38th week of 2014 patent applcation highlights part 239 |
Patent application number | Title | Published |
20140283106 | DOMAIN PROTECTED MARKS LIST BASED TECHNIQUES FOR MANAGING DOMAIN NAME REGISTRATIONS - A facility comprising systems and methods for preventing or protecting against the registration of domain names that exactly match, contain, or are similar to a mark is provided. The facility maintains a data structure for recording strings that an entity, such as an individual, company, or other organization, has an interest in protecting, such as a domain name that exactly matches, contains, or is similar to a mark owned or held by the entity. In response to requests to register a domain name that includes a recorded string, the facility can prevent registration of that domain name even if the domain name is not registered. The facility may periodically share or publish the data structure with any number of domain name registrars or registries. In this manner, a mark holder can prevent or protect against registration of domain names under any number of top-level domains with a single request. | 2014-09-18 |
20140283107 | SECURE DATA MANAGEMENT - The disclosed subject matter includes a method. The method includes identifying an attempt to access, by an application instance running in a user space of an operating system, a first security zone of a computer readable medium, where the first security zone is associated with a first security level. The method further includes determining whether a restriction level associated with the application instance is higher than the first security level, where the restriction level is a function of previous security zones that have been accessed by the application instance. When the restriction level associated with the application instance is higher than the first security level, the method would prevent the application instance from writing to the first security zone. When the restriction level associated with the application instance is not higher than the first security level, the method would authorize the application instance to access the first security zone. | 2014-09-18 |
20140283108 | PROVIDING CONTENT ITEMS FROM ALTERNATE SOURCES - Systems and methods for providing content items to users. A computer system may provide to a first user an indication of a plurality of available content items. The computer system may receive from the first user an indication of a first content item selected from the plurality of content items. The computer system may determine whether a content provider service associated with the computer system is authorized to stream the first content item to the first user. When the content provider service is not authorized to stream the first content item to the first user, the computer system may identify an alternate source for the first content item. The computer system may initiate playback of the first content item to the first user from the alternate source. | 2014-09-18 |
20140283109 | USING A URI WHITELIST - A method and/or system for using a URI whitelist may include receiving a request to approve an application for release in an application store. The request may comprise application data. The application data may comprise a resource manifest and/or a Uniform Resource Identifier (URI) whitelist. The resource manifest may comprise, for example, one or more resource items. The URI whitelist may comprise, for example, one or more URI items. The request may be analyzed based on application data. A determination may be made whether the applications may be released in the application store based on the analyzing of the applications data. A request to access a particular URI may be received. A determination of whether to grant the request may be based on a resource manifest and/or a URI whitelist associated with the application. | 2014-09-18 |
20140283110 | USING A FILE WHITELIST - A method and/or system for using a file whitelist may include receiving a request to approve an application for release in an application store. The request may comprise application data. The application data may comprise a resource manifest and/or a file whitelist. The resource manifest may comprise, for example, one or more resource items. The file whitelist may comprise, for example, one or more file items. The request may be analyzed based on application data. A determination may be made whether the applications may be released in the application store based on the analyzing of the applications data. A request to access a particular file may be received. A determination of whether to grant the request may be based on a resource manifest and/or a file whitelist associated with the application. | 2014-09-18 |
20140283111 | SPATIAL SECURITY FOR STORED DATA - Systems and methods of providing spatial security of data stored on a hard disk drive. A method includes associating a user with at least one track and/or sector of the hard disk drive. The method also includes locking the at least one track and/or sector as a default setting. The method additionally includes determining the user has moved into a predefined area. The method further includes unlocking the at least one track and/or sector based on the determining the user has moved into the predefined area. | 2014-09-18 |
20140283112 | Operating a Computer with a Touchscreen - Disclosed are computers and methods of operating those computers. In the methods, a computer in a touch lock state displays a lock screen image showing a cover layer superimposed over, and obscuring, a background layer. A user enters a touch input to a touch screen of the computer, thereby specifying a portion of that touchscreen. The lock screen image is then modified so that the cover layer does not obscure the background layer in the specified portion of the touchscreen. The cover layer in the region of the touchscreen that is not specified in the touch input continues to obscure the background layer in those regions. If the portion of the touchscreen specified by the touch input exceeds a threshold amount the computer may be changed from being in a touch lock state to being in a touch unlock state. | 2014-09-18 |
20140283113 | EFFICIENT PREVENTION OF FRAUD - This disclosure is directed to methods and systems for managing difficulty of use and security for a transaction. A transaction manager operating on a computing device may determining a range of possible steps for a transaction comprising security measures available for the transaction. The transaction manager may identify a threshold for a security metric to be exceeded for authorizing the transaction, the security metric to be determined based on performance of steps selected for the transaction. The transaction manager may select for the transaction at least one step from the range of possible steps, based on optimizing between (i) a difficulty of use quotient of the transaction from subjecting a user to the at least one step, and (ii) the security metric relative to the determined threshold. | 2014-09-18 |
20140283114 | RIGHTS MANAGEMENT FOR CONTENT AGGREGATORS - An arbitrator receives a request to use a plurality of content in an aggregation. The arbitrator determines whether there exist proper rights to use the plurality of content in the aggregation. The requestor is communicated whether permission is granted. The determination may include negotiating for extending right of use by an arbitrator. This negotiation may communicate with content hosting service(s) or the content author(s). The determining step retrieves, stores, and maintains rights information to and from an information store which is accessible by the rights management system. | 2014-09-18 |
20140283115 | METHOD AND SYSTEM FOR MONITORING ACCESS ATTEMPTS OF SHARED MEMORY OF DATABASES - An approach for auditing database access attempts within a computer system. In one implementation, the computer system provides a target server for directing client requests for database access to the target server. In another implementation, the computer system provides a plurality of filtering agents which intercept the client requests and each filtering agent forwards a respective set of client requests which match a respective filter profile to a processing entity. | 2014-09-18 |
20140283116 | METHOD FOR PROTECTED EXECUTION OF CODE AND PROTECTION OF EXECUTABLE CODE AND DATA AGAINST MODIFICATIONS - A method for an automated protection of a programmable code and data without using dedicated components for calculation of the checksums and/or hash values is provided. Execution of each machine instruction uses data from several small blocks of protected code or data. Each of the blocks can be used in forming several machine instructions. If an intruder changes even one of the code blocks or data, it results in incorrect decoding of several machine instructions. Thus, the entire application does not work correctly. The intruder cannot neutralize a code protection mechanism. | 2014-09-18 |
20140283117 | PROTECTION UNIT AND METHOD FOR CONTROLLING ACCESS BY PLURAL PROCESSES TO A STORAGE UNIT - A data processing apparatus is provided, comprising plural processing units configured to execute plural processes, a storage unit configured to store data required for the plural processes; and a protection unit configured to control access by the plural processes to the storage unit. The protection unit is configured to define an allocated access region of the storage unit for each process of the plural processes, wherein the protection unit is configured to deny access for each the process outside the allocated access region and wherein allocated access regions are defined to be non-overlapping. The protection unit is configured to define each allocated access region as a contiguous portion of the storage unit between a lower region limit and an upper region limit, and the protection unit is configured such that when the lower region limit is modified the lower region limit cannot be decreased and such that when the upper region limit is modified the upper region limit cannot be decreased. | 2014-09-18 |
20140283118 | OS Security Filter - A system and method for protecting against the unauthorized use of operating system level commands is disclosed. The system includes a computer module including: a processor configured for performing data operations; a memory unit configured to store instructions executable by the processor; and an operating system module for supporting basic functions of the computer module, such as scheduling tasks, executing applications, and controlling peripherals. A virtual keyboard is connected to the computer module for creating one or more events or sequences of events recognizable by the operating system module. A system level command filter module is provided for filtering system level commands from the one or more recognizable events or sequences of events. | 2014-09-18 |
20140283119 | Tiered Access to On Chip Features - In accordance with some embodiments, multiple blind debug passwords are provided. Each of a plurality of interested entities may have its own password and each password may unlock a specific set of features offered by an integrated circuit. In some embodiments each entity does not know the other passwords of the other entities. Potentially interested entities include an integrated circuit end customer, the original equipment manufacturer, the entity that provided the features to the integrated circuit and a conditional access provider. All debug features may be controlled solely via access to the debug tiers which are accessed by multiple debug passwords. Lower tier passwords are required in order to access higher tiers. Debug features may be separated into multiple tiers with more intrusive access requiring multiple debug passwords in order to gain access. | 2014-09-18 |
20140283120 | Methods And Systems For Managing Data Assets - Methods and systems for managing data assets and rights thereto are disclosed. One method can comprise generating an access token representing access rights of one or more users or device. A request for access to data can be received from the one or more users and the request can be granted or denied based upon the access rights of the one or more users. The access token can be modified based upon granting or denying the request. | 2014-09-18 |
20140283121 | Computer Systems and Methods for Capturing Electronic Service Requests and Responses - A system and method for capturing electronic service requests and responses are disclosed. According to one aspect, the system is configured to monitor and/or capture electronic service requests and responses. Service providers and/or consumers may provide information that is utilized to determine an accessibility level that is to be associated with the electronic service requests and responses. The accessibility level may then be stored and/or associated with the electronic service request and/or response data for subsequent use by a user who meets the defined access criteria in order to derive valuable information from the electronic service request and response data that is stored. In some embodiments, a tiered architecture of access may be utilized to allow different users access to different types of service request and response data. | 2014-09-18 |
20140283122 | DELIVERING AUTHOR SPECIFIC CONTENT - Delivering author specific content includes identifying author specific content with tags inserted into its metadata across multiple online resources and delivering updates about the author specific content to a user specified activity stream. | 2014-09-18 |
20140283123 | METHODS AND SYSTEMS FOR DETECTING, VERIFYING, PREVENTING AND CORRECTING OR RESOLVING UNAUTHORIZED USE OF ELECTRONIC MEDIA CONTENT - A method of detecting, verifying, preventing and correcting or resolving unauthorized use of electronic media content. In one embodiment, the method comprises providing an electronic system that allows auditors to register to audit the use of electronic media content, providing the auditors with information through the electronic system regarding a unique identifier that identifies one or more items of electronic media content, owners of electronic media content or other intellectual property or users who have subscribed to the use of electronic media content, obtaining information from auditors through the electronic system regarding unauthorized use of the electronic media content and verifying that the information received from auditors is complete. | 2014-09-18 |
20140283124 | Method for Managing Access to Documents Protected by Digital Rights Management - A method for managing user access of a document protected by digital rights management (DRM), includes the steps of a server checking whether a user who is attempting to access a DRM-protected document has necessary rights to access the document, the server denying the user's access to the document if the user does not have the necessary rights to access the document, the server providing, if the user does not have the necessary rights to access the document, the user with an instant and pre-prepared prompt containing a unique identification (ID) of the document to direct and assist the user to complete required tasks for acquiring rights to the document, and upon completion of the required tasks by the user, the server granting the necessary rights to the user to access the document. | 2014-09-18 |
20140283125 | FACIAL RECOGNITION-BASED INFORMATION DISCOVERY - A system and method thereof for control, by a user, regarding information made publicly available about the user to authorized services and/or applications based on an image of the face of the user. A system and method thereof for obtaining user-related information based on facial recognition. | 2014-09-18 |
20140283126 | Managing Privacy For User-Generated Lists In An Online System - A user of a social networking system creates a list of objects and associates the list with a list privacy level identifying the list's accessibility to other social networking system users. For example, the list privacy level indicates other social networking system users capable of accessing the list. For example, a user creates a list including other users and associates a list privacy level with the list. Hence, the user may specify a privacy level of subsequently posted content so that users included on the list, but not other users, may access the posted content. | 2014-09-18 |
20140283127 | Masking sensitive data in HTML while allowing data updates without modifying client and server - The principal object of this embodiment is to propose a method and system for masking sensitive data in web applications while allowing data updates without modifying client and server by intercepting the data live at HTTP/HTTPS network layer, improving the data security of data, providing authorized and restricted access for visibility of information to the users. | 2014-09-18 |
20140283128 | Specifying Applications to Share in a Shared Access Mode - Some embodiments of the invention provide a mobile device with multiple access modes. The device in some embodiments has at least two access modes, a primary access mode and a secondary access mode, that provide different restrictions for accessing the applications and/or data that are stored on the device. In some embodiments, the primary access mode of the device provides unfettered access to all of the device's applications and/or data that are available to a user, while its secondary access mode provides access to a limited set of applications and/or data that are stored on the device. In some embodiments, the device provides tools to select applications for the secondary access mode. | 2014-09-18 |
20140283129 | METHOD, SYSTEM, AND DEVICE FOR PROVIDING A MARKET FOR DIGITAL GOODS - A system includes one or more processors and computer-readable storage media storing instructions executable by a processor to storing a digital good in a cloud data store that is accessible by a user devices associated with a first user and a second user through their respective accounts. When a request to transfer the access rights to the digital good from the account of the first user to the account of a second user, the transfer of the access rights to the digital good is authorized based on satisfaction of one or more business rules and the access rights are transferred from the account of the first user to the account of the second user while said digital good remains in said cloud data store. The access rights are deleted from the account of the first user. | 2014-09-18 |
20140283130 | MEDIA MANAGEMENT SYSTEM - A method for managing media content may include converting an artistic item on a hard-copy media implementation to a digital media file. The method may include receiving a request from a first user to borrow the digital media file. The method may also include determining whether an access right of the digital media file is available. Responsive to determining that the access right of the digital media file is available, the method may further include determining a loan term for loaning the digital media file to the first user. The method may include granting the access right of the digital media file to the first user during the loan term. The method may also include authorizing the first user access to the digital media file during the loan term. | 2014-09-18 |
20140283131 | Assignment of Security Contexts to Define Access Permissions for File System Objects - A system and method are provided for restricting various operations in a file system based on security contexts. An object security context including permissible roles and defining a set of access permissions associated with each of the permissible roles is assigned to a file system object. A user security context is assigned to a user based on authentication information from the user, and the user security context identifies a user role for the user. An executable security context is assigned to an executable program. When the user has launched the executable program, a process is created and assigned the user security context and the executable security context. Responsive to the process attempting to access the file system object, at least one of the user security context and executable security context is verified against the object security context to determine if the attempted access should be allowed. | 2014-09-18 |
20140283132 | COMPUTING APPLICATION SECURITY AND DATA SETTINGS OVERRIDES - Provided are techniques for receiving a first request from a first application for a particular data element; making a determination, with respect to the first request, of whether or not to provide access to the particular data element to the first application; and in response to a determination to provide access to the first application, providing the first application with access to the particular data element; and in response to a determination not to provide access to the first application, providing the first application access to a first dummy data element. | 2014-09-18 |
20140283133 | CODE-ENABLED REMOTE ACTIVATION OF SOFTWARE FOR INDUSTRIAL AUTOMATION SYSTEMS - Systems, methods, and software for enabling software for industrial automation systems and equipment are provided herein. In one example, a non-transitory computer readable medium having stored thereon program instructions executable by a computing device is presented. When executed by the computing device, the program instructions direct the computing device to receive a request for enabling use of software for an industrial control device, identify a code capable of enabling the software based at least in part on the request, and communicate the code to a user to use to enable the software for the industrial control device. | 2014-09-18 |
20140283134 | Device and Method for Asset Protection Scheme - A device and method for an asset protection scheme includes receiving, by a data chunk serving server, a first request for an asset from a client device; transmitting, by the data chunk serving server, a plurality of data chunks to the client device, each of the data chunks corresponding to a portion of the asset; receiving, by a key serving server, a second request for key data from the client device, the key data corresponding to data removed from the asset to create the plurality of data chunks, wherein the plurality of data chunks and the key data correspond to an entirety of the asset; and transmitting, by the key serving server, the key data to the client device. | 2014-09-18 |
20140283135 | Mobile Computing Device with Multiple Access Modes - Some embodiments of the invention provide a mobile device that restricts access to its applications. The mobile device, displays, on the device's touch screen display, a lock screen page for accessing the device in a primary access mode or a secondary access mode. The primary access mode provides access to several of the device's applications, and the secondary access mode provides access to a limited set of the applications. The mobile device receives a touch input on the lock screen page to access the device in the secondary access mode. The mobile device unlocks the device to the secondary access mode by allowing access to the set of applications and restricting access to the remaining applications in the plurality of applications. | 2014-09-18 |
20140283136 | SYSTEMS AND METHODS FOR SECURING AND LOCATING COMPUTING DEVICES - Methods and systems are provided for identifying a computing device and/or the user of such a device and granting or prohibit access to one or more devices based on the location of the computing device. User devices include receivers and emitters for localization signals, and behavior of user devices or user interaction devices are modified according to received localization signals. Example systems may provide tracking media streaming to local devices, automatic configuration of transmitters, or adaptation of multi-user interactions based on user location. | 2014-09-18 |
20140283137 | MEDIA SERVICE DELIVERY SYSTEM PROVIDING CONDITIONAL ACCESS TO MEDIA CONTENT FROM VARIOUS CLIENT DEVICES - A system for protecting the digital rights of content owners allows digital media to be delivered to only those media rendering client devices that have been approved for the media content. Before delivering requested media, the media service provider may determines whether the media rendering client device that requested the media is the type of device that is authorized to receive the request media. If it is, the media service provider may transmit the media to a middleman server over a network (such as the Internet). A middleman server may then serves the media to the client device over a local network. By allowing the media content to be distributed to approved devices only, the media service provider can prevent a user from using the media in a way that is not authorized by the content owner. | 2014-09-18 |
20140283138 | Secure Data Sharing With Publicly Accessible Computing Nodes - An embodiment of the invention includes determining a first security status for first information and a second security status for second information, the second security status being more secure than the first security status; establishing a first communication path between the system and a first local computing node via a first wireless path; conveying the first information to the first local computing node via the first wireless path based on the first security status; and withholding the second information from the first local computing node based on the second security status; wherein the first and second information are stored on at least one of the system and a remotely located computing node. Other embodiments are described herein. | 2014-09-18 |
20140283139 | SYSTEMS AND METHODS FOR PARSING USER-GENERATED CONTENT TO PREVENT ATTACKS - The present invention relates to systems and methods for parsing of a token stream for user generated content in order to prevent attacks on the user generated content. The systems and methods include a database which stores one or more whitelists, and a parser. The parser removes tokens from the token stream by comparing the tokens against the whitelist. Next, the parser validates CSS property values, encodes data within attribute values and text nodes, reconciles closing HTML tags, and coerces media tags into safe variants. The tokens removed may be any of HTML tags, HTML attributes, HTML protocols, CSS selectors and CSS properties. | 2014-09-18 |
20140283140 | DIGITAL MEDIA CONTENT MANAGEMENT APPARATUS AND METHOD - A digital media content management apparatus and method for securely storing a content file on a computer readable medium and playing the content file from the computer readable medium is disclosed. The content file comprises control information readable by a content player and payload information including content data. The content file is deconstructed into at least one control information portion and at least one payload information portion being undetectable to a content player of a user device. The control information portion and the payload information portion are separately stored, and at least one of the portions is associated with packing data, and the packing data associated with at least one of the portions comprises a reference to the location of the other portion. | 2014-09-18 |
20140283141 | Switching a Mobile Device from Operating in a Primary Access Mode to a Secondary Access Mode - Some embodiments of the invention provide a mobile device with multiple access modes. The device in some embodiments has at least two access modes, a primary access mode and a secondary access mode, that provide different restrictions for accessing the applications and/or data that are stored on the device. In some embodiments, the primary access mode of the device provides unfettered access to all of the device's applications and/or data that are available to a user, while its secondary access mode provides access to a limited set of applications and/or data that are stored on the device. | 2014-09-18 |
20140283142 | Analyzing Applications for Different Access Modes - Some embodiments of the invention provide a mobile device with multiple access modes. The device in some embodiments has at least two access modes, a primary access mode and a secondary access mode, that provide different restrictions for accessing the applications and/or data that are stored on the device. In some embodiments, the mobile device automatically selects applications to share or keep private based metadata associated with the applications. | 2014-09-18 |
20140283143 | SOFTWARE APPLICATION FOR MANAGING PRODUCT MANUALS - Methods, systems, and computer-readable medium for managing product manuals. One system includes an electronic device that is configured to download a product manual from a server, store the product manual to non-transitory computer-readable medium included in the electronic device, and associate an authentication period with the product manual. The electronic device is also configured to receive a request to display the product manual from a user and, in response to the request, display the product manual to the user when the authentication period has not expired. In addition, the electronic device is configured to automatically delete product manual from the non-transitory computer-readable medium when the authentication period has expired. | 2014-09-18 |
20140283144 | ENVIRONMENTAL MONITORING DEVICE - An environmental monitoring device that monitors the operation of a legacy electronic device is described. In particular, a sensor in the environmental monitoring device provides sensor data that represents an environmental condition in an external environment that includes the environmental monitoring device. This environmental condition is associated with the operation of the legacy electronic device in the external environment. The environmental monitoring device analyzes the sensor data and provides feedback about the operation of the legacy electronic device based on the analyzed sensor data. Moreover, the sensor provides the sensor data without or excluding communication and/or electrical coupling between the environmental monitoring device and the legacy electronic device. In this way, the environmental monitoring device facilitates monitoring, analysis and feedback of the sensor data without directly interacting with the legacy electronic device. | 2014-09-18 |
20140283145 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PREVENTING ACCESS TO DATA WITH RESPECT TO A DATA ACCESS ATTEMPT ASSOCIATED WITH A REMOTE DATA SHARING SESSION - A system, method, and computer program product are provided for preventing access to data associated with a data access attempt. In use, a data access attempt associated with a remote data sharing session is identified. Further, access to the data is prevented. | 2014-09-18 |
20140283146 | TAMPER SENSOR - A deformable tamper sensor and tamper resistant electronic system is operable to detect opening of an enclosure and perform actions responsive to the detection. Movable elements within the tamper sensor are held in position when the sensor is compressed and define a multi-bit sensor value. Transitioning the sensor from a compressed to a non-compressed state non-destructively provides a new sensor value through movement of one or more elements. | 2014-09-18 |
20140283147 | Methods And Systems For Preventing Hardware Trojan Insertion - Provided are methods and systems for preventing hardware Trojan insertion. An example method can comprise determining unused space in an integrated circuit (IC), selecting a plurality of built-in self-authentication (BISA) filler cells based on the determined unused space, and placing the selected plurality of BISA filler cells onto the unused space. The plurality of BISA filler cells can be connected to form a plurality of BISA blocks. The plurality of BISA blocks can correspond to a plurality of signatures. A modification of one or more BISA filler cell can lead to an alteration of one or more signatures. | 2014-09-18 |
20140283148 | FLYING WIREBONDS FOR CREATING A SECURE CAGE FOR INTEGRATED CIRCUITS AND PATHWAYS - A system and method for disposing one or a plurality of flying sense electrode segments so as to physically cover integrated circuits, circuit pathways and other components on at least one circuit board to physically secure the circuits, pathways and components from probes or data interception. | 2014-09-18 |
20140283149 | In Vivo Cellular Screening Methods and Compositions for Modeling and Treating Nervous System Dysfunction - Described herein are methods and composition for identifying agents that modulate nerve regeneration in vivo in extended third instar (ETI) | 2014-09-18 |
20140283150 | Animal Models and Therapeutic Molecules - The invention discloses methods for the generation of chimaeric human-non-human antibodies and chimaeric antibody chains, antibodies and antibody chains so produced, and derivatives thereof including fully humanised antibodies; compositions comprising said antibodies, antibody chains and derivatives, as well as cells, non-human mammals and vectors, suitable for use in said methods. | 2014-09-18 |
20140283151 | COMPOSITIONS AND METHODS FOR DIAGNOSIS OF GENETIC SUSCEPTIBILITY, RESISTANCE, OR TOLERANCE TO INFECTION BY MYCOBACTERIA AND BOVINE PARATUBERCULOSIS USING PROMOTER VARIANTS OF EDN2 - Provided are methods for determining susceptibility, resistance or tolerance to | 2014-09-18 |
20140283152 | METHOD FOR ARTIFICIAL SELECTION - The present invention provides methods of determining the breeding value of an individual or determining the best pair of individuals to mate based on additive and non-additive factors. The invention further provides methods of breeding an individual selected by using a molecular marker-derived matrix comprising additive and non-additive effects. The invention also provides a kit for determining the Estimated Breeding Value of an individual. | 2014-09-18 |
20140283153 | TRANSGENIC ANIMALS AND METHODS OF USE - This invention relates to transgenic vertebrates, and more specifically to transgenic vertebrates for the development of human therapeutics. | 2014-09-18 |
20140283154 | TRANSGENIC INSECT CELLS COMPRISING A BACTERIAL GLCNAC-6-P 2PRIME-EPIMERASE - The present invention relates to methods of facilitating the expression of recombinant polypeptides from cells, extracellular fluids, extracellular fibers, or any combination thereof, obtained from transgenic insect cells and larvae comprising a bacterial GlcNAc-6-P 2′-epimerase (GNPE), which is capable of converting N-acetyl-D-glucosamine-6-phosphate (GlcNAc-6-P) to N-acetyl-D-mannosamine-6-phosphate (ManNAc-6-P). The invention relates to methods to promote efficient glycoconjugate sialylation, by providing simpler ways to produce large intracellular pools of sialic acid precursors. The invention is also directed to nucleic acids, vectors, and cells comprising nucleic acids encoding polypeptides involved in the synthesis of sialic acid precursors, and cells in combination with nucleic acids encoding glycosyltransferases, including sialyltransferases, to facilitate the production of humanized recombinant glycoproteins. The engineered cells can be used to produce glycosylated proteins lepidopteran insects and cultured cell lines derived from | 2014-09-18 |
20140283155 | REPRESSIBLE LETHAL SYSTEM FOR REGULATING INSECT POPULATIONS - Disclosed herein are components, systems and methods for regulating population of multicellular organisms, for example insects. | 2014-09-18 |
20140283156 | TRANS-SPLICING RIBOZYMES AND SILENT RECOMBINASES - The present invention provides a trans-splicing ribozyme comprising i) a targeting nucleotide sequence that is complementary to a target nucleotide sequence within a mRNA that is expressed in a cell; contiguous with ii) a catalytic RNA sequence; contiguous with iii) a donor transcript, which donor transcript comprises at least a nucleotide sequence that encodes a trans-activator, wherein when the trans-splicing ribozyme is expressed in a cell, the catalytic RNA sequence cleaves the mRNA and ligates the donor transcript to the mRNA to generate a spliced mRNA which comprises the donor transcript, such that the donor transcript is translated as part of the spliced mRNA in the cell, as well as methods of using the trans-splicing ribozyme. The present invention also provides variants of Cre and other recombinases, as well as method of using the variants. | 2014-09-18 |
20140283157 | LIPOPROTEIN-ASSOCIATED PHOSPHOLIPASE A2 ANTIBODY COMPOSITIONS AND METHODS OF USE - The invention provides isolated anti-Lp-PLA2 antibodies that bind to Lp-PLA2. The invention also encompasses compositions comprising an anti-Lp-PLA2 antibody. These compositions can be provided in an article of manufacture or a kit. Another aspect of the invention is an isolated nucleic acid encoding an anti-Lp-PLA2 antibody, as well as an expression vector comprising the isolated nucleic acid. Also provided are cells that produce the anti-Lp-PLA2 antibodies. The invention encompasses a method of producing the anti-Lp-PLA2 antibodies. Other aspects of the invention are a method of detecting an Lp-PLA2 in a subject. | 2014-09-18 |
20140283158 | Rodents With Conditional Acvr1 Mutant Alleles - A genetically modified mouse is provided that comprises a conditional Acvr | 2014-09-18 |
20140283159 | LETTUCE VARIETY 'E01L30144' - A new lettuce variety designated ‘E01L30144’ is described. ‘E01L30144’ is a cutting lettuce variety exhibiting stability and uniformity. | 2014-09-18 |
20140283160 | LOBLOLLY PINE TREE NAMED '01PM0038' - A new and distinct variety of loblolly pine tree named ‘01PM0038’, particularly characterized by high rust resistance, uniform, rapid growth, stem straightness and moderate branch angle. | 2014-09-18 |
20140283161 | LETTUCE VARIETY 'ARROYO' - A new lettuce variety designated ‘Arroyo’ is described. ‘Arroyo’ is a romaine lettuce variety exhibiting stability and uniformity. | 2014-09-18 |
20140283162 | METHOD FOR PRODUCING A EUPHORBIA INTERSPECIFIC HYBRID PLANT WITH RED BRACTS AND NON-FUNCTIONAL SMALL CYATHIA - The present invention relates to | 2014-09-18 |
20140283163 | WATERMELON VARIETIES - The present invention relates to methods of producing unique varieties of triploid watermelon with diverse rind patterning. More specifically, a new watermelon variety designated ‘Harvest Moon’ is described. ‘Harvest Moon’ is a seedless, spotted watermelon variety with improved flesh quality and deeper red color than traditional spotted watermelon varieties. | 2014-09-18 |
20140283164 | SSC INDUCTION IN VITIS MUSCADINIA - This invention relates to a method for introgressing a form of seedlessness, viz. stenospermocarpy (SSC) from subgenus | 2014-09-18 |
20140283165 | DEVELOPMENT OF TOBACCO VARIETIES WITH NO OR SIGNIFICANTLY REDUCED ANATABINE CONTENT - A process for producing a reduced tobacco-specific nitrosamine (TSNA) tobacco plant comprising reducing and/or eliminating anatabine biosynthesis in wild-type tobacco plant. In addition, use of such plants for discovery of molecular markers that are closely linked with genes required for anatabine biosynthesis and for discovery of genes required for anatabine biosynthesis. In addition, a smoking composition, a smoking article and a smokeless tobacco oral delivery product contain the tobacco material. | 2014-09-18 |
20140283166 | CREATION AND TRANSMISSION OF MEGALOCI - The current invention provides methods for creating a block of genetically linked transgenic traits or a megalocus that can be transmitted as a single genetic unit. The present invention further provides methods for trait introgression to other plants, varieties or species using the megaloci of the invention. Also provided are plants, seeds, and plant parts comprising the megaloci. | 2014-09-18 |
20140283167 | HYBRID PEPPER 'E20S12779' - A hybrid pepper designated ‘E20S12779’ is disclosed. The invention relates to the seeds of hybrid pepper ‘E20S12779’ to the plants of hybrid pepper ‘E20S12779’ and to methods for producing a hybrid plant, and to methods for producing other pepper lines, cultivars or hybrids derived from the hybrid pepper ‘E20S12779’. | 2014-09-18 |
20140283168 | SOYBEAN CULTIVAR OW1113014 - The present invention is in the field of soybean variety OW1113014 breeding and development. The present invention particularly relates to the soybean variety OW1113014 and its progeny, and methods of making OW1113014. | 2014-09-18 |
20140283169 | SOYBEAN CULTIVAR HI1016703-1 - The present invention is in the field of soybean variety HI1016703-1 breeding and development. The present invention particularly relates to the soybean variety HI1016703-1 and its progeny, and methods of making HI1016703-1. | 2014-09-18 |
20140283170 | SOYBEAN CULTIVAR HI1016703-2 - The present invention is in the field of soybean variety HI1016703-2 breeding and development. The present invention particularly relates to the soybean variety HI1016703-2 and its progeny, and methods of making HI1016703-2. | 2014-09-18 |
20140283171 | SOYBEAN CULTIVAR HI1019014-1 - The present invention is in the field of soybean variety HI1019014-1 breeding and development. The present invention particularly relates to the soybean variety HI1019014-1 and its progeny, and methods of making HI1019014-1. | 2014-09-18 |
20140283172 | SOYBEAN CULTIVAR BY1113148 - The present invention is in the field of soybean variety BY1113148 breeding and development. The present invention particularly relates to the soybean variety BY1113148 and its progeny, and methods of making BY1113148. | 2014-09-18 |
20140283173 | SOYBEAN CULTIVAR HI1110907 - The present invention is in the field of soybean variety HI1110907 breeding and development. The present invention particularly relates to the soybean variety HI1110907 and its progeny, and methods of making HI1110907. | 2014-09-18 |
20140283174 | SOYBEAN CULTIVAR NE0912640 - The present invention is in the field of soybean variety NE0912640 breeding and development. The present invention particularly relates to the soybean variety NE0912640 and its progeny, and methods of making NE0912640. | 2014-09-18 |
20140283175 | SOYBEAN CULTIVAR NE1115163 - The present invention is in the field of soybean variety NE1115163 breeding and development. The present invention particularly relates to the soybean variety NE1115163 and its progeny, and methods of making NE1115163. | 2014-09-18 |
20140283176 | SOYBEAN CULTIVAR AR1111663 - The present invention is in the field of soybean variety AR1111663 breeding and development. The present invention particularly relates to the soybean variety AR1111663 and its progeny, and methods of making AR1111663. | 2014-09-18 |
20140283177 | SOYBEAN CULTIVAR AR1111926 - The present invention is in the field of soybean variety AR1111926 breeding and development. The present invention particularly relates to the soybean variety AR1111926 and its progeny, and methods of making AR1111926. | 2014-09-18 |
20140283178 | SOYBEAN CULTIVAR WN1013689-1 - The present invention is in the field of soybean variety WN1013689-1 breeding and development. The present invention particularly relates to the soybean variety WN1013689-1 and its progeny, and methods of making WN1013689-1. | 2014-09-18 |
20140283179 | SOYBEAN CULTIVAR WN1013689-2 - The present invention is in the field of soybean variety WN1013689-2 breeding and development. The present invention particularly relates to the soybean variety WN1013689-2 and its progeny, and methods of making WN1013689-2. | 2014-09-18 |
20140283180 | SOYBEAN CULTIVAR WN1116259 - The present invention is in the field of soybean variety WN1116259 breeding and development. The present invention particularly relates to the soybean variety WN1116259 and its progeny, and methods of making WN1116259. | 2014-09-18 |
20140283181 | SOYBEAN CULTIVAR WN1118256 - The present invention is in the field of soybean variety WN1118256 breeding and development. The present invention particularly relates to the soybean variety WN1118256 and its progeny, and methods of making WN1118256. | 2014-09-18 |
20140283182 | INBRED CORN LINES IL3, CB26, CB27, II13, ML22, MM46, AND MM69 - Inbred corn lines, designated IL3, CB26, CB27, II13, ML22, MM46, and MM69, are disclosed. The invention relates to the seeds of inbred corn lines IL3, CB26, CB27, II13, ML22, MM46, and MM69, to the plants and plant parts of inbred corn lines IL3, CB26, CB27, II13, ML22, MM46, and MM69 and to methods for producing a corn plant, either inbred or hybrid, by crossing inbred corn lines IL3, CB26, CB27, II13, ML22, MM46, and MM69 with itself or another corn line. The invention also relates to products produced from the seeds, plants, or parts thereof, of inbred corn lines IL3, CB26, CB27, II13, ML22, MM46, and MM69 and/or of the hybrids produced using the inbred as a parent. The invention further relates to methods for producing a corn plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other inbred corn lines derived from inbred corn lines IL3, CB26, CB27, II13, ML22, MM46, and MM69. | 2014-09-18 |
20140283183 | INBRED CORN LINES MM59, CB26, CB27, II13, ML22, MM46, AND MM69 - Inbred corn lines, designated MM59, CB26, CB27, II13, ML22, MM46, and MM69, are disclosed. The invention relates to the seeds of inbred corn lines MM59, CB26, CB27, II13, ML22, MM46, and MM69, to the plants and plant parts of inbred corn lines MM59, CB26, CB27, II13, ML22, MM46, and MM69 and to methods for producing a corn plant, either inbred or hybrid, by crossing inbred corn lines MM59, CB26, CB27, II13, ML22, MM46, and MM69 with itself or another corn line. The invention also relates to products produced from the seeds, plants, or parts thereof, of inbred corn lines MM59, CB26, CB27, II13, ML22, MM46, and MM69 and/or of the hybrids produced using the inbred as a parent. The invention further relates to methods for producing a corn plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other inbred corn lines derived from inbred corn lines MM59, CB26, CB27, II13, ML22, MM46, and MM69. | 2014-09-18 |
20140283184 | HYBRID CORN PLANT AND SEED S2338 - This invention provides hybrid maize plant designated S2338. This invention further provides hybrid seed of S2338, hybrid plants produced from such seed, and variants, mutants, and trivial modifications to hybrid S2338, as well as methods of using the hybrid and products produced from the hybrid. | 2014-09-18 |
20140283185 | SOYBEAN CULTIVAR OW1113707 - The present invention is in the field of soybean variety OW1113707 breeding and development. The present invention particularly relates to the soybean variety OW1113707 and its progeny, and methods of making OW1113707. | 2014-09-18 |
20140283186 | SOYBEAN CULTIVAR OW1117105 - The present invention is in the field of soybean variety OW1117105 breeding and development. The present invention particularly relates to the soybean variety OW1117105 and its progeny, and methods of making OW1117105. | 2014-09-18 |
20140283187 | HYBRID MELON VARIETY 34-309 RZ - The present invention relates to a | 2014-09-18 |
20140283188 | HYBRID MELON VARIETY 34-757 RZ - The present invention relates to a | 2014-09-18 |
20140283189 | HYBRID MELON VARIETY 34-765 RZ - The present invention relates to a | 2014-09-18 |
20140283191 | RESISTANCE TO ARTHROPOD PEST IN TOMATOES - The present invention is directed to a commercial tomato, namely | 2014-09-18 |
20140283192 | HYBRID PEPPER VARIETIES 35-237 RZ and 35-238 RZ - The present invention relates to a | 2014-09-18 |
20140283193 | LETTUCE VARIETY 79-348 RZ - The present invention relates to a | 2014-09-18 |
20140283194 | LETTUCE VARIETY 41-106 RZ - The present invention relates to a | 2014-09-18 |
20140283195 | HYBRID SPINACH VARIETY 51-518 RZ - The present invention relates to a | 2014-09-18 |
20140283196 | LETTUCE VARIETY 45-125 RZ - The present invention relates to a | 2014-09-18 |
20140283197 | SOYBEAN MARKERS LINKED TO PHYTOPHTHORA RESISTANCE - This disclosure concerns compositions and methods for identifying the | 2014-09-18 |
20140283198 | Signaling Compositions, Methods, and Systems for Effecting Plant Growth and Crop Enhancement - Bio-regulators from a group of quaternary ammonium moieties modify a gene expression in a plant to induce enhanced growth and robustness. Such bio-regulator may be applied to seeds through coating or encapsulating, to plants through root drenching, spraying and dusting. Bio-regulators may be duel-acting; causing beneficial modification to gene expressions in desirable plants while modifying gene expression in undesirable plants, making them more susceptible to herbicides. Bio-regulators are Ester Compounds, BMIA Compounds or related salts, BMIA Compounds or related salts of those compounds. | 2014-09-18 |
20140283199 | Signaling Compositions, Methods, and Systems for Effecting Plant Burndown and Herbicide Enhancement - Bio-regulators from a group of quaternary ammonium moieties modify a gene expression in undesirable plants to inhibit growth and robustness and enhance the effectiveness of herbicides. Such bio-regulator may be applied to plants through seed treatments, root drenching, spraying and dusting, or to soil were desirable crops are planted or will be planted. Bio-regulators may be duel-acting; causing beneficial modification to gene expressions in desirable plants while modifying gene expression in undesirable plants, making them more susceptible to herbicides. Bio-regulators are Ester Compounds, BMIA Compounds or related salts of those compounds. | 2014-09-18 |
20140283200 | PLANT REGULATORY ELEMENTS AND USES THEREOF - The invention provides recombinant DNA molecules and constructs, as well as their nucleotide sequences, useful for modulating gene expression in plants. The invention also provides transgenic plants, plant cells, plant parts, and seeds comprising a recombinant DNA molecule comprising a DNA molecule operably linked to heterologous transcribable DNA molecule, as are methods of their use. | 2014-09-18 |
20140283201 | PLANT REGULATORY ELEMENTS AND USES THEREOF - The invention provides recombinant DNA molecules and constructs, and their nucleotide sequences, useful for modulating gene expression in plants. The invention also provides transgenic plants, plant cells, plant parts, and seeds comprising a recombinant DNA molecule comprising a DNA molecule operably linked to a heterologous transcribable DNA molecule, as well as methods of their use. | 2014-09-18 |
20140283202 | COMPOSITIONS, ORGANISMS, SYSTEMS, AND METHODS FOR ALTERING COLD, DROUGHT, AND SALT TOLERANCE IN PLANTS - The present disclosure relates, in some embodiments, to materials, systems, organisms, and methods for enhancing abiotic stress tolerance (e.g., cold, salinity, drought, heat, wind) and/or enhancing biomass in plants. For example, enhancing abiotic stress tolerance may be achieved in plants having | 2014-09-18 |
20140283203 | NUCLEIC ACID SEQUENCES ENCODING TRANSCRIPTION FACTORS REGULATING ALKALOID BIOSYNTHESIS AND THEIR USE IN MODIFYING PLANT METABOLISM - Plant metabolism and alkaloid levels can be regulated by transcription factors that regulate the nicotinic alkaloid biosynthetic pathway. In one embodiment, the disclosure provides a transcription factor that negatively regulates alkaloid biosynthesis, such as nicotine biosynthesis. | 2014-09-18 |
20140283204 | NUCLEIC ACID SEQUENCES ENCODING TRANSCRIPTION FACTORS REGULATING ALKALOID BIOSYNTHESIS AND THEIR USE IN MODIFYING PLANT METABOLISM - Plant metabolism and alkaloid levels can be regulated by transcription factors that regulate the nicotinic alkaloid biosynthetic pathway. In one embodiment, the disclosure provides a transcription factor that negatively regulates alkaloid biosynthesis, such as nicotine biosynthesis. | 2014-09-18 |
20140283205 | Root-Preferred Promoter and Methods of Use - The present invention provides compositions and methods for regulating expression of heterologous nucleotide sequences in a plant. Compositions include a novel nucleotide sequence for a promoter for the gene encoding | 2014-09-18 |
20140283206 | Root-Preferred Promoter and Methods of Use - The present invention provides compositions and methods for regulating expression of heterologous nucleotide sequences in a plant. Compositions include a novel nucleotide sequence for a promoter for the gene encoding | 2014-09-18 |