Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


06th week of 2013 patent applcation highlights part 48
Patent application numberTitlePublished
20130036398METHODS FOR BDI-DRIVEN SERVICE COMPONENT ARCHITECTURES AND DEVICES THEREOF - Methods, devices, and computer-readable storage media for developing a business application include mapping one or more requirements of the business application to a Belief Desire Intention (BDI) architecture. The BDI architecture is mapped to a Service Component Architecture (SCA). The business application is developed based at least in part on the mapping of the one or more requirements to the BDI architecture and on the mapping of the BDI architecture to the SCA.2013-02-07
20130036399MOBILE APPLICATION CREATION PLATFORM - A system for creating mobile software applications that may be updated in real time without code changes, re-submittal or user updating. The system includes various types of media content, a content management system, mobile application and a mobile device. Media content is uploaded to the content management system where it is translated and organized in preparation for delivery to the mobile application and mobile device. A user interfaces with the mobile device to receive translated and organized media content for display on the mobile device.2013-02-07
20130036400PRE-MERGE CONFLICT AVOIDANCE - Methods, systems, and computer program products may provide pre-merge conflict avoidance in a revision-control system. A pre-merge conflict avoidance method may include identifying by a computer system a portion of interest of a revision-controlled base source code stored in a source-code repository, the base source code being developed by a plurality of developers. The computer system may determine whether at least one of the plurality of developers has made a change to a portion of a first copy of the base source code corresponding to the portion of interest prior to commitment of the first copy of the base source code to the source-code repository. In response to a determination that the at least one developer has made a change to the portion of interest, a notification may be produced about the change to the portion of interest by the at least one developer.2013-02-07
20130036401Method for Improving the Performance of Browser-Based, Formula-Driven Parametric Objects - A computer-aided, design system and method generates procedural code from a plurality of spreadsheet formulas which define the behavior of a parametric object. These spreadsheet formulas drive function calls to an API of the design system when initially drawing the parametric object within a user interface, and these function calls may be cached as procedural code. In subsequent re-drawings of same object, the procedural code may be executed with updated or changed attributes received from an input dialog box. Rather than converting, translating, and parsing the spreadsheet formulas each time an entry is changed, the procedural code may be optimized for execution and also be concealed from the user so that any proprietary information in the formulas and functions is kept secret.2013-02-07
20130036402USING VIRTUAL MACHINES TO MANAGE SOFTWARE BUILDS - Concepts and technologies are described herein for using virtual machines to manage software builds. A deployment controller manages deployment of a new software build. The deployment controller installs the new software build on test device and tests the new software build. If the new software build functions without errors, the new software build is deployed to hosts of a data center and monitored for errors. If errors are detected, the errors are reported to a developer associated with the new software build. In some embodiments, the deployment controller creates a differencing disk storing differences between the updated software build and an existing software build and uses the differencing disk for installing the new software build for testing and/or for deploying the new software build.2013-02-07
20130036403METHOD AND APPARATUS FOR DEBUGGING PROGRAMS - A computer-implemented method, apparatus and computer program product for debugging programs, the method comprising: displaying a graphic waveform showing values of one or more state variables of a computer program being debugged in two or more points in time; receiving a user selection from points in time, of an indication to a selected point in time in execution from the graphic waveform; and resuming within a debugger an execution state of the computer program associated with the selected point in time.2013-02-07
20130036404TESTING OF A SOFTWARE SYSTEM USING INSTRUMENTATION AT A LOGGING MODULE - In one embodiment, a method includes determining an instrumentation action to perform with the software program when a logging statement is encountered during execution of a software program. The instrumentation action is performed by an instrumentation service associated with a logging service and the execution of the software program is monitored based on the instrumentation action being performed.2013-02-07
20130036405AUTOMATED TEST FAILURE TROUBLESHOOTER - A test controller performs a test of a test-target component of a test-target system so as to generate at least one fail event indicating a possible fault in the test-target component. A trouble-shooting and analysis tool probes the test controller and/or hardware of the test-target system to investigate potential causes of the fail event other than a fault of said software component. The trouble-shooting and analysis tool then analyzes fail data including probe data to evaluate potential causes of the fail event.2013-02-07
20130036406CONTEXTUAL EXCEPTION MANAGEMENT IN MULTI-TENANT SYSTEMS - Methods and systems are provided for managing exceptions in a multi-tenant system providing instances of a virtual application over a network to multiple tenants. One exemplary method involves obtaining, from an instance of the virtual application, context information associated with an anomalous condition identified by the virtual application and automatically creating an exception record maintaining an association between the anomalous condition and the context information.2013-02-07
20130036407CONTEXTUAL EXCEPTION MANAGEMENT IN MULTI-TENANT SYSTEMS - Methods and systems are provided for assigning exceptions in a multi-tenant system providing instances of a virtual application over a network to multiple tenants. One exemplary method of assigning an exception record corresponding to an anomalous condition identified by an instance of the virtual application involves obtaining context information associated with the anomalous condition from the instance of the virtual application and automatically assigning the exception record to a development entity based at least in part on the context information.2013-02-07
20130036408TECHNIQUE FOR COMPILING AND RUNNING HIGH-LEVEL PROGRAMS ON HETEROGENEOUS COMPUTERS - A technique for compiling and running high-level program on heterogeneous computers may include partitioning a program code into two or more logical units, and compiling each of the logical units into one or more executable entities. At least some of the logical units are compiled into two or more executable entities, the two or more executable entities being different compilations of the same logical unit. The two or more executable entities are compatible to run on respective two or more platforms that have different architecture.2013-02-07
20130036409TECHNIQUE FOR COMPILING AND RUNNING HIGH-LEVEL PROGRAMS ON HETEROGENEOUS COMPUTERS - A technique for compiling and running high-level program on heterogeneous computers may include partitioning a program code into two or more logical units, and compiling each of the logical units into one or more executable entities. At least some of the logical units are compiled into two or more executable entities, the two or more executable entities being different compilations of the same logical unit. The two or more executable entities are compatible to run on respective two or more platforms that have different architecture.2013-02-07
20130036410Real-Time Temperature Sensitive Machine Level Code Compilation And Execution - Methods, apparatuses, and computer program products for real-time temperature sensitive machine level code compilation and execution are provided. Embodiments include compiling and executing, by a just-in-time (JIT) compiler, machine level code; during execution of the machine level code, determining, by the JIT compiler, an execution temperature for the machine level code, including reading temperature measurements from one or more processor temperature sensors; based on the determined execution temperature, identifying, by the JIT compiler, a portion of the machine level code that, when executed, caused temperature measurements of one or more processor temperature sensors to exceed a predetermined threshold temperature; recompiling, by the JIT compiler, the machine level code including modifying the identified portion to generate a new execution temperature that is lower than the previously determined execution temperature; and executing, by the JIT compiler, the recompiled machine level code.2013-02-07
20130036411Software Update Method for Display Device - A software update method for a display device includes: storing a first software program by a first memory of a computer device; electrically coupling the computer device to the display device; controlling a display card of the computer device by a public application programming interface (API) function of a driver program of the display card or by a physical address of the display card searched by a search program coded by an operating system of the computer device; transferring the first software program stored in the first memory to the display device through a display data channel (DDC) of the controlled display card; and, receiving the first software program by the display device and updating a second software program stored in a second memory of the display device into the first software program by a microcontroller of the display device.2013-02-07
20130036412SOFTWARE DISTRIBUTION AMONGST MEDICAL DEVICES TAKING INTO ACCOUNT DEPENDENCIES BETWEEN DEVICES - A computer-implemented method is provided for distributing product updates from a configuration device to one or more handheld medical device. The method includes: receiving a request to download a product update to a requesting medical device; determining dependencies that must be met before the product update can be downloaded to the requesting medical device, where at least one of the dependencies specifies a version of software that resides on a device which is interoperable with the requesting medical device; receiving a listing of peer devices from the requesting medical device, such that each peer device in the listing of peer devices is distinct from and interoperable with the requesting medical device; determining software residing on a given peer device for each peer device in the listing of peer devices; comparing the at least one dependency with the software residing on each peer device in the listing of peer devices; and distributing the product update to the requesting medical device when the at least one dependency is met.2013-02-07
20130036413METHODS AND APPARATUS FOR BUG-FIX NOTIFICATIONS - A customer initiates a customer support request indicating that a bug exists in an particular application. An internal bug-fix tracking system includes a case status server that receives a notification event indicating that the bug has been fixed in an updated software release. The associated customer support request is then updated to reflect the bug fix, triggering a notification e-mail that is automatically and directly sent to the customer.2013-02-07
20130036414MANAGING SOFTWARE DISTRIBUTION FOR REGULATORY COMPLIANCE - A computer-implemented system is provided for distributing product updates to end user medical devices. An update interface residing on a distribution platform is configured to distribute product updates and maintain a log of such distributions in an audit database. A configuration device in data communication with the update interface registers itself with the update interface and downloads product updates from the update interface, such that the registration includes providing identifying information for a user of the configuration device and identifying information for the configuration device. A medical device in data communication with the configuration device registers itself with the configuration device and downloads a particular product update from the configuration device, such that the configuration device creates a record of the particular product update and communications the record of the particular product update to the update interface. In this way, product updates distributed via the configuration device are recorded and tracked for regulatory purposes.2013-02-07
20130036415SOFTWARE DISTRIBUTION TO MEDICAL DEVICES VIA AN INTERMEDIARY WHICH ENFORCES MAINTENANCE OF A TRANSACTION LOG - A software configuration device is provided for distributing product updates offline to a plurality of end user medical devices. The configuration device includes: a download manager, in selective data communication with an update interface residing at a server, that downloads product updates from the update interface and stores the product updates on a data store residing on the device; and an update distributor configured to capture identifying information for a user and operable by the user to distribute product updates to one or more end user medical devices. The update distributor further maintains distribution data for each of the distributed product updates, including identifying information for the user, in a transaction log residing on the configuration device. The download manager can subsequently upload the transaction log to the server while in data communication with the server.2013-02-07
20130036416DETECTING AND CORRECTING NETWORK INTERRUPTIONS USING NETWORK ADDRESS TRANSLATION - Embodiments provide a network address translation (NAT) service for network devices. A network connection from at least one private network device to the NAT service is received and a network connection from at least one remote device to the NAT service is received. The private network device is positioned within a private network and the remote device is positioned within a public network. A network availability of the remote device is determined. If the remote device is unavailable or a network configuration setting associated with the remote device changes, the private network device is notified and a connection reset message is transmitted to the private network device.2013-02-07
20130036417Virtual Resource Management Method, System, and Apparatus - A virtual resource management method, system, and apparatus are applied in the field of communications technologies. The virtual resource management method includes running an input/output I/O domain on a remote node, if the remote node needs to enter a sleep state, obtaining information of a processor core occupied by running the input/output I/O domain on the remote node; stopping running the I/O domain if the remote node is in the sleep state; and sorting, according to the obtained information of the processor core, a resource of a corresponding processor core to a virtual resource pool, so that the processor core can be used to perform service processing, thereby implementing virtual resource management.2013-02-07
20130036418In-Place Snapshots of a Virtual Disk Configured with Sparse Extent - A virtualized computer system employs a virtual disk with a space efficient (SE) format to store data for virtual machines running therein. Data within a virtual disk with a SE format is stored in a grain, where multiple grains are included in a storage block. Writes to a grain within shared storage block in a virtual disk with an SE format are serviced by allocating a new grain and storing the write data to the new grain. Metadata associated with the client that transmitted the write request to the virtual disk is then updated to point to the new grain instead of the grain within the shared storage block.2013-02-07
20130036419DYNAMICALLY CONFIGURABLE COMMAND AND CONTROL SYSTEMS AND METHODS - A method and system in a Service Orchestration Architecture environment that provides rules engine-based service orchestration, task, and alert management for collaboration between one or more nodes of operation. The system provides multiple levels of configurability. In one aspect, the system includes a rules engine to define the command and control (C2) service orchestration.2013-02-07
20130036420IMAGE FORMING APPARATUS FOR DETERMINING THE AVAILABILITY OF APPLICATION PROGRAM INTERFACES - An image forming apparatus has a plurality of programs of which an interface is open to public so that an application created according to the interface is executable. An amount condition providing part provides information indicating a mount condition of a group constituted by a plurality of the programs in accordance with a request made by the application.2013-02-07
20130036421CONSTRAINED RATE MONOTONIC ANALYSIS AND SCHEDULING - A method for scheduling schedulable entities onto an execution timeline for a processing entity in a constrained environment includes determining available capacity on the execution timeline for the processing entity based on constraints on the execution timeline over a plurality of time periods, wherein schedulable entities can only be scheduled onto the execution timeline during schedulable windows of time that are not precluded by constraints. The method further includes determining whether enough available capacity exists to schedule a schedulable entity with a budget at a rate. The method further includes when enough available capacity exists to schedule the schedulable entity with the budget at the rate, scheduling the schedulable entity onto the execution timeline for the processing entity during a schedulable window of time. The method further includes when the schedulable entity is scheduled onto the execution timeline, updating available capacity to reflect the capacity utilized by the schedulable entity.2013-02-07
20130036422OPTIMIZED DATACENTER MANAGEMENT BY CENTRALIZED TASK EXECUTION THROUGH DEPENDENCY INVERSION - A Datacenter Management Service (DMS) is provided as a platform designed to automate datacenter management tasks that are performed across multiple technology silos and datacenter servers or collections of servers. The infrastructure to perform the automation is provided by integrating heterogeneous task providers and implementations into a set of standardized adapters through dependency inversion. A platform automating datacenter management tasks may include three main components: integration of adapters into an interface allowing a common interface for datacenter task execution, an execution platform that works against the adapters, and implementation of the adapters for a given type of datacenter management task.2013-02-07
20130036423SYSTEMS AND METHODS FOR BOUNDING PROCESSING TIMES ON MULTIPLE PROCESSING UNITS - Embodiments of the present invention provide improved systems and methods for processing multiple tasks. In one embodiment a method comprises: selecting a processing unit as a master processing unit from a processing cluster comprising multiple processing units, the master processing unit selected to execute master instruction entities; reading a master instruction entity from memory; scheduling the master instruction entity to execute on the master processing unit; identifying an execution group containing the master instruction entity, the execution group defining a set of related entities; when the execution group contains at least one slave instruction entity, scheduling the at least one slave instruction entity to execute on a processing unit other than the master processing unit during the execution of the master instruction entity; and terminating execution of instruction entities related by the execution group when a master instruction entity is executed that is not a member of the execution group.2013-02-07
20130036424RESOURCE ALLOCATION IN PARTIAL FAULT TOLERANT APPLICATIONS - A method for allocating a set of components of an application to a set of resource groups includes the following steps performed by a computer system. The set of resource groups is ordered based on respective failure measures and resource capacities associated with the resource groups. An importance value is assigned to each of the components. The importance value is associated with an affect of the component on an output of the application. The components are assigned to the resource groups based on the importance value of each component and the respective failure measures and resource capacities associated with the resource groups. The components with higher importance values are assigned to resource groups with lower failure measures and higher resource capacities. The application may be a partial fault tolerant (PFT) application that comprises PFT application components. The resource groups may comprise a heterogeneous set of resource groups (or clusters).2013-02-07
20130036425USING STAGES TO HANDLE DEPENDENCIES IN PARALLEL TASKS - Technologies are described herein for using stages for managing dependencies between tasks executed in parallel. A request for permission to execute a task from a group or batch of tasks is received. The specified task is retrieved from a task definition list defining a task ID, stage, and maximum stage for each task in the group. If another pending or currently running task exists with a stage and maximum stage less than the stage defined for the retrieved task, then the retrieved task is not allowed to run. If no other pending or currently running task exists with a stage and maximum stage less than the stage defined for the retrieved task, then the permission to execute the specified task is given.2013-02-07
20130036426INFORMATION PROCESSING DEVICE AND TASK SWITCHING METHOD - Disclosed is an information processing device and a task switching method that can reduce the time required for switching of tasks in a plurality of coprocessors. The information processing device includes a processor core; coprocessors including operation units that perform operation in response to a request from the processor core and operation storage units that store the contents of operation of the operation units, save storage units that store the saved contents of operation, a task switching control unit that outputs a save/restore request signal when switching a task on which operation is performed by the coprocessors-, and save/restore units that perform at least one of saving of the contents of operation in the operation storage units to the save storage units and restoration of the contents of operation in the save storage units to the operation storage units in response to the save/restore request signal.2013-02-07
20130036427MESSAGE QUEUING WITH FLEXIBLE CONSISTENCY OPTIONS - Embodiments of the invention relate to message queuing. In one embodiment, a request from an application for retrieving a message from a queue is received. The queue is stored across multiple nodes of a distributed storage system. A preference with respect to message order and message duplication associated with the queue is identified. A message sequence index associated with the queue is sampled based on the preference that has been identified. The message is selected in response to the sampling. The message that has been selected is made unavailable to other applications for a given interval of time, while maintaining the message in the queue. The message is sent to the application.2013-02-07
20130036428EVENT TRIGGERING METHOD DURING SLEEP MODE AND RELATED MOBILE DEVICES - An event triggering method for triggering events during a sleep mode for use in a mobile device is provided, wherein events includes at least first and second type events. First, an event manager operated in the sleep mode is provided, wherein event manager includes a counter. Thereafter, second type event registers to event manager a periodical time period. Upon receiving a request for triggering the first type event, it is determined whether to trigger second type event together with triggered first event according to a counter value counted by the counter and time period registered by the second type event; wherein second type event is determined as not being triggered when counter value is less than time period registered by second type event and second type event is determined as being triggered when counter value is equal to or exceeds time period registered by second type event.2013-02-07
20130036429SYSTEM AND METHOD FOR CIRCULATING MAP-BASED APPLICATION - A system and a method for circulating a map-based App are provided. In a method in which an App circulation system circulates an App including position information, when a smart terminal is connected, position information of the smart terminal is acquired. The App circulation system searches for one of more Apps having position information within a predetermined radius of the smart terminal based on the acquired position information. The found location App is displayed in the smart terminal on a map based on a position or augmented reality.2013-02-07
20130036430Portable Information Display Terminal - Provided is a portable information display terminal capable of automatically starting an appropriate application program according to not only the time but also the use state of the portable information display terminal. The portable information display terminal (2013-02-07
20130036431Constraining Execution of Specified Device Drivers - Techniques for allowing peripheral-device manufacturers to specify drivers for use with these devices and then loading these manufacturer-specified drivers in a manner that constrains operation of the drivers are described herein. In some instances, the techniques constrain operation of the drivers by loading these drivers into isolated containers. By loading such a driver into an isolated container, the techniques protect the host computer from harm caused by a buggy or malicious device driver. Furthermore, by loading a device driver that a manufacturer of the corresponding device specifies, the techniques allow this manufacturer to select a driver that is unlikely to harm the peripheral device itself In tandem, the techniques provide a framework that protects both the peripheral device and the host computer to which the peripheral device couples.2013-02-07
20130036432SKEW ADJUSTING APPARATUS AND OPTICAL DISC DRIVE INCLUDING THE SAME - A skew adjusting apparatus is provided. The skew adjusting apparatus includes a plurality of skew support members provided on a base mold coupled to a base chassis to have an elastic force, and a plurality of skew screws configured to couple a motor plate that supports a spindle motor to the base mold.2013-02-07
20130036433SYSTEMS AND METHODS FOR CACHING DATA IN MEDIA-ON-DEMAND SYSTEMS - Systems and methods may be provided for retrieving non-on-demand media data and on-demand media data that is provided by separate data sources. On-demand media data may be cached to reduce system latencies and the burden on the distribution network.2013-02-07
20130036434Targeted Television Advertising Based on Profiles Linked to Multiple Online Devices - A profile provider: (i) associates a primary online device (OD1) with a set-top box (STB); (ii) a location of OD1 at some point in time is estimated to be “near” the STB, thereby establishing a STB proxy location; (iii) one or more secondary online devices (OD2s) are observed to be located “near” the STB proxy location and are associated with the STB; and (iv) a television advertisement is selected to be directed to the STB, which selection is based at least in part on profile information linked to one of the associated OD2s. The method can be particularly advantageous in situations wherein: the STB is not connected to any computer network; the STB is not ever connected to the same local area network as OD1 or OD2; or television service (used by the STB) and online access (used by OD1 and OD2s) are provided by different service providers.2013-02-07
20130036435METHODS AND APPARATUS TO OBTAIN ANONYMOUS AUDIENCE MEASUREMENT DATA FROM NETWORK SERVER DATA FOR PARTICULAR DEMOGRAPHIC AND USAGE PROFILES - Methods and apparatus to obtain anonymous audience measurement data from network server data for particular demographic and usage profiles are disclosed. An example method to provide anonymous audience measurement data to an audience measurement entity disclosed herein comprises obtaining a demographic profile and a network usage profile, sampling customer data stored in a customer database not accessible by the audience measurement entity to generate a customer sample representative of the demographic profile and the network usage profile without customer intervention, the customer sample including customer identification information, processing log data obtained from a network server not accessible by the audience measurement entity using the customer identification information to determine audience measurement data associated with customers in the customer sample, and removing the customer identification information from the audience measurement data to prepare the anonymous audience measurement data for the audience measurement entity.2013-02-07
20130036436PROCESS AND DEVICE FOR THE PROTECTION AND DISPLAY OF VIDEO STREAMS - A process distributing video streams to a plurality of addressees, comprising a marking step comprising adding at least one visual element to a video stream, which marking step is applied to an original video stream common to all the addressees and which is personalized for each addressee by addition of a visual element specific to the addressee that allows rapid visual identification of the addressee, wherein the added visual element replaces part of the original video stream that is stored in complementary information on a multimedia server.2013-02-07
20130036437USING IPTV AS HEALTH MONITOR - An IPTV can receive a user name and present a screen enabling a user by means of a remote control to select health information categories, inputting numeric parameters into the selected categories which can be uploaded to an Internet server for analysis and viewed by the user for subsequent monitoring/charting.2013-02-07
20130036438SERVER SYSTEM FOR REAL-TIME MOVING IMAGE COLLECTION, RECOGNITION, CLASSIFICATION, PROCESSING, AND DELIVERY - Provided is a server system in which real-time communication based on a moving image group is performed between a number of users.2013-02-07
20130036439METHOD OF PROVIDING CONTENT MANAGEMENT LIST INCLUDING ASSOCIATED MEDIA CONTENT AND APPARATUS FOR PERFORMING THE SAME - There are disclosed a method of providing a content management list which enables various contents to integrally used and managed and an apparatus for performing the same. A method of providing a content management list including associated media is performed by a content management list providing apparatus capable of accessing one or more local contents over a network and includes searching for information of an associated local content associated with a channel program included in Electronic Program Guide (EPG) information of a broadcasting program and displaying the searched information of the associated local content in such a way as to have an association with air time of the channel program of the content management list. Accordingly, a user can plan to use various contents more efficiently without the need to search for all available contents in order to directly check associated content and use the associated content.2013-02-07
20130036440RECEPTION APPARATUS, METHOD, COMPUTER PROGRAM, AND INFORMATION PROVIDING APPARATUS FOR PROVIDING AN ALERT SERVICE - A reception apparatus, method, computer program, and information providing apparatus for providing one or more alert services. The reception apparatus includes a receiver, a display interface, an input unit, and a processor. The receiver receives a notification of an alert service. The display interface presents the notification of the alert service on a display. Further, the input unit receives a request from a user of the reception apparatus to subscribe to the alert service. In response to receiving the subscription request, the processor registers a location of new content information associated with the alert service in a memory. Further, the processor determines whether new content corresponding to the alert service is available based on the new content information. When the new content is determined to be available, the processor downloads the new content and causes the display interface to present a pop-up alert based on the new content.2013-02-07
20130036441APPARATUS AND A METHOD FOR CONTENT RETRIEVAL FOR PRESENTATION IN A TELEVISION BROWSER ENVIRONMENT - The invention concerns a method and an apparatus performing the method. In the method a change to a background download enabled state is detected at a mobile node. The mobile node retrieves at least one content package from a remote node and detects a change to a browsing mode. The mobile node indicates the existence of at least one content package on a display to the user and receiving an indication via a remote control unit of a selection of a content package by the user. In response, the mobile node presents content from at least one file in the content package on the display, receives an indication via the remote control unit of a selection of a hyperlink in the content package and downloads a content item corresponding to the hyperlink.2013-02-07
20130036442SYSTEM AND METHOD FOR VISUAL SELECTION OF ELEMENTS IN VIDEO CONTENT - A method and system for generating an image that displays a portion of a scene from a video that is being displayed on a first device, the image having at least one selectable item. When an item is selected, a menu may be displayed to allow a user to receive more information about the item. The method may include displaying the selectable image on a second device.2013-02-07
20130036443INTERACTIVE AND PROGRAM HALF-SCREEN - A method and system that provides a television service via a customer device; receives a customer input to invoke an interactive mode pertaining to the television service; retrieves a graphical user interface that includes an interactive and program half-screen comprising an interactive half-screen and a program half-screen, wherein the interactive half-screen is substantially a same size as a program half-screen, and the interactive half-screen and the program half-screen occupy an entire size of the graphical user interface; and displays the graphical user interface via the customer device, wherein the interactive half-screen includes one or more interactive graphical elements and the program half-screen includes a program window to display a program.2013-02-07
20130036444DISPLAY APPARATUS DISPLAYING BROADCASTING INFORMATION OF THREE-DIMENSIONAL IMAGE AND CONTROL METHOD THEREOF - Disclosed are a display apparatus displaying broadcasting information of a three-dimensional (3D) image and a control method thereof, the display apparatus including: a signal receiver which receives broadcasting information of each channel comprised in a broadcasting signal; an image processor which processes the broadcasting signal to display an image; a display unit which displays thereon an image and broadcasting information based on the broadcasting signal; and a controller which searches the received broadcasting information of each channel, identifies a 3D image among the broadcasting information, displays the broadcasting information of the 3D image by channel on the display unit and changes into a channel selected by a user, upon receiving a user request for displaying a 3D broadcasting list. Accordingly, users are capable of changing into a desired broadcasting channel for viewing by extracting broadcasting information of a 3D image only and displaying broadcasting information of each channel.2013-02-07
20130036445COMMUNICATION DEVICE AND RECONFIMETHOD AND APPARATUS FOR HIGH DEFINITION VIDEO WIRELESS TRANSMISSION - A High Definition (HD) video wireless transmission method for transmitting a data packet for a video frame of an HD video is provided. The method includes: receiving the video frame which comprises a video frame size; acquiring a payload length and a Minimal Required Transmission Time (MRTT) associated with the video frame, wherein the MRTT is a minimal time bound for transmitting the video frame to a receiving end; performing partitioning to the video frame for acquiring the data packet according to the payload length; and performing scheduling to the data packet according to the MRTT, and the scheduled data packet is transmitted to the receiving end.2013-02-07
20130036446MULTILAYER CONTROLLING SYSTEM OF DATE TRANSFER AND THE METHOD USING THEREOF - The present invention discloses a multilayer controlling system of data transfer and the method using thereof. The disclosed multilayer controlling system is used for controlling data to transfer from a service operator to pluralities of clients. The system comprises a remote server, at least one intermediate server and pluralities of set-top boxes. The remote server is disposed at the service operator and connects with the intermediate server via a first network interface to take the initiative in transferring the data to the intermediate server. The set-top boxes are disposed at the clients, and the intermediate server connects with the set-top boxes via a second network interface to take the initiative in transferring the date to the set-top boxes. Each of the set-top boxes has a first storage unit, and the data are stored in the first storage unit of each set-top box.2013-02-07
20130036447Attribution points for policy management - Attribution points for policy management for improvement of a determination of an access control decision; identity verification; rights management determination; or permissions inquiry. These attribution points include those between a Policy Enforcement Point and a Policy Decision Point; as well as resources for Policy Decision Point when there is not sufficient information received from the Policy Enforcement Point. Attribution Points facilitates the augmentation of attributes; speed the transmission of attributes between PEP and PDP; reduces the elapsed time for a decision; and maintains security over the attributes. An attribution point also facilitates the retrieval of attributes across zones, such as security and/or networks and/or detached systems.2013-02-07
20130036448SANDBOXING TECHNOLOGY FOR WEBRUNTIME SYSTEM - In a first embodiment of the present invention, a method of providing security enforcements of widgets in a computer system having a processor and a memory is provided, comprising: extracting access control information from a widget process requesting a service, generating access control rules customized for the widget process, and providing the access control rules to a trusted portion of the computer system outside of the user code space of a Web Runtime (WRT) system; and for any static access control rule, delegating security checking of the widget process from the WRT system to the trusted portion of the computer system.2013-02-07
20130036449TECHNIQUES FOR PROVIDING TENANT BASED STORAGE SECURITY AND SERVICE LEVEL ASSURANCE IN CLOUD STORAGE ENVIRONMENT - Techniques for tenant-bases storage security and service level assurances in a cloud environment are presented. A Tenant Storage Machine (TSM) for each tenant uses a unique identifier. The TSM is dynamically allocated with operating system resources to run processes based on agreed service level assurances. The service level assurances are stored in a Service Level Assurance (SLA) policy store. The TSM communicates with the SLA policy store via a TSM bus to acquire a SLA policy configured for the tenant and based on which resources are dynamically allocated. Processes running under the TSM run with root privileges to provide security.2013-02-07
20130036450AUTOMATIC DISABLING OF ENABLED CONNECTION PROFILE FOR WIRELESS NETWORK - To reduce automatically a number of enabled connection profiles in a mobile station, for example, while the number of enabled connection profiles is at its maximum, a mobile station automatically selects one of the existing enabled connection profiles to disable and automatically disables the auto-selected connection profile.2013-02-07
20130036451SYSTEM AND METHOD FOR CLIENT-SERVER COMMUNICATION FACILITATING UTILIZATION OF AUTHENTICATION AND NETWORK-BASED PROCEDURE CALL - System and method for setting up a data communication are disclosed. Method includes facilitating authenticating a module of a client computing device for the data communication. Method includes facilitating authenticating a module of a server for the data communication. Method includes authenticating an encoding for a network-based procedure call interface for the server. Method includes binding the network-based procedure call interface to a protocol for a gateway interface of the server. Method includes facilitating verifying that a message size of a message transmitted to a module of the client computing device or to a module of the server is within a message size range. Method includes facilitating creating a tunnel to a module of the server, wherein the tunnel is for the data communication. Method includes facilitating creating a channel within the tunnel, wherein the channel is for the data communication.2013-02-07
20130036452USER AUTHENTICATION METHOD, USER AUTHENTICATION DEVICE, AND PROGRAM - Provided is a user authentication method including reproducing sound data of which a sound source in a first position of a space around a user is virtually localized using a Head-Related Transfer Function (HRTF) of the user toward the user, acquiring a second position of the space around the user, the second position being estimated by the user who has listened to the reproduced sound data as a position of the sound source; and authenticating the user according to a coincidence between the first position and the second position.2013-02-07
20130036453SYSTEM, METHOD AND USER INTERFACE FOR NETWORK STATUS REPORTING - A method and user interface for informing a user of the status of a network connection are provided. Conventionally, the “connected” icon in the system tray only informs the user that the computer is linked to a network medium, such as an Ethernet or wireless access point. This icon does not indicate whether a routable IP address has been obtained. In this invention, an icon is used to inform the user that the network connection is disabled, connecting, connected (routable IP address obtained), or in a warning state. The warning state indicates that a non-routable IP address (e.g. auto net address) has been obtained, which will likely be unsatisfactory to the user. However, when connected to an 802.11 ad-hoc network, or when IP status checking is disabled, a non-routable IP address is deemed acceptable, and thus the “connected” icon is displayed.2013-02-07
20130036454MANAGEMENT OF ACCESS IDENTIFIERS - Access to an on-line account management system is facilitated. A request is received to perform a first action using an on-line account management system. The request comprises a first access identifier. A global party identifier associated with the first access identifier is determined. Restriction information associated with the first access identifier and the global party identifier is accessed from a global party profile operable to store at least one of a time-based, a location-based, and a device-based restriction associated with actions capable of being performed using the on-line account management system. A processor determines whether the first action is permissible based on the restriction information associated with the first access identifier and the global party identifier.2013-02-07
20130036455METHOD FOR CONTROLLING ACESS TO RESOURCES - The invention enables a service provider to authorise a service to access a resource or function provided by a service provider based on a resource owner's consent, wherein the consent takes into account both to the identity of the service requesting the access and the identity of the user of the requesting service. The invention separates the service access process into a first step in which the requesting service is granted access on the condition that the access is made in the name of a defined user, and a second step in which the user of the requesting service authorises the requesting service to access the resource in the requesting user's name.2013-02-07
20130036456CREDENTIAL PROVISION AND PROOF SYSTEM - A method of authenticating to a computer server involves a first authentication client transmitting an authentication token to the computer server via a first communications channel, and a second authentication client receiving a payload from the computer server via a second communications channel distinct from the first communications channel in accordance with an outcome of a determination of authenticity of the authentication token by the computer server.2013-02-07
20130036457Multiple Image Reverse Turing Test - In a Reverse Turing Test an applicant seeking access to a computer process is presented with an image containing human-readable data that is intended to be inaccessible to an automated process or bot. In an improved Reverse Turing Test the applicant is presented with multiple sub-images that have to be rearranged in order to yield the overall image. This does not substantially increase a human applicant's difficulty in dealing with the test, but makes it much more difficult for a bot to interpret the image.2013-02-07
20130036458METHODS AND SYSTEMS FOR IDENTITY VERIFICATION - The disclosed embodiment relates to identity verification and identity management, and in particular, to methods and systems for identifying individuals, identifying users accessing one or more services over a network, determining member identity ratings, and based on member identity ratings that restrict access to network-based content and certain user-to-user interactions. Further, the user experience in performing identity management is simplified and enhanced as disclosed herein.2013-02-07
20130036459METHODS AND SYSTEMS FOR IDENTITY VERIFICATION - The disclosed embodiment relates to identity verification and identity management, and in particular, to methods and systems for identifying individuals, identifying users accessing one or more services over a network, determining member identity ratings, and based on member identity ratings that restrict access to network-based content and certain user-to-user interactions. Further, the user experience in performing identity management is simplified and enhanced as disclosed herein.2013-02-07
20130036460Cross-domain Session Refresh - Various embodiments utilize redirection techniques to refresh an authenticated session for a web-based executable operated across multiple domains. In at least some embodiments, the redirection techniques utilize a hidden inline frame (“i-frame”) to refresh an authenticated session. In some embodiments, polling is utilized to detect the end of a redirection sequence and a refreshed authenticated session while in other embodiments, an authenticated session is assumed to be refreshed after the expiration of a predetermined period of time.2013-02-07
20130036461IMAGE-BASED AUTHENTICATION - Techniques for authenticating a user of a computing device (e.g., handheld, desktop, laptop) are provided. In order to grant access to any of the services provided by the computing device, the computing device displays, to the user, one or more images that are stored on the computing device. The user is required to accurately identify one or more objects depicted in the one or more images in order to gain access to the computing device. The computing device is not required to be connected to any network at the time of authentication. Authentication data that is associated with object(s) in each displayed image may have been established previously by another computing device and then provided to the computing device.2013-02-07
20130036462Method and apparatus for using a multi-factor password or a dynamic password for enhanced security on a device - Techniques for improving security on a device are disclosed. In an aspect, a multi-factor password comprising a plurality of factors may be used to improve security. Each factor may correspond to a different type of information that may be used for authentication and/or other purposes. For example, the plurality of factors may include an alpha-numeric string, a fingerprint of a user, a voice clip, a picture, a video, etc. The device may authenticate the user based on the multi-factor password. In another aspect, a dynamic password that varies with at least one parameter (e.g., time, location, etc.) may be used to improve security. The dynamic password may have a plurality of values for a plurality of scenarios defined by at least one parameter. The device may authenticate a user in a given scenario based on a value of the dynamic password applicable for that scenario.2013-02-07
20130036463BIOMETRIC-ENABLED SMART CARD - A biometrics-enabled smart card for use in transactional or identity applications (e.g., credit cards and identity cards). The biometric smart card includes a substrate, a biometric sensor capable of reading biometric information through the substrate, and a microprocessor to process, store, and authenticate biometric information. The substrate has a Young's modulus of at least abut 50 GPa and a thickness of up to about 0.5 mm.2013-02-07
20130036464Processor operable to ensure code integrity - A processor can be used to ensure that program code can only be used for a designed purpose and not exploited by malware. Embodiments of an illustrative processor can comprise logic operable to execute a program instruction and to distinguish whether the program instruction is a legitimate branch instruction or a non-legitimate branch instruction.2013-02-07
20130036465Security controller - A security controller has first and second read request paths for performing security checking of read requests received from a master device and for controlling issuing of the read request to a safe device. If the first read request path is selected for an incoming read request then the first read request path controls issuing of the read request in dependence on result of the security checking. If the second read request path is selected, then the incoming read request is issued without waiting for a result of the security checking, and tracking data is stored indicating the result of the security checking. When receiving a response to a read request issued using the second read request path, a response path modifies the response to mask read data if the tracking data stored for the corresponding read request indicates that a security violation occurred.2013-02-07
20130036466INTERNET INFRASTRUCTURE REPUTATION - One or more techniques and/or systems are provided for internet connectivity protection. In particular, reputational information assigned to infrastructure components (e.g., IP addresses, name servers, domains, etc.) may be leveraged to determine whether an infrastructure component associated with a user navigating to content of a URL is malicious or safe. For example, infrastructure component data associated with a web browser navigating to a website of a URL may be collected and sent to a reputation server. The reputation server may return reputation information associated with the infrastructure component data (e.g., an IP address may be known as malicious even though the URL may not yet have a reputation). In this way, the user may be provided with notifications, such as warnings, when various unsafe conditions arise, such as interacting with an infrastructure component with a bad reputation, a resolved IP address not matching the URL, etc.2013-02-07
20130036467METHOD AND PROCESS FOR PIN ENTRY IN A CONSISTENT SOFTWARE STACK IN CASH MACHINES - Method for checking the consistency of control software of a controller of a self-service automat having a trustworthy domain (2013-02-07
20130036468ANTI-PHISHING DOMAIN ADVISOR AND METHOD THEREOF - A method of anti-phishing and domain name protection. The method comprises capturing a system call sent to an operating system of a client by an application requesting an access to an Internet resource; extracting a URL included in the captured system call; capturing a response to the system call sent from operating system to the application; determining if the system call's response includes any one of a domain name system (DNS) error code and fake internet protocol (IP) address; checking the extracted URL against an anti-phishing blacklist to determine if the Internet resource is a malicious website; performing a DNS error correction action if any one of the DNS error code and the fake IP address was detected; and performing an anti-phishing protection action if the internet resource is determined to be a malicious website.2013-02-07
20130036469DETECTING SUSPICIOUS NETWORK ACTIVITY USING FLOW SAMPLING - Methods, media, and computing devices for network security can include receiving flow sampled network traffic from multiple network devices with a network monitoring computing device for network traffic among multiple computing devices, comparing source ports and destination ports in the flow sampled network traffic to a list of approved ports with the network monitoring computing device, and detecting suspicious network activity for flow sampled network traffic having a source port and a destination port exceptional to the list of approved ports with the network monitoring computing device. Alternatively, a suspicious network activity list can be maintained for flow sampled network traffic having source and destination ports exceptional to the list of approved ports. Alternatively, a network administrator can be alerted when a port is added to the suspicious network activity list in response to a total number of ports in the suspicious network activity list exceeding a threshold number.2013-02-07
20130036470CROSS-VM NETWORK FILTERING - A security virtual machine inspects all data traffic between other virtual machines on a virtualization platform in order to prevent an inter-VM attack. Data traffic between the machines is intercepted at the privileged domain and directed to the security virtual machine via a hook mechanism and a shared memory location. The traffic is read by the security machine and analyzed for malicious software. After analysis, the security machine sends back a verdict for each data packet to the privileged machine which then drops each data packet or passes each data packet on to its intended destination. The privileged domain keeps a copy of each packet or relies upon the security machine to send back each packet. The security machine also substitutes legitimate or warning data packets into a malicious data package instead of blocking data packets. The shared memory location is a circular buffer for greater performance. Traffic is intercepted on a single host computer or between host computers.2013-02-07
20130036471System and Method for Rule Matching in a Processor - In one embodiment, a system includes a format block configured to receive a key, at least one rule, and rule formatting information. The rule can have one or more dimensions. The format block can be further configured to extract each of the dimensions from the at least one rule. The system can further include a plurality of dimension matching engines (DME). Each DME can be configured to receive the key and a corresponding formatted dimension, and process the key and the corresponding dimension for returning a match or nomatch. The system can further include a post processing block configured to analyze the matches or no matches returned from the DMEs and return a response based on the returned matches or nomatches.2013-02-07
20130036472Computer Worm Defense System and Method - A computer worm defense system comprises multiple containment systems tied together by a management system. Each containment system is deployed on a separate communication network and contains a worm sensor and a blocking system. In various embodiments, the computer worm may be transported from a production network, where the computer worm is not readily identifiable, to an alternate network in the worm sensor where the computer worm may be readily identifiable. Computer worm identifiers generated by a worm sensor of one containment system can be provided not only to the blocking system of the same containment system, but can also be distributed by the management system to blocking systems of other containment systems.2013-02-07
20130036473SYSTEM AND METHOD FOR BRANCH FUNCTION BASED OBFUSCATION - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for obfuscating branches in computer code. A compiler or a post-compilation tool can obfuscate branches by receiving source code, and compiling the source code to yield computer-executable code. The compiler identifies branches in the computer-executable code, and determines a return address and a destination value for each branch. Then, based on the return address and the destination value for each branch, the compiler constructs a binary tree with nodes and leaf nodes, each node storing a balanced value, and each leaf node storing a destination value. The non-leaf nodes are arranged such that searching the binary tree by return address leads to a corresponding destination value. Then the compiler inserts the binary tree in the computer-executable code and replaces each branch with instructions in the computer-executable code for performing a branching operation based on the binary tree.2013-02-07
20130036474Method and Apparatus for Secure Data Representation Allowing Efficient Collection, Search and Retrieval - A system and method for secure representation of data is presented. The method comprises setting a number of components, dividing original data into the set number of components using a function, storing the set number of components of divided data, determining a number of retrieved components, and using the function to retrieve the data from the retrieved components and to determine retrieved data. In one aspect, the function is XOR. In one aspect, when the number of retrieved components is less than the set number of components, the retrieved data is redacted data, and when the number of retrieved components is equal to the set number of components, the retrieved data is the original data.2013-02-07
20130036475ACCESS RIGHTS MANAGEMENT IN ENTERPRISE DIGITAL RIGHTS MANAGEMENT SYSTEMS - Systems and methods for obtaining access rights to an encrypted document are described. The method comprises receiving a request for obtaining access rights to the encrypted document from a requestor, through an eDRM interface. The method further comprises generating a request inbox corresponding to a granter of the encrypted document. The request inbox contains at least the request received from the requestor. The generated request inbox is sent to the granter through the eDRM interface. The method furthermore comprises obtaining a response to the request from the granter, and providing a status alert indicative of the response to the requestor through the eDRM interface.2013-02-07
20130036476RIGHTS-BASED SYSTEM - A rights-based system is described in which vouchers are employed for creating, managing, distributing, and redeeming rights in digital contexts. A voucher is a digital, possession-based rights representation. An authorization component of the system validates the vouchers and issues corresponding tokens. Access to digital resources is provided in response to presentation of the tokens which are validated by matching voucher refresh values to corresponding values maintained by the system. New refresh values are generated and inserted in the vouchers each time they are redeemed.2013-02-07
20130036477Method and Apparatus Encoding a Rule for a Lookup Request in a Processor - In one embodiment, a method includes encoding a key matching rule having at least one dimension by storing in a memory (i) a header of the key matching rule that has at least one header field, and (ii) at least one rule value field of the key matching rule corresponding to one of the dimensions.2013-02-07
20130036478Identifying and Redacting Privileged Information - Systems and methods for identifying and redacting privileged information automatically in electronic discovery documents such as emails are disclosed. In reviewing documents for discovery review, some documents have both privileged and non-privileged information. Significant cost savings are achieved in conducting electronic discovery by automatically identifying and redacting privileged content while preserving non-privileged information for production.2013-02-07
20130036479CONTENT RECORD TERMINAL, CONTENT RECORD/REPRODUCTION SYSTEM, AND CONTENT RECORDING METHOD - When a content write unit records a content on a medium, a control unit controls to record a dummy license which is generated by a dummy license generation unit and an expiration time limit is set into a past time, into the medium. When a recording of the content on the medium is completed, the control unit controls to delete the dummy license recorded on the medium and to record a normal license into the medium.2013-02-07
20130036480SYSTEM AND METHOD FOR SHARING OF DATA SECURELY BETWEEN ELECTRONIC DEVICES - A system for securely sharing data and conducting transactions in an electronic environment. The system may include a personal information device having a processor, memory and biometric sensor. Personal data is stored in the memory of the personal information device. The personal information device may be registered with a centralized system. Data stored on the personal information device may be uploaded to an access device upon verification of a user's identity using a biometric recognition technique.2013-02-07
20130036481USE OF PERLECAN DOMAIN V IN TREATING AMYLOIDOGENIC DISEASE - The application reports that perlecan domain V (DV) or the LG3 domain thereof reduces deposition and toxicity of Aβ peptide, the major component of plaques in Alzheimer's disease. Methods of using DV, LG3 and related molecules in treatment of amyloidogenic diseases, particularly Alzheimer's disease, are provided.2013-02-07
20130036482METHOD FOR ASSESSMENT OF POTENTIAL FOR DEVELOPMENT OF DRAVET SYNDROME AND USE THEREOF - Provided is a method of assessing a potential for development of Dravet syndrome with high accuracy, and use thereof. The method according to the present invention of assessing a potential for development of Dravet syndrome includes, with use of a sample taken from a subject, detecting whether or not a mutation is on α-subunit type 1 of voltage-gated sodium ion channel Na2013-02-07
20130036483BEAN LINE FIVC6V1001 - The invention provides seed and plants of the bean line designated FIVC6V1001. The invention thus relates to the plants, seeds and tissue cultures of bean line FIVC6V1001, and to methods for producing a bean plant produced by crossing a plant of bean line FIVC6V1001 with itself or with another bean plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of bean line FIVC6V1001, including the pods and gametes of such plants.2013-02-07
20130036484BEAN LINE FIVC6V1002 - The invention provides seed and plants of the bean line designated FIVC6V1002. The invention thus relates to the plants, seeds and tissue cultures of bean line FIVC6V1002, and to methods for producing a bean plant produced by crossing a plant of bean line FIVC6V1002 with itself or with another bean plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of bean line FIVC6V1002, including the pods and gametes of such plants.2013-02-07
20130036485BEAN LINE FIVC6V0998 - The invention provides seed and plants of the bean line designated FIVC6V0998. The invention thus relates to the plants, seeds and tissue cultures of bean line FIVC6V0998, and to methods for producing a bean plant produced by crossing a plant of bean line FIVC6V0998 with itself or with another bean plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of bean line FIVC6V0998, including the pods and gametes of such plants.2013-02-07
20130036486BEAN LINE FIVC6V0999 - The invention provides seed and plants of the bean line designated FIVC6V0999. The invention thus relates to the plants, seeds and tissue cultures of bean line FIVC6V0999, and to methods for producing a bean plant produced by crossing a plant of bean line FIVC6V0999 with itself or with another bean plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of bean line FIVC6V0999, including the pods and gametes of such plants.2013-02-07
20130036487PEPPER HYBRID SVR 11368833 - The invention provides seed and plants of pepper hybrid SVR 11368833 and the parent lines thereof, such as line SLR 148-7017 and SLR 113-1108. The invention thus relates to the plants, seeds and tissue cultures of pepper hybrid SVR 11368833 and the parent lines thereof, and to methods for producing a pepper plant produced by crossing such plants with themselves or with another pepper plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants.2013-02-07
20130036488SOYBEAN VARIETY D2011909 - The invention relates to the soybean variety designated D2011909. Provided by the invention are the seeds, plants and derivatives of the soybean variety D2011909. Also provided by the invention are tissue cultures of the soybean variety D2011909 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety D2011909 with itself or another soybean variety and plants produced by such methods.2013-02-07
20130036489SOYBEAN VARIETY A1026138 - The invention relates to the soybean variety designated A1026138. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1026138. Also provided by the invention are tissue cultures of the soybean variety A1026138 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1026138 with itself or another soybean variety and plants produced by such methods.2013-02-07
20130036490SOYBEAN VARIETY A1026150 - The invention relates to the soybean variety designated A1026150. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1026150. Also provided by the invention are tissue cultures of the soybean variety A1026150 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1026150 with itself or another soybean variety and plants produced by such methods.2013-02-07
20130036491SOYBEAN VARIETY A1026154 - The invention relates to the soybean variety designated A1026154. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1026154. Also provided by the invention are tissue cultures of the soybean variety A1026154 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1026154 with itself or another soybean variety and plants produced by such methods.2013-02-07
20130036492SOYBEAN VARIETY A1026142 - The invention relates to the soybean variety designated A1026142. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1026142. Also provided by the invention are tissue cultures of the soybean variety A1026142 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1026142 with itself or another soybean variety and plants produced by such methods.2013-02-07
20130036493SOYBEAN VARIETY S100305 - The invention relates to the soybean variety designated S100305. Provided by the invention are the seeds, plants and derivatives of the soybean variety S100305. Also provided by the invention are tissue cultures of the soybean variety S100305 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety S100305 with itself or another soybean variety and plants produced by such methods.2013-02-07
20130036494SOYBEAN VARIETY D2011911 - The invention relates to the soybean variety designated D2011911. Provided by the invention are the seeds, plants and derivatives of the soybean variety D2011911. Also provided by the invention are tissue cultures of the soybean variety D2011911 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety D2011911 with itself or another soybean variety and plants produced by such methods.2013-02-07
20130036495SOYBEAN VARIETY A1026289 - The invention relates to the soybean variety designated A1026289. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1026289. Also provided by the invention are tissue cultures of the soybean variety A1026289 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1026289 with itself or another soybean variety and plants produced by such methods.2013-02-07
20130036496SOYBEAN VARIETY S100306 - The invention relates to the soybean variety designated S100306. Provided by the invention are the seeds, plants and derivatives of the soybean variety S100306. Also provided by the invention are tissue cultures of the soybean variety S100306 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety S100306 with itself or another soybean variety and plants produced by such methods.2013-02-07
20130036497SOYBEAN VARIETY A1026311 - The invention relates to the soybean variety designated A1026311. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1026311. Also provided by the invention are tissue cultures of the soybean variety A1026311 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1026311 with itself or another soybean variety and plants produced by such methods.2013-02-07
Website © 2025 Advameg, Inc.