38th week of 2011 patent applcation highlights part 63 |
Patent application number | Title | Published |
20110231911 | METHODS AND SYSTEMS FOR AUTHENTICATING USERS - A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction, inputting information in a workstation, and determining whether the inputted information is known. Moreover, the method includes determining a state of a communications device when the inputted information is known, and transmitting a biometric authentication request from a server to a workstation when the state of the communications device is enrolled. Additionally, the method includes obtaining biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and conducting the transaction when the transmitted and stored one-time pass-phrases match. | 2011-09-22 |
20110231912 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR AUTHENTICATING A MOBILE DEVICE USING AN ACCESS TOKEN - In accordance with embodiments, there are provided mechanisms and methods for authenticating a mobile device using an access token. These mechanisms and methods for authenticating a mobile device using an access token can provide authentication in an automated manner. The ability to provide authentication in an automated manner can enable repeated access to data by a user without requiring an associated repetitive manual authentication by the user. | 2011-09-22 |
20110231913 | SYSTEM AND METHODS OF DETERMINING COMPUTATIONAL PUZZLE DIFFICULTY FOR CHALLENGE-RESPONSE AUTHENTICATION - Computational puzzles are parameterized by a difficulty variable which may be assigned based on at least one component from the group of components: time component, location component, reputation component, usage component, content component, and social networking component. For example, in one embodiment, the proof-of-work puzzle comprises a location component directed by the geographic location of the client that can be applied to any web transaction or application. One such application involves online ticket sales including those that employ purchasing robots. Another application involves accessing and using webmail. | 2011-09-22 |
20110231914 | SYSTEM AND METHOD FOR VALIDATING A USER OF AN ACCOUNT USING A WIRELESS DEVICE - The disclosure provides a system and method of authenticating a user to a network. For the method, if a request for a resource initiated by the device is related to a restricted resource, then the method: redirects the request to the authentication server; initiates an authentication process at the server to request a user account and a password from the device to authenticate the device if it has not been authenticated; automatically provides the device with access to the restricted resource if the device previously had been authenticated to access the restricted resource; and provides a signal to the device indicating whether it has been authenticated to allow the device to update its graphical user interface to indicate an access status for the restricted resource. If the request relates to a non-restricted resource, then the method automatically provides the device with access to the non-restricted resource. | 2011-09-22 |
20110231915 | SYSTEMS AND METHODS OF CONTROLLING NETWORK ACCESS - A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device. | 2011-09-22 |
20110231916 | SYSTEMS AND METHODS OF CONTROLLING NETWORK ACCESS - A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device. | 2011-09-22 |
20110231917 | SYSTEM AND METHOD FOR PROVIDING A VIRTUAL PEER-TO-PEER ENVIRONMENT - An improved system and method are disclosed for peer-to-peer communications. In one example, the method enables the creation of a virtual endpoint that may operate within a peer-to-peer network to represent a device that is unable to operate as an endpoint. | 2011-09-22 |
20110231918 | REMOTE REGISTRATION FOR ENTERPRISE APPLICATIONS - A partner registration module can provide for an automatic registration of partners to a central server. An entire partner registration process can be automated from end to end, providing a unified process for registering partners. The partner registration module can be fully compatible with current registration agents and next generation registration agents. | 2011-09-22 |
20110231919 | EFFICIENT SINGLE SIGN-ON AND IDENTITY PROVIDER CONFIGURATION AND DEPLOYMENT IN A DATABASE SYSTEM - Various techniques and procedures related to user authentication, identity providers, and single sign-on (SSO) are presented here. One approach creates an SSO link between two organizations in a streamlined manner using an internal cross-user systemwide digital certificate, and without processing any user-created, user-uploaded, or user-assigned digital certificates. Another approach presented here configures an identity provider service for an entity or organization by processing a single user command. The identity provider service is automatically configured in the background without processing any additional user commands, user instructions, or user-entered data. | 2011-09-22 |
20110231920 | SERVER APPARATUS AND PROGRAM FOR SINGLE SIGN-ON - A server apparatus includes an analyzer unit which analyzes log-in information for a server received from a client, determines an authentication scheme of the server, and extracts, from the log-in information, provisional authentication information in a form representative of variable information. The analyzer unit stores, in the storage device, information representative of the authentication scheme and the provisional authentication information as the variable information. The analyzer unit also stores, in the storage device, as the variable information, authentication information of a user for the server that is associated with representative authentication information of the user. | 2011-09-22 |
20110231921 | PLUGGABLE TOKEN PROVIDER MODEL TO IMPLEMENT AUTHENTICATION ACROSS MULTIPLE WEB SERVICES - A pluggable token provider model for message level authentication across multiple web services is provided. Web service and token provider implementations within a client application are separated from an actual component that operates the business logic to formulate and understand a web request. The web service components may request web services to be executed and supply the body for the web service message while a common framework maintains the web services metadata, which includes definitions associated with respective tokens. The framework may further maintain token provider implementations that actually fetch authentication tokens and perform the web requests. | 2011-09-22 |
20110231922 | COMMUNICATION APPARATUS, WIRELESS COMMUNICATION SYSTEM, AND METHOD OF SETTING ASSOCIATION INFORMATION - A communication apparatus includes a first communication unit that performs a wireless communication with two storage media that store therein association information for establishing a wireless connection and user identification information for identifying a user, respectively, and receives the association information and the user identification from the two storage media; a determination unit that performs user authentication based on the user identification information, determines whether or not to validate the association information based on the user authentication, and if the association information is determined to be valid, sets the association information; and a second communication unit that establishes a wireless connection based on the association information set by the determination unit. | 2011-09-22 |
20110231923 | LOCAL AUTHENTICATION IN PROXY SSL TUNNELS USING A CLIENT-SIDE PROXY AGENT - A traffic management device (TMD), system, and processor-readable storage medium are directed towards reducing a number of login web pages served by a server device over an end-to-end encrypted connection. In one embodiment, a TMD intercepts and processes requests for content addressed to the server device. The TMD may serve a stored copy of a login page corresponding to the requested content to the client device. In response, the client device may submit login information associated with the login page to the TMD. The TMD may extract the login information from the submitted response and send a request to the server device to authenticate the client device based on the extracted login information. If the client device is authenticated, the TMD may transmit a ‘login successful’ page to the client device. | 2011-09-22 |
20110231924 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PROVIDING APPLICATION LAYER FIREWALL AND INTEGRATED DEEP PACKET INSPECTION FUNCTIONS FOR PROVIDING EARLY INTRUSION DETECTION AND INTRUSION PREVENTION AT AN EDGE NETWORKING DEVICE - Methods, systems, and computer readable media for an application layer firewall function including an integrated deep packet inspection function for providing early intrusion detection and intrusion prevention at an edge networking device are disclosed. According to one method, steps are performed at a session controller configured to operate at the border of a first network and a second network. The steps include receiving, at an intrusion protection system (IPS) module of the session controller interfacing with modules associated with layers 2 and above of a protocol stack of the session controller, information gathered by modules located at lower layers and associated with an intrusion attempt, vulnerability, or other security policy violation. In response to receiving the information, the IPS module provides at least one of a security policy and a rule to a module located at the most appropriate layer for securing the intrusion attempt, vulnerability, or other security policy violation. | 2011-09-22 |
20110231925 | FIREWALL NETWORK APPLICATION APPARATUS - A method and system for distributing flows between a multiple processors. The flows can be received from an external source such as a network, by a front-end processor that recognizes the flow and the associated request, and identifies at least one internal applications processor to process the request/flow. The front-end processor utilizes a flow scheduling vector related to the identified applications processor(s), and the flow scheduling vector can be based on intrinsic data from the applications processor(s) that can include CPU utilization, memory utilization, packet loss, and queue length or buffer occupation. In some embodiments, applications processors can be understood to belong to a group, wherein applications processors within a group can be configured identically. A flow schedule vector can be computed for the different applications processor groups. | 2011-09-22 |
20110231926 | BASIC ARCHITECTURE FOR SECURE INTERNET COMPUTERS - A method or apparatus for a computer or microchip with one or more inner hardware-based access barriers or firewalls that establish one or more private units disconnected from a public unit having connection to the Internet, and one or more of the private units have a connection to one or more secure non-Internet-connected private networks for personal and/or local administration. The hardware-based access barriers include a single out-only bus and/or another in-only bus with a single on/off switch and/or both buses, each with a single on/off switch. The hardware-based access barriers can be positioned successively between an outer private unit, an intermediate more private unit, an inner most private unit, and the public unit, and each private unit can be configured for a separate connection to a separate network of computers that excludes the Internet. | 2011-09-22 |
20110231927 | Internet Mediation - Systems and methods for a user to personalize Internet content from an Internet service provider using selected policy applications. The policy applications may be discrete, single purpose applications. The system may be controlled from home gateways and remote devices. | 2011-09-22 |
20110231928 | SYSTEMS AND METHODS OF CONTROLLING NETWORK ACCESS - A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device. | 2011-09-22 |
20110231929 | SYSTEMS AND METHODS FOR PROVIDING A VPN SOLUTION - A system, apparatus and a method for implementing a secured communications link at a layer other than that at which packets are filtered are disclosed. In one embodiment, a computer system is configured to form a virtual private network (“VPN”) and comprises an address inspection driver to identify initial target packet traffic addressed to a target server. Also, the computer system includes a pseudo server module to receive rerouted initial target packet traffic from the address inspection driver. The pseudo server module is configured to convey packet regeneration instructions to a VPN gateway. The address inspection driver functions to identify additional target packet traffic addressed to the target server and routes the additional target packet traffic to the pseudo server. In one embodiment, the pseudo server is configured to strip header information from the additional target packet traffic to form a payload, and thereafter, to route the payload to the target. | 2011-09-22 |
20110231930 | INCORPORATING VISUAL ASPECTS TO IDENTIFY PERMISSIONS AND SECURITY LEVELS IN AGGREGATED CONTENT - In one embodiment, a method includes identifying content associated with a composition and at least one authorization associated with a user. The content is a subject of a request for access associated with the user, and is an aggregate of a plurality of sections. The plurality of sections includes a first section with a first authorization level and a second section with a second authorization level that is higher than the first authorization level. The method also includes determining if at least one authorization indicates that the user may access the first section and determining if at least one authorization indicates that the user may access the second section. The first section is portrayed to the user if it is determined that the user may access the first section, and the second section is portrayed to the user if it is determined that the user may access the second section. | 2011-09-22 |
20110231931 | METHOD AND DEVICE FOR PREVENTING DOMAIN NAME SYSTEM SPOOFING - A method for preventing Domain Name System (DNS) spoofing includes: performing uppercase/lowercase conversion for letters of a DNS question field in a DNS request packet according to a preset rule; sending the DNS request packet; receiving a DNS response packet; obtaining uppercase/lowercase distribution of the letters of the DNS question field in the DNS response packet; and forwarding the DNS response packet to a target DNS client if the uppercase/lowercase distribution of the letters of the DNS question field in the DNS response packet complies with the preset rule. Corresponding to the method, a device for preventing DNS spoofing is disclosed. The method and device reduce occupation of storage resources of the device. | 2011-09-22 |
20110231932 | SECURITY INTRUSION DETECTION AND RESPONSE - A system comprises an enclosure, host logic contained in the enclosure, and intrusion security logic also contained in the enclosure. The intrusion security logic is coupled to the host logic and configured to detect a security intrusion to the system and to respond to a security intrusion with a user-configurable trigger event. The intrusion security logic implements at least two tamper blocks, each tamper block configured to monitor one more input signals and initiate a trigger event when a security breach of the enclosure is detected. At least one of the tamper blocks comprises a state machine whose operation is controlled by way of user-programmable registers. | 2011-09-22 |
20110231933 | LOADBALANCING NETWORK TRAFFIC ACROSS MULTIPLE REMOTE INSPECTION DEVICES - An apparatus includes a checking functionality (CF) for processing data packets in a computer network that comprises a plurality of CFs. The CF includes an interface for communication with one or more source switches that route data packets to the CF for processing, a packet processing capability for processing the data packets, and logic for communicating data regarding the packet processing capability to the source switch through the interface. | 2011-09-22 |
20110231934 | Distributed Virus Detection - A method and system for efficient virus protection in networks of computing resources. Virus definitions are ranked and distributed according to activity. Active viruses are scanned for by substantially every computing resource in the network but scanning for less active virus is distributed across the network according to computing resource capacity. | 2011-09-22 |
20110231935 | SYSTEM AND METHOD FOR PASSIVELY IDENTIFYING ENCRYPTED AND INTERACTIVE NETWORK SESSIONS - The system and method for passively identifying encrypted and interactive network sessions described herein may distribute a passive vulnerability scanner in a network, wherein the passive vulnerability scanner may observe traffic travelling across the network and reconstruct a network session from the observed traffic. The passive vulnerability scanner may then analyze the reconstructed network session to determine whether the session was encrypted or interactive (e.g., based on randomization, packet timing characteristics, or other qualities measured for the session). Thus, the passive vulnerability scanner may monitor the network in real-time to detect any devices in the network that run encrypted or interactive services or otherwise participate in encrypted or interactive sessions, wherein detecting encrypted and interactive sessions in the network may be used to manage changes and potential vulnerabilities in the network. | 2011-09-22 |
20110231936 | Detection of vulnerabilities in computer systems - Systems, methods, and apparatus, including computer program products, for detecting a presence of at least one vulnerability in an application. The method is provided that includes modifying instructions of the application to include at least one sensor that is configurable to generate an event indicator, wherein the event indicator includes at least some data associated with the event; storing the event indicator with other stored event indicators generated by the at least one sensor during the execution of the application; analyzing the stored event indicators; detecting a presence of at least one vulnerability in the application based on the analysis of the stored event indicators; and reporting the presence of at least one vulnerability. | 2011-09-22 |
20110231937 | GENERATING A MULTIPLE-PREREQUISITE ATTACK GRAPH - In one aspect, a method to generate an attack graph includes determining if a potential node provides a first precondition equivalent to one of preconditions provided by a group of preexisting nodes on the attack graph. The group of preexisting nodes includes a first state node, a first vulnerability instance node, a first prerequisite node, and a second state node. The method also includes, if the first precondition is equivalent to one of the preconditions provided by the group of preexisting nodes, coupling a current node to a preexisting node providing the precondition equivalent to the first precondition using a first edge and if the first precondition is not equivalent to one of the preconditions provided by the group of preexisting nodes, generating the potential node as a new node on the attack graph and coupling the new node to the current node using a second edge. | 2011-09-22 |
20110231938 | APPLICATION SOFTWARE PROTECTING METHOD AND STREAM TRANSMITTING/RECEIVING SYSTEM - A protection method of application software is executed by initiating the first program transmitted from a server via a network on a client, and the method divides an execution result of the application software executed on the client into a plurality of pieces of intermediate data in accordance with distribution arrangement information reported by the server, distributes and arranges the plurality of pieces of intermediate data in the server and the client, transmits to the server notice information including a data length and arranged location information of each piece of the distributed and arranged plurality of pieces of intermediate data, rearranges the distributed and arranged plurality of pieces of intermediate data in the original order of the execution result of the application software on the basis of the notice information, generates in the server a second program for generating the execution result, and transmits the second program to the client. | 2011-09-22 |
20110231939 | MEMORY CARD WITH EMBEDDED IDENTIFIER - A software installation system comprises an interface component that receives a request to access data resident upon a flash memory card. An installation component compares a unique identifier associated with the data with a unique identifier embedded within the flash memory card, and the installation component determines whether to allow access to the data based at least in part upon the comparison. The installation component prohibits access to the data if the unique identifier associated with the data does not match the unique identifier embedded within the flash memory card. | 2011-09-22 |
20110231940 | CREDENTIAL-BASED ACCESS TO DATA - Existing mechanisms that control access to data based upon whether the user seeking to access the data is identified among the users that are allowed to access the data, can be extended to further control access based upon the provision of credential data by the user, or processes associated therewith. Access control entries can limit access based upon Boolean conditionals, including those referencing credential data, such that access can be granted only to specific users that provide the credential data or, alternatively, to any user that provides it. The referenced credential data can be specified in the access control information in an obfuscated form for security purposes. Information associated with the user, such as a user token, can be temporarily updated to include credential data when provided by the user, so as to enable access to the data but to prevent such access from remaining open too long. | 2011-09-22 |
20110231941 | LICENSE MANAGEMENT IN A MEDIA NETWORK ENVIRONMENT - Acquiring a license in a hub network, including: sending a license request from a client to a server through an intermediary device; sending a connection confirmation from the client to the server through the intermediary device; and receiving license data at the client from the server through the intermediary device in response to the license request, wherein the client and the server are not connected in a hub network, wherein the license request identifies a sub-copy version stored on the client, wherein the sub-copy version includes sub-copy locked content data, and wherein the license data is bound to the hub network. | 2011-09-22 |
20110231942 | TIKI1 AND TIKI2, WNT INHIBITORS - This invention relates to Tiki1 and Tiki2 proteins and nucleic acids, cells expressing the same, and methods for identifying compounds that modulate Tiki1/2 activity for use in the treatment of osteoporosis or cellular proliferative disorders. | 2011-09-22 |
20110231943 | TRANSGENIC ANIMALS AND USES THEREOF - In general, the invention features genetically modified non-human mammals (e.g., bovines and other ungulates), and methods of making these mammals. In particular, the invention features transgenic ungulates having reduced levels of endogenous IgM heavy chain and/or prion protein. | 2011-09-22 |
20110231944 | B CELL-DERIVED IPS CELLS AND APPLICATION THEREOF - Provided are a B cell-derived iPS cell generated using a convenient technique, a technology for providing a human antibody at low cost using the iPS cell, an immunologically humanized mouse prepared using cells differentiated from the iPS cell, and the like. Also provided are a cloned cell obtained by contacting a B cell with nuclear reprogramming factors excluding C/EBPα and Pax5 expression inhibiting substances, particularly nucleic acids that encode Oct3/4, Sox2, Klf4 and c-Myc, wherein the cloned cell has an immunoglobulin gene rearranged therein and possesses pluripotency and replication competence (B-iPS cell). Still also provided are a method of producing a monoclonal antibody against a specified antigen, comprising recovering an antibody from a culture of B cells obtained by differentiating a B-iPS cell derived from a B cell immunized with the specified antigen, and a method of generating an immunologically humanized mouse, comprising transplanting to an immunodeficient mouse a human immunohematological system cell obtained by differentiating a B-iPS cell. | 2011-09-22 |
20110231945 | GOLD EVENING PRIMROSE AND METHOD OF BREEDING THE SAME - Disclosed is a gold evening primrose, a novel variety of evening primrose. The gold evening primrose has a height of 20 to 40 cm, panicle-type uniflorous large yellow flowers blooming during the day, and leaves tinged with reddish purple in winter enduring a low temperature of −15° C. The gold evening primrose adapts well to a variety of environments, develops large flowers, blossoms during the day, has high ornamental value due to long blooming period ranging from early June to late July, exhibits superior fertility, is resistant to harmful insects, can be semi-permanent Iy gardened through a single planting, thereby reducing costs, and has evergreen leaves that are tinged with red in winter, thus being suitable for use in landscaping and gardening throughout all four seasons. | 2011-09-22 |
20110231946 | ENGINEERING OF BOLTING RESISTANCE IN SUGAR BEET BY MEANS OF THE TRANSGENIC EXPRESSION OF THE BEET HOMOLOGUE OF FLOWERING TIME CONTROL GENE FT - This invention relates to the field of bolting and flowering time control in sugar beet, specifically to methods as well as nucleic acid molecules, chimeric constructs, and vectors for engineering bolting resistance in sugar beet by means of altering the expression of the | 2011-09-22 |
20110231947 | Potato Cultivar 'Newton' - A potato cultivar designated ‘Newton’ is disclosed. The invention relates to the tubers of potato cultivar ‘Newton’, to the seeds of potato cultivar ‘Newton’, to the plants of potato ‘Newton’, to the plant parts of potato cultivar ‘Newton’ and to methods for producing a potato plant produced by crossing potato cultivar ‘Newton’ with itself or with another potato variety. The invention also relates to methods for producing a potato plant containing in its genetic material one or more transgenes and to the transgenic potato plants and plant parts produced by those methods. This invention also relates to potato cultivars or breeding cultivars and plant parts derived from potato variety ‘Newton’, to methods for producing other potato cultivars, lines or plant parts derived from potato cultivar ‘Newton’ and to the potato plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid potato tubers, seeds, plants and plant parts produced by crossing potato cultivar ‘Newton’ with another potato cultivar. | 2011-09-22 |
20110231948 | Potato Cultivar 'Brooke' - A potato cultivar designated ‘Brooke’ is disclosed. The invention relates to the tubers of potato cultivar ‘Brooke’, to the seeds of potato cultivar ‘Brooke’, to the plants of potato ‘Brooke’, to the plant parts of potato cultivar ‘Brooke’ and to methods for producing a potato plant produced by crossing potato cultivar ‘Brooke’ with itself or with another potato variety. The invention also relates to methods for producing a potato plant containing in its genetic material one or more transgenes and to the transgenic potato plants and plant parts produced by those methods. This invention also relates to potato cultivars or breeding cultivars and plant parts derived from potato variety ‘Brooke’, to methods for producing other potato cultivars, lines or plant parts derived from potato cultivar ‘Brooke’ and to the potato plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid potato tubers, seeds, plants and plant parts produced by crossing potato cultivar ‘Brooke’ with another potato cultivar. | 2011-09-22 |
20110231949 | Potato Cultivar 'Madingley' - A potato cultivar designated ‘Madingley’ is disclosed. The invention relates to the tubers of potato cultivar ‘Madingley’, to the seeds of potato cultivar ‘Madingley’, to the plants of potato ‘Madingley’, to the plant parts of potato cultivar ‘Madingley’ and to methods for producing a potato plant produced by crossing potato cultivar ‘Madingley’ with itself or with another potato variety. The invention also relates to methods for producing a potato plant containing in its genetic material one or more transgenes and to the transgenic potato plants and plant parts produced by those methods. This invention also relates to potato cultivars or breeding cultivars and plant parts derived from potato variety ‘Madingley’, to methods for producing other potato cultivars, lines or plant parts derived from potato cultivar ‘Madingley’ and to the potato plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid potato tubers, seeds, plants and plant parts produced by crossing potato cultivar ‘Madingley’ with another potato cultivar. | 2011-09-22 |
20110231950 | Potato Cultivar 'Linton' - A potato cultivar designated ‘Linton’ is disclosed. The invention relates to the tubers of potato cultivar ‘Linton’, to the seeds of potato cultivar ‘Linton’, to the plants of potato ‘Linton’, to the plant parts of potato cultivar ‘Linton’ and to methods for producing a potato plant produced by crossing potato cultivar ‘Linton’ with itself or with another potato variety. The invention also relates to methods for producing a potato plant containing in its genetic material one or more transgenes and to the transgenic potato plants and plant parts produced by those methods. This invention also relates to potato cultivars or breeding cultivars and plant parts derived from potato variety ‘Linton’, to methods for producing other potato cultivars, lines or plant parts derived from potato cultivar ‘Linton’ and to the potato plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid potato tubers, seeds, plants and plant parts produced by crossing potato cultivar ‘Linton’ with another potato cultivar. | 2011-09-22 |
20110231951 | CLUBROOT RESISTANCE BRASSICA OLERACEA PLANTS - The present invention discloses | 2011-09-22 |
20110231952 | SOYBEAN NODULATION FACTOR RECEPTOR PROTEINS, ENCODING NUCLEIC ACIDS AND USES THEREFOR - The invention provides GmNFR1α, GmNFR1β, GmNFR5α and GmNFR5β soybean nodulation factor receptor proteins, a receptor complex and encoding nucleic acids. Also provided are GmNFR1α, GmNFR1β, GmNFR5α and GmNFR5β promoters which may be useful for expressing autologous or heterologous sequences in plants such as soybean. Variant proteins and nucleic acids including RNA splice variants, mis-sense mutants and non-sense mutants are also described. Also provided are genetically-modified plants and methods of producing genetically-modified plants. Over-expression of soybean nodulation factor receptor proteins by genetically-modified plants may lead to enhanced and/or otherwise facilitated nodulation and/or nitrogen fixation. Genetically-modified plants with down-regulated nodulation factor receptor expression, such as by RNAi or antisense constructs, may exhibit inhibited, diminished or otherwise reduced nodulation and/or nitrogen fixation. | 2011-09-22 |
20110231953 | TRANSFORMED PLANT WITH INCREASED CHLOROPLASTS PER CELL - This invention provides a transformed plant with increased number of chloroplasts per cell, comprising an over-expressed foreign DNA which codes for PDV1 and/or PDV2, or CRF2, a homologue thereof, or a mutant thereof. | 2011-09-22 |
20110231954 | GL9 TRANSCRIPTIONAL CONTROL SEQUENCES - The present invention relates to transcriptional control sequences derived from GL9 genes, wherein the transcriptional control sequences direct specific or preferential expression of an operably connected nucleotide sequence of interest in one or more parts of a plant seed. | 2011-09-22 |
20110231955 | EFFICIENT GENE SILENCING IN PLANTS USING SHORT dsRNA SEQUENCES - Methods and means are provided to increase the efficiency of gene silencing when using dsRNA sequences which have a stem length shorter than about 200 base pairs by providing chimeric genes encoding such dsRNA sequences with a promoter recognized by DNA dependent RNA polymerase III comprising all cis-acting promoter elements which interact with DNA dependent RNA polymerase III. | 2011-09-22 |
20110231956 | Environmentally Adjusted Transgenic Plants - The present invention relates to a novel transgenic plant having tolerance to salt stress. The plant is transformed with a recombinant nucleic acid encoding glutamic acid decarboxylase isolated from | 2011-09-22 |
20110231957 | METHOD FOR PROMOTION OF BRANCH FORMATION, DWARFING, STERILITY, AND PROMOTION OF MULTIPLE FLOWER BUD FORMATION OF PLANT - An object of the present invention is to provide a method for promoting branch formation, inducing dwarfism, causing sterility, and promoting multiple flower bud formation, of a plant, and an agent for promoting branch formation and/or inducing dwarfism and/or causing sterility and/or promoting multiple flower bud formation, of a plant. Phytoplasmas are pathogenic bacteria that promote branch formation and/or dwarfism and/or sterility and/or the multiple flower bud formation of a plant. Introduction of a PAM765 peptide derived from a phytoplasma into a plant enables the promotion of branch formation and/or dwarfism and/or sterility and/or the promotion of multiple flower bud formation of a plant. It is also possible to provide an agent for promoting branch formation and/or inducing dwarfism and/or causing sterility and/or promoting multiple flower bud formation of a plant, the agent containing the PAM765 peptide or a gene encoding the PAM765 peptide. | 2011-09-22 |
20110231958 | TRANSGENIC PLANTS AND FUNGI CAPABLE OF METABOLIZING PHOSPHITE AS A SOURCE OF PHOSPHORUS - System, including methods and compositions, for making and using transgenic plants and/or transgenic fungi that metabolize phosphite as a source of phosphorus for supporting growth. | 2011-09-22 |
20110231959 | Annotated plant genes - The present invention is in the field of plant biochemistry. More specifically the invention relates to nucleic acid sequences from plant cells, in particular, nucleic acid sequences from maize, teosinte, soybean, | 2011-09-22 |
20110231960 | BACTERIAL TOXIN VACCINE - A bacterial toxin protein such as a Shiga toxin protein is efficiently produced using plant cells. The plant cells are transformed using a DNA construct containing DNA encoding a hybrid protein in which the bacterial toxin proteins such as the Shiga toxin proteins are tandemly linked through a peptide having the following characteristics (A) and (B) to produce the bacterial toxin protein in the plant cells: (A) a number of amino acids is 12 to 30; and (B) a content of proline is 20 to 35%. | 2011-09-22 |
20110231961 | METABOLIC REGULATORS - The present invention provides metabolic regulators, which are proteins (such as fusion proteins, truncated proteins or full-length proteins) that bind to specific metabolites and which can be used to control the availability of the metabolites in cells, particularly plant cells. Proteins of the invention include one or more metabolic regulator proteins, can be truncated or full length, can further comprise a transmembrane domain or lipoylation site or can further comprise a transit peptide. Metabolic regulators of the invention can be soluble, e.g., cytosolic soluble, can be anchored to a biological membrane or can be organelle targeted or apoplastic targeted. The present invention also provides nucleic acid molecules encoding the metabolic regulators, methods of making the nucleic acid molecules, methods for making transformed organisms, including plants, photosynthetic organisms, microbes, invertebrates, and vertebrates, and methods for controlling availability of metabolites to a host cell. | 2011-09-22 |
20110231962 | TRANSGENIC BIOLUMINESCENT PLANTS - Transgenic plants, and a method for making the same, wherein genes encoding the enzyme luciferase and its corresponding substrate luciferin are incorporated into a native plant genome. Once transformed into plant cells, these genes may be regulated such that under certain endogenous or exogenous conditions, their expression in the mature plant results in bioluminescence. Different luciferin/luciferase complexes and/or mechanisms of regulation may be utilized for these transgenic plants, depending on a variety of factors such as plant species and the circumstances under which a biolmuniescent reaction is desired. Phototransformation may be utilized to vary the wavelength of light emitted from the mature plant. | 2011-09-22 |
20110231963 | MODIFIED BACILLUS THURINGIENSIS CRY14 PROTEINS FOR NEMATODE CONTROL - The subject invention concerns plants protected from nematode feeding damage and improved versions of Cry proteins. The subject invention also concerns improved versions of Cry14A proteins. Synthetic genes encoding these modified proteins are also part of the subject invention. Another embodiment of the subject invention includes plants transformed with the genes of the subject invention. In yet another embodiment the subject invention concerns Bt proteins for in-plant protection against crop damage by root knot nematode (RKN; | 2011-09-22 |
20110231964 | Sclerotinia-resistant Brassica - The invention provides | 2011-09-22 |
20110231965 | MODE SYNTHESIZING ATOMIC FORCE MICROSCOPY AND MODE-SYNTHESIZING SENSING - A method of analyzing a sample that includes applying a first set of energies at a first set of frequencies to a sample and applying, simultaneously with the applying the first set of energies, a second set of energies at a second set of frequencies, wherein the first set of energies and the second set of energies form a multi-mode coupling. The method further includes detecting an effect of the multi-mode coupling. | 2011-09-22 |
20110231966 | SCANNING PROBE MICROSCOPY WITH SPECTROSCOPIC MOLECULAR RECOGNITION - A method for determining chemical characteristics of a sample, the method including directly applying a first acoustic wave at a first frequency to a probe and applying, independent of the directly applying the first acoustic wave, a second acoustic wave at a second frequency to the sample, wherein the first frequency is different than the second frequency and the first acoustic wave and the second acoustic wave are simultaneously applied to the probe and the sample, respectively, and form a coupling. The method further including applying electromagnetic energy to the sample, wherein the electromagnetic energy is absorbed by the sample causing a change in phase of the second acoustic wave. The method further including detecting an effect of the coupling and determining a spectrum of the sample based on the detecting. | 2011-09-22 |
20110231967 | KIWI PLANT NAMED 'AU GOLDEN DRAGON' - A new and distinct cultivar of the species | 2011-09-22 |
20110231968 | Nectarine tree named 'Cakepearl' - A new and distinct variety of white flat nectarine tree, denominated ‘CAKEPEARL’, has a large flat fruit of very long shelf life without alteration after harvesting, a semi-sweet white flesh of high eating quality and an attractive homogenous purple red skin color. The tree is of large size and is vigorous. Fruit can be consumed crunchy or at maturity. | 2011-09-22 |
20110231969 | Hibiscus plant named 'DUP-CHR' - A new and distinct cultivar of | 2011-09-22 |
20110231970 | Hibiscus plant named 'DUP-RRAS' - A new and distinct cultivar of | 2011-09-22 |
20110231971 | Hibiscus plant named 'DUP-LMF' - A new and distinct cultivar of | 2011-09-22 |
20110231972 | Agave plant named 'YUCCAGAVE FITZGIBBONI' - A new cultivar of | 2011-09-22 |
20110231973 | PHLOX PLANT NAMED 'BARSIXTYTWO' | 2011-09-22 |
20110231974 | PHLOX PLANT NAMED 'BARSIXTYONE' | 2011-09-22 |
20110231975 | PHLOX PLANT NAMED 'BARSIXTY' | 2011-09-22 |