02nd week of 2013 patent applcation highlights part 64 |
Patent application number | Title | Published |
20130014246 | THIRD PARTY VPN CERTIFICATION - A virtual private network (VPN) over a telecommunications network is created by sending a request from a first VPN device to a second VPN device for establishing a VPN between the first and second VPN devices. The request includes a first signed certificate having a verified VPN parameter for the first VPN device. A reply is received at the first VPN device from the second VPN device that includes a second signed certificate having a verified VPN parameter for the second VPN device. The VPN is established between the first and second VPN devices based on each verified VPN parameter for each of the first and second VPN devices. | 2013-01-10 |
20130014247 | METHOD AND SYSTEM FOR AUTHENTICATING AN ACCESSORY - A method, system, and connector interface for authenticating an accessory, the method includes performing a first authentication operation on the accessory by the media player, where an authentication certificate is validated; and performing a second authentication operation on the accessory by the media player, where an authentication signature is validated. According to the system and method disclosed herein, the media player and accessory may utilize a plurality of commands utilized in a variety of environments such as within a connector interface system environment to control access to the media player. | 2013-01-10 |
20130014248 | Mobile application security system and method - A system for authenticating the user of a computing device comprises an authorized user directory. Each record is uniquely associated with an authorized user and includes at least a computing device ID value that is a globally unique value assigned to the authorized user's computing device, a group of unique depictions such as photographs, an identification of a key depiction. Portions of each image form fiducials recognizable by the user. The record further includes trace pattern verification data representing continuous trace strokes between pairs of the fiducials within the key depiction. To authenticate, the group of images are displayed to the user. The user must first select the key image and secondly trace continuous trace strokes between the pairs of fiducials to match the trace pattern verification data. | 2013-01-10 |
20130014249 | SECURE DEVICE SHARING - A device and method for placing the device in a locked state having an associated set of permitted tasks so as to permit the device owner to share the device with others but maintain security over aspects of the device. A task change request is evaluated to determine whether the requested task is permitted and, if so, the requested task is allowed; if not, then an authorization process is invoked to prompt the user to input authorization data. Upon verification of the authorization data, the device may be unlocked and the requested change implemented. The permitted tasks may designate specific applications, specific operations or functions within applications or at the operating system level, one or more currently open windows, and other levels of granularity. | 2013-01-10 |
20130014250 | WIRELESS COMMUNICATION DEVICE WITH PASSWORD PROTECTION AND RELATED METHOD - A wireless communication device (and its related method of operation) includes, if invoked, password protected access to data stored therewithin and/or to normal device operations and further includes duress password checking logic that automatically causes a duress message to be sent if a duress password has been entered. The duress message is preferably sent without maintaining any user accessible indication of such sending. It is also preferred that the password checking logic automatically cause an end-of-duress message to be sent if a normal password is entered after a duress password has been entered. A plurality of different duress passwords may be entered into a duress password portion of data memory in the device. | 2013-01-10 |
20130014251 | SUBSTRATE PROCESSING APPARATUS - An operating section including an operation screen and amounting section, comprises a data authentication unit configured to collate authentication data when a device is inserted into the mounting section, which is the device into which the authentication data such as at least user ID and user password is integrated, and completes log-in when the authentication data is registered, and a display control unit is configured to perform changeover of a display state of at least a part of the operation screen. | 2013-01-10 |
20130014252 | PORTABLE COMPUTER ACCOUNTS - User accounts, authentication information and user home directories are stored on an external storage media that can be transferred from one device to another. Measures are included for detecting tampering of stored information and for preventing possibly conflicting or damaging account and file information from entering a host device. | 2013-01-10 |
20130014253 | Network Protection Service - A network protection method is provided. The network protection method may include receiving a Domain Name System (DNS) request, logging the DNS request, classifying the DNS request based on an analysis of a DNS name associated with the DNS request, taking a security action based on the classification, analyzing network traffic after taking the security action, and providing substantially real-time feedback associated with the network traffic to improve future DNS request classifications. The method may further include receiving a DNS response and logging the DNS response. The analysis of the DNS name may include receiving DNS data related to the DNS name from a plurality of sources, receiving reputation data related to the plurality of sources, scoring each of the plurality of sources based on the reputation data, and aggregating the DNS data related to the DNS name based on the scoring. | 2013-01-10 |
20130014254 | RESPONDING TO A MAINTENANCE FREE STORAGE CONTAINER SECURITY THREAT - A method for responding to a security threat for a maintenance free storage container begins by a dispersed storage (DS) processing module identifying a security threat for the maintenance free storage container, wherein the maintenance free storage container allows for multiple storage servers of a plurality of storage servers to be in a failure mode without replacement. The method continues with the DS processing module determining a failure mode level that is indicative of whether one or more of the multiple storage servers are in the failure mode. The method continues with the DS processing module selecting a security threat countermeasure based on the security threat and the failure mode level. The method continues with the DS processing module implementing the security threat countermeasure. | 2013-01-10 |
20130014255 | System and Method for Providing Network Security - A method includes receiving an indication of at least one detected security issue at a network device. The indication is received at a security manager processor from a security agent. The method includes selecting, via the security manager processor, at least one executable security object responsive to the indication. The security manager processor verifies compatibility between the at least one executable security object, the network device, and communication media. The method also includes sending the at least one executable security object to the network device via the security manager processor to provide a protective security measure to the network device against the at least one detected security issue upon execution of the at least one executable security object. | 2013-01-10 |
20130014256 | JCVM BYTECODE EXECUTION PROTECTION AGAINST FAULT ATTACKS - The invention relates to a computing device comprising means to store and execute bytecodes, the computing device storing bytecodes which comprise a bytecode for calling a method. An attack detection bytecode is present after the bytecode for calling the method, and when executing bytecode, the computing device is set, upon return from the method, to continue bytecode execution after the attack detection bytecode. The invention also relates to a procedure for generating secure bytecode and to an applet development tool. | 2013-01-10 |
20130014257 | LIMITING EXECUTION OF SOFTWARE PROGRAMS - Techniques are disclosed for limiting execution of software programs. For example, a method comprises the following steps. A first set of program code is extracted from a second set of program code. The extracted first set of program code is parsed to generate a parsed structure. The parsed structure generated from the first set of program code is examined for one or more expressions predetermined to be unsafe for execution. The one or more expressions predetermined to be unsafe for execution that are contained in the first set of program code are detected. In one example, the first set of program code may be a script generated with the JavaScript™ scripting language and the second set of program code may be a business process. | 2013-01-10 |
20130014258 | Controlling Network-Based Applications With Social Media Postings - A content posting associated with a user of the social media service is received. The posting can be submitted to the social media service as a status update or message to the social media account associated with the application. The content posting contains an embedded command. The content posting is processed to generate a request to one or more data sources. The request can be a query for information or an instruction to perform an action (e.g. update a data record). The request is sent to one or more data sources, and a response comprising data from the data source is received. The response is parsed to extract data values which are inserted into pre-configured templates in accordance with the characteristics of the response delivery method preference set by the user and stored in a application user profile. The response delivery method can be a social media service and/or other response delivery method (e.g. SMS or RSS feed). In some embodiments, the formatted response is then sent to the social media service and/or other response delivery method for delivery. | 2013-01-10 |
20130014259 | DETECTION OF SPYWARE THREATS WITHIN VIRTUAL MACHINE - A system analyzes content accessed at a network site to determine whether it is malicious. The system employs a tool able to identify spyware that is piggy-backed on executable files (such as software downloads) and is able to detect “drive-by download” attacks that install software on the victim's computer when a page is rendered by a browser program. The tool uses a virtual machine (VM) to sandbox and analyze potentially malicious content. By installing and running executable files within a clean VM environment, commercial anti-spyware tools can be employed to determine whether a specific executable contains piggy-backed spyware. By visiting a Web page with an unmodified browser inside a clean VM environment, predefined “triggers,” such as the installation of a new library, or the creation of a new process, can be used to determine whether the page mounts a drive-by download attack. | 2013-01-10 |
20130014260 | APPARATUS, SYSTEM, AND METHOD FOR PREVENTING INFECTION BY MALICIOUS CODE - The invention relates to an apparatus for preventing infection by malicious code, comprising: a database in which files installed in an agent system, DNA values for each part of the files, and index information for indicating whether each file is normal or malicious are stored; a calculation unit which calculates a DNA value for a part of a file for which an execution is requested in the agent system; and a file inspection unit which searches the database to extract, in a group, files having the DNA value calculated by the calculation unit, inspects whether an object file is normal or malicious on the basis of the index information on the files extracted in a group, and allows the execution of the object file or makes a request for the calculation of DNA values of other parts which selectively include one part of the object file. | 2013-01-10 |
20130014261 | HASH-BASED SYSTEMS AND METHODS FOR DETECTING AND PREVENTING TRANSMISSION OF POLYMORPHIC NETWORK WORMS AND VIRUSES | 2013-01-10 |
20130014262 | MOBILE COMMUNICATION TERMINAL HAVING A BEHAVIOR-BASED MALICIOUS CODE DETECTION FUNCTION AND DETECTION METHOD THEREOF - A mobile communication terminal comprises: a system unit which performs application installation and removal, outputs an installation completion message upon completion of the application installation, and provides, upon receipt of request for authority information on the application, the requested authority information; a behavior information database in which behavior information data is stored; and an inspection unit which makes a request for the authority information to the system unit and receives the authority information, upon receipt of the installation completion message from the system unit, and which compares the authority information and the behavior information data stored in the behavior information database to examine whether the application is a malicious code or not. | 2013-01-10 |
20130014263 | SYSTEM AND METHOD FOR REMOTELY CONDUCTING A SECURITY ASSESSMENT AND ANALYSIS OF A NETWORK - A system and method for performing a security audit of a target network. The system includes a device that establishes a connection to the target network through a communication link. The device has reverse tunneling capabilities for establishing a secure tunnel over the Internet. The system also includes a receiving computer connected to the device through the secure tunnel established by the device over the Internet, and the receiving computer sends commands to the device for performing the security audit of the target network. The device is deployed onsite near the network and the receiving computer is located at a remote offsite location. Also, the device may be covertly hidden onsite near the network to simulate a malicious attack on the target network. | 2013-01-10 |
20130014264 | Systems and Methods For Implementing and Scoring Computer Network Defense Exercises - A process for facilitating a client system defense training exercise implemented over a client-server architecture includes designated modules and hardware for protocol version identification message; registration; profiling; health reporting; vulnerability status messaging; storage; access and scoring. More particularly, the server identifies a rule-based vulnerability profile to the client and scores client responses in accordance with established scoring rules for various defensive and offensive asset training scenarios. | 2013-01-10 |
20130014265 | UNIVERSAL PATCHING MACHINE - A universal patching machine is used to provide security for a computer system. A conversion function is generated for the patching machine that modifies input data to the computer system so that the computer system has an output and state that match the output and state that would be produced by a vendor-patched version of the computer system. The universal patching machine detects security vulnerabilities in intercepted data traffic. If a vulnerability violation is detected, the universal patching machine modifies the data traffic to remove the violation. Fixing the data traffic in this way ensures that the vulnerability cannot be exploited in an attack against the data network. The universal patching machine is formed from patch processors and a packet controller. The patch processors are formed from network patches. In operation, the patch processors detect vulnerabilities and issue modification commands that direct the packet controller to fix the data traffic. | 2013-01-10 |
20130014266 | Collaboration privacy - Generally described, the present disclosure relates to conferences. More specifically, this disclosure relates to collaboration privacy. In one illustrative embodiment, a system is described for conference and other collaborations in which trusted and untrusted parties are present. To retain information privacy within the collaboration, the system determines a context for the conference. From the context, information privacy related groupings can be identified. The system can then determine information privacy measures for those privacy related groupings. The information privacy measures for the groupings can be actuated for the parties within the conference. These measures can include, but are not limited to, visual or audio announcements to trusted parties within the conference. Other information privacy measures can include privacy enabled features such as sidebar conferences between the trusted parties. | 2013-01-10 |
20130014267 | COMPUTER PROTOCOL GENERATION AND OBFUSCATION - In the field of computer science, communications protocols (such as computer network protocols) are hardened (secured) against reverse engineering attacks by hackers using a software tool which is applied to a high level definition of the protocol. The tool converts the definition to executable form, such as computer source code, and also applies reverse-engineering countermeasures to the protocol definition as now expressed in source code, to prevent hackers from recovering useful details of the protocol. This conversion process also allows preservation of backwards version compatibility of the protocol definition. | 2013-01-10 |
20130014268 | STORAGE DEVICE AND STORAGE METHOD - According to one embodiment, a storage device includes a connector configured to be connected to an equipment; a wireless communication unit configured to transmit and receive data through wireless communication; an identification unit configured to identify the equipment connected to the connector; a storage unit configured to include, for each identified equipment, a restricted area accessible only by the identified equipment; and a controller configured to control the storage unit such that the data, which is received by the wireless communication unit when the equipment is connected to the connector, is written in the restricted area for the connected equipment. | 2013-01-10 |
20130014269 | NONVOLATILE MEMORY DEVICE AND MEMORY SYSTEM INCLUDING THE SAME - A nonvolatile memory device includes a memory cell array configured to store an authentication key and authentication key configuration information in first and second pluralities of nonvolatile memory cells, along with data whose security is to be protected, and a control circuit controlling an operation of the memory cell array. | 2013-01-10 |
20130014270 | METHOD OF COMPARING PRIVATE DATA WITHOUT REVEALING THE DATA - Disclosed in this specification is a method and program storage device for comparing two sets of private data without revealing those private data. If the comparison deems the two data sets sufficiently similar, helper data may be provided to permit reconstruction of one of the private data sets without transmission of that private data set. | 2013-01-10 |
20130014271 | Data protection method and device - An apparatus and method for encoding and decoding additional information into a digital information in an integral manner. More particularly, the invention relates to a method and device for data protection. | 2013-01-10 |
20130014272 | SYSTEM AND METHOD OF PROVIDING INFORMATION ACCESS ON A PORTABLE DEVICE - A system and method of providing information stored in a memory is provided. The system comprises an information repository for storing information and an access module for providing access to the information in response to a predetermined operation performed on a man-machine interface. The method includes the steps of storing information in a memory and providing access to the information in dependence upon at least one predetermined operation. | 2013-01-10 |
20130014273 | VALIDATION OF PROTECTED INTRA-SYSTEM INTERCONNECTS FOR DIGITAL RIGHTS MANAGEMENT IN ELECTRICAL COMPUTERS AND DIGITAL DATA PROCESSING SYSTEMS - Embodiments for validating protected data paths for digital rights management of digital objects are disclosed. Some embodiments disclosed herein may comprise processes or apparatus for transferring data from one or more peripherals to one or more computers or digital data processing systems for the latter to process, store, and/or further transfer and/or for transferring data from the computers or digital data processing systems to the peripherals. Some embodiments disclosed herein may comprise processes or apparatus for interconnecting or communicating between two or more components connected to an interconnection medium a within a single computer or digital data processing system. | 2013-01-10 |
20130014274 | System and Method for Encapsulating and Enabling Protection Through Diverse Variations in Software Libraries - A flexible software library in which the software modules are defined as an abstract intermediate representation. The flexible library allows security transformation and performance attribute selections to be made by the end-user, rather than the library creator. Furthermore, since the flexible library contains an abstract representation of the software modules, the library can also be provisioned to contain an arbitrary number of named instances, representing specific sets of values for security and performance decisions, along with the corresponding native object-code resulting from those decisions. This permits distribution of software modules in a completely platform-independent manner while avoiding the disclosure of proprietary information, such as source-files. | 2013-01-10 |
20130014275 | Method For Linking and Loading to Protect Applications - A linker or loader, and associated method, is described, whereby the application of security transformations to object-code modules can be deferred until link or load-time, through, for example, memory relocation, selection from diverse instances of a module, and late-binding of constants. This provides several benefits over conventional source-to-source security transformations. These deferred security transformations can be applied in a very light-weight manner and create many opportunities for diversity in the resulting executable program, enhancing security, while at the same time minimizing the impact on execution performance and correctness, and reducing the complexity of debugging. | 2013-01-10 |
20130014276 | Method for protecting data contents - A method for protecting data contents, in particular video data, is provided. The data contents are provided by a distribution application available in a communications network and may be loaded onto an output unit to be played back on this output unit. A current system utilization of the output unit is monitored or measured during playback of the loaded data contents on the output unit. This current system utilization is compared to an estimated standard system utilization of the output unit for the playback of data contents. If the current system utilization of the output unit exceeds the estimated standard system utilization during a predefined period, appropriate protective measures, such as interrupting playback of the data contents, a corresponding message to the distribution application, etc., are taken and carried out to protect the data contents. | 2013-01-10 |
20130014277 | Methods, Systems, Devices and Computer Program Products for Presenting Information - The life history of a person or entity can be presented in a graphical representation of a highway. Life events may be represented by simple data strings, or by files such as photographs, dissertations, job offers, and love-letters, among others. For ease in viewing, the information representing the life history is categorized according to type (medical, educational, photographic, etc.) and placed in lanes corresponding to the type of information. The information is also organized by date, being placed between miles corresponding to temporal periods, for instance, years. Other graphical arrangements of stored information are also included. | 2013-01-10 |
20130014278 | INTELLIGENT DECISION SUPPORT FOR CONSENT MANAGEMENT - Embodiments of the invention relate to a system and computer program product to intelligently provide consent to access a record in a shared pool of resources. Tools are provided to support policies to address and maintain restrictive access of a designated record, both with respect to local and non-local rules and regulations, as well as personal restrictions pertaining to personal and discretionary sharing decisions. | 2013-01-10 |
20130014279 | SYSTEM FOR PROVIDING PRIVACY OF USER INFORMATION IN AN ONLINE SOCIAL NETWORK WITH INLINE EDITING OF PRIVACY LEVELS AND CUSTOMIZED PRIVACY GROUPS - A method of displaying, editing, and enforcing privacy settings for individual pieces of information published on a website. Privacy selections are displayed next to the information they protect. A user interface is presented in response to user-interaction with the displayed privacy selections that allows further privacy selections. The privacy selections indicate which other users may view the associated information. These options may be in the form of tiers of users with granted access or privacy groups. The publishing user may customize the privacy options by creating new tiers or groups for inclusion in the selection interface. Privacy icons may be associated with the privacy options, and may be displayed to the publishing user next to protected information, allowing easy identification of currently selected privacy settings. The publishing user may also upload additional privacy icons. Other users who access the published information are shown only those pieces of information that they have the right to view, based on the selected privacy settings. | 2013-01-10 |
20130014280 | Managing Secure Sharing of Private Information Across Security Domains Via a Communication Link, Including Through the Internet, Wireless Communications, Mobile Devices, a Telephone Network, and Electronic Messaging - A system and method of sharing information among at least a first organization and a second organization, comprising receiving via a communication link a request for authorization for a user in the first organization to access one or more individual's information in a second organization, the communication link comprising the Internet, Wireless Communications, Mobile Devices, a Telephone Network, and Electronic Messaging. A request is logged and authorization is determined based on at least an access profile, one or more caseloads and the one or more roles associated with the user and the type of the one or more individual's information in the second organization. The information requested is transferred, by the communication link, from the second organization to the user in the first organization and such transfer of information is logged. | 2013-01-10 |
20130014281 | Method and System for Controlled Distribution of Information Over a Network - An information management and distribution system is disclosed. The information management and distribution system includes a client-side application and a server application that interact to facilitate the controlled exchange of contact information over a network. The client-side application can provide creation and design, rolodex, exchange, and update features. The information management and distribution system can also include a corporate administrator application. Still another aspect of the invention is that contact information can be distributed to registered users in a common format. | 2013-01-10 |
20130014282 | Method and System for Controlled Distribution of Information Over a Network - An information management and distribution system is disclosed. The information management and distribution system includes a client-side application and a server application that interact to facilitate the controlled exchange of contact information over a network. The client-side application can provide creation and design, rolodex, exchange, and update features. The information management and distribution system can also include a corporate administrator application. Still another aspect of the invention is that contact information can be distributed to registered users in a common format. | 2013-01-10 |
20130014283 | DATABASE APPLICATION SECURITY - A method allows access to a set of secure databases and database applications over an untrusted network without replicating the secure database. The method involves authenticating a user using a first authentication application. When the user is verified, then the user's credentials are directed to a second authentication application associated with a secure database based on a first set of user settings retrieved for the user. The second authentication application, based on a second set of user settings, grants the user access to the secure database and database applications associated with the secure database. | 2013-01-10 |
20130014284 | Leveraging A Social Graph From A Social Network For Social Context In Other Systems - A social network contains information describing information about members of the social network and about various connections among the members. An external system that interacts with users (such as a website) communicates with the social network to access information about the members of the social network. In particular, the external system may determine whether a user is a member of the social network and then obtain information about the member and the member's connections within the social network. This allows an external system to use information from the social network to enhance a user's experience on the external system, while enforcing each member's privacy settings. | 2013-01-10 |
20130014285 | COMMUNICATION SERVICE SYSTEM - A communication service system includes a SNS server | 2013-01-10 |
20130014286 | METHOD AND SYSTEM FOR MAKING EDRM-PROTECTED DATA OBJECTS AVAILABLE - A method and a system make EDRM-protected data objects available to users. Access rights to an EDRM-protected data object are produced depending on partial access rights to at least one or more data objects, which data objects are contained in the respective EDRM-protected data object. The access rights to the EDRM-protected data object are calculated by a client computer of the user using an access right differentiation function depending on the partial access rights which are made available by different EDRM servers. A data object key of the EDRM-protected data object is calculated by the client computer of the user using a key differentiation function depending on partial keys which are made available by the different EDRM servers. | 2013-01-10 |
20130014287 | MEASUREMENT DATA MANAGEMENT METHOD AND MEASUREMENT DATA MANAGEMENT SYSTEM - Remote meter reading terminal devices | 2013-01-10 |
20130014288 | NOVEL REPORTER-TAGGED RECOMBINANT MEMBRANE PROTEINS WITH TRANSMEMBRANE LINKERS - Recombinant protein constructs are described that comprises a membrane protein whose N- or C-terminus in the native state is recombinantly linked through a membrane-spanning linker polypeptide to a reporter polypeptide. The reporter polypeptide may be a fluorogen activating protein capable of binding a fluorogen to detect the location and relative abundance of the membrane protein, and more specifically to detect protein trafficking to the cell surface using a cell impermeant fluorogen probe. | 2013-01-10 |
20130014289 | GENES CONFERRING STRESS TOLERANCE IN PLANTS AND USES THEREOF - Compositions and methods for imparting stress tolerance to plants using WRKY nucleic acid and polypeptides. | 2013-01-10 |
20130014290 | UDP-XYLOSE SYNTHASES (UXS) POLYNUCLEOTIDES, POLYPEPTIDES AND USES THEREOF - The present disclosure concerns methods and compositions relating to UXS polypeptides and/or nucleic acids encoding UXS polypeptides. In certain claims, the methods and compositions are of use to improve digestibility and/or ease of grain processing. Such improvements relate to a modulation in arabinoxylan and/or hemicellulose content in transgenic plants. Such plants can, for example, comprise one or more nucleic acid sequences that inhibit expression of one or more UDP-Xylose Synthase (USX) genes. | 2013-01-10 |
20130014291 | Cytokinin Oxidase-Like Sequences and Methods of Use - Methods and compositions for modulating plant development are provided. Polynucleotide sequences and amino acid sequences encoding cytokinin oxidase polypeptides are provided. The sequences can be used in a variety of methods including modulating root development, modulating floral development, modulating leaf and/or shoot development, modulating seed size and/or weight, modulating tolerance under abiotic stress, and modulating resistance to pathogens. Polynucleotides comprising CKX promoters are also provided. The promoters can be used to regulate expression of a sequence of interest. Transformed plants, plant cells, tissues, and seed are also provided. | 2013-01-10 |
20130014292 | TRANSGENIC PLANTS HAVING INCREASED BIOMASS - Methods and materials for modulating biomass levels in plants are disclosed. For example, nucleic acids encoding biomass-modulating polypeptides are disclosed as well as methods for using such nucleic acids to transform plant cells. Also disclosed are plants having increased biomass levels and plant products produced from plants having increased biomass levels. | 2013-01-10 |
20130014293 | Xylanase Variants and Polynucleotides Encoding Same - The present invention relates to variants of a parent xylanase. The present invention also relates to polynucleotides encoding the variants; nucleic acid constructs, vectors, and host cells comprising the polynucleotides; and methods of using the variants. | 2013-01-10 |
20130014294 | SITE-SPECIFIC INTEGRATION AND STACKING OF TRANSGENES IN SOYBEAN VIA DNA RECOMBINASE MEDIATED CASSETTE EXCHANGE - A targeting method is described that allows precise cassette replacement at a previously characterized genetic locus. A target DNA construct containing a pair of incompatible FRT sites flanking a target cassette was introduced into soybean by regular biolistic transformation. Transgenic events containing a single complete copy of the target site were then selected and retransformed with a donor DNA construct containing the identical pair of incompatible FRT sites flanking a donor cassette. Precise DNA cassette exchange happened between the target cassette and the donor cassette via recombinase mediated cassette exchange (RMCE) so that the donor cassette was introduced at the exact genomic site previously occupied by the target cassette. Through repeated RMCE using additional incompatible FRT sites, multiple groups of transgenes can be stacked at the same genomic locus. | 2013-01-10 |
20130014295 | METHOD FOR POSITIONING AN ATOMIC FORCE MICROSCOPY TIP IN A CELL - A method for positioning a tip of an atomic force microscope relative to a intracellular target site in a cell is provided. In general terms, the method comprises: a) positioning a fluorescent tip of an atomic force microscope over a cell comprising a fluorescent intracellular target site so that said tip is above target site; b) moving the tip toward said target site while obtaining images of the distal end of said tip and/or the target site using a fluorescence microscope; and c) arresting the movement of the tip when the target site and the distal end of the tip are both in focus in the fluorescence microscope. A microscope system for performing the method is also provided. | 2013-01-10 |
20130014296 | PROBE ASSEMBLY FOR A SCANNING PROBE MICROSCOPE - A probe assembly for use with a scanning probe microscope includes a carrier supporting at least two probes mounted on a tilt stage arranged to tilt the carrier about an axis. The probes may be distributed on one or more surfaces. In use, the tilt stage operates either as a selection device, orienting a selected probe or surface towards a sample, and/or as an alignment tool, adjusting a planar array of probes such that they are better aligned with the sample. This offers the potential for automated exchange of probes, with increased speed and accuracy, during microscope operation. | 2013-01-10 |
20130014297 | Floribunda Rose Plant Named 'RADPROV' - A new and distinct Floribunda rose plant is provided that abundantly and substantially continuously forms attractive very double old-fashioned blossoms that are pink with undertones of lavender. The blossom fragrance is very strong and commonly is reminiscent of fresh citrus. The plant exhibits vigorous vegetation and an upright and bushy growth habit. The foliage is dark green with a semi-glossy finish. Good resistance to blackspot has been experienced. The plant is well suited for growing as attractive ornamentation in parks and gardens. | 2013-01-10 |
20130014298 | Grandiflora Rose Plant Named 'Meikanaro' - A new and distinct variety of Grandiflora rose plant is provided that abundantly and substantially continuously forms attractive double blossoms that are yellow finishing to cream yellow in coloration. The vegetation is vigorous and a bushy growth habit is displayed. Attractive conical buds are formed, and the disease resistance is good. The plant is particularly well suited for providing distinctive attractive ornamentation in the landscape. | 2013-01-10 |
20130014299 | Apple tree, 'DS 3' - A new and distinct variety of apple tree is described and which is somewhat similar in its overall characteristics to that of the ‘Honeycrisp’ apple tree (U.S. Plant Pat. No. 7197) but which is distinguishable therefrom by producing fruit which are ripe for harvesting and shipment about 10 days later then the ‘Honeycrisp’ apple tree when grown under the prevailing ecological conditions which occur near Ephrata, Wash. | 2013-01-10 |
20130014300 | Hop plant named 'Hort3829' - A new and distinct hops plant is described. The triploid cultivar results out of selection from a population of seedlings derived from the open pollination of the cultivar ‘Hallertauer Mittelfrueh’ (not patented). The cones are of a medium size, oval shape and ripen early. The new cultivar appears suitable for beer flavouring in the aroma hops market. | 2013-01-10 |
20130014301 | Rosmarinus plant named 'Sunkissed' - A new and distinct cultivar of | 2013-01-10 |