17th week of 2011 patent applcation highlights part 57 |
Patent application number | Title | Published |
20110099611 | METHODS AND APPARATUS FOR SECURE, PORTABLE, WIRELESS AND MULTI-HOP DATA NETWORKING - A mobile network solution provides secure and portable wireless networking service to mobile users with devices equipped with wireless network interfaces. The Secure Nomadic Wireless Network, or SNOWNET, follows a hierarchical approach. Special SNOWNET nodes are deployed in the area where networking service is needed and form a backbone network. At the same time, SNOWNET nodes provide local access service to regular mobile clients. SNOWNET provides security through authentication of the nodes and clients, as well as through encryption of the data. | 2011-04-28 |
20110099612 | AUTOMATIC USER AUTHENTICATION AND IDENTIFICATION FOR MOBILE INSTANT MESSAGING APPLICATION - Automatic identification and authentication of a user of a mobile application entails receiving from the wireless communications device a unique device identifier and an e-mail address corresponding to the wireless communications device, associating a registration identifier with the unique device identifier and the e-mail address, generating an authentication token, and communicating the authentication token and the registration identifier to the wireless communications device. This technology obviates the need for the user to remember and enter a user ID and password to access backed-up application data on a server. This is particularly useful for instant messaging applications, e.g. PIN messaging, in which the unique device identifier is used to identify the user and is also the transport address. Once registered, the user who has switched to a new device or has wiped his existing device, can restore contacts or other application data from the server based on the registration identifier. | 2011-04-28 |
20110099613 | MODIFICATION OF A SECURED PARAMETER IN A USER IDENTIFICATION MODULE - There is provided a user identification module configured for use in a mobile communication device. An exemplary user identification module comprises a first data item being accessible for reading a value of a parameter used in the operation of the user identification module. The exemplary user identification module also comprises at least two second data items, the second data items being unmodifiable and each second data item including a value of the parameter. The first data item includes a modifiable reference addressing one second data item. | 2011-04-28 |
20110099614 | NETWORK SYSTEM, METHOD OF CONTROLLING ACCESS TO STORAGE DEVICE, ADMINISTRATION SERVER, STORAGE DEVICE, LOG-IN CONTROL METHOD, NETWORK BOOT SYSTEM, AND METHOD OF ACCESSING INDIVIDUAL STORAGE UNIT - A network boot system including one or more client terminals, a DHCP (Dynamic Host Configuration Protocol) server, a PXE (Preboot Execution Environment) server, a TFTP (Trivial File Transfer Protocol) server, a database administration server, one or more storage devices, and an authentification server (such as a Radius server) connected to each other via a TCP/IP (Transmission Control Protocol)/Internet Protocol) network. A plurality of LU provided in the storage devices as separated into a system area LU and a user area LU prepared per user. | 2011-04-28 |
20110099615 | SECURE FALLBACK NETWORK DEVICE - A network device and method may provide secure fallback operations. The device includes a port allowing the device to communicate with a network and a processor to generate a security credential, provide the security credential to a call manager during initialization, and provide the security credential to a secondary device during fallback operations. The network device may include a memory to store the security credential and routing information for fallback operations. | 2011-04-28 |
20110099616 | Authenticating Using Cloud Authentication - An authentication mechanism in a local area network may use a cloud authentication mechanism to allow or deny authentication requests. A user may gain access within a local area network by entering a cloud identification and password, which may be verified by a cloud authentication mechanism. If the authentication is successful from the cloud authentication mechanism, the user identification and password are stored locally for subsequent authentication requests. In some embodiments, the cloud password may be periodically flushed so that subsequent requests may be passed to the cloud authentication mechanism. The authentication mechanism may be used in both domain and workgroup local area networks, and may operate in parallel with other users who may have local area network or client credentials which may not be authenticated from the cloud. | 2011-04-28 |
20110099617 | METHOD AND SYSTEM FOR VALIDATING AUTHENTICITY OF IDENTITY CLAIMS - A method for validating authenticity of identity claims of one or more communicating entities in an online transaction over a network is disclosed. The method includes extracting identity information of the first communicating entity by the second communicating entity during online transaction and prompting a client to provide a unique resource name of the first entity. Further, the method includes validating the identity information extracted from the first entity by checking identity information already registered in a registry. Later the method includes authenticating the identity claims of the first entity based on the validation results. The method also includes steps for registering identity information of the first entity within the registry. | 2011-04-28 |
20110099618 | SINGLE SIGN-ON AUTHENTICATION - Apparatus, systems, and methods may operate to receive a request from a node to provide access to a web site, to provide site authenticity information associated with the web site to the node, and to receive single sign-on (SSO) information from the node in response to validation of the site authenticity information by the node, the SSO information enabling the node to automatically log in to the web site. Additional activities include receiving site authenticity information from a node associated with a web site, and automatically transmitting SSO information to the node responsive to validating the site authenticity information. Additional apparatus, systems, and methods are disclosed. | 2011-04-28 |
20110099619 | SYSTEM AND METHOD FOR CREATING A TRANSPARENT DATA TUNNEL - A method of transparently transferring data between a network application running on a first processor and a target service running on a second processor through a tunnel server running on a third processor, the method comprising: connecting a target program running on the second processor to the tunnel server; connecting a client program running on the first processor to the tunnel server; connecting the network application to the client program through a network adapter running on the first processor; sending data from network application to the tunnel server through the client program; connecting the target program to the target service through a network adapter running on the second processor; and relaying data from the tunnel server to the target service through the target program. | 2011-04-28 |
20110099620 | Malware Detector - A transparent proxy for malware detection includes a monitor module, a protocol determination module, a challenge generation module, a response determination module, and a data control module. The monitor module examines data originating from an application towards a remote server. The protocol determination module identifies the protocol type used for the data. The challenge generation module produces a challenge for the application based upon the protocol type, sends the challenge to the application, and maintains a state related to the data and the challenge. The response determination module makes a determination if an automatic non-interactive application response is received in response to the challenge from the application. The data control module allows the first data to continue to the remote server when the determination is valid. The data control module reports malware detection and blocks the data to continue to the remote server when the determination is invalid. | 2011-04-28 |
20110099621 | Process for monitoring, filtering and caching internet connections - A one-box system and process for controlling Internet usage by users on a network. The system controls usage by combining two or more of the following functions into a single operating unit: 1) monitoring and logging internet access on a user and/or work station basis; 2) preventing or authorizing access on a user and/or work station basis to ULR's (or groups of URL's) that have been previously designated an inappropriate or appropriate, respectively, for that user or work station; 3) preventing or authorizing the downloading of files with any pre-designated file extension to any user or workstation; 4) blocking of peer-to-peer access of any pre-designated Internet file-sharing or other service (such as Kazaa, RealPlayer, AOL Instant Messaging, etc); 5) periodically or immediately alerting a designated representative of the attempt by any user or work station to access of pre-determined inappropriate site or file; 6) allowing remote review of the Internet activity log for any user by anyone (such as a student's parents) with knowledge of that user's log-in information (i.e., name and password); and 7) caching downloaded Internet objects for subsequent in-network retrieval. The system and process of this invention can also be configured to perform the traditional firewall function as well. | 2011-04-28 |
20110099622 | APPARATUS FOR DETECTING AND FILTERING APPLICATION LAYER DDOS ATTACK OF WEB SERVICE - Disclosed is a DDoS attack detection and response apparatus. The DDoS attack detection and response apparatus comprises: a receiver unit receiving HTTP requests from a client terminal which is characterized as an IP address; a data measuring unit computing the number of HTTP requests by IP and the number of URIs per HTTP over a certain time period; a DDoS discrimination unit comparing the number of HTTPs per URI with a threshold value and defining an access of the client terminal having the IP address as a DDoS attack when the number of HTTPs per URI is larger than the threshold value; and a blocking unit blocking packets from the IP address when the DDoS discrimination unit detects a DDoS attack. | 2011-04-28 |
20110099623 | SYSTEM AND METHOD FOR PROVIDING UNIFIED TRANSPORT AND SECURITY PROTOCOLS - The system and method described herein may provide unified transport and security protocols. In particular, the unified transport and security protocols may include a Secure Frame Layer transport and security protocol that includes stages for initially configuring a requester device and a responder device, identifying the requester device and the responder device to one another, and authenticating message frames communicated between the requester device and the responder device. Additionally, the unified transport and security protocols may further include a Secure Persistent User Datagram Protocol that includes modes for processing message frames received at the requester device and the responder device, recovering the requester device in response to packet loss, retransmitting lost packets sent between the requester device and the responder device, and updating location information for the requester device to restore a communications session between the requester device and the responder device. | 2011-04-28 |
20110099624 | Selection of Authentication Servers Based on Authentication Mechanisms in Supplicant Attempts to Access Network Resources - A computer-implemented method is provided for processing access requests in an AAA network. The method includes receiving an access request from a network device, identifying, based upon the access request, an authentication mechanism for facilitating AAA services for the network device and selecting, based on the identified authentication mechanism, a particular server from a plurality of servers that is compatible with the identified authentication mechanism. | 2011-04-28 |
20110099625 | TRUSTED PLATFORM MODULE SUPPORTED ONE TIME PASSWORDS - A Trusted Platform Module (TPM) can be utilized to implement One Time Password (OTP) mechanisms. One or more delegation blobs can be created by the TPM and the delegation authentication values of the delegation blobs can be based on the version number of the delegation blobs. A data blob with a protected secret can comprise a pointer to the delegation table of the TPM. The version number can be provided to an authority from which an OTP (a delegation authentication value) can be received. The OTP can be utilized to gain access to the secret and an authentication value of the key blob, which can be utilized to increase the version number of all associated delegation blobs. Policy limitations can be associated with the delegation blobs and can be enforced by policy enforcement mechanisms that can reference the TPM tick counter to enforce temporal policy restrictions. | 2011-04-28 |
20110099626 | MULTI-FUNCTIONAL PERIPHERAL CONTROL SYSTEM AND MULTI-FUNCTIONAL PERIPHERAL - A multi-functional peripheral control system is composed of an authentication server having a user information management database for storing authentication information corresponding to each user, and that performs user authentication processing with reference to the user information management database, and one or more multi-functional peripherals managed by the authentication server, in which the multi-functional peripheral has a user information management table for storing authentication information corresponding to a user, when being possible to connect to the authentication server, transmits user information to the authentication server to perform authentication processing, and when being impossible to connect to the authentication server, performs alternate authentication with reference to the user information management table, and the multi-functional peripheral includes a user deletion portion for deleting user information that authentication is not permitted by the authentication server from the user information management table. | 2011-04-28 |
20110099627 | COMPUTING PLATFORM - The present application describes a computing platform incorporating a trusted entity and storing, in non-volatile memory, one or more indicators, which indicate a current update status of an executable program code, and one or more expected values associated with measurement of the program code, the trusted entity being programmed to update the one or more indicators, by reference to the expected values, in response to a measured change in a current update status of the program code. | 2011-04-28 |
20110099628 | METHOD AND SYSTEM FOR WEIGHTING TRANSACTIONS IN A FRAUD DETECTION SYSTEM - A method of computing a similarity between a first transaction having a set of properties and a second transaction having the set of properties includes computing an initial weight for each of the properties of the set of properties and computing a similarity between each of the properties of the first transaction and the properties of the second transaction. The method also includes adjusting the initial weight for each of the properties based on a measure of the commonness of each of the properties of the set of properties, normalizing the adjusted weights, and computing the similarity by summing the products of the normalized adjusted weights and the computed similarities. | 2011-04-28 |
20110099629 | AUTHENTICATING A WEB PAGE WITH EMBEDDED JAVASCRIPT - A method for detecting if a digital document (e.g. an HTML document) is changed by others than authenticated script code (e.g. JavaScript code) is presented. The method comprises loading the authenticated script code into a trusted computer application and storing a snapshot of the digital document in the trusted computer application. Before the authenticated script code is executed, the snapshot of the digital document is compared with the document to verify if the digital document is still authentic. After executing the authenticated script code, the snapshot of the digital document is replaced with an up-to-date copy reflecting eventual changes made to the digital document by the executed script code. The digital document can then at any time be compared with the most recent snapshot to verify if it is authentic. | 2011-04-28 |
20110099630 | SYSTEM AND METHOD FOR PROTECTING COMMUNICATION DEVICES FROM DENIAL OF SERVICE ATTACKS - A system for preventing successful denial of service attacks comprises a first communication device, a second communication device, and a network. The first and second communication devices establish a communication session via the network. Based on various information, such as a pre-shared secret, one of the communication devices determines a network access filter value and compares this value to at least one data frame in order to authenticate such data frame without committing significant computing resource and any memory space. By updating the network access filter over time, an unauthorized user who discovers the outdated network access filter values is prevented from successfully launching a denial of service attack. | 2011-04-28 |
20110099631 | Distributed Packet Flow Inspection and Processing - Distribution of network processing load among a set of packet processing devices is improved by employing means for eliminating, controlling, or otherwise affecting redundant packet processing operations. In one embodiment, at least two packet processing devices are present, both capable of processing data packets flowing therethrough, such as, inspecting, detecting, and filtering data packets pursuant to one or more filters from a filter set. Redundancy is controlled by providing or enabling either or both of the packet processing devices with capability for detecting during its said inspection of said data packets that, for example, one or more filters had been previously executed on said data packets by the other packet processing device, and then not executing the previously-executed filters on said data packets. | 2011-04-28 |
20110099632 | DETECTING USER-MODE ROOTKITS - A method and system for determining whether resources of a computer system are being hidden is provided. The security system invokes a high-level function of user mode that is intercepted and filtered by the malware to identify resources. The security system also directly invokes a low-level function of kernel mode that is not intercepted and filtered by the malware to identify resources. After invoking the high-level function and the low-level function, the security system compares the identified resources. If the low-level function identified a resource that was not identified by the high-level function, then the security system may consider the resource to be hidden. | 2011-04-28 |
20110099633 | System and method of containing computer worms - A computer worm containment system comprises a detection system and a blocking system. The detection system orchestrates a sequence of network activities in a decoy computer network and monitors that network to identify anomalous behavior and determine whether the anomalous behavior is caused by a computer worm. The detection system can then determine an identifier of the computer worm based on the anomalous behavior. The detection system can also generate a recovery script for disabling the computer worm or repairing damage caused by the computer worm. The blocking system is configured to use the computer worm identifier to protect another computer network. The blocking system can also use the recovery script to disable a computer worm within the other network and to repair damage caused to the network by the worm. | 2011-04-28 |
20110099634 | Using File Prevalence to Inform Aggressiveness of Behavioral Heuristics - The prevalence rate of a file to be subject to behavior based heuristics analysis is determined, and the aggressiveness level to use in the analysis is adjusted, responsive to the prevalence rate. The aggressiveness is set to higher levels for lower prevalence files and to lower levels for higher prevalence files. Behavior based heuristics analysis is applied to the file, using the set aggressiveness level. In addition to setting the aggressiveness level, the heuristic analysis can also comprise dynamically weighing lower prevalence files as being more likely to be malicious and higher prevalence files as being less likely. Based on the applied behavior based heuristics analysis, it is determined whether or not the file comprises malware. If it is determined that the file comprises malware, appropriate steps can be taken, such as blocking, deleting, quarantining and/or disinfecting the file. | 2011-04-28 |
20110099635 | SYSTEM AND METHOD FOR DETECTING EXECUTABLE MACHINE INSTRUCTIONS IN A DATA STREAM - Detecting executable machine instructions in a data is accomplished by accessing a plurality of values representing data contained within a memory of a computer system and performing pre-processing on the plurality of values to produce a candidate data subset. The pre-processing may include determining whether the plurality of values meets (a) a randomness condition, (b) a length condition, and/or (c) a string ratio condition. The candidate data subset is inspected for computer instructions, characteristics of the computer instructions are determined, and a predetermined action taken based on the characteristics of the computer instructions. | 2011-04-28 |
20110099636 | Read-only protection method for removable storage medium - A read-only protection method for removable storage medium has steps of establishing a copy prohibited list, receiving a write command for the removable storage medium, determining whether to allow duplication of data to the removable storage medium, allowing duplication of data to the removable storage medium when the data to be duplicated are not listed in the copy prohibited list and prohibiting duplication of data to the removable storage medium when the data to be duplicated are listed in the copy prohibited list. The method of the present invention prohibits copying of pre-designated data to the removable storage medium, but writing other data is allowed. | 2011-04-28 |
20110099637 | SECURITY DISPOSING METHOD AND DEVICE FOR INPUT DATA - A security disposing method and device for the input data involves generating an interference data according to a predefined rule when inputting the data, and mixing the input data with the interference data and sending the mixed data, and parsing out the interference data according to the predefined rule after receiving the mixed data, and separating the input data according to the parsed interference data. | 2011-04-28 |
20110099638 | METHOD AND APPARATUS TO REPORT POLICY VIOLATIONS IN MESSAGES - A method and apparatus for reporting policy violations in messages is described. A violation is identified by detecting fragments in a message that match information from any one or more rows within a tabular structure of source data. The fragments that match this information are then specified as part of reporting the violation. | 2011-04-28 |
20110099639 | METHOD AND APPARATUS FOR PREVENTING AUTORUN OF PORTABLE USB STORAGE - Provided is a technology which creates an autorun file that is used in autorun for preventing the autorun of a USB-based portable storage, thereby allowing an arbitrary user or worm virus not to manipulate the autorun file. A method for preventing autorun of portable storage accesses at least one of a master file table entry of a root directory and a master file table entry of an autorun file, and sets non-autorun in the at least one accessed master file table entry. | 2011-04-28 |
20110099640 | METHOD AND SYSTEM FOR SELECTIVELY CONTROLLING ACCESS TO PROTECTED MEDIA ON A MEDIA STORAGE DEVICE - A method of preventing unauthorized reproduction of media disposed on a media storage device according to one embodiment is described. The method comprises installing a compliance mechanism on the computer system. The compliance mechanism is communicatively coupled with the computer system when installed thereon. The compliance mechanism is for enforcing compliance with a usage restriction applicable to the media. The method further includes obtaining control of a data input pathway operable on the computer system. The method further includes accessing data that is disposed on the media storage device that is associated with the usage restriction. The method further includes preventing the computer system from accessing the media digitally via the data pathway while enabling presentation of the protected media. | 2011-04-28 |
20110099641 | Trial Access for Media Files from a Media List - A portable media device includes a processor and a memory. The memory stores instructions that when executed cause the processor to access a media file stored in the portable media device based on a trial access term for the media file, determine that a trial period within the trial access term for the media file has expired, and set the media file as inaccessible to the portable device in response to determining that the trial period within the trial access term has expired. | 2011-04-28 |
20110099642 | CONTROLLER FOR EVENT-BASED STATISTICAL COVERT CHANNELS - A controller for an event-based statistical covert channel includes a data receiver; a data transmitter; and a channel controller that includes a fixed distribution randomized event buffer construction processor (FDREBCP) and a fixed distribution randomized event buffer (FDREB). The FDREBCP holds event distribution data that define one or more fixed distributions that the FDREBCP employs to fill the FDREB, whereby the event distribution data is stored during the occurrence of the event, subsequently removed from the FDREB and reordered, and a dummy event distribution data created to prevent an unauthorized outsider modulating the timing of events by alternatively causing and not causing the event. | 2011-04-28 |
20110099643 | Automated Privacy Enforcement - A system and method of protecting the privacy of data is presented. The system and method may include receiving data from a data warehouse and determining an access level for each data element received. The access value may be based on the assigned business purpose of the user attempting to access the data. If a user with an assigned business purpose is authorized to access the data then access will be given, if not, access to the data will be denied. In some examples, the requesting user may request to override the security settings in order to obtain access to the data. | 2011-04-28 |
20110099644 | MIG-6 KNOCKOUT MICE AND ELUCIDATION OF ASSOCIATION OF MIG-6 WITH EARLY ONSET DEGENERATIVE JOINT DISEASE AND ROLE AS A TUMOR SUPPRESSOR - The molecular mechanism underlying degenerative joint disease, also known as osteoarthritis (OA), is not fully understood. Disruption of mitogen inducible gene 6 (Mig-6) in mice by homologous recombination (KO mice) led to early onset OA as revealed by simultaneous enlargement and deformity of multiple joints, degradation of articular cartilage and the development of bony outgrowths or osteophytes within the joint space. The latter appeared to be derived from proliferation of mesenchymal progenitor cells followed by differentiation into chondrocytes. Because of the striking similarity to human OA, Mig-6 KO mice are a useful animal model for studying the mechanism of this disease and for testing new drugs or therapies for treating OA. These KO mice also developed epithelial hyperplasia, adenoma, and adenocarcinoma in organs such as lung, gallbladder, and bile duct. Mig-6 is therefore a tumor suppressor gene and is a candidate gene for the frequent Ip36 genetic alterations found in lung cancer. It can be used as a tumor biomarker as well as a target for cancer therapy. Mig-6 is located in human chromosome Ip36, a locus frequently associated with human lung cancer. Mig-6 is a negative regulator of EGF signaling, and like EGF, was induced by HGF/SF in human lung cancer cell lines. Frequently the receptors EGFR and Met were co-expressed, and Mig-6 was induced by both EGF and HGF/SF in a MAPK-dependent fashion. Not all tumor lines express Mig-6 in response to either EGF or HGF/SF. In these cases, missense and nonsense mutations in the Mig-6 coding region were found, as was evidence for Mig-6 transcriptional silencing. | 2011-04-28 |
20110099645 | ANIMAL MODEL FOR CIGARETTE-SMOKE-INDUCED ATHEROSCLEROSIS AND RELATED METHODS - Provided herein are non-human animal models and related methods useful for the identification, characterization, and analysis of the effects of environmental stimuli on the development and progression of pathological conditions. The environmental stimuli can include, but are not limited to, exposure to tobacco (e.g., cigarette, etc.) smoke. Exemplary pathological conditions include, but are not limited to, atherosclerosis, other cardiovascular disease (CVD), and the like. Also provided herein are non-human animal models and related methods useful for the identification, characterization, and analysis of pharmaceutical compounds, compositions, and/or formulations that can be used to prevent or treat a given pathological condition brought on by exposure to a given environmental condition. | 2011-04-28 |
20110099646 | GREEN FLUORESCENT PROTEIN OPTIMIZED FOR EXPRESSION WITH SELF-CLEAVING POLYPEPTIDES - The present invention provides a new fluorescent protein, engineered to facilitate release from self-cleaving peptides. | 2011-04-28 |
20110099647 | ANTIBODIES AGAINST CD38 FOR TREATMENT OF MULTIPLE MYELOMA - Isolated human monoclonal antibodies which bind to human CD38, and related antibody-based compositions and molecules, are disclosed. Also disclosed are pharmaceutical compositions comprising the human antibodies, and therapeutic and diagnostic methods for using the human antibodies. | 2011-04-28 |
20110099648 | RECOMBINANT GENE WHICH ENHANCES THE ABILITY OF FISH TO TOLERATE LOW DISSOLVED OXYGEN STRESS AND THE USE THEREOF - The invention discloses a recombinant gene which enhances the ability of fish to tolerate low dissolved oxygen (DO) stress and the use thereof. Carp β-actin gene promoter is used as a promoter and | 2011-04-28 |
20110099649 | Method for performing genetic modification under a drug-free environment and components thereof - The present invention provides a method and components thereof of performing genetic modification under a drug-free environment. The method comprises the steps of generating a trapped mammalian cell library by trapper constructs (including the element of piggyBac terminal inverted repeats (TIRs)), reporter constructs, and helper constructs (including a sequence of an internal ribosomal entry site (IRES)). The present art allows: (1) to target & identify the silenced loci; (2) to separate genes with low-level expression at certain differentiation stages; (3) to evaluate the efficiency of gene targeting in the silent or repressed loci. The present invention avoids the biased gene targeting observed in the prior arts, and eliminates the needs of introducing antibiotic genes into the host genome which may lead to a potential threat of drifting antibiotic resistant genes into environment. | 2011-04-28 |
20110099650 | COMPOSITIONS AND METHOD FOR MODULATING PLANT ROOT HAIR DEVELOPMENT - This invention relates to the modulation of root hair development in plants by altering the expression of RHD6-related genes, for example to increase the number, length and/or longevity of root hairs in the plant. This may be useful, for example, in improving the ability of plants to extract nutrients from the soil. | 2011-04-28 |
20110099651 | NOVEL GARDEN BEAN SB4348 - A novel garden bean cultivar, designated SB4348, is disclosed. The invention relates to the seeds of garden bean cultivar SB4348, to the plants of garden bean line SB4348 and to methods for producing a garden bean plant by crossing the cultivar SB4348 with itself or another garden bean line. The invention further relates to methods for producing a garden bean plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other garden bean lines derived from the cultivar SB4348. | 2011-04-28 |
20110099652 | NOVEL GARDEN BEAN SB4372 - A novel garden bean cultivar, designated SB4372, is disclosed. The invention relates to the seeds of garden bean cultivar SB4372, to the plants of garden bean line SB4372 and to methods for producing a garden bean plant by crossing the cultivar SB4372 with itself or another garden bean line. The invention further relates to methods for producing a garden bean plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other garden bean lines derived from the cultivar SB4372. | 2011-04-28 |
20110099653 | TOMATO VARIETY EX01419137 - The invention provides seed and plants of the tomato variety designated EX01419137. The invention thus relates to the plants, seeds and tissue cultures of tomato variety EX01419137 and to methods for producing a tomato plant produced by crossing a plant of tomato variety EX01419137 with itself or with another tomato plant, such as a plant of another variety. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of tomato variety EX01419137 including the fruit and gametes of such plants. The invention also relates to tomato variety CHI 14-2079. The present invention is also directed to tomato variety CHD 14-2080. | 2011-04-28 |
20110099654 | GENOME SHUFFLING METHOD FOR AUTOGAMOUS PLANTS UTILIZING DOMINANT MALE STERILITY OBTAINED BY GENE ENGINEERING TECHNIQUE, AND RECURRENT SELECTION BREEDING SYSTEM BASED ON THE GENOME SHUFFLING METHOD - A genome shuffling method for autogamous plants, including producing individuals having the following three traits in a tight coupling linkage by a gene engineering technique selected from a transgenic technique and a gene targeting technique: 1) dominant male sterility, 2) chemical tolerance and 3) lethality inducible by activating an inducible promoter, selecting, from progeny of the individuals, male-sterile individuals by means of the chemical tolerance described in 2) and male-fertile individuals by means of the lethality described in 3), arranging the male-sterile individuals and the male-fertile individuals close together in flowering periods thereof, so that the male-sterile individuals are crossed with the male-fertile individuals, harvesting seeds from the male-sterile individuals, and repeating outcrossing using the seeds from generation to generation. | 2011-04-28 |
20110099655 | Transgenic Plants - Disclosed herein are transgenic plants having recombinant DNA which expresses a G1073 transcription factor which provides enhanced resistance and/or tolerance to water deficit. More specifically the DNA constructs comprise a polynucleotide which encodes at least a functional part of a G1073 transcription factor or a homologous transcription factor. | 2011-04-28 |
20110099656 | Potato Cultivar FF X RG 387 - A potato cultivar designated FF X RG 387 is disclosed. The invention relates to the tubers of potato cultivar FF X RG 387, to the seeds of potato cultivar FF X RG 387, to the plants of potato FF X RG 387, to the plant parts of potato cultivar FF X RG 387 and to methods for producing a potato plant produced by crossing potato cultivar FF X RG 387 with itself or with another potato variety. The invention also relates to methods for producing a potato plant containing in its genetic material one or more transgenes and to the transgenic potato plants and plant parts produced by those methods. This invention also relates to potato cultivars or breeding cultivars and plant parts derived from potato variety FF X RG 387, to methods for producing other potato cultivars, lines or plant parts derived from potato cultivar FF X RG 387 and to the potato plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid potato tubers, seeds, plants and plant parts produced by crossing potato cultivar FF X RG 387 with another potato cultivar. | 2011-04-28 |
20110099657 | Soybean Cultivar S080187 - A soybean cultivar designated S080187 is disclosed. The invention relates to the seeds of soybean cultivar S080187, to the plants of soybean S080187, to plant parts of soybean cultivar S080187, and to methods for producing a soybean plant produced by crossing soybean cultivar S080187 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S080187, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S080187, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S080187 with another soybean cultivar. | 2011-04-28 |
20110099658 | Soybean Cultivar S080120 - A soybean cultivar designated S080120 is disclosed. The invention relates to the seeds of soybean cultivar S080120, to the plants of soybean S080120, to plant parts of soybean cultivar S080120, and to methods for producing a soybean plant produced by crossing soybean cultivar S080120 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S080120, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S080120, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S080120 with another soybean cultivar. | 2011-04-28 |
20110099659 | Soybean Cultivar S080189 - A soybean cultivar designated S080189 is disclosed. The invention relates to the seeds of soybean cultivar S080189, to the plants of soybean S080189, to plant parts of soybean cultivar S080189, and to methods for producing a soybean plant produced by crossing soybean cultivar S080189 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S080189, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S080189, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S080189 with another soybean cultivar. | 2011-04-28 |
20110099660 | Soybean Cultivar S080203 - A soybean cultivar designated S080203 is disclosed. The invention relates to the seeds of soybean cultivar S080203, to the plants of soybean S080203, to plant parts of soybean cultivar S080203, and to methods for producing a soybean plant produced by crossing soybean cultivar S080203 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S080203, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S080203, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S080203 with another soybean cultivar. | 2011-04-28 |
20110099661 | Soybean Cultivar S080186 - A soybean cultivar designated S080186 is disclosed. The invention relates to the seeds of soybean cultivar S080186, to the plants of soybean S080186, to plant parts of soybean cultivar S080186, and to methods for producing a soybean plant produced by crossing soybean cultivar S080186 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S080186, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S080186, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S080186 with another soybean cultivar. | 2011-04-28 |
20110099662 | CORN EVENT TC1507 AND METHODS FOR DETECTION THEREOF - The invention provides DNA compositions that relate to transgenic insect resistant maize plants. Also provided are assays for detecting the presence of the maize TC1507 event based on the DNA sequence of the recombinant construct inserted into the maize genome and the DNA sequences flanking the insertion site. Kits and conditions useful in conducting the assays are provided. | 2011-04-28 |
20110099663 | CARROT HYBRID 07100375 - The invention provides seed and plants of carrot hybrid 07100375 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of carrot hybrid 07100375 and the parent lines thereof, and to methods for producing a carrot plant produced by crossing such plants with themselves or with another carrot plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the roots and gametes of such plants. | 2011-04-28 |
20110099664 | Producing process of sterile plants, plants obtained by the process, and use of the plants - Transcription of a gene associated with formation of floral organs is suppressed to produce a sterile plant. A plant cell is transfected with a chimeric gene that includes (i) a coding gene of a transcription factor that promotes expression of a gene associated with formation of floral organs, and (ii) a polynucleotide that encodes a functional peptide that converts an arbitrary transcription factor into a transcription repressor, and a chimeric protein in which the transcription factor is fused with the functional peptide is expressed in the plant cell. The expression of the gene associated with formation of floral organs is dominantly suppressed by the chimeric protein, and as a result a male sterile plant is produced that cannot properly form pollen. The chimeric protein also suppresses expression of a gene associated with dehiscence of anther, and as a result a plant is produced in which dehiscence of anther is suppressed. Further, the chimeric protein suppresses expression of target genes of a transcription factor associated with formation of stamen and pistil, and as a result a double flowered plant is produced. | 2011-04-28 |
20110099665 | LEAFY COTYLEDON 1 TRANSCRIPTIONAL ACTIVATOR (LEC1) VARIANT POLYNUCLEOTIDES AND POLYPEPTIDES COMPOSITIONS AND METHODS OF INCREASING TRANSFORMATION EFFICIENCY - The present invention provides LEC1 variants. The LEC1 variants comprise a LEC1 A domain, a LEC1 B domain and a LEC1 C domain, where the LEC1 B domain has at least one mutation and/or is chimeric with respect to the LEC1 A or C domain. The invention also includes methods of preparing such LEC1 variants, and methods of using such LEC1 variants to modulate the level or activity of LEC1 variants in a plant cell. Modulation of LEC1 activity or levels can be used for different purposes such as increasing transformation efficiency, stimulating growth of somatic embryos, improving the growth and recovery of transformants, inducing apomixes, increasing transformation frequency, enhancing tissue culture response and the like. | 2011-04-28 |
20110099666 | MODIFICATION OF PLANT LIGNIN CONTENT - DNA constructs comprising a first DNA segment that corresponds to at least a portion of a gene in the monolignol biosynthetic pathway, a spacer DNA segment, and a second DNA segment that is complementary to the first DNA segment can be used to reduce or modulate the lignin content in plants. In some embodiments, DNA constructs comprise at least a portion of a gene for 4CL, C3H, CCR, C4H or CCoAOMT. Vascular-preferred and constitutive promoters can be used to drive expression of the constructs. | 2011-04-28 |
20110099667 | PLANTS HAVING ALTERED AGRONOMIC CHARACTERISTICS UNDER NITROGEN LIMITING CONDITIONS AND RELATED CONSTRUCTS AND METHODS INVOLVING GENES ENCODING LNT1 POLYPEPTIDES AND HOMOLOGS THEREOF - Isolated polynucleotides and polypeptides and recombinant DNA constructs particularly useful for altering agronomic characteristics of plants under nitrogen limiting conditions, compositions (such as plants or seeds) comprising these recombinant DNA constructs, and methods utilizing these recombinant DNA constructs. The recombinant DNA construct comprises a polynucleotide operably linked to a promoter functional in a plant, wherein said polynucleotide encodes an LNT1 polypeptide. | 2011-04-28 |
20110099668 | Expressing GLK in plants - The present invention provides, in part, GLK1 nucleic acid molecules and polypeptides that can be used to confer resistance to a pathogen in a plant. The present invention also provides methods of detecting disease resistance genes and plants. | 2011-04-28 |
20110099669 | PLANTS HAVING ENHANCED YIELD-RELATED TRAITS AND A METHOD FOR MAKING THE SAME - The present invention relates generally to the field of molecular biology and concerns a method for improving various plant growth characteristics by modulating expression in a plant of a nucleic acid sequence encoding a GS1 (Glutamine Synthase 1). The present invention also concerns plants having modulated expression of a nucleic acid sequence encoding a GS1, which plants have improved growth characteristics relative to corresponding wild type plants or other control plants. The invention also provides constructs useful in the methods of the invention. Furthermore, the present invention relates generally to the field of molecular biology and concerns a method for enhancing various plant yield-related traits by modulating expression in a plant of a nucleic acid sequence encoding a PEAMT (Phosphoethanolamine N-methyltransferase) polypeptide. The present invention also concerns plants having modulated expression of a nucleic acid sequence encoding a PEAMT, which plants have enhanced yield-related traits relative to corresponding wild type plants or other control plants. The invention also provides hitherto unknown PEAMT-encoding nucleic acid sequences, and constructs comprising the same, useful in performing the methods of the invention. Yet furthermore, the present invention relates generally to the field of molecular biology and concerns a method for increasing various plant seed yield-related traits by increasing expression in a plant of a nucleic acid sequence encoding a fatty acyl-acyl carrier protein (ACP) thioesterase B (FATB) polypeptide. The present invention also concerns plants having increased expression of a nucleic acid sequence encoding a FATB polypeptide, which plants have increased seed yield-related traits relative to control plants. The invention additionally relates to nucleic acid sequences, nucleic acid sequence constructs, vectors and plants containing said nucleic acid sequences. Even furthermore, the present invention relates generally to the field of molecular biology and concerns a method for improving various plant growth characteristics by modulating expression in a plant of a nucleic acid sequence encoding a LFY-like (LEAFY-like). The present invention also concerns plants having modulated expression of a nucleic acid sequence encoding a LFY-like, which plants have improved growth characteristics relative to corresponding wild type plants or other control plants. The invention also provides constructs useful in the methods of the invention. | 2011-04-28 |
20110099670 | NUCLEOTIDE SEQUENCES CODING FOR CIS-ACONITIC DECARBOXYLASE AND USE THEREOF - The present invention relates to nucleotide sequences encoding polypeptides with cis-aconitic decarboxylase activity, the cells transformed with such nucleotide sequences, preferably fungal or plant cells, and to methods wherein such transformed cells are use for the production of itaconic acid. | 2011-04-28 |
20110099671 | Cellobiohydrolase variants and polynucleotides encoding same - The present invention relates to variants of a parent cellobiohydrolase II. The present invention also relates to polynucleotides encoding the variants; nucleic acid constructs, vectors, and host cells comprising the polynucleotides; and methods of using the variants. | 2011-04-28 |
20110099672 | Methods and Compositions for Expression of Transgenes in Plants - Transgenic plants are provided comprising a plurality of transgenes comprised in a single locus. In certain aspects, 7 or more transgenes may be expressed from a first locus. Methods are provided for transformation of plant cells with a plurality of transgenes. Also provided are methods for expressing and enhancing the expression of one or more transgenes in a plant. | 2011-04-28 |
20110099673 | STAGE FOR SCANNING PROBE MICROSCOPY AND SAMPLE OBSERVATION METHOD - It is an object of the invention to provide a stage for scanning probe microscopy that can be used in any kind of SPM and can effectively irradiate light to a sample and a solution near the sample without irradiated light blocked by a cantilever. The stage for scanning probe microscopy of the invention is a stage for scanning probe microscopy for fixing a sample substrate that mounts a sample to be observed thereon and has optical transparency and includes an opening that is provided below a portion where the sample substrate is fixed and that has an opening area included within the sample substrate in plan view. Light is radiated from a bottom surface of the sample substrate onto the sample through the opening. | 2011-04-28 |
20110099674 | Interspecific cornus hybrid designated KF 111-1 - An advanced generation interspecific hybrid of | 2011-04-28 |