49th week of 2013 patent applcation highlights part 80 |
Patent application number | Title | Published |
20130326579 | HEALTHCARE PRIVACY BREACH PREVENTION THROUGH INTEGRATED AUDIT AND ACCESS CONTROL - A computer-implemented method for compliance with a privacy requirement. The method comprises analyzing, using one or more processors, an access log related to a history of users accessing records; deriving a plurality of roles assigned to the users and a plurality of accesses reflecting actions taken by the users; and deriving from the access log a mapped log comprising a plurality of mapping records including a plurality of mapped role-access pairs. The method further comprises generating, using the one or more processors, a reduced log including a plurality of reduced records comprising a mapped role-access pair and statistics that are associated with the mapped role-access pair, the statistics being derived from a subset of the mapping records that include the mapped role-access pair; and deriving an access policy based on the reduced log, wherein the access policy includes a plurality of proposed role-access pairs. | 2013-12-05 |
20130326580 | METHODS AND APPARATUS FOR CREATING AND IMPLEMENTING SECURITY POLICIES FOR RESOURCES ON A NETWORK - Methods and apparatus for creating an access permission relationship for resources may include receiving and presenting a matrix comprising roles for users of a system and resources on the system. The methods and apparatus may also include presenting access permissions at an intersection of a role and a resource on the matrix and receiving an assignment of one or more access permissions for the role and the resources. The methods and apparatus may include creating a security policy for the resources based on the assigned access permissions. | 2013-12-05 |
20130326581 | Client Side Security Management for an Operations, Administrations and Maintenance System for Wireless Clients - An Operations, Administration, and Maintenance (OA&M) | 2013-12-05 |
20130326582 | ABOVE-LOCK NOTES - A note-capture application is disclosed that allows notes to be displayed on the lock screen. In one embodiment, a note-capture application can be invoked when a mobile device is in an above-lock state. Note data can be captured using the note-capture application, and the captured data can be persistently displayed on the lock screen. A user can perform a unique gesture from the lock screen to invoke the note-capture application. In another embodiment, multiple input modes can be available for note data capture. For example, voice data, text data, camera data, etc. can all be used to capture notes for display on the lock screen. | 2013-12-05 |
20130326583 | MOBILE COMPUTING DEVICE - This is described a method of access control for a mobile computing device having a touch-screen, the method comprising: receiving a signal indicating an input applied to the touch-screen; matching the signal against a library of signal characteristics to identify a user of the mobile computing device from a group of users of the mobile computing device; receiving an additional input to the mobile computing device; using both the signal and the additional input to authenticate the user; and if authenticated, allowing access to the mobile computing device in accordance with configuration data for the authenticated user. | 2013-12-05 |
20130326584 | METHOD AND SYSTEM FOR ENTITY AUTHENTICATION IN RESOURCE-LIMITED NETWORK - A method and a system for entity authentication in a resource-limited network are provided by the present invention. Said method comprises the following steps: 1) entity A sends an authentication request message to entity B; 2) after receiving the authentication request message, entity B sends an authentication response message to entity A; and 3) entity A determines the validity of entity B according to the received authentication response message. The authentication between entities in a resource-limited network can be implemented by the application of the present invention. | 2013-12-05 |
20130326585 | System and Method for Fuse Enablement of a Secure Client Hosted Virtualization in an Information Handling System - A client hosted virtualization system includes a processor to execute code, a non-volatile memory, and a switch. The memory includes code to implement a basic input/output system (BIOS) for the CHVS, and code to implement a virtualization manager. The virtualization manager is operable to initialize the CHVS, authenticate a virtual machine image associated with a virtual machine, and launch the virtual machine on the CHVS. The switch is operable to select one of a first state and a second state. The processor operates to execute the BIOS code when the switch is in the first state and to execute the virtualization manager code when the switch is in the second state. | 2013-12-05 |
20130326586 | Connection Processing Method and System - The disclosure provides a connection processing method and system. The method includes: establishing a secure connection between a Mobility Management Entity (MME) and/or Serving Gateway (S-GW) and a Home (Evolved) NodeB (H(e)NB); and protecting a connection between the MME and/or S-GW and the H(e)NB via the secure connection. The disclosure increases the reliability and security of a data transmission mechanism of an H(e)NB system, overcomes the security defects of the H(e)NB system, and improves the security performance of the H(e)NB system. | 2013-12-05 |
20130326587 | TECHNIQUES FOR AUTO-AUTHENTICATION - Techniques to automatically authenticate may include determining that a mobile device is on a wireless local area network. An network access identification for the wireless local area network may be determined. The mobile device may be automatically authenticated on the wireless local area network based on information associated with the network access identification. Other embodiments are described and claimed. | 2013-12-05 |
20130326588 | Enabling Host Based RBAC Roles for LDAP Users - Provided are techniques for receiving, from a user, a first Role-Based Access Control (RBAC) request for access to a resource; correlating the first RBAC request to a first originating host device; mapping an ID corresponding to the user, the first originating host device and the resource to a first role; generating, based upon the first role, a first set of permissions corresponding to the resource; and enabling to the user to access the resource from the first originating host device in conformity with the first set of permissions. In addition to ID, host and resource, a communication medium may be factored into the mapping. | 2013-12-05 |
20130326589 | Event Centric Network Application - A system and method implementing an event centric network application including software controlled processes on one or more servers, and client applications or user side software processes controlling user hardware to implement social networking capabilities specifically aimed at and around multiuser attended events. A portal or server side software process serves event related communications between, the system hardware that is controlled by event organizers, advertisers, and individuals attending the event from user devices such as phones or other communications enabled computing devices. The system implements a single virtual environment or event centric electronic portal hosted on a system server and communicated to a user device through a communications interface on a user device. | 2013-12-05 |
20130326590 | SYSTEM AND METHOD TO CONTROL APPLICATION TO APPLICATION COMMUNICATION OVER A NETWORK - A method is provided to control communication between applications that communicate over a network comprising: designating a different respective application identifier (AppID) for each of a multiplicity of A2A enabled applications suitable to run on endpoint devices coupled to a network suitable for delivery of multimedia information; providing in non-transitory media a registry that indicates authorized AppIDs; receiving over the network a request originating from a first endpoint device for authorization for a media connection; wherein the authorization request includes an AppID; in response to the authorization request, determining whether the AppID within the authorization request matches an authorized AppID indicated within the registry; rejecting the authorization request in response to a determination that the AppID does not match an authorized AppID indicated within the registry. | 2013-12-05 |
20130326591 | WIRELESS COMMUNICATION DEVICE AND WIRELESS COMMUNICATION METHOD - According to an embodiment, a wireless communication device includes a wireless communication unit, a control unit and a storage unit. The wireless communication unit is configured to perform close proximity wireless communication or near-distance wireless communication with other wireless communication device. The storage unit is configured to store data and setting parameters associated with the data. The setting parameters include presence or absence of a lock function and transfer-permitting information. The control unit activates the wireless communication unit when a user is the authorized user. After the control unit activates the wireless communication unit, when the lock function is present in the setting parameters, the control unit determines whether a transfer permission is present based on the transfer-permitting information. When determining that the transfer permission is present, the control unit causes the wireless communication unit to transfer the data. | 2013-12-05 |
20130326592 | PERSONAL AUTHENTICATION APPARATUS AND PERSONAL AUTHENTICATION METHOD - A personal authentication apparatus that controls an authenticated state of a target device based on the motion of the target device includes a motion sensor that detects motion information indicating the motion of the target device, a carried-state determination unit configured to determine whether or not the target device is being carried by a user based on the detected motion information, and an authentication control unit configured to control the authenticated state of the target device based on a result of the determination by the carried-state determination unit. | 2013-12-05 |
20130326593 | WIRELESS DEVICE AND WIRELESS COMMUNICATION METHOD - A wireless device has a first information acquisition part to acquire first information when the wireless device passes through a first gate, a second information generator to generate second information necessary to acquire data, by using the first information, and a data acquisition part to acquire the data transmitted from a data providing apparatus through wireless communication, by using the second information. | 2013-12-05 |
20130326594 | WIRELESS DEVICE REGISTRATION, SUCH AS AUTOMATIC REGISTRATION OF A WI-FI ENABLED DEVICE - A system for providing a wireless device with access to a computer network includes an access point that sets up a radio link with the wireless device and couples the wireless device to the network. The system also includes a server that receives data packets from the access point through the computer network. The data packets include at least one data packet that has a first identifier that uniquely identifies the wireless device and a second identifier that corresponds to the wireless device. The system further includes a database that is coupled to the server and stores data for associating a service plan with the first and second identifiers and basing the service plan, at least in part, on the second identifier. Other features and systems are also disclosed. | 2013-12-05 |
20130326595 | System and Method for Access Control Via Mobile Device - A system is described for controlling an actuating unit that restricts physical access such as a motorized garage door actuator unit. The system comprises a mobile wireless communication device, an electro-mechanical access control security device, and a receiving unit controlling the electro-mechanical access control security device, the receiving unit paired with the mobile wireless communication device for receiving user input for activating the electro-mechanical access control security device via a peer-to-peer communication directly with the mobile wireless communication device, and a pre-authorization of communication of the receiving unit with the mobile wireless communication device, the mobile wireless communication device receiving the pre-authorization from a central security server. | 2013-12-05 |
20130326596 | APPARATUS AND METHODS FOR PROVIDING AUTHORIZED DEVICE ACCESS - Methods, apparatus, and systems are described for providing an accessor device an access credential to interact with a device resource on an accessee device. An authorization entity having a trust relationship with the accessee device, or a linked subordinate authorization entity, generates the access credential. The access credential includes a modification detection indicator, at least one access privilege, and an accessor public key. The at least one access privilege corresponds to at least one device resource on the accessee device. The authorization entity forwards the access credential to the accessor device, which presents the access credential to the accessee device for authentication. Once authenticated, the accessee device grants access to one or more device resources, and controls requests to insure they are within the scope of the at least one access privilege. | 2013-12-05 |
20130326597 | AUTHENTICATION SYSTEM, INFORMATION REGISTRATION SYSTEM, SERVER, PROGRAM, AND AUTHENTICATION METHOD - The authentication system includes a plurality of user terminals that are used by the same user, and a server capable of communicating with the plurality of user terminals. A user terminal transmits, to the server, an identification ID of the user terminal, a first code that is used in common in the plurality of user terminals, and a second code that was encrypted using the first code. The server is configured to decrypt the encrypted second code using the first code, and perform authentication of the user terminal using the identification ID and the decrypted second code. The server, upon receiving a second code that is not encrypted from one of the plurality of user terminals, transmits the second code that was encrypted using the first code to the one of the user terminals. | 2013-12-05 |
20130326598 | SYSTEM, METHOD AND COMPUTER READABLE MEDIUM FOR MESSAGE AUTHENTICATION TO SUBSCRIBERS OF AN INTERNET SERVICE PROVIDER - An internet service provider (ISP) is configured to provide notification messages such as service updates to subscribers via redirected web pages. In order for the web pages to be treated as originating from the ISP, the ISP provides a shared secret in the browser message. The shared secret may be a secret not derivable by viruses or trojans in the subscriber computer, such as a MAC address of the subscriber modem. | 2013-12-05 |
20130326599 | Validating Pointer Records In A Domain Name System (DNS) Service - In one embodiment a method for receiving a request from a user to update a pointer record of a domain name system (DNS) in a DNS service includes issuing a query from the DNS service to a resource of a first service of the data center from the DNS service using a uniform resource indicator (URI) of the request corresponding to the resource, receiving a list of Internet protocol (IP) addresses in the DNS service from the first service, determining whether an IP address received in the request corresponds to one of the IP addresses of the list, and if so, enabling the user to update the pointer record. | 2013-12-05 |
20130326600 | Authenticating Users Based Upon an Identity Footprint - Disclosed are various embodiments of generating a user signature associated with a user and authenticating a user. At least one behavior associated with at least one sensor in a computing device is identified. A timestamp is generated and associated with the behavior. A user signature corresponding to a user based at least in part upon the behavior and the timestamp is generated and stored. | 2013-12-05 |
20130326601 | COMMUNICATION SYSTEM - A content distribution server receives from an information processing device, a first password generated from first data indicating a key and server specific information specific to the server with the use of a predetermined function. Then, the received first password and processing designation information designating processing are transmitted to a terminal. The terminal generates a second password from second data indicating a key matching with the key indicated by the first data and the server specific information obtained from the information processing device, with the use of the function. Then, the first password from the server and the generated second password are checked against each other, and whether or not to perform processing designated by the processing designation information from the server is determined based on a result of checking. | 2013-12-05 |
20130326602 | Digital Signatures - Apparatus and methods of creating digital signatures include storing a credential received from an external issuing entity at a host device associated with a signature engine. After agreeing on a message with a verifying entity, the host device may transmit a version of the credential with a signature from the associated signature engine for the message to the verifying entity. The verifying entity may determine from the version of the credential and the digital signature whether the credential originated from a trusted issuing entity. | 2013-12-05 |
20130326603 | WIRELESS DEVICE, REGISTRATION SERVER AND METHOD FOR PROVISIONING OF WIRELESS DEVICES - The present invention relates to auto-provision of wireless devices. A wireless device ( | 2013-12-05 |
20130326604 | RHYTHM-BASED AUTHENTICATION - Provided herein are systems and methods for using rhythm to provide user authentication. Use of the systems and methods herein include converting rhythm information associated with (e.g., input by) an authorized user to a first vector that includes a representation of the rhythm information. An access attempt is then made on the computing system whereupon additional rhythm information associated with the access attempt is received and converted into to a second vector. The first vector is then compared to the second vector to determine if the access attempt is allowed. | 2013-12-05 |
20130326605 | LOGIN INTERFACE SELECTION FOR COMPUTING ENVIRONMENT USER LOGIN - A device may provide a login process to authenticate users prior to admittance to a computing environment. The device may also enable users to adjust various the computing environment, e.g., the language selected for communicating with the user and the user interfaces to be presented to the user, and may store such adjustments in a secured user account. However, if the user account is inaccessible to the device during the login process, the device is unable to adapt the login process to apply the user's adjustments. Instead, the device may be configured to store users' adjustments (including language selection) outside of the user accounts, and to, upon identifying the user during the login process, present login interfaces specified in the user account. Additionally, users may select different login interfaces during login, and the device may retrieve these login interfaces for selection during future login processes for the same user. | 2013-12-05 |
20130326606 | AUTHENTICATION AND NOTIFICATION HEURISTICS - Server-side authentication of user accounts by using multiple authentication tokens and transmission of update statement to users for updates to applications installed on their devices. Prompting users that updates are available upon determining that a threshold event has occurred and if requisite network and situational conditions exist. Batching and sending notifications or requests for authentications that are required for each application update that is currently ready for download. | 2013-12-05 |
20130326607 | Method, Apparatus and System of Controlling Remote Login - The disclosure provides a multiple location login control method, device, and system. The method may include receiving, by a server, login information recorded for a current login, wherein the login information includes a login ID, a first login time, and a first geographic location of a client for the current login. The login information for the previous login for this login ID is obtained to acquire a second geographic location and second login time of the client at a previous login. The server may calculate a speed of movement based on the two login times and the two geographic locations. When the speed of movement exceeds a preset speed, the server may determine that the current login is an invalid multiple location login. | 2013-12-05 |
20130326608 | COOPERATION SYSTEM, COOPERATION METHOD THEREOF, INFORMATION PROCESSING SYSTEM, AND STORAGE MEDIUM - A client sends a request to start to use a service via an information processing system that is a cooperation source, acquires identification information indicating that authentication has been successfully performed based on group authentication information set for a group to which a user belongs, and then transmits the identification information to an information processing system that is a cooperation destination. | 2013-12-05 |
20130326609 | FORCING ALL MOBILE NETWORK TRAFFIC OVER A SECURE TUNNEL CONNECTION - A process is disclosed in which all network traffic between a mobile device and an untrusted network arriving before the establishment of a VPN tunnel are dropped in response to rules imposed by the mobile device's operating system. Once a VPN tunnel is established all communication from the mobile device is secured, without an intervention on the part of the user of the device. A device supporting such a process is also disclosed. | 2013-12-05 |
20130326610 | SYSTEM AND METHOD FOR CONTROLLING ACCESS TO A PLANT NETWORK - A system for centrally controlling access by computers in a corporate network to a plant network that runs plant applications. The system includes an access control computer in communication with the corporate network and includes a memory, a processor coupled to the memory and a multi-user application stored in the memory and executable by the processor. The multi-user application communicates with a plurality of computers in the corporate network concurrently and communicates with at least one plant application running in the plant network to retrieve data from and pass data to the plant application on behalf of the plurality of computers in the corporate network concurrently. Since all communication from the plurality of computers is tunneled through the access control computer, the likelihood of any virus or worm spreading into the plant network is minimized. | 2013-12-05 |
20130326611 | VARIABLE-STRENGTH SECURITY BASED ON TIME AND/OR NUMBER OF PARTIAL PASSWORD UNLOCKS - An authentication scheme for unlocking a computing system may require a shortened password in some cases. For example, the computing system may be configured to determine a time that a user has been locked out of a computing device and to determine which of a plurality of time spans that the time falls within. The computing system may also prompt the user for a required password including a full password or a subset of the full password depending on the determined time span. The computing system may be further configured to display a visual indicator corresponding to the determined time span or a required password length on a visual display. A length of the required password for login may be progressively longer for each of the plurality of time spans as a time period that a respective time span covers increases. | 2013-12-05 |
20130326612 | Apparatus and Method for Forming Secure Computational Resources - A computer implemented method includes collecting logged operations associated with a computation resource. Permitted operations for the computation resource are inferred based at least in part on the logged operations. A computation resource is augmented to block all operations that can be performed by the computation resource except the permitted operations. | 2013-12-05 |
20130326613 | DYNAMIC CONTROL OF DEVICE UNLOCKING SECURITY LEVEL - Secure access of an electronic device may be dynamically controlled based on an adaptive algorithm. Secure access may comprise locking or unlocking of the electronic device. The adaptive algorithm may enable adjusting parameters used in determining when access to the electronic device is granted or denied. The parameters may comprise one or more thresholds used when comparing current user related information, such as biometric information, with corresponding prior information. The adaptive algorithm may enable adjusting the parameters based on valuation of information that may be exposed when the electronic device is accessed, probability of unwanted access, and/or acceptable cost of improper denial of access. | 2013-12-05 |
20130326614 | SYSTEM AND METHOD FOR CONTROLLING ACCESS TO SECURE RESOURCES - A system and method for controlling access to a secure resource in a device are disclosed. In some embodiments, the device may include a processor capable of receiving a first request from a first application of a plurality of applications executable by the processor, where the first request requests access to the secure resource, and the first request identifies the plurality of applications. In response to the first request, the processor is capable of generating a ticket associated with the secure resource and with each of the plurality of applications, and then storing the ticket in a memory. After receiving a second request from a second application requesting access to the secure resource, the processor is capable of granting the second application access to the secure resource, if the ticket associated with the secure resource exists and if the ticket is associated with the second application. | 2013-12-05 |
20130326615 | METHODS AND STRUCTURE FOR IMPLEMENTING SECURITY IN SYSTEMS THAT UTILIZE SMALL COMPUTER SYSTEM INTERFACE ENCLOSURE SERVICES - Methods and structure are provided for implementing security features in SCSI Enclosure Services (SES) systems. The system comprises an SES device server, which includes a frontend interface, control unit, and backend interface. The frontend interface is operable to receive SES commands generated by Small Computer System Interface (SCSI) devices, and the backend interface is operable to manage operations of at least one peripheral device communicatively coupled with the SES device server based on received SES commands. The control unit is operable to determine whether a SCSI initiator that generated an SES command is an authorized device. The control unit is further operable to perform the SES command in response to determining that the SCSI initiator is an authorized device, and is further operable to reject the SES command in response to determining that the SCSI initiator is not an authorized device. | 2013-12-05 |
20130326616 | Internet Monitoring and Alerting System - A monitoring and alerting system for detecting a disruptive event on the Internet includes a data collection and wrapping module configured to process input data that includes messages produced by a network routing protocol, including a live stream of messages on the network, historical dumps of the message to a computer's file system, or both. An automated analysis engine includes analysis modules configured to analyze routing information and selected Internet behaviors from the input data. User output includes automated alerts to the user and an interactive analysis module. The analysis modules include a probabilistic origin hijack analysis module; a probabilistic route hijack analysis module; a Hidden Markov Model analysis module; a tensor decomposition and analysis module and a static topology analysis module; and a dynamic topology analysis module. | 2013-12-05 |
20130326617 | CLICKJACKING PROTECTION - A clickjacking protector in an electronic system helps prevent unwanted clickjacking. The elements clicked on by the click position are evaluated to determine whether any of the elements clicked on by the click position is obscured (including being transparent or partially transparent). A protective action is generated in response to a determination that an element clicked on by the click position is obscured. | 2013-12-05 |
20130326618 | SYSTEMS, METHODS AND MEDIA FOR MANAGING PROCESS IMAGE HIJACKS - Disclosed is a method of checking the authenticity of an executable process including at least one section. The method includes, when an initial thread of the executable process is created in a suspended state, mapping from storage a copy of the executable process into a spare memory area, where it will not be executed. The method also includes comparing a header of a first section of the executable process with a header of a first section of the copy. The method further includes terminating the executable process when the header of the first section of the executable process and the header of the first section of the copy are not identical. | 2013-12-05 |
20130326619 | MANAGING PROCESS IMAGE HIJACKS - In some embodiments, a method includes storing, at a first time, a copy of an executable process at a memory area if an initial thread of the executable process is defined in a suspended state such that the copy of the executable process is not executed at the memory area. The executable process can be maintained at a storage different from the memory area. The method also includes comparing, at a second time after the first time, a header of a section of the executable process with a header of a section of the copy of the executable process. The method further includes determining not to execute the executable process if the header of the section of the executable process is different from the header of the section of the copy of the executable process. | 2013-12-05 |
20130326620 | INVESTIGATIVE AND DYNAMIC DETECTION OF POTENTIAL SECURITY-THREAT INDICATORS FROM EVENTS IN BIG DATA - A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a URL or agent string in the event. A subset criterion is generated, such that metric values within the subset are relatively separated from a population's center (e.g., within a distribution tail). Application of the criterion to metric values produces a subset. A representation of the subset is presented in an interactive dashboard. The representation can include unique values in the subset and counts of corresponding event occurrences. Clients can select particular elements in the representation to cause more detail to be presented with respect to individual events corresponding to specific values in the subset. Thus, clients can use their knowledge system operations and observance of value frequencies and underlying events to identify anomalous metric values and potential security threats. | 2013-12-05 |
20130326621 | METHOD AND SYSTEM FOR DYNAMIC PROTOCOL DECODING AND ANALYSIS - A method for dynamically decoding protocol data on a computer system is provided using a protocol decoder, which inspects and analyzes protocol data received by the computer system. A protocol decoding program controls the decoding and analysis process. The method may be used by an intrusion prevention system to identify anomalous protocol data that may cause harm to applications receiving the data. | 2013-12-05 |
20130326622 | Trusted Communication Network - A system includes a processing node configured to send authorized inbound messages to registered enterprise networks. An authorized message is a message that includes trusted source indicia. Trusted source indicia indicates that the message was sent by one or more of the processing node or an authenticated message transfer node associated with one of the registered enterprise networks. The system may further include an administration node configured to maintain registration of a plurality of message transfer nodes associated with the enterprise networks. A method includes receiving outbound messages from an authenticated message transfer node of an enterprise network, screening the messages for threats to determine whether to send the messages to associated recipients, applying a first message identifier to each message, wherein the first message identifier can be used to track the message and, for each message, sending the message to the associated recipient if no threats are detected in the message. | 2013-12-05 |
20130326623 | CROSS-USER CORRELATION FOR DETECTING SERVER-SIDE MULTI-TARGET INTRUSION - Technologies are generally described for time-correlating administrative events within virtual machines of a datacenter across many users and/or deployments. In some examples, the correlation of administrative events enables the detection of confluences of repeated unusual events that may indicate a mass hacking attack, thereby allowing attacks lacking network signatures to be detected. Detection of the attack may also allow the repair of affected systems and the prevention of further hacking before the vulnerability has been analyzed or repaired. | 2013-12-05 |
20130326624 | RESISTING THE SPREAD OF UNWANTED CODE AND DATA - A method of processing an electronic file by identifying portions of content data in the electronic file and determining if each portion of content data is passive content data having a fixed purpose or active content data having an associated function. If a portion is passive content data, then a determination is made as to whether the portion of passive content data is to be re-generated. If a portion is active content data, then the portion is analysed to determine whether the portion of active content data is to be re-generated. A re-generated electronic file is then created from the portions of content data which are determined to be re-generated. | 2013-12-05 |
20130326625 | INTEGRATING MULTIPLE DATA SOURCES FOR MALWARE CLASSIFICATION - Disclosed herein are representative embodiments of tools and techniques for classifying programs. According to one exemplary technique, at least one graph representation of at least one dynamic data source of at least one program is generated. Also, at least one graph representation of at least one static data source of the at least one program is generated. Additionally, at least using the at least one graph representation of the at least one dynamic data source and the at least one graph representation of the at least one static data source, the at least one program is classified. | 2013-12-05 |
20130326626 | ASYNCHRONOUS FILTERING AND PROCESSING OF EVENTS FOR MALWARE DETECTION - A method for asynchronous processing of system calls, including detecting a system call on a computer system; filtering the system call to determine when the system call call matches a filter parameter; making a copy of the system call and asynchronously asynchronously processing the system call copy, if the system call does not pass through at through at least one filter, and the filter parameter does not match the system call; placing placing the system call into a queue; releasing the system call after an anti-virus (AV) (AV) check of the system call copy and terminating an object that caused the system call call when the AV check reveals that the system call is malicious; and for an object associated with the system call that has behavior differences compared to a previous known known non-malicious version of the object but also similarities to the previous known non-known non-malicious object, classifying the object as non-malicious. | 2013-12-05 |
20130326627 | APPARATUS AND METHOD FOR DETECTING VULNERABILITY - The invention discloses a vulnerability monitoring method for performing a vulnerability monitoring on a system in which data execution protection (DEP) is enabled, which method comprises the steps of: monitoring an operation with respect to the DEP; and considering that an action exploiting the vulnerability has occurred in the system when an operation to close the DEP is detected. The invention also discloses a corresponding vulnerability monitoring apparatus. | 2013-12-05 |
20130326628 | ELECTRONIC DEVICE - According to one embodiment, an electronic device including, an acquiring module configured to acquire, via the external device, contents which are held in a contents holding medium and which are protected by the first contents protection scheme, and an output module configured to convert the acquired contents protected by the first contents protection scheme to the second contents protection scheme and then outputs the contents to the external device by the second contents protection scheme. | 2013-12-05 |
20130326629 | METHOD AND APPARATUS FOR MANAGING THE PRIVACY AND DISCLOSURE OF LOCATION INFORMATION - An approach for managing the privacy and disclosure of location information associated with a computer system. For one aspect, a request is received from a requestor for a location property associated with a location of a computer system. It is then determined whether a privacy preference associated with the requestor has been specified. If not, a user may be prompted to supply privacy preferences associated with the requestor. The privacy preferences are then applied to determine whether or not to provide the requested information. A user setting, such as a basic input-output system memory location setting, may also be implemented to enable and/or disable location-aware computing. | 2013-12-05 |
20130326630 | PRE-PROCESSOR FOR PHYSICAL LAYER SECURITY - Systems and methods of secure data exchange are disclosed. One such method includes obtaining user data at a physical layer of a transmitter and securing the user data at the physical layer. The user data is secured by processing the user data with a series of non-recursive convolutional encoders interspersed with one or more bit-level permuters. The secured user data is transmitted. | 2013-12-05 |
20130326631 | LAWFUL INTERCEPTION FOR LOCAL SELECTED IP TRAFFIC OFFLOAD AND LOCAL IP ACCESS PERFORMED AT A NON-CORE GATEWAY - Systems, methods, and instrumentalities are described to implement reporting of surveillance information associated with a device. A gateway device may intercept a communication associated with the device. The gateway device may route the communication such that the communication bypasses a core network. The gateway device may report information associated with the communication to a core network entity. The gateway device may receive a command message. The command message may include a request for a surveillance status of the device. The gateway device may send a response message. The response message may indicate a surveillance status of the device. The gateway device may receive an activate surveillance signal for the device. The gateway device may receive a deactivate surveillance signal for the device. Upon receiving the deactivate surveillance signal, the gateway device may stop further reporting. | 2013-12-05 |
20130326632 | Security Within Integrated Circuits - A method for hindering detection of information unintentionally leaked from a secret held in a memory unit is described, the method including receiving a triggering event waiting for at least a first amount of time to pass after the receipt of the triggering event, the memory unit being in a non-operational state during the at least a first amount of time after the at least a first amount of time has passed, changing at least one first condition under which the memory unit operates, thereby causing the memory unit to enter an operational state, waiting for a second amount of time to pass after the changing at least one first condition, and changing, after the second amount of time, at least one second condition under which the memory unit operates, thereby causing the memory unit to enter the non-operational state, wherein access to the secret information is enabled only during the second amount of time, and detection of secret information unintentionally leaked is limited during the first amount of time. Related apparatus and methods are also described. | 2013-12-05 |
20130326633 | LONG-TERM SIGNATURE TERMINAL, LONG-TERM SIGNATURE SERVER, LONG-TERM SIGNATURE TERMINAL PROGRAM, AND LONG-TERM SIGNATURE SERVER PROGRAM - A long-term signature system | 2013-12-05 |
20130326634 | Simple Product Purchase for Multisystem Accounts - A system and method are disclosed for managing the assignment of digital goods licenses. A user selects digital goods to be assigned to a group of target systems, followed by the retrieval of digital goods entitlement records for each system in the group. Systems that are not entitled to the selected digital goods are removed, along with any systems that already have the digital goods installed. If an insufficient number of licenses are available for the remaining systems in the group, then the number of required licenses is determined, followed by their procurement. The available and procured digital goods licenses are then respectively assigned to each system in the group. | 2013-12-05 |
20130326635 | TELECOMMUNICATIONS APPARATUS AND METHOD, STORAGE MEDIUM, AND PROGRAM - The present invention relates to a telecommunications apparatus and a method, a storage medium, and a program for determining whether or not an other side communicating apparatus is near in a network. In a transmitting apparatus, a transmitting unit transmits a sending-message, and a control unit receives a response message to the sending-message, which includes acknowledgement information based on shared data and transmission information in the sending-message. The transmitting apparatus also includes a first judging unit that judges whether a response time of the acknowledgement message is less than a predetermined time. A receiving apparatus includes a generating unit that generates the acknowledgment information and transmits the response message to the transmitting apparatus. | 2013-12-05 |
20130326636 | VERIFICATION THAT A USER ATTEMPTING TO ACCESS CONTENT IS A HUMAN USER - An easier and less frustrating way of verifying that a user attempting to access content is a human user is provided. For example, data indicative of a request by a user to access content from a content server is received. An output of geographic data associated with a geographic region is generated. A task to be performed by the user to access the content is provided as a function of the generated output. The output and the task are transmitted to the content server for presentation to the user. Performance of the task by the user is substantially indicative of the user being a human user. | 2013-12-05 |
20130326637 | PLATFORM AND METHOD FOR DYNAMIC SOFTWARE LICENSE - A platform and a method for dynamic software license are disclosed. The dynamic software license platform comprises a license pool, a register manager, a user configure unit and a license manager. The register manager receives a software application from a user end. The user configure unit grants a setting permission to the user end in response to the software application, and allows the user end to submit a license setting according to the setting permission. The license manager adds the software license provided by the software supplier to the license pool, and dynamically provides the software license from the license pool unit according to the license setting. | 2013-12-05 |
20130326638 | Sicherheitssystem - A method for a setting of security settings in relation for objects is provided. The method comprises the following: storing of access rights identifiers, object identifiers and user identifiers in a data storage, displaying at least each of an object symbol, an access right symbol, and a user symbol in a graphical user interface of a computer, wherein the object symbol relates to an object identifier stored in the data storage, wherein the access rights symbol relates to an access rights identifier stored in the data storage, and wherein the user symbol relates to a user identifier stored in the data storage. Moreover, a selection of an object symbol, a displaying of the selection, a selection of a user symbol and a movement of the user symbol in an environment of the access rights symbol, wherein a security setting to the object is set. | 2013-12-05 |
20130326639 | VIRTUAL MACHINE FOR PROCESSING MEDICAL DATA - The present invention relates to a virtual machine (VM) for processing digital data, in particular medical data, by executing a digital data processing application program, in particular a medical data processing application program (MeDPAP), the virtual machine (VM) being a simulation of a computer, a) the virtual machine (VM) comprising a volatile memory (ViMStor) configured to comprise a storage space for temporary data (TEMP) for temporarily storing the digital data; b) the virtual machine (VM) being configured to be accessed by any virtual machine user activated on a virtual machine user list, wherein any activated maintenance virtual machine user is denied any permission regarding the storage space for temporary data (TEMP), wherein denying any permissions is performed by logging into the virtual machine (VM) as an administrator and setting corresponding options; c) wherein any administrator has been deactivated on the virtual machine user list, wherein deactivating any administrator has been performed by logging into the virtual machine (VM) as an administrator and setting corresponding options for each administrator in the virtual machine user list; d) wherein the virtual machine (VM) is in a state in which the administrator has been logged off after deactivating the administrator on the virtual machine user list. | 2013-12-05 |
20130326640 | ELECTRONIC FILE SECURITY MANAGEMENT PLATFORM - According to some embodiments, an electronic file security management platform may receive a request from a user to access a first electronic file associated with a first application, such as a word processing document. A security characteristic associated with the user may be determined, and an encrypted version of the first electronic file may be decrypted in accordance with the security characteristic. The electronic file security management platform may then arrange for the user to access the first electronic file via the first application such that: (i) a first portion of the first electronic file is available to the user based on a first security requirement associated with the first portion and the security characteristic, and (ii) a second portion of the first electronic file is not available to the user based on a second security requirement associated with the second portion and the security characteristic. | 2013-12-05 |
20130326641 | PROTECTION OF SERIES DATA - Information-processing device including an exchanging unit exchanging data; a receiving unit receiving plural data sets, each of the plural data sets including at least one sub data set, plural predetermined sub data sets included in plural data sets forming series data; a first generating unit generating, for a first target sub data set, a dummy data set different from the first target sub data set; a second generating unit generating authentication information based on a second target sub data set, the second target sub data set being a sub data set or a dummy data set to be processed and selected from the at least one sub data set and the generated sub data set; and a first providing unit providing data including the second target sub data and the authentication information. | 2013-12-05 |
20130326642 | REMOTELY INITIATING LOST MODE ON A COMPUTING DEVICE - Systems, methods, and non-transitory computer-readable storage media are provided for remotely initiating lost mode on a computing device. A request that lost mode be initiated can include a message and contact information provided by the requesting user. Once authenticated, a command to initiate lost mode is sent to the lost device. Initiating lost mode includes locking the lost device and suppressing select functionality. The message and contact information are displayed and the lost device is enabled to contact the requesting user using the contact information. The lost device can also collect and transmit location data to the requesting user. The location data can be presented on a map indicating the lost devices location and the time the lost device was at the location. The location data can be scheduled to be resent to the user based on numerous factors such as a set schedule, rules or heuristic. | 2013-12-05 |
20130326643 | SYSTEM AND METHOD FOR REMOTELY INITIATING LOST MODE ON A COMPUTING DEVICE - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for remotely initiating lost mode on a computing device. A request that lost mode be initiated can include a message and contact information provided by the requesting user. Once authenticated, a command to initiate lost mode is sent to the lost device. Initiating lost mode includes locking the lost device and suppressing select functionality. The message and contact information are displayed and the lost device is enabled to contact the requesting user using the contact information. The lost device can also collect and transmit location data to the requesting user. The location data can be presented on a map indicating the lost devices location and the time the lost device was at the location. The location data can be scheduled to be resent to the user based on numerous factors such as a set schedule, rules or heuristic | 2013-12-05 |
20130326644 | LAGLIDADG HOMING ENDONUCLEASE VARIANTS HAVING MUTATIONS IN TWO FUNCTIONAL SUBDOMAINS AND USE THEREOF - A LAGLIDADG homing endonuclease variant, having mutations in two separate subdomains, each binding a distinct part of a modified DNA target half-site, said LAGLIDADG homing endonuclease variant being able to cleave a chimeric DNA target sequence comprising the nucleotides bound by each subdomain. Use of said herodimeric meganuclease and derived products for genetic engineering, genome therapy and antiviral therapy. | 2013-12-05 |
20130326645 | METHODS AND COMPOSITIONS FOR NUCLEASE-MEDIATED TARGETED INTEGRATION OF TRANSGENES - Disclosed herein are methods and compositions for homology-independent targeted insertion of donor molecules into the genome of a cell. | 2013-12-05 |
20130326646 | COMPOSITIONS AND METHODS FOR DETECTING AND TREATING NEUROLOGICAL CONDITIONS - The present invention relates to the NIPA-1 proteins and nucleic acids encoding the NIPA-1 proteins. The present invention further provides assays for the detection of NIPA-1 polymorphisms and mutations associated with disease states, as well as methods of screening for ligands and modulators of NIPA-1 proteins. | 2013-12-05 |
20130326647 | HUMAN LAMBDA LIGHT CHAIN MICE - Genetically modified mice are provided that express human λ variable (hVλ) sequences, including mice that express hVλ sequences from an endogenous mouse λ light chain locus, mice that express hVλ sequences from an endogenous mouse κ light chain locus, and mice that express hVλ sequences from a transgene or an episome wherein the hVλ sequence is linked to a mouse constant sequence. Mice are provided that are a source of somatically mutated human λ variable sequences useful for making antigen-binding proteins. Compositions and methods for making antigen-binding proteins that comprise human λ variable sequences, including human antibodies, are provided. | 2013-12-05 |
20130326648 | SOYBEAN VARIETY A1035441 - The invention relates to the soybean variety designated A1035441. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1035441. Also provided by the invention are tissue cultures of the soybean variety A1035441 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1035441 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326649 | SOYBEAN VARIETY A1035473 - The invention relates to the soybean variety designated A1035473. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1035473. Also provided by the invention are tissue cultures of the soybean variety A1035473 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1035473 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326650 | SOYBEAN VARIETY A1035501 - The invention relates to the soybean variety designated A1035501. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1035501. Also provided by the invention are tissue cultures of the soybean variety A1035501 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1035501 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326651 | SOYBEAN VARIETY A1035502 - The invention relates to the soybean variety designated A1035502. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1035502. Also provided by the invention are tissue cultures of the soybean variety A1035502 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1035502 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326652 | SOYBEAN VARIETY A1035869 - The invention relates to the soybean variety designated A1035869. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1035869. Also provided by the invention are tissue cultures of the soybean variety A1035869 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1035869 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326653 | SOYBEAN VARIETY A1035898 - The invention relates to the soybean variety designated A1035898. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1035898. Also provided by the invention are tissue cultures of the soybean variety A1035898 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1035898 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326654 | SOYBEAN VARIETY A1036023 - The invention relates to the soybean variety designated A1036023. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1036023. Also provided by the invention are tissue cultures of the soybean variety A1036023 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1036023 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326655 | SOYBEAN VARIETY A1036054 - The invention relates to the soybean variety designated A1036054. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1036054. Also provided by the invention are tissue cultures of the soybean variety A1036054 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1036054 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326656 | SOYBEAN VARIETY A1036077 - The invention relates to the soybean variety designated A1036077. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1036077. Also provided by the invention are tissue cultures of the soybean variety A1036077 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1036077 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326657 | SOYBEAN VARIETY A1036175 - The invention relates to the soybean variety designated A1036175. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1036175. Also provided by the invention are tissue cultures of the soybean variety A1036175 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1036175 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326658 | SOYBEAN VARIETY A1036218 - The invention relates to the soybean variety designated A1036218. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1036218. Also provided by the invention are tissue cultures of the soybean variety A1036218 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1036218 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326659 | SOYBEAN VARIETY A1036233 - The invention relates to the soybean variety designated A1036233. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1036233. Also provided by the invention are tissue cultures of the soybean variety A1036233 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1036233 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326660 | SOYBEAN VARIETY A1036257 - The invention relates to the soybean variety designated A1036257. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1036257. Also provided by the invention are tissue cultures of the soybean variety A1036257 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1036257 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326661 | SOYBEAN VARIETY A1036300 - The invention relates to the soybean variety designated A1036300. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1036300. Also provided by the invention are tissue cultures of the soybean variety A1036300 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1036300 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326662 | SOYBEAN VARIETY A1037429 - The invention relates to the soybean variety designated A1037429. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1037429. Also provided by the invention are tissue cultures of the soybean variety A1037429 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1037429 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326663 | SOYBEAN VARIETY A1037439 - The invention relates to the soybean variety designated A1037439. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1037439. Also provided by the invention are tissue cultures of the soybean variety A1037439 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1037439 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326664 | SOYBEAN VARIETY A1037442 - The invention relates to the soybean variety designated A1037442. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1037442. Also provided by the invention are tissue cultures of the soybean variety A1037442 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1037442 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326665 | SOYBEAN VARIETY A1037446 - The invention relates to the soybean variety designated A1037446. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1037446. Also provided by the invention are tissue cultures of the soybean variety A1037446 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1037446 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326666 | SOYBEAN VARIETY A1037458 - The invention relates to the soybean variety designated A1037458. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1037458. Also provided by the invention are tissue cultures of the soybean variety A1037458 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1037458 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326667 | SOYBEAN VARIETY A1037445 - The invention relates to the soybean variety designated A1037445. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1037445. Also provided by the invention are tissue cultures of the soybean variety A1037445 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1037445 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326668 | SOYBEAN VARIETY A1037459 - The invention relates to the soybean variety designated A1037459. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1037459. Also provided by the invention are tissue cultures of the soybean variety A1037459 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1037459 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326669 | SOYBEAN VARIETY A1037464 - The invention relates to the soybean variety designated A1037464. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1037464. Also provided by the invention are tissue cultures of the soybean variety A1037464 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1037464 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326670 | SOYBEAN VARIETY A1037469 - The invention relates to the soybean variety designated A1037469. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1037469. Also provided by the invention are tissue cultures of the soybean variety A1037469 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1037469 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326671 | SOYBEAN VARIETY A1037473 - The invention relates to the soybean variety designated A1037473. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1037473. Also provided by the invention are tissue cultures of the soybean variety A1037473 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1037473 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326672 | SOYBEAN VARIETY A1037474 - The invention relates to the soybean variety designated A1037474. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1037474. Also provided by the invention are tissue cultures of the soybean variety A1037474 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1037474 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326673 | SOYBEAN VARIETY A1037481 - The invention relates to the soybean variety designated A1037481. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1037481. Also provided by the invention are tissue cultures of the soybean variety A1037481 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1037481 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326674 | SOYBEAN VARIETY A1037489 - The invention relates to the soybean variety designated A1037489. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1037489. Also provided by the invention are tissue cultures of the soybean variety A1037489 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1037489 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326675 | SOYBEAN VARIETY A1037490 - The invention relates to the soybean variety designated A1037490. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1037490. Also provided by the invention are tissue cultures of the soybean variety A1037490 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1037490 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326676 | SOYBEAN VARIETY A1037492 - The invention relates to the soybean variety designated A1037492. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1037492. Also provided by the invention are tissue cultures of the soybean variety A1037492 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1037492 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326677 | SOYBEAN VARIETY A1037503 - The invention relates to the soybean variety designated A1037503. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1037503. Also provided by the invention are tissue cultures of the soybean variety A1037503 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1037503 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |
20130326678 | SOYBEAN VARIETY A1037507 - The invention relates to the soybean variety designated A1037507. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1037507. Also provided by the invention are tissue cultures of the soybean variety A1037507 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1037507 with itself or another soybean variety and plants produced by such methods. | 2013-12-05 |