04th week of 2015 patent applcation highlights part 66 |
Patent application number | Title | Published |
20150026793 | SESSION INITIATION PROTOCOL DENIAL OF SERVICE ATTACK THROTTLING - In one implementation, the number of half open session initiation protocol (SIP) sessions per-destination (e.g., SIP device) or globally is limited by SIP application layer gateway (ALG) as a SIP DoS/DDoS countermeasure. Compared with traditional SIP DoS/DDoS countermeasures, the proposed solution is simple to implement and, thus, less likely to degrade SIP ALG performance. Moreover, this solution automatically adapts to DoS/DDoS attack arrival rate, while at the same time not degrading legal SIP traffic even if throttling is enforced for the SIP device. | 2015-01-22 |
20150026794 | PACKET CLASSIFICATION FOR NETWORK ROUTING - Techniques for packet classification for network routing are disclosed. In some embodiments, packet classification for network routing includes receiving packets associated with a new flow at a security controller from a network device, in which the network device performs packet forwarding; classifying the flow; and determining an action for the flow based on a policy (e.g., a security policy). In some embodiments, the network device is a Software Defined Network (SDN) network device (e.g., a packet forwarding device that supports the OpenFlow protocol or another protocol). | 2015-01-22 |
20150026795 | METHOD AND SYSTEM FOR EXTENDING THE SIGN-IN PROCESS FOR ACCESSING COMPUTER SYSTEMS - A system and a method for extending the sign-in process for accessing computer system is provided. The system and method allows construction of notices which contains prerequisite conditions to be fulfilled by the user along with the credentials for accessing the computer system. The system and the method further allow updation of the data provided by the user in data storage. | 2015-01-22 |
20150026796 | Event-Based Security Challenges - Concepts and technologies are disclosed herein for event-based security challenges. A computer can execute a security application. The computer can receive a request for authentication information associated with a user device. The computer can access event data corresponding to the user device. The computer can generate, based upon the event data, a challenge question and a response to the challenge question. The computer can provide data indicating the challenge question and the response to a requestor associated with the request. | 2015-01-22 |
20150026797 | ELECTRONIC DEVICE AND AUTHENTICATION SYSTEM THEREIN AND METHOD - An authentication system and method thereof capture an image of a user and extract biometric features of the user from the image to determine whether a stored biometric feature matches with the extracted biometric features. If there is a match, an interactive information is generated to invite the user to perform actions shown or specified or described by the interactive information. The user will be authenticated if an action of the user matches the required action in a timely fashion. An electronic device using the same is also provided. | 2015-01-22 |
20150026798 | ELECTRONIC DEVICE AND METHOD FOR IDENTIFYING A REMOTE DEVICE - An identity is identified by an electronic device. The electronic device receives a connection request from a remote device and controls a remote device to capture an image using the remote device. The electronic device accepts the connection request and authorizes the remote device to access the electronic device upon the condition that the captured image matches a predetermined image stored in the electronic device. | 2015-01-22 |
20150026799 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing system includes a management unit that manages information of an object that determines at least one of a parent and a child of the object, a receiving unit that receives specification of an authority object that is an object with which authority information is associated and a request of processing that is to be executed by using the authority object, and a determining unit that determines whether to accept the request or not on the basis of results of a comparison between information of an owner object that is an object that approves the authority information and information of an object that is a parent of the authority object. | 2015-01-22 |
20150026800 | SCALABLE INLINE BEHAVIORAL DDOS ATTACK MITIGATION - Methods and systems for a scalable solution to behavioral Distributed Denial of Service (DDoS) attacks targeting a network are provided. According to one embodiment, a method to determine the scaling treatment is provided for various granular layer parameters of the Open System Interconnection (OSI) model for communication systems. A hardware-based apparatus helps identify packet rates and determine packet rate thresholds through continuous and adaptive learning with multiple DDoS attack mitigation components. The system can be scaled up by stacking multiple DDoS attack mitigation components to provide protection against large scale DDoS attacks by distributing load across these stacked components. | 2015-01-22 |
20150026801 | Process of Reliability for the Generation of Warning Messages on a Network of Synchronized Data - The method for reliabilisation of the supervision of a network comprises: acquisition of a set of events, said events comprising a time stamp corresponding with the emission time of said event; storage of the received events; storage of at least one scenario (SC) comprising a first sequence (S1) of events to be received within a time interval threshold (ΔTs) and a first condition (CD1) to be satisfied; detection of at least a part (pS2) of a received second sequence of events (S2) similar to the first sequence (Si); determination of a second emission time interval (ΔT3) of the second sequence (S2); verification that the first condition (CD1) of the scenario (SC) is satisfied in function of the determined emission time interval (ΔT3), the time interval threshold (ΔTs) of scenario (SC), and the first sequence (S1) and the second sequence (S2) received, and generation of a second status message (M2ET). | 2015-01-22 |
20150026802 | FAKE WEB ADDRESSES AND HYPERLINKS - A destination address is processed to determine if the destination address is a fake web address or hyperlink. The destination address may be compared with a database of known domain names to see if the domain name is legitimate or illegitimate. The designation address may also be compared to other domain names to see if it is an honest or dishonest transformation of the other domain names. Appropriate action may be taken if the designation address is a dishonest transformation of another domain name. | 2015-01-22 |
20150026803 | Native Code Module Security for Arm Instruction Set Architectures - Some embodiments provide a system that executes a native code module. During operation, the system obtains the native code module. Next, the system loads the native code module into a secure runtime environment. Finally, the system safely executes the native code module in the secure runtime environment by using a set of software fault isolation (SFI) mechanisms that constrain store instructions in the native code module. The SFI mechanisms also maintain control flow integrity for the native code module by dividing a code region associated with the native code module into equally sized code blocks and data blocks and starting each of the data blocks with an illegal instruction. | 2015-01-22 |
20150026804 | Method and Apparatus for Reclassifying E-mail or Modifying a Spam Filter Based on Users' Input - A method is disclosed including passing a plurality of e-mails through a spam filter and classifying at least of the plurality of e-mails as not spam. Thereafter, the plurality of e-mails are received at each of a plurality of user computers. The method may further include receiving a plurality of reports, the plurality of reports including one report from each of the plurality of user computers that one or more of the plurality of e-mails are spam that was not classified as spam by the spam filter. Based on the plurality of reports, one or more of the plurality of e-mails is reclassified as spam and/or the spam filter is modified. | 2015-01-22 |
20150026805 | DEVICE REPUTATION MANAGEMENT - A device reputation server recognizes malicious devices used in prior attacks and prevents further attacks by the malicious devices. Server computers require a digital fingerprint of any client devices prior to providing any service to such client devices. Logging of network activity include the digital fingerprint of the device perpetrating the attack. When an attack is detected or discovered, the attacked server reports the attack and the digital fingerprint of the perpetrating device to a device reputation server. The device reputation server uses the report to improve future assessments of the reputation of the device associated with the reported digital fingerprint. | 2015-01-22 |
20150026806 | Mitigating a Cyber-Security Attack By Changing a Network Address of a System Under Attack - In response to determining that a computer is undergoing a cyber attack, a newly assigned IP address is received for the computer. A currently assigned IP address of the computer is changed to the newly assigned IP address. | 2015-01-22 |
20150026807 | Page Fault Injection In Virtual Machines - Described systems and methods allow protecting a host system from malware using virtualization technology. In some embodiments, a memory introspection engine operates below a virtual machine (VM) executing on the host system. The engine is configured to analyze the content of a virtual memory page used by software executing within the VM, and/or to protect the respective content from unauthorized modification, for instance by malware. When the respective content is swapped out of memory, the memory introspection engine injects a page fault into the respective VM, to force a swap-in of the respective content. | 2015-01-22 |
20150026808 | METHOD AND SYSTEM FOR NETWORK-BASED DETECTING OF MALWARE FROM BEHAVIORAL CLUSTERING - A computerized system and method for performing behavioral clustering of malware samples, comprising: executing malware samples in a controlled computer environment for a predetermined time to obtain HTTP traffic; clustering the malware samples into at least one cluster based on network behavioral information from the HTTP traffic; and extracting, using the at least one processor, network signatures from the HTTP traffic information for each cluster, the network signatures being indicative of malware infection. | 2015-01-22 |
20150026809 | SYSTEMS AND METHODS FOR IDENTIFYING MALICIOUS HOSTS - A malware detection system analyzes communication traffic to and/or from a certain host. The malware detection system uses the mismatch between host name and IP address to assign a quantitative score, which is indicative of the probability that the host is malicious. The system may use this score, for example, in combination with other indications, to decide whether the host in question is malicious or innocent. The overall decision may use, for example, a rule engine, machine learning techniques or any other suitable means. The malware detection system may also analyze alerts regarding hosts that are suspected of being malicious. The alerts may originate, for example, from Command & Control (C&C) detection, from an Intrusion Detection System (IDS), or from any other suitable source. A given alert typically reports a name of the suspected host and an IP address that allegedly belongs to that host. | 2015-01-22 |
20150026810 | Method and Apparatus for Detecting Malicious Software Using Machine Learning Techniques - Novel methods, components, and systems for detecting malicious software in a proactive manner are presented. More specifically, we describe methods, components, and systems that leverage machine learning techniques to detect malicious software. The disclosed invention provides a significant improvement with regard to detection capabilities compared to previous approaches. | 2015-01-22 |
20150026811 | PROVISIONING A MODERATED DATA SERVICE USING A SYNDICATED RADIO ACCESS NETWORK (RAN) - A system is configured to receive, from a content provider, traffic associated with a data service and that is destined for a group of user devices; retrieve service information, associated with the data service, that includes a value, associated with the data service, that represents a level of service quality associated with the data service; determine whether the traffic is authorized to be transmitted to the user devices based on the value; discard the traffic based on a determination that the value is less than a threshold; process the traffic to identify whether a condition is associated with the traffic based on a determination that the value is not less than the threshold; transmit the traffic to one or more of the user devices based on a determination that the traffic is not associated with a condition; and discard the traffic based on a determination that the traffic is associated with a condition. | 2015-01-22 |
20150026812 | METHOD AND DEVICE FOR DETECTING VIRUS OF INSTALLATION PACKAGE - Examples of the present disclosure provide a method and device for detecting virus of an installation package. The method includes: An installation package is unpacked, and description information obtained by unpacking the installation package is cached; after a virus detection startup instruction is received, the cached description information is read; the installation package is analyzed according to read description information, and whether there is a virus in the installation package is determined. Technical solutions of the present disclosure can increase the speed of installation package virus detection. | 2015-01-22 |
20150026813 | METHOD AND SYSTEM FOR DETECTING NETWORK LINK - A method and system for detecting network link are disclosed. The method includes: receiving copy content by capturing a copy behavior; performing malware detection on network link in the copy content to obtain a detection result; generating a risk warning message according to the detection result. The system includes: a receiving module, configured to receive copy content by capturing a copy behavior; a detecting module, configured to perform malware detection on network link in the copy content to obtain a detection result; a message generating module, configured to generate a risk warning message according to the detection result. The method and system can reduce the attack risk of malicious network link. | 2015-01-22 |
20150026814 | INVISIBLE INTERFACE FOR MANAGING SECURED DATA TRANSACTIONS - In an exemplary embodiment, a computer-implemented method for secure data transactions includes storing, by a processing device, personal data on a wearable data storage applicable to a body of a user. The wearable data storage is rendered invisible. | 2015-01-22 |
20150026815 | MANAGING AND ACCOUNTING FOR PRIVACY SETTINGS THROUGH TIERED COOKIE SET ACCESS - Tiered management of privacy settings is disclosed. In one example, such management entails defining privacy tiers respectively corresponding to privacy levels. Cookies are then associated to the privacy tiers to accommodate the management of browsing activity according to the relevant tier. Additionally, different sets of private information are respectively to the privacy tiers. This provides for the management of browsing activity using the privacy tiers, the cookies and the different sets of private information. In this fashion, the association of a given cookie to a given privacy tier dictates a given set of private information to be provided to another party in connection with a given browsing activity. | 2015-01-22 |
20150026816 | DISPLAY METHOD AND ELECTRONIC DEVICE - The present invention discloses a display method and an electronic device. The method is applicable to an electronic device, the electronic device is capable of data transmission with a display device, the electronic device includes a first display unit, and the display device includes a second display unit; and the method includes: when the electronic device obtains information needing to be displayed, determining whether the information needing to be displayed is private information and generating a first determination result; in a case that the information needing to be displayed is private information, transmitting the information needing to be displayed to the first display unit only; and in a case that the information needing to be displayed is not private information, transmitting the information needing to be displayed at least to a second display unit. | 2015-01-22 |
20150026817 | Hiding Sensitive Data In Plain Text Environment - Method and system for hiding sensitive data in a plain text environment. The method may include recognizing a starting key in a plain text environment, wherein the starting key indicates to a working system that the text input subsequent to the starting key is to be hidden according to a specified hiding method; receiving subsequent plain text, the working system carrying out the hiding method on the plain text, wherein the input plain text is not displayed in the plain text environment; and recognizing an ending key, ending the hiding method and displaying subsequently input plain text in the plain text environment. The starting key and ending key may also be used to indicate to the working system that the data subsequent to the starting key is hidden according to the specified hiding method. The starting key and ending key are the same or different escape characters. | 2015-01-22 |
20150026818 | METHOD AND DEVICE FOR PROVIDING TEMPORARY CONTACT INFORMATION - A device includes a storage unit, a processor and an output unit. The storage unit is configured to store identification information and a plurality of temporary contact data items. The processor is configured to select one of the temporary contact data items based on the identification information and a first time index. The output unit is configured to output the selected temporary contact data item. The selected contact data item may include at least one of, e.g. a temporary telephone number, a temporary email address, a temporary IP address, and a temporary uniform resource identifier (URI). | 2015-01-22 |
20150026819 | SELECTIVELY ALLOWING REFERENCE TO OBJECT ON UNLOCK DISPLAY SCREEN - Methods and devices for selectively allowing a reference to an object to be included on an unlock display screen are described. In one embodiment, a processor-implemented method is described. The method includes: providing a plurality of perimeters on the electronic device, the perimeters including a low-security perimeter and a high-security perimeter; associating one or more objects with the low-security perimeter and one or more objects with the high-security perimeter; and based on the associations between the one or more objects and the one or more perimeters, selectively allowing one or more of the objects to be referenced on an unlock display screen. | 2015-01-22 |
20150026820 | ALTERNATE CONTENT PLAYLIST FOR LOCKED MEDIA CONTENT - Systems, and methods disclosed herein include systems and methods for providing alternative content playlists for locked media content. Media content may be locked according to certain pre-conditions, such as a release date. Prior to the pre-conditions being met, e.g., on a date earlier than the release date, the content may be locked to prevent user access. During such locked period, a user may be presented with an alternative content playlist with media content that is available to be accessed by the user. | 2015-01-22 |
20150026821 | MANAGEMENT OF DIGITAL INFORMATION - According to an embodiment of the present invention, a system provides secure access to a digital item and includes at least one processor. The system partitions the digital item into a plurality of segments each containing a portion of the digital item and associated with a corresponding sensitivity level. The portion of the digital item within each segment is encrypted in accordance with the corresponding sensitivity level, and the plurality of segments are randomly stored among a plurality of storage units. Embodiments of the present invention further include a method and computer program product for providing secure access to a digital item in substantially the same manner described above. | 2015-01-22 |
20150026822 | PROTECTION OF PROPRIETARY EMBEDDED INSTRUMENTS - A network of storage units has a data path which is at least a portion of the network. The network also has a key storage unit and a gateway storage unit. If the key storage unit stores a key value, the key storage unit transmits a key signal to the gateway storage unit. If the gateway storage unit does not store a gateway value or the key signal is not transmitted to the gateway storage unit, the gateway storage unit does not insert a data path segment in the data path. If the gateway storage unit stores a gateway value and the key signal is transmitted to the gateway storage unit, the gateway storage unit inserts the data path segment. | 2015-01-22 |
20150026823 | METHOD AND SYSTEM FOR ENTITLEMENT SETTING, MAPPING, AND MONITORING IN BIG DATA STORES - A method and system for securing sensitive data content in big data stores is provided. In an example method, entities within the big data store that contain sensitive data are identified. Then, users who have entitlement to access these sensitive entities are identified, along with their level of entitlement. Access controls are then set, based on which users can operate on the sensitive entities. Access or attempts to access these entities is monitored on an ongoing basis. An example system maps entitlement to entities within the big data store that contain sensitive content, to monitor access to these entities and to set access controls for users accessing the big data store. | 2015-01-22 |
20150026824 | DEVICE AND METHOD FOR PROVIDING USER ACTIVITY INFORMATION IN PORTABLE TERMINAL - A device and a method for providing user activity information in a portable terminal are provided. The method includes receiving and storing log data from a specific application, generating user situation information representing a current status of a user based on the stored log data, and transmitting the generated user situation information to the specific application. | 2015-01-22 |
20150026825 | METHOD OF NAVIGATING THROUGH DIGITAL CONTENT - Electronic publications are increasingly replacing physical media, where standards have evolved to mimic these physical media. Accordingly it is beneficial to provide electronic publication software systems and/or software applications to enable new paradigms that provide consumers, authors, publishers, retailers, and others with a method of navigating electronic content comprising the ability to generate a user interface that supports individual page turns as well as small, moderate and large adjustments of position within the electronic content, wherein the user interface supports these adjustments in a manner that is consistent. The method further comprising the ability to receive an indication of an action by a user relating to an adjustments of position within an item of multimedia content rendered on a display device; determine a characteristic of the action; determine a first action relating to the retrieval of additional content of the item of multimedia content based on the characteristic of the action; and determine a predetermined subset of a plurality of objects to render to the user based on the characteristic of the action. | 2015-01-22 |
20150026826 | SUBSCRIBER IDENTITY MODULE-BASED AUTHENTICATION OF A WIRELESS DEVICE AND APPLICATIONS STORED THEREON - An approach is provided for performing a device-level and/or an application-level security check of a device. In the device-level check, a device hash is generated based on a subscriber identity module identifier (SIM ID), a device identifier, the number of secured applications, and the names of the secured applications. A temporary device hash is generated during a booting of the device. If the device hash is determined to not match the temporary device hash, the applications are removed from the device during the booting of the device. In the application-level check, an application hash is generated based on the SIM ID, the device identifier, and the application name. A temporary application hash is generated during a loading of the application. If the application hash is determined to not match the temporary application hash, the application is removed from the device without running the application. | 2015-01-22 |
20150026827 | METHOD FOR APPLICATION MANAGEMENT, CORRESPONDING SYSTEM, AND USER DEVICE - A method for application management is provided. First, an original application is received. A license code is injected into the original application through a repackaging process to generate a repackaged application. Next, the repackaged application is published for a user device to download and install, wherein the user device executes a client program. When the user device executes the repackaged application, the license code sends a license check request to activate the client program to send a license check response according to license information of the repackaged application. The license check response indicates whether the repackaged application is allowed to be further executed. When the license check response indicates that the repackage application is not allowed to be further executed, the license code terminates the repackaged application. | 2015-01-22 |
20150026828 | METHODS AND APPARATUS FOR CHARACTER SET CONTROL, VERIFICATION AND REPORTING - Systems and methods for character set control, verification and reporting are provided. In an example embodiment, a data evaluation system comprises at least one module, executing on one or more computer processors, to implement a language and character set phase in which an authorized character set comprising authorized characters is defined; a document phase including receipt of an input document, the input document comprising document characters; a detection phase including a comparison of the document characters against the authorized characters in the authorized character set to detect unauthorized characters in the input document not forming part of the authorized character set; and a reporting phase including display of the unauthorized characters to a user. | 2015-01-22 |
20150026829 | ANTI-KEYLOG EDITOR - Various embodiments for protecting keyboard data inputted by a user in a computer having a keyboard hardware are disclosed. According to one exemplary embodiment, a method for protecting keyboard data, where the keyboard hardware comprises an I/O port having an input buffer and an output buffer, includes: receiving scan code data based on keyboard data inputted by the user, wherein the scan code data are latched in the output buffer of the I/O port; executing an interrupt routine to fetch the scan code data from the output buffer to a CPU of the computer, wherein the latched scan code data remains in the output buffer after the latched scan code data are read from the output buffer; transmitting a control command to the keyboard hardware through the input buffer of the I/O port; and receiving from the keyboard hardware a response signal generated in response to the control command, wherein the keyboard hardware is configured to transmit the response signal to the output buffer of the I/O port. | 2015-01-22 |
20150026830 | METHOD AND SYSTEM FOR LOCATING A NOTEBOOK COMPUTER - A method for locating a notebook computer by sending a Wake on Wireless WAN (WoW) signal via a wireless network to the notebook computer to switch ON the notebook computer; instructing the notebook computer to determine its own location using GPS if the notebook computer lid is open. | 2015-01-22 |
20150026831 | TL1A MODEL OF INFLAMMATION FIBROSIS AND AUTOIMMUNITY - This invention relates transgenic animals that overexpress TL1A in a tissue specific manner to model inflammatory bowel disease (IBD), such as colitis, Crohn's disease and ulcerative colitis, fibrosis, and related inflammatory diseases and conditions. TL1A transgenic animals constitutively express both TL1A and GFP in lymphoid and myeloid cell lineages, allowing convenient identification and sorting of immune cells involved in IBD disease progression, such as T-cells, antigen presenting cells (APC), and dendritic cells (DC). TL1A transgenic animals may be induced to exhibit gross fibrosis, or isolated cells may be implanted into immunodeficient mice to establish colitis. | 2015-01-22 |
20150026832 | Novel Inflammation in Vivo Model - The present invention relates to a non-human animal deficient in the N-terminal domain of the IL-33 gene. Also provided herein is the use of said non-human animal as an in vivo model of inflammatory diseases, especially with regard to screening methods for anti-inflammatory compounds, and methods for evaluating and optimising the pharmacological properties of a given anti-inflammatory compound. | 2015-01-22 |
20150026833 | Mito-Ob: A Transgenic Mouse Model for Obesity - An obese mouse model was developed by overexpressing the mitochondrial protein prohibitin (PHB) in white adipose tissue (WAT) specific manner driven by adipocyte protein 2 (aP2) promoter. These mice begin to develop obesity as a result of mitochondrial remodeling (upregulation of mitochondrial biogenesis and function) in WAT. | 2015-01-22 |
20150026834 | ANASTASIS BIOSENSOR - The present invention relates to the field of anastasis, i.e., the process of reversal of apoptosis. More specifically, the present invention provides methods and compositions useful for studying anastasis. In one embodiment, the present invention provides an in vivo biosensor comprising (a) a transcription factor complex comprising the Gal4 transcription factor linked to an enzyme cleavable linker, wherein the transcription factor complex is tethered to the plasma membrane via a transmembrane domain; and (b) a reporter system comprising (1) a first nucleic acid encoding flippase operably linked to the upstream activating sequence that binds Gal4; and (2) a second nucleic acid comprising an FRT-flanked stop codon cassette separating a constitutive promoter and a fluorescent protein open reading frame. | 2015-01-22 |
20150026835 | WATERMELON VARIETY TCS-EJ09137 - The invention provides seed and plants of the watermelon line designated TCS-EJ09137. The invention thus relates to the plants, seeds and tissue cultures of watermelon line TCS-EJ09137, and to methods for producing a watermelon plant produced by crossing a plant of watermelon line TCS-EJ09137 with itself or with another watermelon plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of watermelon line TCS-EJ09137, including the fruits and gametes of such plants. | 2015-01-22 |
20150026836 | SULFONYLUREA-TOLERANT SUNFLOWER PLANTS - This invention relates to sunflower lines and hybrids tolerant to sulfonylurea herbicides wherein the tolerance trait is obtained using induced mutagenesis and artificial selection, and to a method for selectively controlling undesired vegetation, including parasitic weeds, by applying sulfonylurea herbicides to sulfonylurea-tolerant sunflower crops. | 2015-01-22 |
20150026837 | SOYBEAN CULTIVAR UA5612 - A soybean cultivar designated UA5612 is disclosed. The invention relates to the seeds of soybean cultivar UA5612, to the plants of soybean cultivar UA5612, to the plant parts of soybean cultivar UA5612, and to methods for producing progeny of soybean cultivar UA5612. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar UA5612. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar UA5612, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar UA5612 with another soybean cultivar. | 2015-01-22 |
20150026838 | DOWNY MILDEW RESISTANT CUCUMBER PLANTS - The present invention relates to cucumber lines having increased resistance to Downy Mildew. The present invention also relates to parts of cucumber plants from lines having increased Downy Mildew resistance, including seeds capable of growing cucumber plants with increased Downy Mildew resistance. Further provided are methods of producing such plants by genetic marker assisted selection. | 2015-01-22 |
20150026839 | MAIZE PLANTS WITH IMPROVED DISEASE RESISTANCE - The present invention is in the field of plant breeding and disease resistance. More specifically, the invention includes a method for breeding corn plants containing one or more markers that are associated with resistance to fungi. The invention further includes germplasm and the use of germplasm containing at least one marker associated with resistance to | 2015-01-22 |
20150026840 | CONSTRUCTS AND SYSTEMS AND METHODS FOR PRODUCING MICROCOMPARTMENTS - To produce a bacterial microcompartment shell, or a designed shell based on naturally occurring bacterial microcompartment shells in a new host organism, a synthetic operon is constructed that contains the desired shell protein genes and translation efficiency is controlled by host specific ribosomal binding sites. Proteins or other molecules can be encapsulated in the microcompartment shells by various methods described herein. The constructs can also be used to express self-assembling sheets comprised of shell proteins. | 2015-01-22 |
20150026841 | CONSTITUTIVE PHOTOMORPHOGENESIS 1 (COP1) NUCLEIC ACID SEQUENCE FROM ZEA MAYS AND ITS USE THEREOF - The present invention relates to an isolated COP1 nucleic acid sequence from a maize plant and the isolated COP1 nucleic acid sequence is named as ZmCOP1. The present invention also relates to a method of using the ZmCOP1 nucleic acid sequence to control the shade avoidance response of a crop plant for high density farming and yield enhancement. | 2015-01-22 |
20150026842 | METHOD OF CONTROLLING SUDDEN DEATH SYNDROME WITH FLUTRIAFOL - This invention relates to the use of the compound flutriafol for protecting plants and plant propagation material from Sudden Death Syndrome. The use comprises applying a composition comprising flutriafol to the soil from which the plant propagation material, a plant, part of a plant and/or plant organ grow or grows at a later point in time. | 2015-01-22 |
20150026843 | Polypeptides Having Protease Activity - The present invention relates to isolated polypeptides having proteaseactivity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptidesin e.g. animal feed and detergents. | 2015-01-22 |
20150026844 | TRANSGENIC BIOLUMINESCENT PLANTS - Transgenic plants, and a method for making the same, wherein genes encoding the enzyme luciferase and its corresponding substrate luciferin are incorporated into a native plant genome. Once transformed into plant cells, these genes may be regulated such that under certain endogenous or exogenous conditions, their expression in the mature plant results in bioluminescence. Different luciferin/luciferase complexes and/or mechanisms of regulation may be utilized for these transgenic plants, depending on a variety of factors such as plant species and the circumstances under which a biolmuniescent reaction is desired. Phototransformation may be utilized to vary the wavelength of light emitted from the mature plant. | 2015-01-22 |
20150026845 | COMPOSITIONS AND RELATED METHODS FOR MODULATING ALKALOID PRODUCTION BY CONTROLLING PMT PROMOTER ACTIVATION MEDIATED BY TRANSCRIPTIONAL FACTORS ERF AND MYC - Compositions and methods for modifying the production levels of alkaloids in plants are provided. Alkaloid production can be genetically controlled by modulating the transcriptional activation of PMT genes mediated by members of the ERF family and/or Myc family of transcription factors. Novel nucleotide sequences encoding the Myc family of transciption factors are also provided. | 2015-01-22 |
20150026846 | Variable Density Scanning - Systems and techniques for varying a scan rate in a measurement instrument. The techniques may be used in scanning probe instruments, including atomic force microscopes (AFMs) and other scanning probe microscopes, as well as profilometers and confocal optical microscopes. This allows the selective imaging of particular regions of a sample surface for accurate measurement of critical dimensions within a relatively small data acquisition time. | 2015-01-22 |
20150026847 | RADIO-FREQUENCY REFLECTOMETRY SCANNING TUNNELING MICROSCOPE - An RF reflectometry scanning tunneling microscope is suitable for observing a surface of an object, and includes a probe that cooperates with the object to form a tunneling resistor therebetween, an RF resonant circuit that cooperates with the tunneling resistor to form a LCR resonant circuit including an inductor connected to a parallel connection of a capacitor, a resistor and the tunneling resistor, a directional coupler receiving an RF signal and outputting the RF signal to the LCR resonant circuit, and an RF signal measuring device that generates a scanning result associated with the surface of the object based on a reflected RF signal resulting from reflection of the RF signal by the LCR resonant circuit. | 2015-01-22 |
20150026848 | Pecan tree named 'TREADWELL' - A pecan tree distinguished by the following unique combination of characteristics: high precociousness and prolificacy, consistent production (if fruit thinned), early nut maturity, large nut size that produces mammoth halves, unusual high percentage kernel, exceptional kernel color, no kernel speckling has been observed, high resistance to N scorch, black pecan aphid, pecan leaf scorch mite, and good resistance to scab fungus. | 2015-01-22 |
20150026849 | Pecan tree named 'HUFFMAN' - A pecan tree distinguished by the following unique combination of characteristics: Consistent and acceptable fruit production, small fruit cluster, moderately early nut maturity, large nut producing mammoth kernels with good color and no observed speckling, and no observed scab fungus. | 2015-01-22 |
20150026850 | Vanda orchid plant 'SPCDW1203' - A new and distinct | 2015-01-22 |
20150026851 | Hemigraphis alternata plant named 'HEGHE01' - ‘HEGHE01’ is a distinctive variety of | 2015-01-22 |
20150026852 | Hemigraphis alternata plant named 'HEGHE02' - ‘HEGHE02’ is a distinctive variety of | 2015-01-22 |
20150026853 | Calibrachoa plant named 'KLECA12236' | 2015-01-22 |
20150026854 | Calibrachoa Plant Named 'KLECA12235' | 2015-01-22 |
20150026855 | Salvia plant named 'Eggben008' - A new and distinct | 2015-01-22 |
20150026856 | Salvia plant named 'Eggben009' - A new and distinct | 2015-01-22 |
20150026857 | Zantedeschia 'Captain Lovely' - A new and distinct | 2015-01-22 |