33rd week of 2012 patent applcation highlights part 62 |
Patent application number | Title | Published |
20120210413 | FACILITATING SINGLE SIGN-ON (SSO) ACROSS MULTIPLE BROWSER INSTANCE - Facilitating single sign-on (SSO) across multiple browser instances such that user authentication at one browser instance is used as a basis to permit access to protected resources (hosted on server systems) from other browser instances. In an embodiment, the different browser instances are executing on different client systems. An authentication server may maintain a registration data indicating the different client systems/browser instances registered by a user for SSO feature. After a user is authenticated for a first session from one browser instance, the authentication server enables the user to access any protected resource from registered client systems/browser instances without requiring further authentication (based on the presence of the authenticated first session). | 2012-08-16 |
20120210414 | INFORMATION PROCESSING SYSTEM, METHOD FOR CONTROLLING INFORMATION PROCESSING SYSTEM, AND STORAGE MEDIUM - An information processing system stores key information for determining an authentication device and information about the authentication device by associating these information pieces with each other and extract the key information from access of an unauthenticated user. Based on the information about the authentication device associated with the key information, the access of the unauthenticated user is redirected. | 2012-08-16 |
20120210415 | METHOD, APPARATUS AND SYSTEM FOR PROVISIONING A PUSH NOTIFICATION SESSION - A system and method for provisioning a push notification session via a communications network between an application on a client terminal and a server corresponding to the application. In one aspect, a push provisioning entity transmits a message to the client terminal, whereby to configure the client terminal into a state in which it is able to request a push notification session with the server. An application on the client terminal can then request establishment of a push notification session by transmitting a push notification session request message to the push provisioning entity. The push provisioning entity generates a token for use in validating the push notification session, associates the generated token with the application and transmits the token to the application, which uses it to establish the push notification session. | 2012-08-16 |
20120210416 | LOAD BALANCING IN A NETWORK WITH SESSION INFORMATION - Methods and systems for balancing load among firewall security devices are provided. According to one embodiment, a switch maintains a session table the session entries of which represent established traffic sessions between a source and a destination and form an association between the traffic session and a particular firewall security device (FSD). Responsive to receiving a packet of a first traffic session on a first port, a determination is made whether there exists a matching session entry. Responsive to a negative determination, a load balancing function is performed to select an FSD with which to associate the first traffic session and a corresponding reverse second traffic session. After processing of the packet by the selected FSD and receipt of the packet at a second port, a session entry is installed within the session table for the second traffic session and which associates the selected FSD with the second traffic session. | 2012-08-16 |
20120210417 | DISTRIBUTED FIREWALL ARCHITECTURE USING VIRTUAL MACHINES - A distributed firewall of a gateway device includes at least one IO module for performing IO functionality of the distributed firewall, at least one security processing module for performing security functionality of the distributed firewall and a firewall controller for managing the IO module and the security processing module. Each of the at least one IO and security processing modules is executed within a virtual machine. In response to a packet received from an ingress interface, the at least one IO module is to identify a security processing module corresponding to a connections session associated with the packet, to transmit the packet to the identified security processing module to perform a security process on the packet, and in response to a signal received from the identified security processing module indicating that the security process has been completed, to transmit the packet to the egress interface. | 2012-08-16 |
20120210418 | SECURITY ELEMENT HAVING AN ELECTRONIC DISPLAY DEVICE FOR DISPLAYING SECURITY-RELEVANT INFORMATION OR PATTERNS - A security element having an electronic display device, particularly a digital display for representing security-relevant information or patterns is provided, wherein the represented information or patterns changes or change over time due to an algorithm and/or external influences. A method for marking, identifying or authenticating objects or living beings is provide, with the living being or object being provided with a security element having an electronic display device, particularly a digital display for representing security-relevant information or patterns, whereby the represented information or patterns changes or change over time due to an algorithm and/or external influences. | 2012-08-16 |
20120210419 | SECURITY MANAGEMENT FOR AN INTEGRATED CONSOLE FOR APPLICATIONS ASSOCIATED WITH MULTIPLE USER REGISTRIES - A system for security management for applications associated with multiple user registries can include an integrated console configured to host a one or more applications or resource objects in corresponding realms. The system also can include one or more roles mapped to different ones of the resource objects and also to different users permitted to access the integrated console. The system yet further can include a user relationship system having associations with multiple different ones of the roles. Finally, the system can include console security management logic programmed to manage authentication for the users using realm of the resource object while not requiring a separate user registry for the integrated console. | 2012-08-16 |
20120210420 | Systems and Methods of Probing Data Transmissions for Detecting Spam Bots - A computer-implemented system and method for detecting, by a mail server module, spam bot activity by a client device. An email session is conducted between the mail server module and the client device according to a predetermined protocol that includes exchange of messages between the mail server module and the client device. The mail server module probes compliance with the predetermined protocol including: purposefully introducing at least one irregularity into a first message from the mail server module; monitoring a subsequent message transmission from the client device; comparing the subsequent message against reference criteria; and producing a reputability determination for the client device based on an extent to which the subsequent message was a proper response to the at least one irregularity according to the predetermined protocol, the reputability determination being indicative of a likelihood that the client device conducts spam bot activity. | 2012-08-16 |
20120210421 | MALICIOUIS USER AGENT DETECTION AND DENIAL OF SERVICE (DOS) DETECTION AND PREVENTION USING FINGERPRINTING - A method may include receiving a session control protocol request message and fingerprinting the received session control protocol message. The method may further include comparing the fingerprint of the received request message to a list of fingerprints associated with known malicious user agents and rejecting the request message when the fingerprint of the received message matches any fingerprint in the list of fingerprints associated with known malicious user agents. The method may include comparing the fingerprint of the received request message to the list of fingerprints associated with known non-malicious user agents and accepting the request message when the fingerprint of the received message matches any fingerprint in the list of fingerprints associated with known non-malicious user agents. | 2012-08-16 |
20120210422 | METHOD AND APPARATUS FOR DETECTING MALICIOUS SOFTWARE USING GENERIC SIGNATURES - Novel methods, components, and systems for automatically detecting malicious software are presented. More specifically, we describe methods, components, and systems for the automated deployment of generic signatures to detect malicious software. (Typically, generic signature creation and deployment require more extensive manual processes.) The disclosed invention provides a significant improvement with regard to automation compared to previous approaches. | 2012-08-16 |
20120210423 | METHOD AND APPARATUS FOR DETECTING MALICIOUS SOFTWARE THROUGH CONTEXTUAL CONVICTIONS, GENERIC SIGNATURES AND MACHINE LEARNING TECHNIQUES - Novel methods, components, and systems that enhance traditional techniques for detecting malicious software are presented. More specifically, methods, components, and systems that use important contextual information from a client system (such as recent history of events on that system), machine learning techniques, the automated deployment of generic signatures, and combinations thereof, to detect malicious software. The disclosed invention provides a significant improvement with regard to automation compared to previous approaches. | 2012-08-16 |
20120210424 | System for Efficiently Handling Cryptographic Messages Containing Nonce Values in a Wireless Connectionless Environment Without Comprising Security - A secure communication module that accepts a cryptographic message if a nonce value for the received message is greater than the largest nonce value yet seen. If the received nonce value is not the largest nonce value yet seen, the secure communication module compares the received nonce value with a nonce acceptance window. If the nonce value falls outside the nonce acceptance window, the secure communication module rejects the received message and assumes a replay attack. Alternatively, if the nonce value falls within the nonce acceptance window, the secure communication module compares the received nonce value with a replay window mask. If comparison with the replay window mask indicates that the received nonce value has been seen before, the secure communication module rejects the received message and assumes a replay attack. Otherwise, the secure communication module accepts the message and adds the received nonce value to the replay window mask. | 2012-08-16 |
20120210425 | Network Surveillance - A method of network surveillance includes receiving network packets handled by a network entity and building at least one long-term and at least one short-term statistical profile from a measure of the network packets that monitors data transfers, errors, or network connections. A comparison of the statistical profiles is used to determine whether the difference between the statistical profiles indicates suspicious network activity. | 2012-08-16 |
20120210426 | ANALYSIS SYSTEM FOR UNKNOWN APPLICATION LAYER PROTOCOLS - An analysis system for unknown application layer protocols, which could automatically discover unknown applications existing in a network, and then obtain keywords, attribute values, status codes or type codes representing semantic meaning of each field in each type of unknown application as well as message formats, dialogue rules and status transfer relations of application layer protocols by using cluster analysis and optimal partitioning method based on hidden semi-Markov model. Unknown application analysis result could be used for flow management and safety protection of a network. The system has the following advantages: it avoids difficulties arising from manual discovery and analysis of unknown applications, and improves network management efficiency and responding speed against new types of network attacks. | 2012-08-16 |
20120210427 | CONFIGURABLE INVESTIGATIVE TOOL - This disclosure provides example techniques to invoke one or more tools, with an investigative tool. The investigative tool provides a common framework that allows investigators to invoke their own trusted tools or third-party generated tools. The investigative tool described herein seamlessly and transparently invokes the tools in accordance with an investigative profile created by the investigator. | 2012-08-16 |
20120210428 | FLOW DATA FOR SECURITY INTRUSION DETECTION - Disclosed herein are techniques for detecting possible security intrusions in a computer network. The security intrusion detection may be based on analyzing patterns of how transactions flow through one or more software applications. For example, patterns of transaction flows are determined for an initial time period to establish a baseline of normal flow patterns. These normal flow patterns may be compared with patterns for transaction flows for a later time period. Deviations in the patterns of transaction flow may indicate a possible security intrusion. | 2012-08-16 |
20120210431 | Detecting a trojan horse - A method and apparatus for detected a Trojan in a suspicious software application in the form of at least one electronic file. A computer device determines the source from which the suspicious software application was obtained. A comparison is then made between the source from which the suspicious software application was obtained and a source from which an original, clean version of the software application was obtained. If the sources differ, then it is determined that the suspicious application is more likely to contain a Trojan horse than if the sources were the same. | 2012-08-16 |
20120210432 | LABEL-BASED TAINT ANALYSIS - A computer-implemented method and apparatus, adapted to receive a computer program, and dynamically analyze the computer program to determine flow of untrusted data with respect to a computer resource associated with the computer program. Based on the flow of untrusted data, the method and apparatus determine an abstraction of the computerized resource, and performing static analysis of the computer program with respect to the abstraction, wherein the static analysis is for identifying whether the computer program is susceptible to one or more possible security vulnerabilities. | 2012-08-16 |
20120210433 | EXFILTRATION TESTING AND EXTRUSION ASSESSMENT - An improved technique employs an automated agent inside the network perimeter, which generates and sends data packets to a listener outside the network perimeter. Along these lines, the automated agent generates data packets over a specified range of security parameters including port number, payload format, and communications protocol. The agent attempts to send these data packets across the network boundary through a firewall at an egress or other point of the network. The listener receives the data packets and analyzes the payload content of each received data packet for each value of the security parameters (e.g., port number, file type, and protocol). The listener then sends the results of the analysis to a report generator, which summarizes the analysis for an administrator of the network. | 2012-08-16 |
20120210434 | Security countermeasure management platform - A management platform that allows security and compliance users to view risks and vulnerabilities in their environment with the added context of what other mitigating security countermeasures are associated with that vulnerability and that are applicable and/or available within the overall security architecture. Additionally, the platform allows users to take one or more actions from controlling the operation of a security countermeasure for mitigation purposes to documenting the awareness of a security countermeasure that is in place. | 2012-08-16 |
20120210435 | Web content ratings - A method of performing a security check at a user computer on web page content downloaded to the user computer over the Internet. The method includes retrieving rating information for the web page from a web service over the Internet, the rating information including one or more content ratings and a first signature generated from the content, using a specified algorithm, at substantially the same time as the or each content rating was determined. The downloaded web page content is then processed using said specified algorithm to generate a second signature, and said first and second signatures are compared and the differences therebetween quantified. It is then determined if the quantified difference exceeds a threshold value. If not, then the received content rating(s) is(are) trusted. If yes, then the result is reported to said web service. | 2012-08-16 |
20120210436 | SYSTEM AND METHOD FOR FINGERPRINTING IN A CLOUD-COMPUTING ENVIRONMENT - A system and method for uniquely fingerprinting an execution environment instance in a cloud-computing environment in which an application is assigned to the execution environment instance, and a license key is required for the application to access a desired licensed feature. The application requests a fingerprint certificate from a cloud infrastructure management unit via the application's execution environment instance. The management unit identifies the fingerprint assigned to the execution environment instance, digitally signs a fingerprint certificate, and assigns an expiration timestamp. An application programming interface (API) sends the signed certificate and timestamp back to the application. The application verifies the digital signature and the timestamp and utilizes the fingerprint certificate to request a license key from a licensing system. The licensing system verifies the fingerprint certificate before generating the license key, and the application verifies that the license key matches the fingerprint before accessing the licensed feature. | 2012-08-16 |
20120210437 | Method and system to enhance accuracy of a data leak prevention (DLP) system - A Data Loss Prevention (DLP) system is enhanced according to this disclosure by augmenting the information obtained from OS API hooking with “context” information obtained from other sources, such as by monitoring an endpoint's user interface (UI). In one embodiment, the additional “context” information is obtained from one or more user interface hooks that provide the DLP system with additional information, such as the contents of one or more application windows, the UI elements contained in a particular display window, window activation or deactivation, window resizing, user input, pointer operations, and the like. This UI information defines a “context” of the application, namely, its operating state (including, without limitation, its display state), and associated user actions that define that state. When a particular OS API hook is invoked by the application, the DLP solution uses the context information to make a more accurate enforcement decision, preferably based on the UI context. | 2012-08-16 |
20120210438 | Secure Three-Dimensional Mask-Programmed Read-Only Memory - Among all classes of three-dimensional read-only memory (3D-ROM), mask-programmed 3D-ROM (3Dm-ROM) is suitable for mass information dissemination. A secure 3Dm-ROM (3Dm-ROMS) comprises a 3Dm-ROM for storing mass information, a non-mask-programmed memory (NMP) for storing at least a key and an encryption logic. It provides strong copyright protection by writing different keys into different NMPs and encrypting the 3Dm-ROM contents with these different keys. | 2012-08-16 |
20120210439 | METHOD AND DEVICE FOR EXCERPT LICENSING - There are times when a first user may wish to distribute an excerpt of a protected digital content to a second user, for example for criticism. The protected digital content is divided into a plurality of parts, each part being encrypted using a control word specific for the part, wherein each control word can be generated from a master control word for the protected digital content. A device belonging to the first user selects the parts of the excerpt; generates the control words for the selected parts from the master control word; generates a license for the selected parts, the license comprising the control words for the selected parts; and transmits the selected parts and the license to the receiver of the second user. Also provided is the device of the first user. | 2012-08-16 |
20120210440 | INFORMATION PROCESSING DEVICE, INFORMATION RECORD MEDIUM MANUFACTURING DEVICE, INFORMATION RECORD MEDIUM, METHOD THEREFORE, AND COMPUTER PROGRAM - An information processing device for executing content reproduction processing includes: a content reproduction processing unit for executing data transformation processing for replacing a part of configuration data of input content to be reproduced with transformation data, and executing processing for reproducing the reproduction content; and a parameter generating unit for providing the content reproduction processing unit with a parameter to be applied in the data transformation processing; wherein the content reproduction processing unit has a configuration for obtaining a parameter identifier that is different for each segment set as a sectioning region of reproduction content, and outputting a parameter calculation request accompanied by the parameter identifier to the parameter generating unit; and wherein the parameter generating unit has a configuration for providing the content reproducing unit with a parameter corresponding to a segment, in response to the parameter calculation request from the content reproducing unit. | 2012-08-16 |
20120210441 | Software Protection Using an Installation Product Having an Entitlement File - Techniques for establishing entitlement to a computer program product are provided, and include providing a client identity in a registration process to produce an entitlement file, obtaining an encoded version of a computer program product, and transforming the computer program product into an installation product in a computer storage medium, wherein the installation product comprises the entitlement file to establish entitled use of the computer program product. Also, techniques for facilitating security compliance of a computer program product include providing an encoded version of a computer program product, and providing an installation product builder for the computer program product, wherein the installation product builder creates an installation product in a computer storage medium using a client identity and the encoded version of the computer program product during a registration process, and wherein the created installation product comprises an entitlement file to facilitate security compliance of the computer program product. | 2012-08-16 |
20120210442 | LICENSE MANAGEMENT SYSTEM, LICENSE MANAGEMENT DEVICE, AND COMPUTER-READABLE RECORDING MEDIUM HAVING LICENSE MANAGEMENT PROGRAM - A license management device includes a license identifier generator unit generating a license identifier and license information corresponding to a group of application programs, the license identifier associated with a group identifier of the group and the license information on the group, a group information storage unit storing the group identifier with a product identifier of each application program, a license information storage unit recording the license identifier corresponding to the group identifier with the product identifier of the application program, a determination unit determining, on receiving the license identifier associated with the application program, whether the received license identifier is recorded in the license information storage unit, and a sending unit sending via a network, if the received license identifier is recorded in the license information storage unit, a license file corresponding to the recorded license identifier to provide a permission to use the application program of the group. | 2012-08-16 |
20120210443 | SECURING AND MANAGING APPS ON A DEVICE - Apps are secured or security-wrapped either before they are downloaded onto a device, such as a smartphone or tablet device, or after they are downloaded but before they are allowed to access the device operating system and cause any potential damage to the device. An app provider, such as an employer or a cellphone provider, can secure its apps before consumers download an app from their app store or marketplace. The app is secured before it is allowed to access the operating system of the device, thereby preventing the app from malicious behavior. Core object code of the app is obtained and the digital signature is removed. App object code is substituted with security program object code, thereby creating a security-wrapped app. The security-wrapped app is prepared for execution on the device and is re-signed with a new key. | 2012-08-16 |
20120210444 | APPARATUS AND METHOD FOR RESTRICTING THE EXECUTION OF A PROGRAM - An attribute detector detects the attributes of a user of a program. A determining unit determines, based on the detected attribute of a user, whether the user is a superior user for whom usage restriction is not necessary or a subordinate user for whom the usage restriction is necessary, for a program of a first type. The program of the first type is a program appealing to the taste of the user and that is frequently run by the user for many hours. When the user is verified to be the subordinate user and also when the user has executed a program of a second type for a predetermined number of recommended executions, a permission/rejection determining unit permits the execution of the program of the first type. | 2012-08-16 |
20120210445 | Systems and Methods for Verifying the Authenticity of a Remote Device - Some embodiments of the invention are directed to, among other things, systems, computer readable media, methods and any other means for verifying the authenticity of a client device. In some embodiments, a token is issued by one or more remote media servers that allows the client device to download video, media or other data from one or more remote media servers. | 2012-08-16 |
20120210446 | SESSION-CONTROLLED-ACCESS OF CLIENT DATA BY SUPPORT PERSONNEL - A method for controlling access to client data by support providers is disclosed herein. In one embodiment, such a method includes initiating a session on a server computer in response to receipt of a request for assistance from a client, the session having client data associated therewith. A session key is generated for the session. The session key includes a session identifier and a support provider identifier corresponding to an assignee. The session key may further include a client identifier corresponding to the client. Requests to access the client data include an assignee key including a session identifier and a support provider identifier, and potentially a client identifier if needed. The assignee key is compared to the session key. If correspondence is found between the identifiers in the assignee key and the session key, access is granted. | 2012-08-16 |
20120210447 | Secure video download method - A method of movie distribution runs on a server accessible by a user desiring to look for a movie to download. After user authentication, the server retrieves a user's permissions list from storage. When it receives a request from the user to download the movie, it checks the permissions list to determine whether or not the user has permission to download the movie. If permitted, the server watermarks the video in a process involving segmenting the video and sends an integrated stream of watermarked-video over the network. When the user does not have permission, then the server requests personal details to gain permission. The server optionally checks if the user is accessing the server from the same Internet Protocol address as used in a previous access. If not, the server asks the user to prove that the user is the same user that has permission to access the server. | 2012-08-16 |
20120210448 | SYSTEM AND METHOD FOR ACCESSING PRIVATE DIGITAL CONTENT - A system, method and computer program product for providing access to private digital content are disclosed. The private digital content is owned by an owner and installed on a content server and access is provided to a first client which is capable of rendering said digital content. Predetermined information required for gaining authorized access to said content server by said first client is generated by a second client. The predetermined information is transferred from said second client to said first client then used by said first client to get access to said private digital content. | 2012-08-16 |
20120210449 | NOVEL TRANSPARENT ZEBRAFISH AND PREPARATION METHOD THEREOF - This invention provides a biological selective breeding technique in preparation of a transparent zebrafish, Citrine. The appearance of Citrine is transparent and yellowish, with uniformly pigmented black eyes and its inner organs are observable by eyes. The invention also provides a method for in vivo observation of progression and expansion of various disease stages or physiological processes. | 2012-08-16 |
20120210450 | Novel gene disruptions, compositions and methods relating thereto - The present invention relates to transgenic animals, as well as compositions and methods relating to the characterization of gene function. Specifically, the present invention provides transgenic mice comprising disruptions in PRO194, PRO220, PRO241, PRO284, PRO331, PRO354, PRO355, PRO533, PRO541, PRO725, PRO937, PRO1014, PRO1120, PRO1182, PRO1325, PRO1382, PRO1410, PRO1555, PRO1556, PRO1760, PRO1787, PRO1868, PRO4326, PRO4332, PRO4346, PRO4400, PRO6003, PRO6094, PRO6244, PRO9820, PRO9828, PRO10274, PRO16090, PRO19644, PRO21340, PRO92165, PRO85143, PRO1124, PRO1026 or PRO23370 genes. Such in vivo studies and characterizations may provide valuable identification and discovery of therapeutics and/or treatments useful in the prevention, amelioration or correction of diseases or dysfunctions associated with gene disruptions such as neurological disorders; cardiovascular, endothelial or angiogenic disorders; eye abnormalities; immunological disorders; oncological disorders; bone metabolic abnormalities or disorders; lipid metabolic disorders; or developmental abnormalities. | 2012-08-16 |
20120210451 | ISLET CELL SHEET, PROCESS FOR PRODUCTION THEREOF, AND USE THEREOF - A polymer that changes hydration at a temperature between 0 to 80° C. is coated on the surface of a cell culture support, and islet cells are cultured on the support at a temperature range that causes polymer to have weak hydration, then the temperature of a culture solution is changed to a temperature that causes the polymer to have strong hydration to obtain islet cells in a sheet form. Such islet cells in a sheet form have an insulin producing function even if there is no blood flow. | 2012-08-16 |
20120210452 | ALKOXYLATED NON-IONIC ALKANOL ADJUVANT FORMULATIONS AND METHODS FOR MAKING AND USING THE SAME - Embodiments include adjuvant formulations containing an alkoxylated alkanol adjuvant having the following alkanol structure: | 2012-08-16 |
20120210453 | PURPLE TRANSGENIC FLUORESCENT ORNAMENTAL FISH - The present invention relates to the method and use of fluorescent proteins in making purple transgenic fluorescent fish. Also disclosed are methods of establishing a population of such transgenic fish and methods of providing them to the ornamental fish industry for the purpose of marketing. Thus, new varieties of ornamental fish of different fluorescence colors from a novel source are developed. | 2012-08-16 |
20120210454 | BLUE TRANSGENIC FLUORESCENT ORNAMENTAL FISH - The present invention relates to transgenic blue ornamental fish, as well as methods of making such fish by in vitro fertilization techniques. Also disclosed are methods of establishing a population of such transgenic fish and methods of providing them to the ornamental fish industry for the purpose of marketing. | 2012-08-16 |
20120210455 | TOMATO VARIETY PICUS - The invention provides seed and plants of the tomato variety designated Picus. The invention thus relates to the plants, seeds and tissue cultures of tomato variety Picus and to methods for producing a tomato plant produced by crossing a plant of tomato variety Picus with itself or with another tomato plant, such as a plant of another variety. The invention further relates to seeds and plants produced by such crossing, and also relates to parts of a plant of tomato variety Picus including the fruit and gametes of such plants. The invention also relates to tomato variety FDS 14-2081, and to seeds and plants produced by crossing a plant of tomato variety FDS 14-2081 with itself or another tomato plant. The present invention is also directed to tomato variety FDS 14-2090, and to seeds and plants produced by crossing a plant of tomato variety FDS 14-2090 with itself or another tomato plant. | 2012-08-16 |
20120210456 | ENHANCEMENT OF PLANT YIELD, VIGOR AND STRESS TOLERANCE II - Altering the activity of specific regulatory proteins in plants, for example, with the use of heterologous repression domains fused to HY5 or STH2 clade proteins, can have beneficial effects on plant performance, including improved stress tolerance and yield. | 2012-08-16 |
20120210457 | NOVEL PLANT VARIETY OF HIGH FERTILITY XBRASSICORAPHANUS WITH STABILIZED SEED PRODUCTIVITY - The present invention relates to a method for breeding a novel plant variety of high fertility | 2012-08-16 |
20120210458 | Isolated Novel Nucleic Acid and Protein Molecules from Corn and Methods of Using Thereof - This disclosure provides purified nucleic acids and polypeptides and various uses of these sequences such as transcript profiling. Also provided are transgenic plants, seeds, and plant cells containing DNA for expression of the proteins that are useful for imparting enhanced agronomic trait(s) to transgenic crop plants, methods of making such plants and methods of making agricultural commodity including seeds and hybrid seeds from such plants. | 2012-08-16 |
20120210459 | Design and Implementation of Novel and/or Enhanced Bacterial Microcompartments for Customizing Metabolism - Herein is described a bacterial microcompartment catalog comprising a total of 634 gene sequences encoding bacterial microcompartments, the proteins of each can be inserted into a host organism and if needed, expressed using an inducible expression system. Disclosed are at least 32 types of gene clusters which provide microcompartments having metabolizing or other enzyme activity. The expression of these microcompartments can be used to provide or enhance an organism's carbon fixation and/or sequestration activity or biomass production or, generally speaking additional or enhanced metabolic activities to an organism. | 2012-08-16 |
20120210460 | NITRATE-RESPONSIVE PROMOTER - The present invention provides methods for screening for nitrate-regulated promoter and enhancer elements in plant cells. The present invention also provides expression cassettes that contain nitrate-regulated promoters operably linked to heterologous polynucleotide sequences. The expression cassettes of the present invention are useful for expressing polypeptides, proteins and nucleic acid molecules in plant cells treated with nitrates and nitrites. | 2012-08-16 |
20120210461 | GENERATING GENOTYPIC VARIATIONS IN PLANT GENOMES BY GAMETE INFECTION - A method of generating genotypic variation in a genome of a plant is disclosed. The method comprising introducing into a gamete or a gamete producing tissue of the plant at least one viral expression vector encoding at least one chimeric nuclease which comprises a DNA binding domain, a nuclease and a localization signal to a DNA-containing organelle, wherein the DNA binding domain mediates specific targeting of the nuclease to the genome of the plant, wherein the introducing is performed such that the gamete or gamete producing tissue expresses the chimeric nuclease but not all plant tissues express the chimeric nuclease, thereby generating genotypic variation in the genome of the plant. | 2012-08-16 |
20120210462 | SYNTHETIC INSECTICIDAL PROTEINS ACTIVE AGAINST CORN ROOTWORM - Traditionally, the primary method for impacting insect pest populations is the application of broad-spectrum chemical insecticides. However, there is increasing concern about the environmental hazards associated with the production and use of synthetic chemical pesticides. Thus, there is substantial interest in developing alternative pesticides, including biological control of insect pests of agricultural significance using a microbial agent or another species of insect. The present invention provides compositions and methods for such biological control. Modified Cry3 pesticidal polypeptides, polynucleotides encoding such polypeptides, and methods of use are disclosed. The modified polynucleotides provided herein can be used to transform organisms and cells of hosts comprising plant, insects, and microorganisms. The expression of modified polypeptides can provide the host with improved insecticidal activity against one or more insect pathogens. | 2012-08-16 |
20120210463 | Root-Preferred Promoter and Methods of Use - The present invention provides compositions and methods for regulating expression of heterologous nucleotide sequences in a plant. Compositions include a novel nucleotide sequence for a promoter for the gene encoding | 2012-08-16 |
20120210464 | INSECTICIDAL PROTEINS - Improved compositions and methods for controlling pests are disclosed. In particular, novel engineered Cry1Ba (eCry1Ba) proteins having improved toxicity to lepidopteran insect pests are provided. By substituting at least one amino acid in domain I of a Cry1Ba protein an engineered Cry1Ba protein having substantially altered insecticidal properties is designed. Further, a method of making the engineered Cry1Ba proteins and methods of using the ecry1Ba nucleic acid sequences, for example in transgenic plants to express eCry1B proteins to confer protection from insect damage are disclosed. | 2012-08-16 |
20120210465 | Production of Polyunsaturated Fatty Acids, Novel Biosynthesis Genes, And Novel Plant Expression Constructs - The present invention relates to a method for the production of unsaturated fatty acids with at least two double bonds. The invention furthermore relates to the use of nucleic acid sequences SEQ ID NO: 1, 3, 5, 9, and 11 encoding polypeptides having desaturase or elongase activity in the method and for generating a transgenic organism, preferably a transgenic plant or a transgenic microorganism, with an increased content of fatty acids, oils or lipids with unsaturated C | 2012-08-16 |
20120210466 | MAMMALIAN-TYPE GLYCOSYLATION IN PLANTS BY EXPRESSION OF NON-MAMMALIAN GLYCOSYLTRANSFERASES - The present invention relates to non-mammalian β-1,4-galactosyltransferases that can be used in their wild-type or in modified forms. The invention further relates to transformed plants and plant cells expressing non-mammalian β-1,4-galacto-syltransferase and methods to produce glycoproteins with altered and preferably mammalian-type glycosylation. The invention additionally provides nucleic acid molecules and expression vectors of non-mammalian β-1,4-galactosyltransferases. | 2012-08-16 |
20120210467 | PHOSPHOLIPASES, NUCLEIC ACIDS ENCODING THEM AND METHODS FOR MAKING AND USING THEM - In alternative embodiments, the invention provides phosphatidylinositol-specific phospholipase C (PI-PLC) enzymes, nucleic acids encoding them, antibodies that bind specifically to them, and methods for making and using them. Industrial methods and products comprising use of these phospholipases are also provided. In certain embodiments, provided herein are methods for hydration of non hydratable phospholipids (NHPs) within a lipid matrix. The methods enable migration of NHPs to an oil-water interface thereby allowing the NHPs to be reacted and/or removed from the lipids. In certain embodiments, provided is a method for removing NHPs, hydratable phospholipids, and lecithins from vegetable oils to produce a degummed oil or fat product that can be used for food production and/or non-food applications. In certain embodiments, provided herein are methods for hydration of NHPs followed by enzymatic treatment and removal of various phospholipids and lecithins. The methods provided herein can be practiced on either crude or water-degummed oils. | 2012-08-16 |
20120210468 | Novel method to generate commercially useful oils in algae - The present invention discloses a novel microalgae-based method, called Microalgae Genomics Technology™ (MaGT), which can be used to generate and improve oil/fatty acid production in microalgae, and revealed some examples of its potential applications. Specifically, this method utilizes microalgae genomics technology to manipulate the intrinsic oil/fatty acid metabolic pathways in the genomes of microalgae and therefore induce the algae to produce novel oils/fatty acids or increase the concentration of existing oils/fatty acids with a variety of commercial applications. | 2012-08-16 |
20120210469 | METHODS AND MEANS FOR OBTAINING MODIFIED PHENOTYPES - Methods and means are provided for reducing the phenotypic expression of a nucleic acid of interest in eukaryotic cells, particularly in plant cells, by providing aberrant, preferably unpolyadenylated, target-specific RNA to the nucleus of the host cell. Preferably, the unpolyadenylated target-specific RNA is provided by transcription of a chimeric gene comprising a promoter, a DNA region encoding the target-specific RNA, a self-splicing ribozyme and a DNA region involved in 3′ end formation and polyadenylation. | 2012-08-16 |
20120210470 | RED LETTUCE - The present invention relates to a head-forming lettuce plant of the species | 2012-08-16 |
20120210471 | Floribunda rose plant named 'Evanrat' - A new and distinct variety of Floribunda rose plant is provided that forms in abundance on a substantially continuous basis attractive double blossoms that are light pink in coloration. The buds are pointed and oval in configuration. The vegetation is strong and vigorous and a rounded and bushy growth habit is displayed. The ornamental foliage is dark green with a glossy upper surface and contrasts well with the light pink blossoms. The plant is particularly well suited for providing attractive ornamentation. | 2012-08-16 |
20120210472 | APPLE TREE NAMED 'MONALISA' - A new apple tree ( | 2012-08-16 |
20120210473 | APPLE TREE NAMED 'SOUTHFIELD' - A new and distinct apple variety is described. The variety results from a limb sport found in Nelson, New Zealand. The fruit of the apple tree of this new variety have an attractive appearance, with a high proportion of red coloration and areas of a darker red coloration in the form of a blush. This new variety is also characterised by an early harvest date and has been named ‘Southfield’. | 2012-08-16 |
20120210474 | STRAWBERRY PLANT NAMED 'JOLY' - A new and distinct variety of | 2012-08-16 |
20120210475 | Strawberry plant named 'Dely' - A new and distinct variety of | 2012-08-16 |
20120210476 | Strawberry plant named 'NABILA' - A new and distinct variety of | 2012-08-16 |
20120210477 | Strawberry plant named 'RANIA' - A new and distinct variety of | 2012-08-16 |
20120210478 | Strawberry plant named 'CAPRI' - A new and distinct variety of | 2012-08-16 |
20120210479 | Crapemyrtle plant named 'GAMAD IX' - A new and distinct cultivar of crapemyrtle, ‘GAMAD IX’, is provided. ‘GAMAD IX’ is a | 2012-08-16 |
20120210480 | Echinacea plant named 'Secret Romance' - A new and distinct | 2012-08-16 |
20120210429 | Adaptive Behavioral Intrusion Detection Systems and Methods - Systems and methods for analyzing historical network traffic and determining which traffic does not belong in a network are disclosed. Intrusion detection is performed over a period of time, looking for behavioral patterns within networks or information systems and generating alerts when these patterns change. The intrusion detection system intelligently forms correlations between disparate sources to find traffic anomalies. Over time, behaviors are predictive, and the intrusion detection system attempts to predict outcomes, becoming proactive instead of just reactive. Intrusions occur throughout whole information systems, including both network infrastructure and application servers. By treating the information system as a whole and performing intrusion detection across it, the chances of detection are increased significantly. | 2012-08-16 |
20120210430 | INTRUSION DETECTION USING A NETWORK PROCESSOR AND A PARALLEL PATTERN DETECTION ENGINE - An intrusion detection system (IDS) comprises a network processor (NP) coupled to a memory unit for storing programs and data. The NP is also coupled to one or more parallel pattern detection engines (PPDE) which provide high speed parallel detection of patterns in an input data stream. Each PPDE comprises many processing units (PUs) each designed to store intrusion signatures as a sequence of data with selected operation codes. The PUs have configuration registers for selecting modes of pattern recognition. Each PU compares a byte at each clock cycle. If a sequence of bytes from the input pattern match a stored pattern, the identification of the PU detecting the pattern is outputted with any applicable comparison data. By storing intrusion signatures in many parallel PUs, the IDS can process network data at the NP processing speed. PUs may be cascaded to increase intrusion coverage or to detect long intrusion signatures. | 2012-08-16 |