Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


09th week of 2011 patent applcation highlights part 83
Patent application numberTitlePublished
20110055884System and Method for Mapping Potential Internet Protocol Television Interference - A method is disclosed for determining a mitigation strategy to limit a potential source of interference on an Internet Protocol television (IPTV) system. A new user installation request is received at a server in the IPTV system. A first geographical location of a customer premises associated with the new user installation request is received. A second geographical location of an amplitude modulation broadcasting facility is received. The first geographical location and the second geographical location are plotted. A first distance between the first geographical location and the second geographical location is determined. A first signal transmission power rating for the amplitude modulation broadcasting facility is retrieved. A first mitigation strategy to limit a first interference of the amplitude modulation broadcasting facility on an IPTV signal provided to the first geographical location when the first distance is less than the first threshold distance is determined.2011-03-03
20110055885METHOD AND SYSTEM FOR PROVIDING INTERACTIVE LOOK-AND-FEEL IN A DIGITAL BROADCAST VIA AN X Y PROTOCOL - A system for providing an interactive look-and-feel in a digital video broadcast via an X-Y protocol is provided. At a head-end, video information is digitized and associated with private data, such as event identifications, X-Y coordinates, link event identification and synchronization data. This information is then transmitted to a receiving end and is input into a set-top box. The set-top box receives the broadcast digital signal and includes a member for receiving the broadcast digital signal and generating a playable signal including indicia of the link data. The playable signal is then played on a playing device. The user is provided with a remote control or similar input device for selecting from the indicia. Upon selection of a desired indicia, the user may exercise the predetermined link associated with the selected indicia in order to obtain the desired playable signal.2011-03-03
20110055886MULTI-WIRELESS DEVICE CHANNEL COMMUNICATIONS - A method and apparatus support delivering a video media stream to a wireless device by exchanging communication signals through a secure communications interface to establish first and second communication channels. The channels may be according to different communication protocols. A first portion of the streamed video media stream over the first communication channel is encrypted while a second portion of the video media stream over the second communication channel is not encrypted. The second portion is based on the first. In addition to encryption of only the first portion, one embodiment includes using different communication protocols for the first and second channels to further enhance secure media delivery.2011-03-03
20110055887Tunneling and Signaling of Content in Legacy Formats - Broadcast services and other transmissions may conform to multiple types of protocols. Accordingly, a broadcast system may tunnel broadcasts or transmissions of a first protocol in a transport stream conforming to a second protocol. Each of the tunneled streams may be multicast together and may correspond to a separate and different physical layer pipe. The types of protocols and physical layer pipes carried in the transport stream may be defined in a pre-signaling section and/or post-signaling section of the transport stream. Common physical layer pipes may be generated and included in the transport stream to carry information and data common to multiple broadcast services or transmissions such as program specific information or service information.2011-03-03
20110055888CONFIGURABLE TELEVISION BROADCAST RECEIVING SYSTEM - A configurable television broadcast receiving system includes an analog to digital converter that receives a broadcast television (TV) signal and converts it from an analog signal to a digital signal. A communication interface receives the digital signal and communicates it to a general purpose programmable processor. The processor processes the digital signal by performing arithmetic processes to the signal to create a processed signal. A display device is communicatively coupled to the processor, receives the processed signal and displays a video rendition according to the processed signal.2011-03-03
20110055889Dynamic Application Loader for Set Top Box - Set top boxes (STBs) in a cable system are configured on a box-by-box basis to facilitate beta and trial testing of new or updated services. STBs are assigned to deployment groups identified by a deployment group identifier. Features configurations including hierarchies of features can be defined individually for different deployment groups. Configuration files for provisioning the STBs are provided by a cable system head end according to the deployment group the STB is assigned to. STBs can be configured at the time they boot and register with the system or in a “hot” manner to avoid rebooting.2011-03-03
20110055890METHOD AND SYSTEM TO CONFIGURE SECURITY RIGHTS BASED ON CONTEXTUAL INFORMATION - Disclosed are methods and systems for modifying access of a business intelligence report on a client computing device according to contextual information of a user. The method includes obtaining a context update message from a context acquisition model associated with the client computing device through one or more software interfaces provided by the context, based on the contextual information of the user, retrieving one or more security policies associated with the contextual information, applying the one or more security policies to the business intelligence report according to the contextual information of the user and displaying the business intelligence report on the client computing device to the user according to the one or more security policies.2011-03-03
20110055891DEVICE SECURITY - Security of a device, such as a mobile device, is maintained via a heartbeat signal. As long as the heartbeat signal is detected, the device is allowed to perform operations. If the heartbeat signal is not detected, appropriate action is taken. Appropriate action can include powering down the device, restricting access to files, erasing files, erasing the contents of a disk on the device, preventing access to designated files, reporting the location of the device, and/or preventing the device from being turned on after it is turned off. In an example configuration, the heartbeat signal is a low-power consuming, low data rate, signal allowing for processing of the heartbeat signal to be accomplished, at least in part, via the SIM of the device.2011-03-03
20110055892ACCESS CONTROL IN A MULTI-PRINCIPAL BROWSER - A principal operating system based-browser controls access to resources. The resources are represented semantically in a resource object model. A browser kernel of the browser mediates resources access calls from principals. In some implementations the principals are web entities and the resources are peripheral devices. The resource object model separates device semantics from physical device access. Resource access control policies are maintained by the browser kernel and separated from device access mechanisms.2011-03-03
20110055893COMMUNICATION APPLICATION - In at least some embodiments, a computer system includes a processor and a system memory coupled to the processor. The system memory stores a communication application that, when executed, provides first stage operations and second stage operations. The computer system also includes a network interface coupled to the processor. The first stage operations comprise a selective exchange of primary connection information with a communication endpoint via the network interface. The second stage operations comprise initiating a peer-to-peer communication session with the communication endpoint based on the primary connection information.2011-03-03
20110055894Firewall and NAT Traversal for Social Networking and/or Content Sharing On Mobile Devices - A method for facilitating firewall and NAT traversal during social networking and/or content sharing via a mobile device uses an instant message protocol to establish a near real-time communications session between two user devices on opposite sides of the firewall or NAT enabled router. A first application on a mobile device provides social networking and/or content sharing. A second application on the mobile device establishes a communication session for exchanging near real-time messages between the mobile device and a second device over the firewall or NAT protected network. The second application is associated with the first application and allows the mobile device to access a file associated with the first application that is stored in the second device via the communication session.2011-03-03
20110055895Shared scalable server to control confidential sensory event traffic among recordation terminals, analysis engines, and a storage farm coupled via a non-proprietary communication channel - A highly secure sensory stream event server receiving and storing encrypted assets and references to those assets over a non-proprietary communications channel. A system for selectively decrypting and transmitting references to analysis clients such as authenticated mutually unconscious users, and retrieving, decrypting and transmitting certain assets from high-volume storage, distributed storage, or in transit. A method for controlling a plurality of sensory stream event recordation clients and a plurality of analysis clients transmitting policies and commands requesting upload of assets and obtaining status solely by receiving client initiated sessions.2011-03-03
20110055896AUTHENTICATION SERVER AND LINE SERVER - When a reader/writer 2011-03-03
20110055897TRUST ASSERTION USING HIERARCHICAL WEIGHTS - An illustrative embodiment provides a computer-implemented method for access control by trust assertion using hierarchical weights. The computer-implemented method comprises obtaining an access request for an asset, identifying a trust value associated with a set of paths associated with the access request to form an identified trust value. The identified trust value is compared with a required trust value and a determination as to whether the identified trust value is greater than or equal to the required trust value is made. Responsive to a determination that the identified trust value is greater than or equal to the required trust value, access to the asset is permitted.2011-03-03
20110055898Dynamic Authentication in Secured Wireless Networks - Systems and methods for authentication using paired dynamic secrets in secured wireless networks are provided. Each authenticated user is assigned a random secret generated so as to be unique to the user. The secret is associated with a wireless interface belonging to the user, so that no other wireless interface may use the same secret to access the network. The secret may be updated either periodically or at the request of a network administrator, and reauthentication of the wireless network may be required.2011-03-03
20110055899SECURE REMOTE MANAGEMENT OF NETWORK DEVICES WITH LOCAL PROCESSING AND SECURE SHELL FOR REMOTE DISTRIBUTION OF INFORMATION - A system and method for the management of one or more wide area or local area network connected devices by a collocated managing device. The managing device forwards information in graphical form using a secure connection to a remotely located administrative user workstation.2011-03-03
20110055900DISTRIBUTED AUTHENTICATION, AUTHORIZATION AND ACCOUNTING - In some embodiments, computer systems, storage mediums, and methods are provided for controlling a connecting device's access to a plurality of computer networks. In other embodiments, the provided computer systems, storage mediums, and methods may provide for authentication, authorization, and accounting of connecting devices connecting to a plurality of computer networks. In other embodiments, the provided computer systems, storage mediums, and methods may provide for the distribution of authentication routing data and authorization policies among a plurality of computer networks. In yet other embodiments, the provided computer systems, storage mediums, and methods may provide for the distribution of accounting among a plurality of computer networks.2011-03-03
20110055901WIRELESS DEVICE FOR GROUP ACCESS AND MANAGEMENT - A system and method for establishing a group of wireless devices having shared media stored thereupon associates each group member device of the group of wireless devices, communicates with at least some of the group member devices of the group of wireless devices to identify shared media and upon receiving a request transmitted by a group member device of the group of wireless devices, supports access to shared media. The shared media may be stored on a different group member device, upon a managing server computer, or a media server. Upon a successful validation, the group member device that made the request is notified to facilitate the access to the shared media. The notification includes access information.2011-03-03
20110055902DYNAMIC AUGMENTATION, REDUCTION, AND/OR REPLACEMENT OF SECURITY INFORMATION BY EVALUATING LOGICAL EXPRESSIONS - Method, server, and computer product for modifying base permissions of access control lists (ACL) by evaluating logical expressions (LE). Base permissions are determined for a subject by comparing a name of subject against ACL entries for an object. ACL entries having LE entries are determined. LE entries are evaluated to determine which LE entries are true for LE attributes of the subject. Set operators of LE entries are combined to single union ACL, intersect ACL, and replace ACL. Replace operation performed to replace base permissions with replace ACL, resulting in first output. If no replace ACL, base permissions are the first output. Union operation is performed on first output and union ACL, resulting in second output. If no union ACL, first output is second output. Intersect operation performed on second output and intersect ACL, resulting in third output. If no intersect ACL, permissions of second output are the third output.2011-03-03
20110055903AUTHENTICATING USE OF A DISPERSED STORAGE NETWORK - At least one dispersed storage (DS) processing unit (2011-03-03
20110055904LICENSE AUTHENTICATION SYSTEM AND AUTHENTICATION METHOD - A license authentication system and method enabling authentication of an application to be installed in a client PC which is being incapable of communicating with the server which authenticates the application. A portable terminal performs license authentication of an application to be installed in a client PC in place of the server and gives the client PC a temporary right of use (step 2011-03-03
20110055905AUTHENTICATION APPARATUS AND COMPUTER-READABLE MEDIUM STORING AUTHENTICATION PROGRAM CODE - An authentication apparatus may include a storage unit, an analysis unit, and an authentication unit. The storage unit may be configured to store pieces of authentication information and an authentication order of the pieces of authentication information. The analysis unit may be configured to compare pieces of input information with the pieces of authentication information and to compare an input order of the pieces of input information with the authentication order. The authentication unit may be configured to authorize the pieces of input information if the comparison shows that the pieces of input information match the pieces of authentication information as necessary to authenticate and the input order of the pieces of input information matches the authentication order.2011-03-03
20110055906METHOD FOR AUTHENTICATION AND VERIFYING INDIVIDUALS AND UNITS - A method is provided for authenticating and verifying individuals and units, wherein the data exchange between the units proceeds by means of relative data and/or encrypted data. The method is characterized in that the authentication and/or verification processes of individual and/or units are carried out by units that are allocated to individuals or that the authentication and/or verification processes of individuals and/or units are carried out by units authorized to authenticate and/or verify, a unit being authorized to authenticate and/or verify by the transmission of at least one copy of a power by a unit allocated to an individual through the unit allocated to the individual once the owner of the unit allocated to an individual is authenticated.2011-03-03
20110055907HOST STATE MONITORING - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for a host state machine. In one aspect, the method includes defining a state machine in a memory of a data processing apparatus, the state machine comprising a plurality of states, and wherein network access for a host device is controlled in each state according to one or more network access zones associated with the state, each network access zone defining network access capabilities for the host device; monitoring, by the data processing apparatus, host devices attempting to access the network and host devices that have access to the network; and transitioning, for each host device, a state of the host based on the monitoring and a current state of the host.2011-03-03
20110055908SYSTEM AND METHOD FOR REMOTELY ACCESSING AND CONTROLLING A NETWORKED COMPUTER - The present invention advantageously provides a system and method for remotely accessing a networked computer. The system includes a personal computer, a locator server, a remote access terminal, and a connection key. The system is configured to remote access to only those users who are authorized and use authorized remote access terminal and connection key. In some embodiments, the connection key is configured to automate communication requests and authentication processes without user interaction.2011-03-03
20110055909METHODS, APPARATUS, AND COMPUTER PROGRAM PRODUCTS FOR SUBSCRIBER AUTHENTICATION AND TEMPORARY CODE GENERATION - Method, apparatus, and computer products are provided for providing temporary generated codes by a server. Responsive to triplet authentication of a device to service provider network, a server receives an initial code from the device to request a temporary generated code. The server verifies the triplet authentication of device. The server determines whether there is a user account match to the initial code. The server determines a corresponding application server based on the initial code and the user account match. The server generates a temporary generated code to access the application server. The temporary generated code is transmitted to both the application server and the communication device, is set to expire at a preset time, is generated to allow the user access to a single session on the application server, and is generated to expire after the temporary generated code is input to access the single session on application server.2011-03-03
20110055910USER-CENTRIC INTERCEPTION - The present invention relates to methods and arrangement for user-centric interception in a telecommunication system wherein correlated identities are federated in an Identity Management Controller. The method comprises: Sending from an Intercept Unit to the Identity Management Controller, a request for identities correlated with a specified key target identity. The Intercept Unit receives identities federated to the specified key target identity. The received identities are utilized for user-centric interception purposes.2011-03-03
20110055911BUSINESS VALIDATION BASED SOCIAL WEBSITE ACCOUNT AUTHENTICATION - Methods of the present inventions allow for verifying the authenticity of social website accounts. An example embodiment of a business validation based social website account authentication method may comprise the steps of receiving a request (that may include a business name and a business email address) to verify the authenticity of a social website account, validating the business name and business email address, and determining whether the domain name is registered to and under control of the business. If the business name and business email address are both validated, and the domain name is registered to and under control of the business, the social website account's authenticity may be certified.2011-03-03
20110055912METHODS AND APPARATUS FOR ENABLING CONTEXT SHARING - Some embodiments relate to processing a web page requested by a web browser. The requested web page is received, and additional code is inserted into the web page that alters and/or augments the functionality of the web page. The web page is then forwarded to the web browser that requested it. The browser executes the code inserted into the web page, thereby augmenting the functionality of the web page.2011-03-03
20110055913Multi-Level Authentication - Approaches for performing a multiple level authentication on an entity are provided. A primary authentication credential and a secondary authentication credential may be established for a user account. The primary authentication credential uniquely identifies a particular account of the software application. The secondary authentication credential uniquely identifies an entity, such as a user, application, or device, authorized to use the particular user account. Upon receiving a request to access the software application using the particular user account, a determination is made as to whether the request is accompanied by the primary authentication credentials and a secondary authentication credential associated with the particular user account. Upon determining that the request is accompanied by valid primary and secondary authentication credentials for the user account, limited access, based upon the secondary authentication credential, to the software application using the particular user account is granted.2011-03-03
20110055914PERSONAL INFORMATION LEAKAGE PREVENTIVE DEVICE AND METHOD - Conventional service providing systems personalized according to the user's information need to provide personal information. Therefore, there has been a problem that personal information might be leaked by service providers. A reliable proxy is installed between a user terminal and a service provider server to manage the personal information on the user. The proxy receives information necessary to create a content from the service provider server, creates a content reflecting the personal information from the information necessary to create the content, and transmits it to the user's terminal A countermeasure against estimation of personal information is taken for even a request of a user to acquire a sub-content and so forth.2011-03-03
20110055915METHODS OF PROVIDING DIGITAL CONTENT TAILORED TO USERS OF PRIVATE NETWORKS WITHIN A PROTECTED VIRTUAL ENVIRONMENT - A method of communicating valuable digital information to users is provided that utilizes, in some cases, a proxy server to white list significantly greater amounts of information available on the internet to penetrate protective virtual barriers such as firewalls or walled gardens, and in which such digital information is conveyed in a significantly tailored arrangement by assessing more precise geographic location data of the user during the process.2011-03-03
20110055916METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR ADAPTIVE PACKET FILTERING - The subject matter described herein includes methods, systems, and computer readable media for adaptive packet filtering. One method includes identifying at least one subset of rules and an ordered set of firewall packet filtering rules that defines a firewall policy such that the subset contains disjoint rules. Disjoint rules are defined as rules whose order can be changed without changing integrity of the firewall policy. Rules in the subset are sorted to statistically decrease the number of comparisons that will be applied to each packet that a firewall encounters. Packets are filtered at the firewall using the sorted rules in the subset by comparing each packet to each of the sorted rules in the subset until the packet is allowed or denied and ceasing the comparing for the packet in response to the packet being allowed or denied and thereby achieving sub-linear searching for packets filtered using the sorted rules in the subset.2011-03-03
20110055917VALID ACCESS TO MOBILE DEVICE APPLICATION - A method in a mobile device, for verifying valid access to at least one software application comprised in the mobile device. The mobile device comprises a unique hardware manufacturer identity code. The at least one software application comprises a list of at least one valid unique hardware manufacturer identity code. First, a request to access to the at least one software application is received. Then it requests the unique hardware manufacturer identity code of the mobile device. The next step is to receive the unique hardware manufacturer identity code and to extract at least a part of the identity code identifying the manufacturer of the mobile device. The extracted part of the identity code with valid codes comprised in the software application is compared. If the extracted part of the identity code corresponds to the valid code, access to the at least one software application is provided to the user.2011-03-03
20110055918ACCESS CONTROL MODEL OF FUNCTION PRIVILEGES FOR ENTERPRISE-WIDE APPLICATIONS - Techniques are provided for access control in a system. A request is received for checking whether a subject has a privilege for a resource. A security class that defines a plurality of privileges that include the requested privilege is determined. One or more access control lists have been configured for the security class. The one or more access control lists comprise one or more access control entries. Each of the one more access control entry defines whether one or more subjects has been granted or denied to zero, one or more of the plurality of privileges defined in the security class. Based on the access control lists configured for the security class, it is determined whether the subject should be granted the privilege for the requested resource.2011-03-03
20110055919System and Method for the Designation of Items in a Virtual Universe - The present invention enables items in a Virtual Universe to be tagged as available for pickup by one or more designated users. The present invention permits a designated user to be alerted that there is an item designated for that user/avatar and available for pick-up at a location in the Virtual Universe. A user may designate another user (or user's avatar), for example, a minor for whom the designating user has responsibility, as an “item” to be tracked. For privacy and other reasons, this and other features may be implemented on an opt-in basis.2011-03-03
20110055920METHOD AND SYSTEM FOR AUTONOMOUS CONTROL AND PROTECTION OF COMPUTER SYSTEMS - A management system includes a plurality of components within a computer system. A plurality of component resource managers is provided, and each of the components is controlled by at least one of the plurality of component resource managers. A plurality of component management interfaces is also provided. Each of the components communicates with at least one of the controlling component resource managers via one of the component management interfaces. At least one runtime manager autonomously controls operation of the components and the component resource managers.2011-03-03
20110055921PROTECTING AGAINST DISTRIBUTED NETWORK FLOOD ATTACKS - A network security device performs a three-stage analysis of traffic to identify malicious clients. In one example, a device includes an attack detection module to, during a first stage, monitor network connections to a protected network device, during a second stage, to monitor a plurality of types of transactions for the plurality of network sessions when a parameter for the connections exceeds a connection threshold, and during a third stage, to monitor communications associated with network addresses from which transactions of the at least one of type of transactions originate when a parameter associated with the at least one type of transactions exceeds a transaction-type threshold. The device executes a programmed action with respect to at least one of the network addresses when the transactions of the at least one of the plurality of types of transactions originating from the at least one network address exceeds a client-transaction threshold.2011-03-03
20110055922Method for Detecting and Blocking Phishing Attacks - A method for detecting a suspected phishing attack characterized by monitoring strings of characters in a questionnaire presented by a non-approved address to a user terminal for similarity to a substring of a string of sensitive data, such that the substring has a length of one or more characters less than the length of the string of sensitive data, such that on detecting a substring of critical length, an alert is triggered.2011-03-03
20110055923HIERARCHICAL STATISTICAL MODEL OF INTERNET REPUTATION - In embodiments of the present invention improved capabilities are described for predicting the reputation of a communication identifier, such as a web address, a domain name, an IP address, host name, email address, IM address, telephone number, VoIP telephony address, and the like. In embodiments, the present invention may receive a communication from a first communication identifier, parse the first communication identifier into its components, and assign the components to a hierarchical tree structure, where the hierarchical tree structure maintains the hierarchical relationship between the components of the communication identifier. The present invention may monitor and keep count of a number of communications from the first communication identifier, wherein the number of communications may be kept for both malicious and/or unwanted communications and non-malicious and/or unwanted communications. Attributes may then be provided to the number of communications for each appropriate component of the hierarchical tree, and a statistical measure may be calculated as related to the number of communications for each component of the hierarchical tree. The present invention may then receive a communication from a second communication identifier, where the second communication identifier may be previously unknown and have a common component with the hierarchical tree. The statistical measure of the common component may then be assigned to the second communication identifier, and utilizing the statistical measure assigned to the second communication identifier, may provide a prediction of reputation of the second communication identifier.2011-03-03
20110055924GRAPH STRUCTURES FOR EVENT MATCHING - A system for matching a system event to a rule is disclosed. The system includes a computer-readable data structure comprising a plurality of system event rules organizable as a partially ordered set. The system also includes a processor configured to analyze the computer-readable data structure to determine whether an event matches a description set of at least one rule from the plurality of system event rules. Methods and machine-readable mediums are also disclosed.2011-03-03
20110055925PATTERN-BASED APPLICATION CLASSIFICATION - Embodiments of present disclosure provide a method and system for remotely auditing a security posture of a client machine at a centralized server. The system receives an integrity-protected report from the client machine, or other devices related to the client machine, the report comprising entries associated with security events or security states or both related to the client machine. The report entries comprise characteristics of the security events or security states to facilitate identification of a probable security attack at the client machine. The system also detects a pattern among one or more reports. Finally, the system classifies the security posture of the client machine based on the detected pattern, which could indicate a probable security attack at the client machine.2011-03-03
20110055926FLEXIBLY ASSIGNING SECURITY CONFIGURATIONS TO APPLICATIONS - A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.2011-03-03
20110055927UPDATING ASSETS RENDERED IN A VIRTUAL WORLD ENVIRONMENT BASED ON DETECTED USER INTERACTIONS IN ANOTHER WORLD - A virtual world controller receives an identifier of a detected interaction by a user within another world, separate from a particular virtual world environment accessible by the user, from a device that detects and reports user interactions within the other world. The virtual world controller identifies at least one particular trigger tag name assigned to the identifier of the detected interaction from among a plurality of separate detectable user interactions in a trigger tag database. The virtual world controller identifies at least one particular asset class from among a plurality of asset classes specified with the particular trigger tag name within a particular trigger asset coupling from among at least one trigger asset coupling in a trigger asset coupling database. The virtual world controller accesses at least one particular asset assigned to the at least one particular asset class in an asset class database. The virtual world controller renders the at least one particular asset within the particular virtual world environment in a virtual location within the particular virtual world triggered by the particular trigger asset coupling.2011-03-03
20110055928METHOD AND SYSTEM FOR DETECTING UNAUTHORIZED WIRELESS DEVICES - An approach is provided for detecting unauthorized wireless devices in a network. A platform retrieves an identifier of a device from a log of devices connected to a network, determines whether the device is a wireless device by applying a plurality of criteria to the identifier, retrieving a list of wireless devices authorized to connect to the network if the device is determined to be a wireless device, and compares the identifier with the list to determine whether the device is authorized to connect to the network.2011-03-03
20110055929METHOD FOR PRODUCING AN IMAGE INTENDED FOR AN OPERATING SYSTEM CALLED OS IMAGE AND CORRESPONDING DEVICE - A method for producing a standard OS image, intended for an operating system, including a compilation of at least one source file into at least one executable file. The method also including forming (form) an intermediate standard OS image (IM2011-03-03
20110055930CORRELATING PRIVATE AFFINITIES - The claimed subject matter relates to an architecture that can leverage private affinities in order to facilitate or enrich relationships between people. In particular, the architecture can receive a profile associated with a user wherein the profile includes a set of private affinities that are cryptographically protected from public inspection. The architecture can decrypt and/or cryptographically compare a private affinity from the profile to an affinity in a disparate profile (associated with a disparate user) in order to identify a matching affinity. Once a matching affinity is identified, a message indicating such can be provided to the user along with a request to publish certain revealed information to the disparate user, possibly based upon a mutual exchange of commensurate information from the disparate user.2011-03-03
20110055931METHOD AND APPARATUS FOR PROTECTING ACCOUNT NUMBERS AND PASSWORDS - A method and apparatus are provided for protecting confidential information. The method includes the steps of providing a plurality of files where each file contains at least one item of secret information, password protecting the plurality of files with a master password, detecting entry of passwords into a master password entry field, comparing entered passwords with the master password to identify incorrect master passwords and deleting the plurality of files upon successive entry of incorrect master passwords a predetermined number of times.2011-03-03
20110055932Data Access Control with Flexible Data Disclosure - A method for presenting data, the method including presenting via a first computer output device an indicator indicating a data item whose value is prevented, in accordance with predefined access control criteria, from being presented via the first computer output device, receiving from a requestor a request to present the data item value, maintaining a record of an identity of the requestor together with a description of the requested data item, and presenting via a second computer output device the data item value.2011-03-03
20110055933PERSONAL LIBRARY ON NET - A personal library on a network enables content to be distributed in a manner that is able to be regulated to prevent users from violating copyright law yet allows user to use the content on more than one device. The personal library receives content from a store and/or contains content and then provides the content including a content management implementation to user devices.2011-03-03
20110055934METHOD AND SYSTEM FOR TUNABLE DISTRIBUTION OF CONTENT - A method and system for tunable distribution of content are disclosed. Preferably, the content comprises digital rights and/or watermark information. In one embodiment, a computer-implemented method comprises receiving a request from a client. One or more content files related to the request and a user profile of a user are determined. One or more seeders are assigned to start the delivery of the one or more content files. The client is allowed to obtain a plurality of pieces of the one or more content files from the one or more seeders. At least one piece of the plurality of pieces of the one or more content files contains digital rights and/or watermark information.2011-03-03
20110055935SYSTEM FOR GROUP ACCESS TO SHARED MEDIA, RESOURCES, AND SERVICES - A system and method for establishing a group of wireless devices for sharing software and hardware resources as well as media stored thereupon associates each group member device of the group of wireless devices, communicates with at least some of the group member devices of the group of wireless devices to identify shared media and upon receiving a request transmitted by a group member device of the group of wireless devices, supports access to shared media. The shared media may be stored on a different group member device, upon a managing portal device, or a media server. Upon a successful validation, the group member device that made the request is notified to facilitate the access to the shared media. The notification includes access information.2011-03-03
20110055936TRANSGENIC MAMALS MODIFIELD IN BRI PROTEIN EXPRESSION - Provided are non-human mammals comprising a transgenic nucleic acid sequence capable of causing an alteration of expression of Bri2 or Bri3 in the mammal. Also provided are non-human mammals comprising a Bri2 or Bri3 gene under the control of the native Bri2 or Bri3 promoter. Additionally provided are non-human mammals genetically engineered to lack expression of a Bri2 or Bri3 gene. Further, non-human mammals comprising a transgene encoding a Bri2 or Bri3 protein under the control of the αCaMKII promoter are provided. Non-human mammals comprising a transgene encoding a furin protein are additionally provided. Embryonic stem cells of any of the above-described non-human mammals are further provided. Methods of screening a compound for treatment of a disease characterized by cerebral amyloidosis are additionally provided. Also provided are methods of making transgenic non-human mammals. Nucleic acids capable of causing an alteration of expression of Bri2 or BH3 if transfected into a mouse are additionally provided, as are comprising a sequence capable of causing an alteration of expression of Bri2 or Bri3 if transfected into a mouse.2011-03-03
20110055937Keratin 8 Mutations are Risk Factors for Developing Liver Disease of Multiple Etiologies - Keratin 8 and 18 (K8/K18) mutations are shown to be associated with a predisposition to liver or biliary tract disease, particularly noncryptogenic hepatobiliary disease. Unique K8/K18 mutations are shown in patients with diseases including but without limitation to viral hepatitis, biliary atresia, alcoholic cirrhosis and other acute or chronic toxic liver injury, cryptogenic cirrhosis, acute fulminant hepatitis, autoimmune liver disease, cystic fibrosis, primary biliary cirrhosis, primary sclerosing cholangitis, diseases that are linked with cryptogenic cirrhosis, such as nonalcoholic steatohepatitis, and the like. Livers with keratin mutations had increased incidence of cytoplasmic filamentous deposits. Therefore, K8/K18 are susceptibility genes for developing cryptogenic and noncryptogenic forms of liver disease. Mutant alleles are associated with disease susceptibility, and their detection is used in the diagnosis of a predisposition to these conditions.2011-03-03
20110055938TRANSGENIC ANIMAL FOR PRODUCTION OF ANTIBODIES HAVING MINIMAL CDRS - A transgenic animal is provided. In certain embodiments, the transgenic animal comprises a genome comprising: an immunoglobulin light chain locus comprising: a) a functional immunoglobulin light chain gene comprising a transcribed variable region encoding: i. light chain CDR1, CDR2 and CDR3 regions that are composed of 2 to 5 different amino acids; and ii. a light chain framework; and, operably linked to the functional immunoglobulin light chain gene: b) a plurality of pseudogene light chain variable regions each encoding: i. light chain CDR1, CDR2 and CDR3 regions that are composed of the same 2 to 5 different amino acids as the CDRs of the functional gene; and ii. a light chain framework that is identical in amino acid sequence to the light chain framework of the transcribed variable region.2011-03-03
20110055939METHOD FOR INTRODUCING FOREIGN GENE INTO EARLY EMBRYO OF PRIMATE ANIMAL AND METHOD FOR PRODUCING TRANSGENIC PRIMATE ANIMAL COMPRISING SUCH METHOD - An object of the present invention is to provide a method for introducing a gene into an embryo for production of a human disease model primate animal using a non-human primate animal such as a marmoset. The present invention relates to a method for introducing a foreign gene into an early embryo of a non-human primate animal, which comprises placing early embryos of a non-human primate in a 0.2 M to 0.3 M sucrose solution, so as to increase the volume of the perivitelline spaces, and then injecting a viral vector containing a human foreign gene operably linked to a promoter into the perivitelline spaces of the early embryos.2011-03-03
20110055940Therapeutic Inhibitors of PAI-1 Function Methods of Their Use - The invention relates to mammalian PAI-I ligands and modulators. In particular, the invention relates to polypeptides, polypeptide compositions and polynucleotides that encode polypeptides that are ligands and/or modulators of PAI-I. The invention also relates to polyligands that are homopolyligands or heteropolyligands that modulate PAI-I activity. The invention also relates to ligands and polyligands localized to a region of a cell. The invention also relates to localization tethers and promoter sequences that can be used to provide spatial control of the PAI-I ligands and polyligands. The invention also relates to inducible gene switches that can be used to provide temporal control of the PAI-I ligands and polyligands. The invention also relates to methods of treating or preventing atherosclerosis. The invention also relates to methods of treating or preventing fibrosis.2011-03-03
20110055941Chd5 is a novel tumor suppressor gene - The invention provides methods of treating cancer using a Chd5 protein or an agonist thereof Also provided are diagnostics, screening methods of cancer therapeutics, and cancer models useful for studying cancer biology and drug screening.2011-03-03
20110055942Single domain TDF-related compounds and analogs thereof - The present invention relates generally to tissue differentiation factor (TDF) analogs. More specifically, the invention relates to structure-based methods and compositions useful in designing, identifying, and producing molecules which act as functional modulators of TDF-like receptors. The invention further relates to methods of detecting, preventing, and treating TDF-associated disorders.2011-03-03
20110055943NOVEL THERAPEUTIC TARGETS IN INFLAMMATORY BOWEL DISEASE - The present invention relates to novel sequences for use in detection, diagnosis and treatment of bowl disease (BD). The invention provides BD-associated polynucleotide sequences whose expression is associated with BD. Provided herein are diagnostic compositions and methods for the detection of BD. The present invention provides monoclonal and polyclonal antibodies specific for the BD polypeptides. The present invention also provides diagnostic tools and therapeutic compositions and methods for screening, prevention and treatment of BD.2011-03-03
20110055944CUCUMBER HYBRID DARLINGTON AND PARENTS THEREOF - The invention provides seed and plants of cucumber hybrid Darlington and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of cucumber hybrid Darlington and the parent lines thereof, and to methods for producing a cucumber plant produced by crossing such plants with themselves or with another cucumber plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants.2011-03-03
20110055945BROCCOLI HYBRID PS05151639 - The invention provides seed and plants of broccoli hybrid PS05151639 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of broccoli hybrid PS05151639 and the parent lines thereof, and to methods for producing a broccoli plant produced by crossing such plants with themselves or with another broccoli plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants.2011-03-03
20110055946DOMINANT EARLINESS MUTATION AND GENE IN SUNFLOWER (HELIANTHUS ANNUUS) - The subject invention relates in part to the discovery of a spontaneous sunflower mutation. The subject invention involves an ‘early’ mutation and related inbred/hybrid development. The subject invention further provides a single dominant gene that confers earliness in sunflower inbred isolines and near isogenic hybrids. There is no known prior teaching or suggestion of this gene's utility for hybrid development in the industry. The subject indention also provides a new and distinctive sunflower inbred line designated H 120R. The invention includes seeds that possess this mutated gene, plants produced by growing these seeds, and progeny thereof that possess this mutated gene and the associated earliness trait. The subject invention also includes methods for producing such sunflower seeds and plants, including inbreds and hybrids. Such plants can be produced by, for example, crossing such an inbred line with itself or with another sunflower line.2011-03-03
20110055947MELON SLIP HARVEST INDICATOR - The invention provides a 2011-03-03
20110055948Soybean Cultivar S090001 - A soybean cultivar designated S090001 is disclosed. The invention relates to the seeds of soybean cultivar S090001, to the plants of soybean S090001, to plant parts of soybean cultivar S090001, and to methods for producing a soybean plant produced by crossing soybean cultivar S090001 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S090001, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S090001, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S090001 with another soybean cultivar.2011-03-03
20110055949Soybean Cultivar 86351435 - A soybean cultivar designated 86351435 is disclosed. The invention relates to the seeds of soybean cultivar 86351435, to the plants of soybean 86351435, to plant parts of soybean cultivar 86351435, and to methods for producing a soybean plant produced by crossing soybean cultivar 86351435 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety 86351435, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 86351435, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar 86351435 with another soybean cultivar.2011-03-03
20110055950Soybean Cultivar 88234045 - A soybean cultivar designated 88234045 is disclosed. The invention relates to the seeds of soybean cultivar 88234045, to the plants of soybean 88234045, to plant parts of soybean cultivar 88234045, and to methods for producing a soybean plant produced by crossing soybean cultivar 88234045 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety 88234045, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 88234045, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar 88234045 with another soybean cultivar.2011-03-03
20110055951Soybean Cultivar 80213755 - A soybean cultivar designated 80213755 is disclosed. The invention relates to the seeds of soybean cultivar 80213755, to the plants of soybean 80213755, to plant parts of soybean cultivar 80213755, and to methods for producing a soybean plant produced by crossing soybean cultivar 80213755 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety 80213755, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 80213755, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar 80213755 with another soybean cultivar.2011-03-03
20110055952Soybean Cultivar 88192265 - A soybean cultivar designated 88192265 is disclosed. The invention relates to the seeds of soybean cultivar 88192265, to the plants of soybean 88192265, to plant parts of soybean cultivar 88192265, and to methods for producing a soybean plant produced by crossing soybean cultivar 88192265 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety 88192265, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 88192265, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar 88192265 with another soybean cultivar.2011-03-03
20110055953Soybean Cultivar 8607481 - A soybean cultivar designated 8607481 is disclosed. The invention relates to the seeds of soybean cultivar 8607481, to the plants of soybean 8607481, to plant parts of soybean cultivar 8607481, and to methods for producing a soybean plant produced by crossing soybean cultivar 8607481 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety 8607481, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 8607481, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar 8607481 with another soybean cultivar.2011-03-03
20110055954Soybean Cultivar 8922462 - A soybean cultivar designated 8922462 is disclosed. The invention relates to the seeds of soybean cultivar 8922462, to the plants of soybean 8922462, to plant parts of soybean cultivar 8922462, and to methods for producing a soybean plant produced by crossing soybean cultivar 8922462 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety 8922462, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 8922462, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar 8922462 with another soybean cultivar.2011-03-03
20110055955Soybean Cultivar 306601347 - soybean cultivar designated 306601347 is disclosed. The invention relates to the seeds of soybean cultivar 306601347, to the plants of soybean 306601347, to plant parts of soybean cultivar 306601347, and to methods for producing a soybean plant produced by crossing soybean cultivar 306601347 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety 306601347, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 306601347, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar 306601347 with another soybean cultivar.2011-03-03
20110055956Soybean Cultivar 1811321658 - A soybean cultivar designated 1811321658 is disclosed. The invention relates to the seeds of soybean cultivar 1811321658, to the plants of soybean 1811321658, to plant parts of soybean cultivar 1811321658 and to methods for producing a soybean plant produced by crossing soybean cultivar 1811321658 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars or breeding cultivars and plant parts derived from soybean variety 1811321658, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 1811321658 and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants and plant parts produced by crossing the cultivar 1811321658 with another soybean cultivar.2011-03-03
20110055957Soybean Cultivar 1467521658 - A soybean cultivar designated 1467521658 is disclosed. The invention relates to the seeds of soybean cultivar 1467521658, to the plants of soybean 1467521658, to plant parts of soybean cultivar 1467521658 and to methods for producing a soybean plant produced by crossing soybean cultivar 1467521658 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars or breeding cultivars and plant parts derived from soybean variety 1467521658, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 1467521658 and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants and plant parts produced by crossing the cultivar 1467521658 with another soybean cultivar.2011-03-03
20110055958Soybean Cultivar 1196221658 - A soybean cultivar designated 1196221658 is disclosed. The invention relates to the seeds of soybean cultivar 1196221658, to the plants of soybean 1196221658, to plant parts of soybean cultivar 1196221658 and to methods for producing a soybean plant produced by crossing soybean cultivar 1196221658 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars or breeding cultivars and plant parts derived from soybean variety 1196221658, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 1196221658 and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants and plant parts produced by crossing the cultivar 1196221658 with another soybean cultivar.2011-03-03
20110055959Soybean Cultivar 1972621658 - A soybean cultivar designated 1972621658 is disclosed. The invention relates to the seeds of soybean cultivar 1972621658, to the plants of soybean 1972621658, to plant parts of soybean cultivar 1972621658 and to methods for producing a soybean plant produced by crossing soybean cultivar 1972621658 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars or breeding cultivars and plant parts derived from soybean variety 1972621658, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 1972621658 and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants and plant parts produced by crossing the cultivar 1972621658 with another soybean cultivar.2011-03-03
20110055960METHOD TO IDENTIFY ASIAN SOYBEAN RUST RESISTANCE QUANTITATIVE TRAIT LOCI IN SOYBEAN AND COMPOSITIONS THEREOF - The present invention is in the field of plant breeding and disease resistance. More specifically, the invention includes a method for breeding soybean plants containing quantitative trait loci that are associated with resistance to Asian Soybean Rust (ASR), a fungal disease associated with 2011-03-03
20110055961LETTUCE LINE PS06519291 - The invention provides seed and plants of the lettuce line designated PS06519291. The invention thus relates to the plants, seeds and tissue cultures of lettuce line PS06519291, and to methods for producing a lettuce plant produced by crossing a plant of lettuce line PS06519291 with itself or with another lettuce plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of lettuce line PS06519291, including the gametes of such plants.2011-03-03
20110055962LETTUCE LINE PS06519080 - The invention provides seed and plants of the lettuce line designated PS06519080. The invention thus relates to the plants, seeds and tissue cultures of lettuce line PS06519080, and to methods for producing a lettuce plant produced by crossing a plant of lettuce line PS06519080 with itself or with another lettuce plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of lettuce line PS06519080, including the gametes of such plants.2011-03-03
20110055963Stabilization and blueing of anthocyanin pigments using gene encoding aromatic acyltransferase capable of transferring an aromatic acyl group to the 3'-position of anthocyanin - A method of acylating the 3′ position of anthocyanin using an enzyme that transfers an aromatic acyl group to a sugar at the 3′ position of anthocyanin or a gene encoding the enzyme.2011-03-03
20110055964Method for Generating Hypermutable Plants - Blockade of mismatch repair in a plant can lead to hypermutation and a new genotype and/or phenotype. One approach used to generate hypermutable plants is through the expression of dominant negative alleles of mismatch repair genes in transgenic plants or derived cells. By introducing these genes into cells and transgenic plants, new cell lines and plant varieties with novel and useful properties can be prepared more efficiently than by relying on the natural rate of mutation. Moreover, methods to inhibit the expression and activity of endogenous plant MMR genes and their encoded products are also useful to generate hypermutable plants.2011-03-03
20110055965CYCLE SINGLE-STRANDED NUCLEIC ACID COMPLEX AND METHOD FOR PRODUCING THE SAME - The present invention relates to a circular single-stranded nucleic acid complex comprising a sense strand RNA sequence, an antisense strand RNA sequence complementary to the sense strand RNA sequence, and two identical or different loop moieties connecting the sense and antisense strands, wherein the sense and antisense strands form a stem by pairing, and the loop moieties are selected from the group consisting of polyalkylene glycol, DNA, DNA-RNA chimera, a derivative thereof, and a combination thereof.2011-03-03
20110055966Environmental Stress-Inducible 996 Promoter Isolated from Rice and Uses Thereof - The present invention relates to environmental stress-inducible 996 promoter isolated from rice, a recombinant plant expression vector comprising said promoter, a method of producing a target protein by using said recombinant plant expression vector, a method of producing a transgenic plant using said recombinant plant expression vector, a transgenic plant produced by said method, a method of improving resistance of a plant to environmental stress by using said promoter, and a primer set for amplification of said promoter.2011-03-03
20110055967ENVIRONMENTAL STRESS-INDUCIBLE 972 PROMOTER ISOLATED FROM RICE AND USES THEREOF - The present invention relates to environmental stress-inducible 972 promoter isolated from rice, a recombinant plant expression vector comprising said promoter, a method of producing a target protein by using said recombinant plant expression vector, a method of producing a transgenic plant using said recombinant plant expression vector, a transgenic plant produced by said method, a method of improving resistance of a plant to environmental stress by using said promoter, and a primer set for amplification of said promoter.2011-03-03
20110055968NOVEL BACILLUS THURINGIENSIS CRYSTAL POLYPEPTIDES, POLYNUCLEOTIDES, AND COMPOSITIONS THEREOF - The present invention provides insecticidal polypeptides related to shuffled 2011-03-03
20110055969Method to Produce Foreign Protein in Kernel of Oil Palm - The present disclosure relates at least in part to methods for use in producing a foreign protein in a plant, for example an oil palm. In certain embodiments the foreign protein is expressed in the kernel of an oil palm fruit.2011-03-03
20110055970Method to Produce Foreign Protein in Mesocarp of Oil Palm - The present disclosure relates at least in part to methods for use in producing foreign protein in a plant, for example an oil palm. In certain embodiments the foreign protein is expressed in the mesocarp of oil palm fruit.2011-03-03
20110055971SUGAR AND LIPID METABOLISM REGULATORS IN PLANTS III - Isolated nucleic acids and proteins associated with lipid and sugar metabolism regulation are provided. In particular, lipid metabolism proteins (LMP) and encoding nucleic acids originating from 2011-03-03
20110055972SUGAR AND LIPID METABOLISM REGULATORS IN PLANTS IV - Isolated nucleic acids and proteins associated with lipid and sugar metabolism regulation are provided. In particular, lipid metabolism proteins (LMP) and encoding nucleic acids originating from 2011-03-03
20110055973DELTA-8 DESATURASES AND THEIR USE IN MAKING POLYUNSATURATED FATTY ACIDS - Isolated nucleic acid fragments and recombinant constructs comprising such fragments encoding delta-8 desaturases along with a method of making long-chain polyunsaturated fatty acids (PUFAs) using these delta-8 desaturases in plants and oleaginous yeast.2011-03-03
20110055974MANIPULATION OF FLAVONOID BIOSYNTHESIS IN PLANTS - The present invention relates to nucleic acids and nucleic acid fragments encoding amino acid sequences for flavonoid biosynthetic enzymes in plants, and the use thereof for the modification of flavonoid biosynthesis in plants. More particularly, the flavonoid biosynthetic enzyme is selected from the group consisting of chalcone isomerase (CHI), chalcone synthase (CHS), chalcone reductase (CHR), dihydroflavonol 4-reductase (DFR), leucoanthocyanidin reductase (LCR), flavonoid 3′,5′ hydrolase (F3′5′H), flavanone 3-hydroxylase (F3H), flavonoid 3′-hydroxylase (F3′H), phenylalanine ammonia-olyase (PAL) and vestitone reductase (VR), and functionally active fragments and variants thereof.2011-03-03
20110055975NITROGEN-REGULATED SUGAR SENSING GENE AND PROTEIN AND MODULATION THEREOF - The present invention relates to a nitrogen-regulated GATA transcription factor gene required for sugar sensing and the modulation of the expression of this gene to modulate a characteristic in a plant. The GATA transcription factor of the present invention is involved in regulating sugar sensing in plants and its expression is influenced by nitrogen status. Increased expression of this or substantially similar genes can produce plants with improved nitrogen utilization and increased yield.2011-03-03
20110055976Method Of Protease Production In Plants - A process of producing a protease in a plant or in plant cells, comprising (a) providing a plant comprising a heterologous nucleotide sequence comprising a coding sequence encoding a fusion protein, said fusion protein comprising: an apoplast or plastid signal peptide; a SUMO protein or a derivative of a SUMO protein; and a zymogen of said protease, and (b) expressing said fusion protein.2011-03-03
20110055977Enhancement of Reproductive Heat Tolerance in Plants - The reproductive heat tolerance of plants may be enhanced by transformation with chimeric construct comprising a nucleic acid coding sequence encoding a heat shock protein operatively linked to a promoter which is effective for expression in mature pollen of the plant. Although mature pollen of plants do not normally express heat shock proteins, plants transformed with this construct express and accumulate the heat shock protein even in pollen which is mature. The mature pollen of the transformed plants exhibits significantly increased tolerance to elevated temperature stress.2011-03-03
20110055978Pesticidal Mixtures - The present invention relates to synergistic mixtures comprising, as active components, an insecticidal compound I selected from the nicotinic receptor agonists/antagonists compounds and one or two further fungicidal compounds in synergistic effective amounts.2011-03-03
20110055979Protein Kinase Stress-Related Proteins and Methods of Use in Plants - A transgenic plant transformed by a Protein Kinase Stress-Related Protein (PKSRP) coding nucleic acid, wherein expression of the nucleic acid sequence in the plant results in increased tolerance to environmental stress as compared to a wild type variety of the plant. Also provided are agricultural products, including seeds, produced by the transgenic plants. Also provided are isolated PKSRPs, and isolated nucleic acid coding PKSRPs, and vectors and host cells containing the latter.2011-03-03
20110055980Chalcone 3-Hydroxylase - The present invention relates to an isolated nucleic acid molecule, comprising a nucleotide sequence, which encodes a polypeptide with chalcone 3-hydroxylase activity, wherein the nucleotide sequence comprises SEQ ID NO. 1 or has at least a 60% identity with SEQ ID NO. 1 or is able to hybridize with a molecule comprising the sequence of SEQ ID NO. 1, wherein the nucleotide sequence encodes a polypeptide, which comprises the motif FASRPLSX2011-03-03
20110055981Device for Positioning a Moveable Object of Submicron Scale - The instant disclosure describes a device for positioning a moveable object which can be moved over a distance of the order of 1 nanometer in a time of 1 microsecond or less, comprising: a microtip; first piezoelectric positioning, polarization, detection and control means for moving the microtip relative to the object and bringing it to a distance of the order of 1 nanometer from the object in order to make a tunnel current flow between the microtip and the object, for measuring the tunnel current and for slaving, depending on the measured tunnel current, the distance between the microtip and the object to a constant value (d2011-03-03
20110055982A SCANNING PROBE MICROSCOPE AND A MEASURING METHOD USING THE SAME - It is difficult for a scanning probe microscope according to the conventional technology to operate a probe for scanning and positioning in a wide range and for high-precision scanning in a narrow range. A scanning probe microscope according to the invention uses probe driving actuators for coarse adjustment and fine adjustment. For scanning and positioning in a wide range, the coarse adjustment actuator is switched to fast responsiveness. For scanning in a narrow range, the coarse adjustment actuator is switched to slow responsiveness. Instead, positional noise is reduced and the fine adjustment actuator is mainly used for scanning in a narrow range. The probe is capable of not only scanning and positioning in a wide range but also high-precision scanning in a narrow range.2011-03-03
20110055983DYNAMIC MODE AFM APPARATUS - There is provided a dynamic mode AFM apparatus that configures an automatic control system which can automatically obtain a probe-sample distance, and allows high-speed identification of atoms of the sample surface.2011-03-03
Website © 2025 Advameg, Inc.