for Multi-Channel Broadcast Program Options - entitlement management messages ( | 2013-10-10 |
20130268959 | APPARATUS, SYSTEMS AND METHODS TO COMMUNICATE AUTHORIZED PROGRAMMING BETWEEN A RECEIVING DEVICE AND A MOBILE DEVICE - A mobile device embodiment communicates program distribution account information to a program distributor. The mobile device embodiment receives from the program distributor, authorization to use programming that is conditioned on the communicated program distribution account information. The mobile device embodiment communicates the authorization to a receiving device. | 2013-10-10 |
20130268960 | System and Method for Secure Transmission of Media Content - A system that incorporates teachings of the present disclosure may include, for example, a gateway comprising a controller to receive from a communication device a request for media content, receive a key and a record associated with the communications device from an interactive television system, wherein the record comprises a list of entitled media content, determine whether the requested media content is in the list of entitled media content, retrieve the requested media content from the interactive television system when the requested media content is determined to be in the list of entitled media content, encrypt the retrieved media content utilizing the key, and transmit the encrypted media content to the communications device. Other embodiments are disclosed. | 2013-10-10 |
20130268961 | VARIABILITY IN AVAILABLE LEVELS OF QUALITY OF ENCODED CONTENT - A server resource provides notification to subscribers in a respective network environment that the content is available for retrieval at a particular bit rate (e.g., a promotional bit rate) or particular level of quality (e.g., promotional level of quality) amongst multiple levels of quality for a limited duration of time. For example, an especially high level of quality (or bit rate) of the content may be available only for the limited duration of time. After making the especially high level of quality of content available for retrieval during a promotional period, the content may be subsequently available for retrieval only at lower levels of quality. Accordingly, one or more configurations as discussed herein include changing the ability to access content encoded at different levels of quality over time. | 2013-10-10 |
20130268962 | INTEGRATION OF SOCIAL MEDIA WITH LIVE EVENTS - Apparatus and methods that provide for integration of social media with live events are disclosed. Social media content could be published to an online social media service responsive to the detection of a trigger that is associated with a live event video broadcast. In some embodiments, incoming user-driven social media content is repurposed and automatically reformatted for video display. Story content sources and citations might also be integrated for broadcast stories. Story content approval and notification could also be supported. | 2013-10-10 |
20130268963 | METHODS AND SYSTEMS FOR DELIVERY OF COMPLIANT VIDEO ADVERTISEMENTS TO DEVICES FROM ONE OR MORE PLATFORMS - A method of delivering video content. The method may comprise receiving a request for a first video from a video-playing device that is coupled to a network, determining whether to include a second video, generating a playlist comprising the first video and the second video, and transmitting the playlist to the Internet video-playing device. The second video may comprise a video advertisement. Additionally, a system for delivering video content is described. The system may include a processor, storage, an operating system, a logging module, one or more network interfaces capable of communicating with a plurality of video advertising networks, and a scripting engine. | 2013-10-10 |
20130268964 | METHODS AND SYSTEMS FOR VERIFICATION OF VIDEO DELIVERY - A method of delivering video content. The method may comprise receiving a request for a first video from an Internet connected device, selecting a second video to be played with the first video, generating a playlist comprising the first video and the second video, and transmitting the playlist to the Internet connected device. The playlist may include a verification video. Additionally, a system for delivering video content is described. The system may include a processor, storage, an operating system, one or more network interfaces capable of communicating with a plurality of video advertising networks, a digital advanced stream redirector generator module capable of generating a playlist, and a scripting engine. | 2013-10-10 |
20130268965 | METHOD FOR ADVERTISING DECISION RESOLUTION ACCELERATION BASED ON LOOKAHEAD OPPORTUNITY TRIGGERING - A server receives a source signal stream having a channel identifier and an indication that an advertisement placement opportunity is located in the signal stream a time period prior to an advertisement signal point. The server transmits the channel identifier to a session manager. The server receives from the session manager a list of sessions corresponding to a number of recipients currently viewing a channel corresponding to the channel identifier. The server transmits to an ad decision service an ad call for each session in the list. The server receives from the ad decision service a plurality of advertisements targeted to the list. The server stores the plurality of advertisements in at least one cache prior to expiration of the time period, where the advertisement signal point is detected by the programmed computer. | 2013-10-10 |
20130268966 | VISUAL CUE FOR PROGRAMS IN AN ELECTRONIC PROGRAM GUIDE - An electronic program guide includes a plurality of elements arrayed in a grid of rows and columns, with the rows corresponding to program sources and the columns corresponding to time intervals. Each element corresponds to a program played out from a particular program source during a corresponding time interval. The background of each element changes, such as by way of a color gradient or changing shape, to indicate one of a program beginning or ending. In this way, a viewer can ascertain the length of the program even if the element gets clipped upon updating the electronic program guide. | 2013-10-10 |
20130268967 | METHOD FOR PROVIDING A SHORTCUT AND IMAGE DISPLAY DEVICE THEREOF - A multifunctional display device displays a menu including shortcut objects. A processor assigns each object to one of a broadcast channel, network address, or an application. The objects may be an alphabetical character, number, symbol, or icon. | 2013-10-10 |
20130268968 | DISPLAY APPARATUS AND METHOD FOR SCHEDULING BROADCAST USING THE SAME - A display apparatus and a method for scheduling a broadcast using the same. The broadcast scheduling method includes generating a program information table, in which broadcast information is arranged, if a broadcast program selected by a user in the program information table is moved into an area adjacent to an icon, displaying the broadcast program being added to an item folder, and scheduling the broadcast program. | 2013-10-10 |
20130268969 | ALLOWING PRESENTATION CONTROL OF IMMEDIATE CONTENT INTERRUPTING DIGITAL TELEVISION CHANNEL PROGRAMMING - A channel programming associated with a channel can be selected. The channel can be associated with a programming broadcasting system. The channel programming can be displayed upon a presentation device. An immediate content from a content delivery entity interrupting the presentation of the channel programming can be received. The channel programming and the immediate content can be simultaneously presented on the presentation device. | 2013-10-10 |
20130268970 | INTERACTIVE TELEVISION PROGRAM GUIDE WITH SELECTABLE LANGUAGES - An interactive television program guide is provided. The interactive television program guide provides a user with the opportunity to select a language for playing television programming and displaying program guide text. Television program audio in the desired language may be obtained from a SAP or digital audio track and played in the selected language. Television related information in the desired language may be obtained from a digital track. If television program audio or related information is not provided in the selected language, the program guide may use a default language. The program guide may coordinate program guide display screen text with languages available for television programs when the programs are broadcast to users. | 2013-10-10 |
20130268971 | UNIVERSAL AND PORTABLE CHANNEL DESIGNATIONS - Systems and methods are described that provide favorite channel designation portability from a variety of locations, devices and/or programming service providers. | 2013-10-10 |
20130268972 | SYSTEM AND METHOD FOR COMMANDING A CONTROLLED DEVICE - A system and method for commanding a controlled device. An intelligent navigation server detects a transition from a current state of a remote control device. A context for transition is also determined. The current state, the new current state and the context are evaluated to select a set of commands appropriate to the context and the new current state. The selected commands determine behavior options for the controlled device. The set of selected commands are sent to the remote control device. Text and/or graphical data appropriate to the new current state may also be sent to the remote control device. The remote control device may generate display data based on the selected commands to provide one or more soft buttons linked to one or more of the selected commands. The remote control device may also display the text and/or graphical data. | 2013-10-10 |
20130268973 | Sharing Television and Video Programming Through Social Networking - In particular embodiments a social networking system may receive from an external system outside the social-networking system, a request comprising a user identifier associated with a user of the social-networking system, query a social graph for stories generated by one or more connections of the user on the social-networking system, and transmit the stories to the external system. Similarly the social networking system may receive, from an external system outside of the social networking system, a request comprising a user identifier associated with a user of the social networking system, a content identifier, and a action performed by the user on the content identifier, generate a story for the received request, and publish the story to one or more connections of the user on the social networking system. | 2013-10-10 |
20130268974 | ASSOCIATING INFORMATION WITH ELECTRONIC PROGRAM GUIDE ENTRIES - An information processor determines what media content is currently and/or could be displayed on a primary viewing screen. The information processor then mines other sources of information to obtain associated information. This information can then be accessed by a user as raw data and/or further processed by the information processor and then accessed by the user. Typically, the associated information is displayed on a secondary screen. This allows, for example, an electronic programming guide to be enhanced with additional information. | 2013-10-10 |
20130268975 | APPARATUS AND METHOD FOR MANAGING A PERSONAL CHANNEL - The invention relates to an apparatus ( | 2013-10-10 |
20130268976 | METHOD AND SYSTEM FOR MULTI-SERVICE RECEPTION - A multi-service antenna may comprise: a support structure, a reflector mounted to the support structure, a signal processing assembly mounted with the support structure, a first wire strung between the reflector and the support structure and/or the signal processing assembly, and circuitry for processing a first signal received as a result of electromagnetic radiation (e.g., terrestrial television and/or cellular signals) incident on the first wire. The circuitry for processing the first signal may be housed in the signal processing assembly. A second wire may also be strung between the reflector and the support structure and/or the signal processing assembly, and the circuitry may be operable to perform diversity processing of signals received via the two wires. | 2013-10-10 |
20130268977 | METHOD AND SYSTEM FOR FULL SPECTRUM CAPTURE FOR TERRESTRIAL APPLICATIONS - A satellite television system comprises a satellite dish, a terrestrial television receiver integrated within the satellite dish, and an integrated satellite and terrestrial TV set-top box. The satellite dish integrated satellite and terrestrial TV set-top box receive satellite television signals via the satellite dish and receive processed terrestrial television signals from the terrestrial television receiver integrated within the satellite dish. The satellite dish integrated satellite and terrestrial TV set-top box generate output satellite television channel content from the received satellite television signals and output terrestrial television channel content from the processed terrestrial television signals. The terrestrial television receiver may comprise a plurality of integrated demodulators and the terrestrial television receiver capture, utilizing a plurality of integrated demodulators, a corresponding plurality of terrestrial television channels. The plurality of integrated demodulators may be operable to generate the processed terrestrial television signals from the captured corresponding plurality of terrestrial television channels. | 2013-10-10 |
20130268978 | METHOD AND SYSTEM FOR FULL SPECTRUM CAPTURE FOR SATELLITE AND TERRESTRIAL APPLICATIONS - A multiband receiver comprising an integrated diversity antenna system is operable to receive satellite and terrestrial television. The multiband receiver captures spectrum comprising satellite television channels and/or terrestrial television channels and demodulate the satellite television channels and/or the terrestrial television channels. The diversity antenna system is integrated on a board or substrate within the multiband receiver. The multiband receiver discriminates between satellite television signals and non-satellite television signals in the captured spectrum and also discriminates between the terrestrial television signals and non-terrestrial television signals in the captured spectrum. The multiband receiver generates output satellite television channel content from the demodulated satellite television channels and also generates output terrestrial television channel content from the demodulated terrestrial television channels. The multiband receiver packetizes the generated output satellite and/or terrestrial television channel content. The generated output satellite and/or terrestrial television channel content is communicated to one or more mobile communication devices. | 2013-10-10 |
20130268979 | Method And System For Full Spectrum Capture Sample Rate Adaptation - An electronic device may be operable to sample a signal during an analog-to-digital conversion using an analog-to-digital converter in the electronic device, and the signal may comprise a wide bandwidth and a plurality of channels. The electronic device may adaptively change a sample rate of the sampling to move aliasing out of a region of one or more desired channels of the plurality of channels. The electronic device may change the sample rate using a variable oscillator in the electronic device. The change of the sample rate may comprise, for example, increasing or decreasing the sample rate by a particular percentage. In response to the change of the sample rate, the electronic device may perform, using a variable rate interpolator in the electronic device, variable rate interpolation. The variable rate interpolator may comprise, for example, a finite impulse response filter. | 2013-10-10 |
20130268980 | DISTRIBUTED PLAYBACK ARCHITECTURE - Master element for a distributed playback architecture for a media data, having: a payload data source for providing payload data packets; a beacon packet creator for creating beacon packets useable for synchronizing a playback process of the payload data packets at, at least one, slave element in the distributed playback architecture; and a network interface for transmitting an interleaved packet stream to the at least one slave element, the interleaved packet stream having the payload data packets provided by the payload data source and the beacon packets created by the beacon packet creator. A corresponding slave element, the distributed playback architecture, a method, and a computer program product are also disclosed. | 2013-10-10 |
20130268981 | OPTIMIZATION OF VIDEO FOR WIRELESS DELIVERY - In one embodiment, a method includes receiving at a network device interposed in a network path between a source and a receiver, video optimized for a wired network link located between the source and the network device, identifying the receiver as a wireless device, optimizing the video for wireless transmission, and transmitting the video optimized for wireless transmission to the receiver. An apparatus is also disclosed. | 2013-10-10 |
20130268982 | REMOTE MANAGEMENT SYSTEM FOR AT LEAST ONE AUDIOVISUAL INFORMATION REPRODUCTION DEVICE - Method for remote management of at least one audiovisual information reproduction device comprising a host server connected to each audiovisual information reproduction device, the host server comprising a database containing management information for each audiovisual information reproduction device, wherein the host server also comprises a site manager communicating with the database, and comprising a number of screens, at least one first screen comprising a menu displaying the list of audiovisual information reproduction systems, validating the choice of each audiovisual information reproduction device causing the display of a first series of screens that the operator can use to modify the operating parameters of at least one selected audiovisual information reproduction device and/or a second series of screens that the operator can use to order at least one song for downloading onto the audiovisual information reproduction systems from a chosen list of devices or to delete at least one song, and/or a third series of screens displaying information about the use of an audiovisual information reproduction device. | 2013-10-10 |
20130268983 | APPARATUS AND METHOD FOR CONFIGURING ON-DEMAND CONTENT DELIVERING OVERLAY NETWORK - Provided are a method and apparatus for content delivery networking. There is provided a method of managing a content delivery network to transfer media content to a user, including: receiving a network configuration request and network configuration information, from a service provider that provides the content; receiving resource information including information about available resources required for configuring the network; and configuring a content delivery overlay network, based on the resource information and the network configuration information. Therefore, by configuring a content delivery overlay network for each provider, service and content providers having no unique content delivery method of their own can provide multimedia services based on applications for smart TV and web TV to a plurality of users. | 2013-10-10 |
20130268984 | DATA NETWORK TRAFFIC MANAGEMENT - A network management system may allocate different amounts of bandwidth to different types of data traffic. The traffic types may be distinguished by their source device address, and whether the source device is part of, or external to, a first network. Packets may also be marked by their sender with information to identify a traffic type, and the marking may be used to determine the packet's treatment. The allocations given to the various types of traffic may be dynamically modified with changing traffic demands and conditions. | 2013-10-10 |
20130268985 | APPARATUS AND METHOD FOR TRANSMITTING AND RECEIVING CHANNEL ADAPTIVE HIERARCHICAL BROADCAST - An apparatus and method for transmitting and receiving a channel adaptive hierarchical broadcast are provided. A channel adaptive hierarchical broadcast transmission apparatus may include a multilayer video dividing unit to divide an input multilayer video bitstream into a first layer video bitstream and a second layer video bitstream, and a multi-transmission channel managing unit to determine transmission channels that are to be used to transmit the first layer video bitstream and the second layer video bitstream, among multiple transmission channels, and to output the first layer video bitstream and the second layer video bitstream to transmitters associated with the determined transmission channels, respectively. | 2013-10-10 |
20130268986 | Handling Large Volumes of Internet Live Unicast Content Streams - To reduce overloading of broadband networks, unicast streams containing the same live Internet content can be identified. Then unicast streams may be combined into a multicast stream. | 2013-10-10 |
20130268987 | NON-REAL TIME PUSH SERVICES - In certain embodiments, a method for receiving non-real time push content involves receiving a transport stream containing an Internet Protocol stream of packets containing non-real time content, non-real time service metadata and non-real time content metadata; demultiplexing the Internet Protocol stream of packets to produce: non-real time content, non-real time service metadata, and non-real time content metadata; where the Non-Real Time content metadata includes a Non-Real Time push NRT_Service_Category. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 2013-10-10 |
20130268988 | Delivering an Audio Video Asset - Delivering an audio video asset in a way that makes best use of different delivery mechanisms available. | 2013-10-10 |
20130268989 | METHOD AND SYSTEM FOR DYNAMICALLY ALOCATING POPULAR CONTENT - Methods and devices for dynamically allocating popular content to multi-node transmission channels are described. In one aspect, a method, performed by a content delivery system is described. The content delivery system comprises a termination system configured to deliver content to a plurality of nodes over a plurality of transmission channels. The method comprises: allocating transmission channels as multi-node transmission channels, each multi-node transmission channel being configured to distribute content from the termination system to a plurality of nodes; allocating transmission channels as single-node transmission channels, each single-node transmission channel being configured to distribute content from the termination system to a single node; and selecting content for transmission in the multi-node transmission channels based on content usage data. | 2013-10-10 |
20130268990 | ARRANGEMENT AND METHOD - A method includes providing at least one target bandwidth for bandwidth usage on an interconnect, the target bandwidth being for traffic associated with a traffic initiator. The method also includes measuring a served bandwidth and resetting the measuring of served bandwidth in response to an occurrence of an event. | 2013-10-10 |
20130268991 | BROADCAST RECEIVING TERMINAL AND PROGRAM EXECUTION METHOD - Under a resource manager, unexpected blocking is prevented without calling a handler for resolving a resource contention, by assigning a priority level depending on the program that has requested for a reservation of a resource as well as by assigning a special priority level which permits a reservation of a resource without any conditions in the case of a program which is urgently needed such as an EAS module. | 2013-10-10 |
20130268992 | APPARATUS AND METHOD FOR DETECTING A MEDIA DEVICE - A system that incorporates teachings of the present disclosure may include, for example, a mobile device having a controller to detect a location of a user by detecting at least one of a network associated with the user and a location of the mobile device, wherein the location of the user includes a media processor, transmit a request for an audio command intended for the media processor to a server on a communications network after detecting the location of the user, wherein the audio command is transmitted by the server to the media processor, detect an audio signal emitted from the media processor, wherein the audio signal is caused by the audio command, and determine an identity of the media processor by associating the detected audio signal with the media processor. Other embodiments are disclosed. | 2013-10-10 |
20130268993 | SET-TOP BOX HAVING MEDIA GATEWAY, SERVER AND STORAGE UNITS - A set top box is provided that has a low profile modular configuration that enables the control unit and storage unit to function independently from each other or as a combined unit. The set top box includes a control unit, a storage unit, and a connector positioned there between. The storage unit includes a housing and a plurality of storage bays for receiving storage modules having two parallel broad sides. The connector is positioned between the control unit and the storage unit and secures the control and storage units together. The connector has a vertical peripheral cross section substantially the same as a vertical peripheral cross section of the control unit and the storage unit. | 2013-10-10 |
20130268994 | SYSTEM AND METHOD FOR DETERMINING AND USING LOCAL REPUTATIONS OF USERS AND HOSTS TO PROTECT INFORMATION IN A NETWORK ENVIRONMENT - A method in an example embodiment includes correlating a first set of event data from a private network and determining a local reputation score of a host in the private network based on correlating the first set of event data. The method further includes providing the local reputation score of the host to a security node, which applies a policy, based on the local reputation score of the host, to a network communication associated with the host. In specific embodiments, the local reputation score of the host is mapped to a network address of the host. In further embodiments, the first set of event data includes one or more event indicators representing one or more events, respectively, in the private network. In more specific embodiments, the method includes determining a local reputation score of a user and providing the local reputation score of the user to the security node. | 2013-10-10 |
20130268995 | Method For Optimising the Transfer of a Stream of Secure Data Via an Automonic Network - The invention relates to a method for optimising the transfer of secure data streams via an autonomic network between multiple information-producing users Pi and multiple information-consuming users Cj, in which, for each secure session between an information-producing user Pi and an information-consuming user Cj, non-persistent security settings are exchanged between an optimisation module and an autonomic agent via a secure control channel to apply between the autonomic agent and the optimisation module the previously negotiated security procedure, such that during an exchange of streams between the information-producing user Pi and the information-consuming user Cj, the optimisation module having non-persistent security settings appears as a client for a server during the said session. | 2013-10-10 |
20130268996 | METHOD OF EXECUTING VIRTUALIZED APPLICATION ABLE TO RUN IN VIRTUALIZED ENVIRONMENT - A method of executing a virtualized application able to run in a virtualized environment. The virtualized application includes application software and the virtualized environment. The application software includes a license monitor to search for a software license while monitoring an execution policy set by a software provider when software is installed or executed. The virtualized environment includes an environment monitor to monitor an execution environment provided to the application software by the virtualized environment. Therefore, it is possible to prevent software able to run in a virtualized environment from being freely copied without any limitations by the execution policy provided by the software provider. | 2013-10-10 |
20130268997 | SYSTEMS AND METHODS FOR ENFORCING ACCESS CONTROL POLICIES ON PRIVILEGED ACCESSES FOR MOBILE DEVICES - Methods and systems described herein relate to enhancing security on a device by enforcing security and access control policies on privileged code execution. | 2013-10-10 |
20130268998 | MANAGEMENT SERVER AND METHOD FOR CONTROLLING DEVICE, USER TERMINAL APPARATUS AND METHOD FOR CONTROLLING DEVICE, AND USER TERMINAL APPARATUS AND CONTROL METHOD THEREOF - A universal access method performed by a mobile device includes receiving a signal from a security access point that requests authentication information from the mobile device through near field communication (NFC), selecting one of first authentication information and second authentication information corresponding to the security access point, and transferring the selected authentication information to the security access point through NFC. | 2013-10-10 |
20130268999 | DEVICE PINNING CAPABILITY FOR ENTERPRISE CLOUD SERVICE AND STORAGE ACCOUNTS - Device pinning capabilities for cloud-based services and/or storage accounts are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system, for authorizing synchronization of a synchronization client on a device with content associated with an account in the cloud-based service, responsive to determining that the device is on a list of devices that are authorized, and synchronizing the synchronization client on the device with the content associated with the account such that the content is also locally available for access on the device. The list of devices can be specific to and associated with devices for a user in the account and can be limited to an allowable number of devices for the account or a user associated with the account. | 2013-10-10 |
20130269000 | Verification in Wireless Local Area Network - A verification method or apparatus applied in a Wireless Local Area Network (WLAN) includes learning an Internet Protocol (IP) address assigned to a station; sending the IP address to a managing device that is managing the access device and receiving, from the managing device, a determination of whether the IP address is used by another station; and verifying a data packet sent by the station by using an IP address that is not used by another station as reported by the managing device. | 2013-10-10 |
20130269001 | EVOLVED PACKET SYSTEM NON ACCESS STRATUM DECIPHERING USING REAL-TIME LTE MONITORING - A monitoring system is coupled to interfaces in an LTE network and passively captures packets from the network interfaces. First data packets associated with an authentication and key agreement procedure are captured on a first interface. Second data packets associated with the authentication and key agreement procedure are captured on a second interface. Individual ones of the first data packets are correlated to individual ones of the second data packets based upon a same parameter. An authentication vector table is created comprising information from the correlated first data packets and second data packets, wherein entries in the table comprise authentication data for a plurality of security contexts. A cipher key is identified to decipher additional packets for the user. The cipher key can also be identified in case of Inter Radio Access Technology Handover by the user equipment. | 2013-10-10 |
20130269002 | Access Based Internet Protocol Multimedia Service Authorization - The described embodiments of the present invention include a method for controlling authorization of a multimedia service requested by a user device. In one embodiment, the method includes examining an identity of an access network associated with the user device and an identity of the service requested to determine whether the service is supported; authorizing resources in the access network required by the service if the service is supported; rejecting the service if the service is not supported and if a policy associated with the access network requires unsupported services to be rejected; and authorizing a default level of resources in the access network if the service is not supported and if the policy associated with the access network does not require unsupported services to be rejected. | 2013-10-10 |
20130269003 | REMOTE AUTHENTICATION SYSTEM - One embodiment of the invention is directed to a method including receiving an alias identifier associated with an account associated with a presenter, determining an associated trusted party using the alias identifier, sending a verification request message to the trusted party after determining the associated trusted party, and receiving a verification response message | 2013-10-10 |
20130269004 | UNIFIED IDENTITY VERIFICATION - Apparatus, systems, and methods are disclosed that operate to register one time, at a server associated with an authenticating entity, information comprising an identity uniquely associated with an individual account owner and an account held by the authenticating entity. Further activity includes receiving an authentication request at the server from a requesting party to authenticate an unauthenticated individual purporting to be the individual account owner, and authenticating, by the server, the unauthenticated individual as the individual account owner by matching a token presented by the unauthenticated individual, to the identity. Responsive solely to the authenticating, only a selected portion of the information previously authorized by the individual account owner is provided for sharing with the plurality of selected requesting parties. Additional apparatus, systems, and methods are disclosed. | 2013-10-10 |
20130269005 | METHOD AND SYSTEM FOR CONTROLLING ESTABLISHMENT OF COMMUNICATION CHANNELS IN A CONTACT CENTER - A method for controlling establishment of a communication channel between a service provider terminal of a contact center and a service request terminal. Receipt of a request to establish the communication channel is responded to by determining whether a license for a media type associated with the communication channel is allocated to the service provider terminal. If a license is determined to be allocated to the service provider terminal, establishment of the communication channel is allowed. If a license is determined not to be allocated to the service provider terminal, availability of a license from a pool of licenses is determined. If a license is determined not to be available, establishment of the communication channel is refused. If a license is determined to be available, the license is allocated to the service provider terminal and establishment of the communication channel is allowed. | 2013-10-10 |
20130269006 | FILE VAULT AND CLOUD BASED DOCUMENT NOTARY SERVICE - In one embodiment, a trusted cloud service such as an “electronic vault” may store records of a consumer's electronic data file history. These documents may come from disparate providers and include financial statements and the like. The trusted vault cloud may act as an online notary to certify documents are legitimate and may be trusted. For example, a retailer may dispute whether the consumer paid a debt. To resolve the issue the retailer may access the cloud vault to retrieve a bank statement for the consumer, whereby the bank statement is electronically notorized by the vault cloud and is thus credible to the retailer. The retailer may then see proof the consumer had indeed paid a past debt to the retailer. Other embodiments are described herein. | 2013-10-10 |
20130269007 | AUTHENTICATION SYSTEM, AUTHENTICATION SERVER, SERVICE PROVIDING SERVER, AUTHENTICATION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM - An authentication system | 2013-10-10 |
20130269008 | KEY ASSIGNMENT FOR A BRAND - Systems and methods for providing secured network access are provided. A user device located within range of a branded hotspot initiates a request for the secured network access. The request concerns secured network access at the hotspot by the user device and includes a unique pre-shared key. A query regarding the unique pre-shared key is sent to a database, which retrieves information regarding a corresponding pre-shared key. That information is sent to the hotspot controller, which allows the user device secured network access as governed by one or more parameters associated with the pre-shared key. | 2013-10-10 |
20130269009 | Method And System Using A Cyber ID To Provide Secure Transactions - A method and system for securing a user transaction involving a subscriber unit (“SU”) (having a processor, memory, and a display configured to accept user input), a credential information manager (“CIM”) (having a processor and memory), and a transaction service provider (“TSP”) (having a processor and memory). A cyber identifier (“CyberID”), a subscriber identifier (“SubscriberID”), and subscriber information, each associated with the user, is stored in the CIM. A transaction request is sent from the SU to the TSP, which creates a transaction identifier (“TID”), stores it in the TSP memory and transmits it to the SU. The SU transmits an authentication request, the TID, and SubscriberID to the CIM, which authenticates the SubscriberID and verifies the TID to the TSP. The TSP verifies the TID and reports it to the CIM, which transmits the CyberID and subscriber information to the TSP, and transmits a transaction authorization to the SU. | 2013-10-10 |
20130269010 | PATTERN ENTROPY PASSWORD STRENGTH ESTIMATOR - A password evaluation system is provided for determining the password strength of a password. A password is provided for evaluation. The password is parsed and substrings are identified from the password. Each substring is associated with a pattern that can generate the substring. The substrings are scored to determine a substring strength measure for the substring. The substrings are combined to identify non-overlapping substring combinations, which together make up the password. The combinations are assigned a combination strength score based in part on the substring strength of the substrings contained in the substring combinations. The substring combination with the lowest combination strength measure is identified and the associated combination strength measure is used as the password strength measure for the password. | 2013-10-10 |
20130269011 | SYSTEM AND METHOD FOR PROVISIONING A UNIQUE DEVICE CREDENTIALS - According to one embodiment of the invention, a method for controlling access to a network comprises a first operation of determining a type of electronic device to join the network. Then, unique device credentials are sent to the electronic device. These unique device credentials are used in authenticating the electronic device, and the format of the unique device credentials is based on the type of electronic device determined. | 2013-10-10 |
20130269012 | System and Method for Securely Provisioning and Generating One-Time-Passwords in a Remote Device - A secure processor such as a TPM generates one-time-passwords used to authenticate a communication device to a service provider. In some embodiments the TPM maintains one-time-password data and performs the one-time-password algorithm within a secure boundary associated with the TPM. In some embodiments the TPM generates one-time-password data structures and associated parent keys and manages the parent keys in the same manner it manages stand | 2013-10-10 |
20130269013 | SYSTEMS, METHODS AND APPARATUS FOR MULTIVARIATE AUTHENTICATION - Systems, methods, and apparatus are disclosed for user authentication using a plurality of authentication variables, such as biometrics and contextual data. Example contextual data includes the geographical location of the user, a gesture of the user, and the machine identification of the individual's user device. | 2013-10-10 |
20130269014 | METHOD AND APPARATUS FOR BROWSER INTERFACE, ACCOUNT MANAGEMENT, AND PROFILE MANAGEMENT - The present system provides a new interface for a user of the internet. The system presents a plurality of frequently visited sites to a user at a single location. When a site is visited by the user, a normalized version of the site is created for presentation to the user. The system allows the user to manage financial accounts from one location, with the user always logged into the user's accounts, and the consolidating and aggregating of information useful to the user. The system also allows for personalization and customization of a user profile. | 2013-10-10 |
20130269015 | RELATED INFORMATION SUCCESSIVELY OUTPUTTING METHOD, RELATED INFORMATION SUCCESSIVELY PROVIDING METHOD, RELATED INFORMATION SUCCESSIVELY OUTPUTTING APPARATUS, RELATED INFORMATION SUCCESSIVELY PROVIDING APPARATUS, RELATED INFORMATION SUCCESSIVELY OUTPUTTING PROGRAM AND RELATED INFORMATION SUCCESSIVELY PROVIDING PROGRAM - Related information successively outputting and providing methods and apparatus are disclosed wherein the processing load to a related information successively providing apparatus upon provision of content related information can be reduced significantly. The outputting apparatus selects content identification information set as a successive output object in a list included in page information acquired from the providing apparatus as noticed content information, and acquires content related information coordinated with the selected content identification from the providing apparatus. The outputting apparatus outputs the acquired content related information and detects an end of the outputting. When an end of the outputting is detected, the selection of noticed content information, acquisition and outputting of related information and detection of an end of outputting are successively executed again. As a result, content related information acquired from the providing apparatus are outputted automatically and successively. | 2013-10-10 |
20130269016 | METHOD FOR INTEGRATING ACCOUNT MANAGEMENT FUNCTION IN INPUT METHOD SOFTWARE - A method for integrating an account management function in input method software includes the following steps: setting account information of one or more services on a setting interface of an input method; setting a verification manner for reading each piece of account information on the setting interface of the input method, the set verification manner is bound to an original account verification manner; using a service A, starting the input method on a login interface, and selecting an account information item of the service A on a password management interface of the input method; and inputting a verification code, where after verification succeeds, an account name and password of the service A are read and submitted to the login interface of a program of the service A. Through the method, an account password can be safely saved, and the account password can be input conveniently and quickly. | 2013-10-10 |
20130269017 | CENTRALIZED SINGLE SIGN ON SERVICE FOR WEBSITES AND ONLINE SERVICES - A system and related operating methods for performing single sign-on across a plurality of different online resources is provided here. The system receives first user credentials for a user, the first user credentials associated with a first online resource. The user is logged into the first online resource, using the first user credentials. While the user remains logged into the online resource, second user credentials for the user are received, wherein the second user credentials are associated with a second online resource. After receiving the second user credentials, a bidirectional single sign-on service is configured for the user. The service enables the user to log into the second online resource using the first user credentials, and enables the user to log into the first online resource using the second user credentials. | 2013-10-10 |
20130269018 | METHOD AND SYSTEM FOR PROVIDING USER ACCESS TO A SECURE APPLICATION - Providing remote user access to secure financial applications includes deployment of SSO software to client workstations by receiving a password for collaborating access to a secure server, navigating to the secure server using a web browser on a remote workstation, providing user authorization details and the received password to the secure server, generating a subsequent password at the secure server upon validation of the user authorization details and received password, and downloading an SSO deployment file to the remote workstation. The deployment file includes a subsequent password. The SSO deployment file is executed to install an SSO client application on the remote workstation. Workstation settings and user credentials are read from a secure file or data store. The SSO client application is run on the workstation to employ the user credentials and subsequent password to logon to the secure application. | 2013-10-10 |
20130269019 | Systems and Methods for Controlling a Local Application Through a Web Page - A system, computer-readable storage medium storing at least one program, and a computer-implemented method for controlling a local utility are disclosed. A first request originating from an application and including a first token is received at a local utility. The application received a web page, including a plurality of links and the first token, from a first server. The plurality of links are received by the application from a second server. The first token is authenticated. Authentication includes sending the first token to a third server. In response to authenticating the first token, a second token is generated at the local utility. The second token is sent to the application for inclusion in subsequent requests from the application. | 2013-10-10 |
20130269020 | Authenticating Cloud Computing Enabling Secure Services - Authenticating cloud computing enabling secure services (ACCESS) offloads “client authentication” activity onto a third-party authenticating cloud computing enabling secure services (ACCESS) node. Instead of having a client device authenticate itself directly to a network server, the client device instead authenticates itself to a third-party authenticating cloud computing enabling secure services (ACCESS) node. The authenticating cloud computing enabling secure services (ACCESS) node then provides credentials that are used by the client device to communicate directly with the server (and utilize the service) without any further authentication being necessary. | 2013-10-10 |
20130269021 | NAMED SOCKETS IN A FIREWALL - A proxy device such as a firewall uses an internal socket namespace such as a text string such that connection requests must be explicitly redirected to a listening socket in the alternate namespace in order to connect to a service. Because external connections cannot directly address the listening socket or service, greater security is provided than with traditional firewall or proxy devices. To receive a redirected proxy connection, a service process creates a listening socket and binds a name in an alternate namespace to the socket before listening for connections. | 2013-10-10 |
20130269022 | Method and Apparatus for Fast Check and Update of Anti-Replay Window Without Bit-Shifting in Internet Protocol Security - An apparatus comprising a processor configured to implement an anti-replay check for a plurality of received packets and a plurality of corresponding sequence numbers; and a circular buffer coupled to the processor and comprising a bitmap, wherein the bitmap is slided in a circular manner by updating a low index that points to a first sequence number for a first received packet and a high index that points to a last sequence number for a last received packet without bit-shifting, and wherein, when the update results in the new value of one of the low index and the high index exceeding the end of the circular buffer, the one of the low index and the high index wraps around from the beginning of the circular buffer. | 2013-10-10 |
20130269023 | Cloud Based Firewall System And Service - A cloud-based firewall system and service is provided to protect customer sites from attacks, leakage of confidential information, and other security threats. In various embodiments, such a firewall system and service can be implemented in conjunction with a content delivery network (CDN) having a plurality of distributed content servers. The CDN servers receive requests for content identified by the customer for delivery via the CDN. The CDN servers include firewalls that examine those requests and take action against security threats, so as to prevent them from reaching the customer site. The CDN provider implements the firewall system as a managed firewall service, with the operation of the firewalls for given customer content being defined by that customer, independently of other customers. In some embodiments, a customer may define different firewall configurations for different categories of that customer's content identified for delivery via the CDN. | 2013-10-10 |
20130269024 | ELECTRONIC DEVICE AND METHOD FOR CONTROLLING ACCESS TO THE ELECTRONIC DEVICE - A method for controlling access to an electronic device, the electronic device determines one or more selected colored shapes in response to receiving selection signals generated by a user selecting the one or more colored shapes, sequentially numbers the selected colored shapes to obtain numbering information. When the numbering information matches prestored unlocking numbering information, the electronic device is unlocked. | 2013-10-10 |
20130269025 | RESOURCE ACCESS BASED ON MULTIPLE SCOPE LEVELS - A scope hierarchy corresponding to a resource to which a type of access is requested is identified, the scope hierarchy including multiple scope levels each of which has an associated access control list. An access control list associated with a lower scope level can further restrict access permitted to the resource by an access control list associated with a higher scope level. Based at least in part on one or more of the access control lists associated with the multiple scope levels, a determination is made as to whether the requested type of access to the resource is permitted. | 2013-10-10 |
20130269026 | RESTRICTED ACCESS MEMORY DEVICE PROVIDING SHORT RANGE COMMUNICATION-BASED SECURITY FEATURES AND RELATED METHODS - A memory device may include a memory, a host interface connector, a short range communication transceiver, and a processor coupled with the memory and the short range communication transceiver. The processor may be capable of storing data in the memory, and reading the data from the memory to the host device via the host interface connector based upon at least one of receiving first authentication data including a password, via the host interface connector, from a memory access application installed on the host device, or receiving second authentication data via the short range communication transceiver without use of the memory access application. | 2013-10-10 |
20130269027 | TECHNIQUES TO EXPLAIN AUTHORIZATION ORIGINS FOR PROTECTED RESOURCE OBJECTS IN A RESOURCE OBJECT DOMAIN - Techniques to explain authorization origins for protected objects in an object domain are disclosed. In one embodiment, for example, an apparatus may comprise a processor circuit, a request processor component operative on the processor circuit to receive and process a request for an authorization origin of a resource object, the authorization origin comprising an access control with a permission arranged to control access to the resource object based on an identity, and a resource origin component operative on the processor circuit to identify the authorization origin of the resource object from a set of interrelated resource objects and associated access controls, retrieve authorization origin information for the authorization origin, and present the authorization origin information in a user interface view. Other embodiments are described and claimed. | 2013-10-10 |
20130269028 | UNIFIED SCAN MANAGEMENT - A particular scan set to be performed on at least a portion of a computing environment is identified. A particular scan engine, in a plurality of scan engines, is identified that is adapted to perform at least one scan in the particular scan set, each scan engine in the plurality of scan engines adapted to perform one or more scans on one or more host devices in the computing environment. A request is sent to the particular scan engine to perform the at least one scan in the particular scan set and scan result data is received from the particular scan engine corresponding to the at least one scan in the particular scan set. | 2013-10-10 |
20130269029 | UNIFIED SCAN ENGINE - A scan engine receives a request to perform a particular scan on at least a portion of a computing environment. The scan engine identifies a particular language interpreter in a set of available language interpreters for use in performing the particular scan and performs the particular scan using the particular language interpreter. The scan engine returns results of the particular scan. In some implementations, the scan engine is implemented on an agent enabling communication between the scan engine and an asset management system. | 2013-10-10 |
20130269030 | DETECTION OF UNEXPECTED SERVER OPERATION THROUGH PHYSICAL ATTRIBUTE MONITORING - Technologies are generally presented for identifying inconsistent usage of computing devices in a multiple computing device environment. When software or hardware are compromised or faulty, the results of self-monitoring may be unreliable for determining inconsistent usage arising from a security breach, a hardware fault, or a software error. Computing devices may be independently monitored for physical attributes, such as temperature, vibration, emitted noise, etc., and such attributes may be compared to expected values based on computing load, network load, or the like. When the monitored and expected physical attribute values differ or conflict, possible inconsistent usage may be identified so that appropriate measures may be taken to rectify the situation. | 2013-10-10 |
20130269031 | NETWORK SYSTEM, NETWORK RELAY METHOD, AND NETWORK RELAY DEVICE - A history management unit within a discard determination unit manages transmission and reception packets related to a resource to be protected for each of users, and records communication history information for users high in use frequency through stateful measurement. A priority determination unit determines the priority of a communication on a per received packet basis on the basis of communication history information. A load determination unit determines a load level of the resource to be protected, and combines the load level with the priority of the communication determined on the per received packet basis. A discard rate determination unit and a packet discard unit implement forwarding processing, determine the priority of the communication on the per user basis, and discard communications low in the priority at a high ratio. | 2013-10-10 |
20130269032 | Detecting Network Intrusion Using a Decoy Cryptographic Key - Systems and methods for detecting intrusion into a data network are disclosed. Such intrusion can be detected, for example, by providing at least two network devices in a data network. Each of the network devices has a decoy cryptographic key that is used to detect unauthorized data and an authentic cryptographic key that is used to encrypt authorized data. The first network device receives data from the second network device that is encrypted using the decoy cryptographic key. The first network device determines that the data is encrypted using the decoy cryptographic key. The first network device deletes or otherwise discards the data encrypted using the decoy cryptographic key. The first network device can generate an alert message instructing other network devices that the second network device is generating the unauthorized data. The alert message also instructs the other network devices to ignore data originating from the second network device. | 2013-10-10 |
20130269033 | METHOD AND SYSTEM FOR CLASSIFYING TRAFFIC - A method and system for classifying traffic in a communication network. The method comprises the steps of: capturing IP packets ( | 2013-10-10 |
20130269034 | PROACTIVE CONTAINMENT OF NETWORK SECURITY ATTACKS - One embodiment disclosed relates to a method of proactive containment of network security attacks. Filtering parameters corresponding to a specific system vulnerability are determined. These parameters are distributed to network infrastructure components, and the network infrastructure components examine packets using these parameters to detect occurrence of an attack. Once an attack is detected, the network infrastructure components take action to inhibit the attack. Other embodiments are also disclosed. | 2013-10-10 |
20130269035 | DATA PRIVACY ENGINE - A computer hardware-implemented method, system, and/or computer program product determines an applicability of a data privacy regulation when transmitting data used with an enterprise project. A data privacy regulation describes regulatory restrictions on data being transmitted from a first geopolitical entity to a second geopolitical entity. A set of categorized data is used by an enterprise project, and the data privacy regulation establishes limitations on a transmission of at least one category of data, from the set of categorized data, from the first geopolitical entity to the second geopolitical entity. A first set of binary data and a second set of binary data are processed to determine if transmission of said at least one category of data from the first geopolitical entity to the second geopolitical entity is regulated by the data privacy regulation. | 2013-10-10 |
20130269036 | METHOD FOR PROTECTING AN APPLICATION PROGRAM - An application program providing a task in an electronic device is protected. Information used for executing the task in the electronic device is stored in a smart object to be coupled thereto. The information is requested from the smart object at run time execution of the application program by the electronic device, and is returned to the application program to define at run time a correct semantic of the task. | 2013-10-10 |
20130269037 | SYSTEM AND APPARATUS FOR TRANSFERRING DATA BETWEEN COMMUNICATION ELEMENTS - A system and apparatus for transferring data between communication elements is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a communication device having a controller element to receive data from a web server to update one or more entries of an identity module coupled to the controller element. The data can be retrieved by the web server from a second communication device. Additional embodiments are disclosed. | 2013-10-10 |
20130269038 | INFORMATION PROTECTION DEVICE AND INFORMATION PROTECTION METHOD - When position information is added in a real-time fashion, anonymity of movement trajectories is ensured and the degree of abstraction of positioning data included in the position information is prevented from becoming too high. A group of anonymous information with a second positioning time preceding a first positioning time is partitioned into two or more groups so that the anonymous information with the first positioning time satisfies a predetermined anonymity metric and so that a degree of abstraction of the abstracted positioning data in the anonymous information becomes lower than a predetermined standard value, anonymous information including positioning data with the first positioning time abstracted by the partitioned groups is generated, and the generated anonymous information is stored in an anonymous information storage unit in association with the anonymous information with the second positioning time. | 2013-10-10 |
20130269039 | DATA ACCESS CONTROL - The presently disclosed subject matter includes a system and method for protecting data stored in a physical storage space of a storage system. According to the teachings disclosed herein, a block key is provided together with a read and a write request and is applied on data, which is related to a logical data block, for calculating a data block signature. A read request according to the presently disclosed subject matter includes, in addition to data indicative of a requested data block, a block key for the purpose of verifying the data block signature that was stored upon the last write of the requested data block. A write request according to the presently disclosed subject matter includes, in addition to data indicative of a data block to be written, a block key for generating a respective data block signature. | 2013-10-10 |
20130269040 | AUTHORISING USE OF A COMPUTER PROGRAM - A method of authorising use of a computer program only able to be used when an authorised message is received from an authorising system includes providing an authorisation system, making a request to use a computer program, signalling the request to the authorisation system, the authorisation system recording the use of the computer program and providing the authorisation message to the computer program upon receipt of the authorisation message the computer program may be used. | 2013-10-10 |
20130269041 | ACCESS TO APPLICATION PROGRAMMING INTERFACE SYSTEMS AND METHODS - A method and system for granting premium access to a service application stored within a service provider (SP) computer system through an open API platform is provided. The method includes receiving a request for premium access to the service application from a developer of a developer application wherein the developer application is configured to request data from the service application, assigning a production key to the developer application, sending an electronic message to a service owner (SO) associated with the service application requesting premium access to the service application, granting premium access to the service application by the SO for the developer application, updating the production key at the open API platform to include premium access to the service application, and notifying the developer of the granting of the premium access to the service application for the developer application. | 2013-10-10 |
20130269042 | OPTIMIZING SECURITY SEALS ON WEB PAGES - A method of providing web site verification information to a user can include receiving a DNS query including a host name and a seal verification site name, parsing the DNS query, and extracting the host name from the DNS query. The method also can include accessing a DNS zone file including a list of Trust Services customers and determining if the host name is associated with a Trust Services customer in the list of Trust Services customers. The method further can include transmitting a positive identifier to the requester if the host name is associated with a Trust Services customer and transmitting a negative identifier to the requester if the host name is not associated with a Trust Services customer. In a specific embodiment, the Trust Services include issuance of digital certificates. | 2013-10-10 |
20130269043 | System and Method for Analyzing A Device - A system and method for analyzing a device are disclosed. In an aspect, a method can comprise determining a parameter of a device at a kernel level of a software stack associated with the device, analyzing the parameter to determine an event state, comparing the event state to a white list to determine a state of an alert trigger, and generating an alert in response to the determined state of the alert trigger. | 2013-10-10 |
20130269044 | NON-INVASIVE SAFETY WRAPPER FOR COMPUTER SYSTEMS - A processing system comprising: a first processor adapted to perform one or more tasks according to a predetermined schedule and generate one or more first outputs; and a second processor synchronised with the first processor; wherein the second processor is adapted to receive the one or more first outputs and generate one or more corresponding second outputs when the timing of the one or more first outputs corresponds with the predetermined schedule. | 2013-10-10 |
20130269045 | HB-EGF DEFICIENT TRANSGENIC ANIMAL AND PRODUCTION METHOD THEREOF - A transgenic animal other than human in which neuropsychiatric disorder condition is developed by the deletion of an HB-EGF gene is obtained. The present invention relates to a transgenic animal other than human in which an HB-EGF gene is deficient and neuropsychiatric disorder condition is developed, and a production method thereof, and a method for screening a therapeutic agent for neuropsychiatric disorder. As a transgenic animal in accordance with the present invention, a transgenic animal in which an HB-EGF gene is specifically deficient in the spiny neurons (striatum, and hippocampus) can be obtained by crossbreeding a transgenic animal that contains a genotype of Gng7 | 2013-10-10 |
20130269046 | Model for Muscle Atrophy - A non-human animal model for muscle cell atrophy is provided. In certain embodiments, the animal comprises a cell comprising a nuclear genome comprising a biologically active atrogen gene in operable linkage with a reporter construct comprising: i. a first coding sequence for an optically detectable protein; and ii. a second coding sequence for a secreted reporter enzyme; wherein expression of the atrogen gene is induced upon initiation of muscle cell atrophy, thereby resulting in production of the secreted reporter enzyme and the first optically detectable protein by the cell. Screening assays that employ the non-human animal are also provided. | 2013-10-10 |
20130269047 | TOMATO HYBRID PX 02461513 AND PARENTS THEREOF - The invention provides seed and plants of tomato hybrid PX 02461513 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid PX 02461513 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2013-10-10 |
20130269048 | CUCUMBER WITH INCREASED NUMBER OF FRUITS - The present invention relates to a cucumber plant ( | 2013-10-10 |
20130269049 | Plants Having Increased Yield and a Method for Making the Same - The present invention concerns a method for increasing plant yield by modulating expression in a plant of a nucleic acid encoding a synovial sarcoma translocation (SYT) polypeptide or a homologue thereof. One such method comprises introducing into a plant a SYT nucleic acid or variant thereof. The invention also relates to transgenic plants having introduced therein a SYT nucleic acid or variant thereof, which plants have increased yield relative to corresponding wild type plants. The present invention also concerns constructs useful in the methods of the invention. | 2013-10-10 |
20130269050 | INBRED CORN LINES BB202, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, AND MN26 - Inbred corn lines, designated BB202, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26, are disclosed. The invention relates to the seeds of inbred corn line BB202, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26, to the plants and plant parts of inbred corn line BB202, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26 and to methods for producing a corn plant, either inbred or hybrid, by crossing inbred corn line BB202, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26 with itself or another corn line. The invention also relates to products produced from the seeds, plants, or parts thereof, of inbred corn line BB202, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26 and/or of the hybrids produced using the inbred as a parent. The invention further relates to methods for producing a corn plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other inbred corn lines derived from inbred corn line BB202, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26. | 2013-10-10 |
20130269051 | INBRED CORN LINES BB87, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, AND MN26 - Inbred corn lines, designated BB87, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26, are disclosed. The invention relates to the seeds of inbred corn line BB87, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26, to the plants and plant parts of inbred corn line BB87, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26 and to methods for producing a corn plant, either inbred or hybrid, by crossing inbred corn line BB87, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26 with itself or another corn line. The invention also relates to products produced from the seeds, plants, or parts thereof, of inbred corn line BB87, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26 and/or of the hybrids produced using the inbred as a parent. The invention further relates to methods for producing a corn plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other inbred corn lines derived from inbred corn line BB87, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26. | 2013-10-10 |
20130269052 | INBRED CORN LINES CC8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, AND MN26 - Inbred corn lines, designated CC8, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26, are disclosed. The invention relates to the seeds of inbred corn line CC8, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26, to the plants and plant parts of inbred corn line CC8, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26 and to methods for producing a corn plant, either inbred or hybrid, by crossing inbred corn line CC8, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26 with itself or another corn line. The invention also relates to products produced from the seeds, plants, or parts thereof, of inbred corn line CC8, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26 and/or of the hybrids produced using the inbred as a parent. The invention further relates to methods for producing a corn plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other inbred corn lines derived from inbred corn line CC8, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26. | 2013-10-10 |
20130269053 | INBRED CORN LINES II11, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, AND MN26 - Inbred corn lines, designated II11, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26, are disclosed. The invention relates to the seeds of inbred corn line II11, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26, to the plants and plant parts of inbred corn line II11, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26 and to methods for producing a corn plant, either inbred or hybrid, by crossing inbred corn line II11, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26 with itself or another corn line. The invention also relates to products produced from the seeds, plants, or parts thereof, of inbred corn line II11, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26 and/or of the hybrids produced using the inbred as a parent. The invention further relates to methods for producing a corn plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other inbred corn lines derived from inbred corn line II11, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26. | 2013-10-10 |
20130269054 | INBRED CORN LINES MM53, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, AND MN26 - Inbred corn lines, designated MM53, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26, are disclosed. The invention relates to the seeds of inbred corn line MM53, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26, to the plants and plant parts of inbred corn line MM53, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26 and to methods for producing a corn plant, either inbred or hybrid, by crossing inbred corn line MM53, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26 with itself or another corn line. The invention also relates to products produced from the seeds, plants, or parts thereof, of inbred corn line MM53, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26 and/or of the hybrids produced using the inbred as a parent. The invention further relates to methods for producing a corn plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other inbred corn lines derived from inbred corn line MM53, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26. | 2013-10-10 |
20130269055 | INBRED CORN LINES MN29, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, AND MN26 - Inbred corn lines, designated MN29, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26, is disclosed. The invention relates to the seeds of inbred corn line MN29, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26, to the plants and plant parts of inbred corn line MN29, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26 and to methods for producing a corn plant, either inbred or hybrid, by crossing inbred corn line MN29, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26 with itself or another corn line. The invention also relates to products produced from the seeds, plants, or parts thereof, of inbred corn line MN29, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26 and/or of the hybrids produced using the inbred as a parent. The invention further relates to methods for producing a corn plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other inbred corn lines derived from inbred corn line MN29, AB8, AB18, AB19, BB84, BB85, BB95, BB98, BB201, BC106, BC137, CB20, or MN26. | 2013-10-10 |