19th week of 2013 patent applcation highlights part 62 |
Patent application number | Title | Published |
20130117801 | VIRTUAL SECURITY BOUNDARY FOR PHYSICAL OR VIRTUAL NETWORK DEVICES - A method and apparatus is disclosed herein for using a virtual security boundary. In one embodiment, the method comprises receiving information from a virtual machine after the virtual machine has been moved from a first physical location in a network to a second physical location in the network, where the information identifies the virtual machine as one previously assigned to a security boundary; determining that access to the virtual machine at the first physical location was permitted by the security gateway; assigning the virtual machine at the second physical location to the security boundary, and applying a security policy associated with the security boundary to communications between the network and the virtual machine at the second physical location. | 2013-05-09 |
20130117802 | AUTHORIZATION-BASED REDACTION OF DATA - Tasks for providing a post-redaction document to a requestor are distributed among several distinct components. The decision about whether a particular requestor is permitted to obtain a requested content item is made by an authorization service. When obtaining requested content item is permitted, the authorization service returns (a) portion identification information, and (b) redaction technique information that indicates the manner by which that portion should be redacted. Redaction is then performed by a redaction component. Techniques are described in which the portion identification information identifies portions to be redacted using XPath expressions, and the redaction component has logic to identify the portions, within the pre-redaction version of the content item, that are targeted by the XPath expressions. | 2013-05-09 |
20130117803 | SECURITY AND SAFETY MANAGER IMPLEMENTATION IN A MULTI-CORE PROCESSOR - A system includes a multi-core computer processor. One or more cores of the multi-core computer processor are configured as a security co-processor for the system and for other cores of the multi-core processor, and one or more cores of the multi-core computer processor are configured as a safety manager co-processor for the system and for other cores of the multi-core processor. An operating system of the security co-processor and an operating system of the safety manager co-processor are independent of operating systems of the other cores of the multi-core processor. The security co-processor and the safety manager co-processor are configured to boot before the other cores and to enforce security policy and/or safety policy on the other cores. | 2013-05-09 |
20130117804 | BROWSER-BASED SECURE DESKTOP APPLICATIONS FOR OPEN COMPUTING PLATFORMS - Example browser-based secure desktop applications for open computing platforms are disclosed. An example method disclosed herein to provide secure desktop functionality to a computing platform comprises providing, in response to a first request, a secure desktop application to the computing platform, the secure desktop application for execution by a browser on the computing platform, and establishing a secure communication connection between a service node and the secure desktop application, the secure communication connection to provide the secure desktop application with access to a trusted entity, the secure communication connection being accessible to a trusted application downloaded to the computing platform for execution by the browser in association with the secure desktop application, the secure communication connection being inaccessible to an untrusted application not executed in association with the secure desktop application. | 2013-05-09 |
20130117805 | TECHNIQUES TO APPLY AND SHARE REMOTE POLICIES ON MOBILE DEVICES - Techniques to apply and share remote policies on personal devices are described. In an embodiment, a technique includes contacting an enterprise server from an enterprise application operating on a personal device. The enterprise application may receive policies from the enterprise server. The policies may be applied to the enterprise application. When a second enterprise application on the personal device is launched, the policies may also be applied to the second enterprise application. When a policy is changed on the enterprise server, notification is pushed to the personal device and all related enterprise applications on the personal device may be updated to enforce the policy change. Other embodiments are described and claimed. | 2013-05-09 |
20130117806 | NETWORK BASED PROVISIONING - The subject disclosure generally relates to provisioning devices via a network service, such as a cloud service. A profile component can authenticate a user of a device with a cloud service, and determine services maintained by the network service that are associated with the user. A reception component can receive a request for a set of services from the device, and a services component can obtain the set of services from the network service, and provision the device based on the set of services. Provisioning the device can include downloading the services to the device, or including the services in a virtual machine executing in the network service. | 2013-05-09 |
20130117807 | SETTING DEFAULT SECURITY FEATURES FOR USE WITH WEB APPLICATIONS AND EXTENSIONS - According to one general aspect, a computer-implemented method for implementing default security features for web applications and browser extensions includes receiving a request to include a web application or a web browser extension in a digital marketplace. A determination is made if the web application or the web browser extension conforms to default security features, wherein the default security features include a prohibition against running in-line script on web pages. The web application or the browser extension is included in the digital marketplace if the web application or the browser extension conforms to the default security features. | 2013-05-09 |
20130117808 | APPARATUS AND METHOD FOR ENHANCING SECURITY IN HETEROGENEOUS COMPUTING ENVIRONMENT - An apparatus and method for enhancing security and stability in a heterogeneous computing environment that supports an open standard parallel program are provided. A method of enhancing security in a heterogeneous computing environment may include loading a source code kernel corresponding to an application program to be installed in a host system, determining whether the source code kernel is targeted for integrity check, based on a security policy of the host system, prior to cross-compiling the source code kernel, requesting a security engine of a computing device to check an integrity of the source code kernel, when the source code kernel is determined to be targeted for the integrity check, and controlling an operation of a runtime compiler based on a check result received from the security engine. | 2013-05-09 |
20130117809 | INTRUSION PREVENTION SYSTEM (IPS) MODE FOR A MALWARE DETECTION SYSTEM - Intrusion prevention system (IPS) mode is provided for a malware detection system. At least one staging server is provided for intercepting an incoming electronic message, making a copy of the intercepted incoming electronic message, and holding the intercepted incoming electronic message until an analysis of the copy of the intercepted incoming electronic message has been completed or until a timeout threshold has been exceeded. A malware detection system is coupled to the at least one staging server. The at least one malware detection system includes at least one decomposition server for receiving the copy of the intercepted incoming electronic message and processing the copy of the intercepted incoming electronic message to detect malware. Multiple mail queues, e.g., incoming, timeout, jail, decomposition, and outgoing, are used to manage message flows and delay messages while malware analysis is performed. | 2013-05-09 |
20130117810 | METHOD AND SYSTEM FOR PROVIDING A CLIENT ACCESS TO AN EXTERNAL SERVICE VIA AN APPLICATION SERVICES PLATFORM - In accordance with embodiments, there are provided mechanisms and methods for providing a client access to an external service via an application services platform. These mechanisms and methods for providing a client access to an external service via an application services platform can enable embodiments to provide effective access to such external service without necessarily forcing the client to access the external service separately with respect to the application services platform. The ability of embodiments to provide such technique can enable the integration of an external service with an application services platform, thus allowing the client to access the external service in a more effective manner. | 2013-05-09 |
20130117811 | METHOD AND SYSTEM FOR ENCRYPTED FILE ACCESS - A method and system for encrypted file access are provided. The method includes the steps of: receiving ( | 2013-05-09 |
20130117812 | SUPERVISION OF THE SECURITY IN A COMPUTER SYSTEM - For supervising the security of a computer system (SY) comprising several elementary computer items (BI), such as machines and applications, and several gathering items (BIg), such as networks, services or sites, gathering elementary items, a supervision device (DS) collects base measurements (MB) representative of states of the elementary items. A unit (UDI) determines several security indicators (I) of different types for each elementary item according to respective functions of the base measurements and several security indicators of different types for each gathering item. Each security indicator of a given type of a gathering item is determined according to a respective function of the security indicators of the given type of the elementary items gathered in the gathering item. The indicators of one item relate to the availability, the intrusion, the vulnerability and the compliance to a security policy. | 2013-05-09 |
20130117813 | KILL SWITCH SECURITY METHOD AND SYSTEM - The present invention provides, in at least one embodiment, a system and method to bolster website and mobile authentication providing an additional security layer for access to password protected information. An authorized user is asked to select a kill switch, including one or more image categories or alphanumeric characters that the authorized user would never select while inputting their password. If the kill switch is entered once or too many times, as defined and specified ahead of time by a set of rules and conditions, during password entry, the kill switch kills the password entry operation. User input can be evaluated at the time of entry according to these rules by a rule processing decision engine. Killing the operation can include taking one or more actions, such as locking out the user, sending a notification of breach, and cataloging information about the source of the breach. | 2013-05-09 |
20130117814 | SECURE WIEGAND COMMUNICATIONS - The present invention is directed toward secure access systems. Specifically, a method and system is provided that enhances the security of unidirectional communication protocols used in access control systems, such as the Wiegand protocol. The enhancements may include obfuscation of data, a two-way packet-mode communications, and blind synchronization of pseudo-random number generators. | 2013-05-09 |
20130117815 | Method of Authorizing a Person, an Authorizing Architecture and a Computer Program Product - The invention relates to a method for authorizing a person. The method comprises the step of receiving authentication data from a personal authentication device transmitting said data to a reader associated with a central authorization system. Further, the method comprises the steps of including the received authentication data in a request message and transmitting the request message to the central authorization system, receiving the request message at the central authorization system and retrieving the authentication data from the request message. The method also comprises the steps of performing an authentication process at a central authentication system using said reader authentication data and executing an authorization process at the central authorization system based on the authentication process result. | 2013-05-09 |
20130117816 | ACCESSING MULTIPLE CLIENT DOMAINS USING A SINGLE APPLICATION - Methods, computer systems, and computer-readable storage media for using a single application on a mobile device to access a plurality of client domain sites are provided. The single application on the mobile device receives from a user of the mobile device a set of authorization credentials. Based on the set of authorization credentials, the single application receives a first client domain uniform resource locator from a third-party directory service. The first client domain uniform resource locator is used to access a client gateway service; the client gateway service provides a secure access point to a number of different service solutions hosted by a client. Upon the user inputting a set of authentication credentials, the user is able to access information from one or more of the different service solutions. | 2013-05-09 |
20130117817 | PREVENTION OF CROSS SITE REQUEST FORGERY ATTACKS BY CONDITIONAL USE COOKIES - To inhibit cross-site forgery attacks, different types/classes of cookies are used. A first cookie and a second cookie are generated by a web server and provided to a client browser during a web session. The first cookie defines a first set of use conditions for when the first cookie is to be used within the web session. The second cookie defines a second set of use conditions for when the second cookie is to be used within the web session. The client browser determines which (if any) of the first cookie or second cookie to send to the web server based on the use conditions defined within each cookie and the operation(s) sought by the client browser. The web server may grant different or the same privileges to operation(s) being sought by the client browser depending on whether the first or second cookie is sent by the client browser. | 2013-05-09 |
20130117818 | System and Method for Conveying Object Location Information - An improved system and method for defining an event based upon an object location and a user-defined zone and managing the conveyance of object location event information among computing devices where object location events are defined in terms of a condition based upon a relationship between user-defined zone information and object location information. One or more location information sources are associated with an object to provide the object location information. One or more user-defined zones are defined on a map and one or more object location events are defined. The occurrence of an object location event produces object location event information that is conveyed to users based on user identification codes. Accessibility to object location information, zone information, and object location event information is based upon an object location information access code, a zone information access code, and an object location event information access code, respectively. | 2013-05-09 |
20130117819 | COST-EFFECTIVE DEVICE FOR TRANSFERRING DATA UNIDIRECTIONALLY - Unlike excessively complex and extremely expensive methods in the prior art, this invention discloses a highly cost-effective and simple-to-use device for transferring data unidirectionally, allowing small businesses and home users to reap the benefits of advanced network security, which otherwise would have been affordable and attainable exclusively by commercial and federal entities. Because of its cost effectiveness and simplicity, the device of this invention makes it possible for every computer user to protect their internal networks from information thieves. | 2013-05-09 |
20130117820 | ENABLING ACCESS TO KEY LIFETIMES FOR WIRELESS LINK SETUP - A particular method includes performing a bootstrapped extensible authentication protocol (EAP) re-authentication protocol (ERP) re-authentication at a mobile device after performing an EAP authentication with the access point prior to expiration of a master session key (MSK) associated with the EAP authentication. Another particular method includes performing, at an access point, a bootstrapped ERP re-authentication of a mobile device without interrupting a flow of data packets with respect to the mobile device. | 2013-05-09 |
20130117821 | METHOD AND SYSTEM FOR PROVIDING SECURE ACCESS TO PRIVATE NETWORKS - Improved approaches for providing secure access to resources maintained on private networks are disclosed. The secure access can be provided through a public network using a standard network browser. Multiple remote users are able to gain restricted and controlled access to at least portions of a private network through a common access point. The solution provided by the invention is not only easily set up and managed, but also able to support many remote users in a cost-effective manner. | 2013-05-09 |
20130117822 | METHOD AND SYSTEM FOR SECURE TELETRANSMISSION - A system for secure teletransmission destined for a receiving person includes a secure server comprising a program providing a redemption code and a designation code for designating an object to which the teletransmission pertains. A terminal includes an interface allowing a sending person to indicate the designation code and to take cognizance of the redemption code, and an interface for connection to the secure server to send a request and to receive the redemption code, in response. A terminal includes an interface allowing the receiving person to enter the redemption code and the designation code, an interface for connection to the secure server to receive an authorization from the secure server. The authorization confirms correlation of the redemption code entered with the designation code. A deliverer automatically delivers the object, after receipt of the authorization. | 2013-05-09 |
20130117823 | SYSTEM AND METHOD FOR ENFORCING SECURITY POLICIES IN A VIRTUAL ENVIRONMENT - A method in one example implementation includes intercepting a request associated with an execution of an object (e.g., a kernel module or a binary) in a computer configured to operate in a virtual machine environment. The request is associated with a privileged domain of the computer that operates logically below one or more operating systems. The method also includes verifying an authorization of the object by computing a checksum for the object and comparing the checksum to a plurality of stored checksums in a memory element. The execution of the object is denied if it is not authorized. In other embodiments, the method can include evaluating a plurality of entries within the memory element of the computer, wherein the entries include authorized binaries and kernel modules. In other embodiments, the method can include intercepting an attempt from a remote computer to execute code from a previously authorized binary. | 2013-05-09 |
20130117824 | PRIVACY PRESERVING AUTHORISATION IN PERVASIVE ENVIRONMENTS - A method for preserving privacy during authorisation in pervasive environments is described. The method includes an authorisation phase in which the user is provided with a reusable credential associated with verifiable constraints, and an operation phase where the service provider verifies the reusable credential before authorising the user. Third parties cannot link plural uses of the credential to each other, and the service provider cannot link plural uses of said credential to each other. | 2013-05-09 |
20130117825 | METHOD AND SYSTEM FOR PROVIDING SECURITY FOR UNIVERSAL PLUG AND PLAY OPERATIONS IN A HOME NETWORK ENVIRONMENT BASED ON OWNERSHIP RIGHTS - A method and system for providing security to Universal Plug and Play (UPnP) operations in a home network environment based on ownership rights where a request is received from a Control Point (CP) to perform an UPnP action associated with an UPnP resource. It is determined whether the CP holds an ownership right to perform the UPnP action based on ownership data associated with the UPnP resource. Accordingly, the CP is authorized to execute the UPnP action on the UPnP resource or an error message is returned to the CP based on the ownership of the UPnP resource. | 2013-05-09 |
20130117826 | HOME REALM DISCOVERY IN MIXED-MODE FEDERATED REALMS - The authentication of identities within a realm in which some identities are authenticated using direct authentication, and some identities are authenticated using federated authentication. Requests for service from valid identities in the realm that are to be authenticated by direct authentication are responded to with a direct authentication interface. Requests for service from valid identities in the realm that are to be authenticated by federated authentication are responded to with a federated authentication interface. Requests for service from invalid identities are responded to pseudo-randomly with either the direct authentication interface or the federated authentication interface. | 2013-05-09 |
20130117827 | SECURE WIEGAND COMMUNICATIONS - The present invention is directed toward secure access systems. Specifically, a method and system is provided that enhances the security of unidirectional communication protocols used in access control systems, such as the Wiegand protocol. The enhancements may include obfuscation of data, a two-way packet-mode communications, and blind synchronization of pseudo-random number generators. | 2013-05-09 |
20130117828 | DISTRIBUTED NETWORK MANAGEMENT HIERARCHY IN A MULTI-STATION COMMUNICATION NETWORK - The invention relates to a network and to a method of operating a network. The network comprises a plurality of stations each able to transmit and receive data so that the network can transmit data between stations via at least one selected intermediate station. The network further comprises a plurality of levels of stations including a first level comprising user and/or seed stations, a second level comprising auxiliary stations providing access to auxiliary networks, a third level comprising at least one location management station, and a fourth level comprising at least one authentication station. The method comprises transmitting, from or on behalf of a station on the first level requiring authentication, to an authentication station via one or more stations, an authentication request message. In response, the authentication station transmits authentication data to authenticate the station on the first level. | 2013-05-09 |
20130117829 | INTERNET ENABLED MONITORING AND CONTROL DEVICE - A connection between a monitoring device and a remote user is accomplished securely over the Internet by using a communication channel with public/private key encryption to connect the two locations and by performing authentication of a user at the local monitoring device rather than at a device server at the remote location, thereby effectively removing the device server as vulnerable point for attack. In particular, when a remote user attempts to log in, via a web browser or interactive telephone system, the encrypted channel is established using the public/private key of the device and the device server proxies the log-in request to the monitored device. The device itself is then responsible for granting or denying access. | 2013-05-09 |
20130117830 | MANAGING THE PROGRESSIVE LEGIBLE OBFUSCATION AND DE-OBFUSCATION OF PUBLIC AND QUASI-PUBLIC BROADCAST MESSAGES - Obfuscating a message, in one aspect, may include detecting sensitive information in a message to be broadcast into public or quasi-public computer network environment; replacing the sensitive information in the message with a representation that preserves general aspects of the sensitive information and a user interface element, the user interface element for enabling a viewer of the message to request access to details of the sensitive information; and transmitting the replaced message for broadcasting into the public or quasi-public computer network environment. De-obfuscating the message, in one aspect, may include authenticating one or more viewers or receivers of the message and based on the authentication, presenting details associated with the sensitive information. | 2013-05-09 |
20130117831 | METHOD AND SYSTEM FOR ENABLING COMPUTER ACCESS - The present invention relates to the filed of computer access and in particular remote authentication. In one form, the invention relates to one time passwords used in computer or web-based systems. In one particular aspect, the present invention is suitable for use with certificate based credentials. | 2013-05-09 |
20130117832 | Identity Verification and Authentication - In one embodiment, receiving, at a first computing device associated with a social-networking system and from a second computing device, a first request to verify an identity of a user of the social-networking system; sending, by the first computing device and to a mobile device associated with the user, a second request for information about the user; receiving, at the first computing device and from the mobile device, the information about the user; determining, by the first computing device, a confidence score indicating a probability that the identity of the user is true based on the information about the user received from the mobile device and information available to the social-networking system; and sending, by the first computing device and to the second computing device, the confidence score. | 2013-05-09 |
20130117833 | AUTHENTICATION DEVICE AND AUTHENTICATION SYSTEM - A biological information authentication device is provided with a biological information memory means, a user group information confirmation means, a biological information registering means and an authentication unit. The user group information is the information representing a trust relationship among a plurality of users; the biological information memory unit associates each biological information extracted from a plurality of users with the user group information and stores them. The user group information confirmation unit receives a determination as to whether or not a trust relationship exists among a plurality of users from whom the biological information is extracted and confirms the relationship between users. The biological information registering unit matches the user group information and stores each biological information extracted from each user in association with the biological information memory means. | 2013-05-09 |
20130117834 | COMMUNICATION CONTROL SYSTEM AND METHOD, AND COMMUNICATION DEVICE AND METHOD - A communication control system pairs a first communication device with a second communication device, the first communication device includes a first image editing unit that edits an input image in accordance with a predetermined rule to generate a first authentication image, and a first transmission unit that transmits first authentication data representing the first authentication image and a first identifier for identifying the first communication device to a server device, the second communication device includes a second transmission unit that transmits second authentication data representing the second authentication image and a second identifier for identifying the second communication device to the server device, and the server device includes a pairing unit that pairs the first communication device with the second communication device in the case where it is determined that the first authentication data matches the second authentication data. | 2013-05-09 |
20130117835 | Image Forming Apparatus, Image Forming System, and Method for Realizing Pseudo Single Sign-On - An image forming apparatus includes: an internal authentication information storage unit that stores user authentication information relating to authentication for the image forming apparatus; an internal user authentication unit; an external authentication information storage unit that stores the user authentication information for external authentication, and a private IP address in association with one another for a plurality of URLs for external authentication; and a pseudo single sign-on unit that when it is determined that a redirection destination URL included in a response message transferred from a cloud server matches one of the stored plurality of URLs for external authentication, reads the user identification information for external authentication relating to the private IP address corresponding to a destination IP address included in a packet of the response message from the external authentication information storage unit, transmits the information for external authentication to the redirection destination URL, and performs the sign-on process. | 2013-05-09 |
20130117836 | AUTO DISCOVERY OF VIRTUAL MACHINES - A method and apparatus is disclosed herein for performing auto discovery of virtual machines. In one embodiment, the method comprises monitoring, using an interface of the device, one or more packets being sent from one or more virtual machines, the one or more packets being sent determining, using a processor of the device, if one of the monitored packets comprises a discovery packet from one virtual machine of the one or more virtual machines, wherein the discovery packet includes an address of a destination location; sending, using the interface of the device, a reply packet to the one virtual machine using an address in the discovery packet identified in the monitored packets, the reply packet including an Internet Protocol (IP) address of the device. | 2013-05-09 |
20130117837 | FAST UPDATE FILTER - A method may include defining a filter for a network device, the filter including a rule and a particular number of prioritized fields, where at least one of the prioritized fields is formatted to accept input as a range of values. The method may also include receiving a rule modification for the filter, the rule modification including at least one input as a range of values, and performing a check for conflicts of the rule modification with the rule in the filter. The method may further include expanding the input range of values to form multiple rules equivalent to the rule modification with the input range of values, establishing backtracking links to integrate the multiple rules with the existing rule, and adding the multiple rules to the filter. | 2013-05-09 |
20130117838 | Superpositional Control of Integrated Circuit Processing - Specialized hardware functions for high assurance processing are seldom integrated into commodity processors. Furthermore, as chips increase in complexity, trustworthy processing of sensitive information can become increasingly difficult to achieve due to extensive on-chip resource sharing and the lack of corresponding protection mechanisms. Embodiments in accordance with the invention allow for enhanced security of commodity integrated circuits, using minor modifications, in conjunction with a separate integrated circuit that can provide monitoring, access control, and other useful security functions. In one embodiment, a separate control plane, stacked using 3-D integration technology, allows for the function and economics of specialized security mechanisms, not available from a coprocessor alone, to be integrated with the underlying commodity computing hardware. | 2013-05-09 |
20130117839 | METHOD FOR CONTROLLING APPLICATION USAGE ON A MOBILE DEVICE WHILE THE DEVICE IS IN MOTION - The disclosure generally describes computer-implemented methods, software, and systems for controlling access to applications on a device while the device is in motion. One example computer-implemented method includes identifying a request to access an application on a device, determining if the requested application is a motion-restricted application, upon determination that the requested application is a motion-restricted application, identifying a speed of movement associated with the device, and controlling access to the requested application based at least in part on the identified speed of movement of the device. | 2013-05-09 |
20130117840 | USER-DRIVEN ACCESS CONTROL - An access system is described herein which allows an application module to access a user-owned resource based on an indication of a user's intent to interact with the user-owned resource. For example, the application module can provide an application user interface which embeds a gadget associated with a particular user-owned resource. The access system can interpret the user's interaction with the gadget as conferring implicit permission to the application module to access the user-owned resource associated with the gadget. In addition, or alternatively, the user may make a telltale gesture in the course of interacting with the application module. The access system can interpret this gesture as conferring implicit permission to the application module to access a user-owned resource that is associated with the gesture. | 2013-05-09 |
20130117841 | INFORMATION PROCESSING PROGRAM AND INFORMATION PROCESSING METHOD - An information processing device stores, in a storage device, command execution user data associating an attribute of a command with a name of a user entitled to execute the command. When execution of the command is requested, a service of the information processing device extracts, from the command execution user data, a name of a user entitled to execute the requested command and executes the command with the extracted user name. | 2013-05-09 |
20130117842 | OPTIMIZING PERFORMANCE INFORMATION COLLECTION - A network management system may detect a network condition corresponding to a network and evaluate the network condition to identify types of network performance information corresponding to the network condition. The network management system may prioritize the types of network performance information and communicate priority information to a network device. The priority information may include the types of network performance information identified by the network management system and/or the priority associated with each type of network performance information. The network device may receive the priority information, evaluate the availability of device resources, collect network performance information based on the priority information and the availability of device resources, and communicate the network performance information to the network management system. | 2013-05-09 |
20130117843 | Methods, Devices, And Systems For Detecting Return-Oriented Programming Exploits - Methods, devices, and systems for detecting return-oriented programming (ROP) exploits are disclosed. A system includes a processor, a main memory, and a cache memory. A cache monitor develops an instruction loading profile by monitoring accesses to cached instructions found in the cache memory and misses to instructions not currently in the cache memory. A remedial action unit terminates execution of one or more of the valid code sequences if the instruction loading profile is indicative of execution of an ROP exploit involving one or more valid code sequences. The instruction loading profile may be a hit/miss ratio derived from monitoring cache hits relative to cache misses. The ROP exploits may include code snippets that each include an executable instruction and a return instruction from valid code sequences. | 2013-05-09 |
20130117844 | MICROCIRCUIT CARD PROTECTED BY A FUSE - A microcircuit card ( | 2013-05-09 |
20130117845 | ENCODING LABELS IN VALUES TO CAPTURE INFORMATION FLOWS - Methods, servers, and systems for encoding security labels in a dynamic language value to allow cross script communications within client application while limiting the types of information that is allowed to be communicated back to a host server. Static analysis is performed during compilation, and the results are used to generate and insert additional code that updates, modifies and propagates labels (e.g., JavaScript labels) attached to values (e.g., JavaScript values) during execution of a program. To support popular language features that allow for strong integration with other web-based systems, malicious code is allowed to perform operations locally (e.g., on the client), and a detection and prevention mechanism identifies and stops malicious code from sending requests or gathered information over the network, naturalizing attacks and improving the security of applications that embed dynamic language code. | 2013-05-09 |
20130117846 | SYSTEM AND METHOD FOR SERVER-COUPLED APPLICATION RE-ANALYSIS TO OBTAIN CHARACTERIZATION ASSESSMENT - This disclosure is directed to a system and method for preventing malware, spyware and other undesirable applications from affecting mobile communication devices (e.g., smartphones, netbooks, and tablets). A mobile communication device uses a server to assist in identifying and removing undesirable applications. When scanning an application, a device transmits information about the application to a server for analysis. The server receives the information, produces a characterization assessment and can also provide a characterization re-assessment for the application, or data object, and transmits the assessment to the device. By performing analysis on a server, the invention allows a device to reduce the battery and performance cost of protecting against undesirable applications. The servers transmits notifications to devices that have installed applications that are discovered to be undesirable. The server receives data about applications from many devices, using the combined data to minimize false positives and provide comprehensive protection against known and unknown threats. The server can accumulate this data and then perform a characterization re-assessment of a data object it has previously assessed. | 2013-05-09 |
20130117847 | Streaming Method and System for Processing Network Metadata - A method and system for processing network metadata is described. Network metadata may be processed by dynamically instantiated executable software modules which make policy-based decisions about the character of the network metadata and about presentation of the network metadata to consumers of the information carried by the network metadata. The network metadata may be type classified and each subclass within a type may be mapped to a definition by a unique fingerprint value. The fingerprint value may be used for matching the network metadata subclasses against relevant policies and transformation rules. For template-based network metadata such as NetFlow v9, an embodiment of the invention can constantly monitor network traffic for unknown templates, capture template definitions, and informs administrators about templates for which custom policies and conversion rules do not exist. Conversion modules can efficiently convert selected types and/or subclasses of network metadata into alternative metadata formats. | 2013-05-09 |
20130117848 | Systems and Methods for Virtualization and Emulation Assisted Malware Detection - Systems and methods for virtualization and emulation malware enabled detection are described. In some embodiments, a method comprises intercepting an object, instantiating and processing the object in a virtualization environment, tracing operations of the object while processing within the virtualization environment, detecting suspicious behavior associated with the object, instantiating an emulation environment in response to the detected suspicious behavior, processing, recording responses to, and tracing operations of the object within the emulation environment, detecting a divergence between the traced operations of the object within the virtualization environment to the traced operations of the object within the emulation environment, re-instantiating the virtualization environment, providing the recorded response from the emulation environment to the object in the virtualization environment, monitoring the operations of the object within the re-instantiation of the virtualization environment, identifying untrusted actions from the monitored operations, and generating a report regarding the identified untrusted actions of the object. | 2013-05-09 |
20130117849 | Systems and Methods for Virtualized Malware Detection - Systems and methods for virtualized malware enabled detection are described. In some embodiments, a method comprises intercepting an object provided from a first digital device, determining one or more resources the object requires, instantiating a virtual environment with the one or more resources, processing the object within the virtual environment, tainting operations of the object within the virtual environment, monitoring the operations of the object, identifying an additional resource of the object while processing that is not provided in the virtual environment, re-instantiating the virtual environment with the additional resource, monitoring the operations of the object while processing within the re-instantiated virtual environment, identifying untrusted actions from the monitored operations, and generating a report identifying the operations and the untrusted actions of the object. | 2013-05-09 |
20130117850 | System and Method for Bidirectional Trust Between Downloaded Applications and Mobile Devices Including a Secure Charger and Malware Scanner - A system and method are described that will enable mobile smart devices, such as a cellular phones, PDAs, or iPads, smartphones, mobile payment systems, mobile healthcare systems, handheld law enforcement systems, and other types of tablet devices, to trust download applications and for the download applications to trust the mobile smart devices onto which they are downloaded. The system and method enables charging a mobile smart device and while charging the mobile smart device scans for malware and other viruses in the applications and the operating system on the mobile smart device. | 2013-05-09 |
20130117851 | Automated method and system for monitoring local area computer networks for unauthorized wireless access - The wireless activity in a geographic area containing LAN connection ports is monitored using one or more sensor devices, called sniffers. By analyzing said wireless activity, one or more APs that are operating in said geographic area are identified. The active APs so identified are classified into three categories, namely “authorized” APs (those that are allowed by network administrator), “unauthorized” APs (those that are not allowed by the network administrator, but are still connected to the LAN of interest) and “external” APs (those that are not allowed by network administrator but are not connected to the LAN of interest, for example APs connected to the neighbor's LAN) by conducting one or more tests. The sniffers detect any wireless station attempting to connect to or communicating with the one or more identified unauthorized APs. Upon identifying unauthorized AP and/or intruding wireless station an indication is transferred to the prevention process. | 2013-05-09 |
20130117852 | Detecting Emergent Behavior in Communications Networks - Systems and methods of detecting emergent behaviors in communications networks are disclosed. In some embodiments, a method may include decomposing a plurality of data packets into a plurality of component data types associated with a candidate alert representing a potential security threat in a network. The method may also include retrieving, from a database, a count for each of a plurality of historical data types matching at least a subset of the component data types, each of the counts quantifying an amount of data of a corresponding historical data type previously detected in the network in a given time period. The method may further include calculating a score that indicates a discrepancy between an amount of data in each of the subset of the component data types and the counts for each corresponding historical data type in the same time period, and handling the candidate alert based upon the score. | 2013-05-09 |
20130117853 | METHODS FOR DETECTING MALICIOUS PROGRAMS USING A MULTILAYERED HEURISTICS APPROACH - Three heuristic layers are used to determine whether suspicious code received at a port of a data processing device is malware. First, static analysis is applied to the suspicious code. If the suspicious code passes the static analysis, dissembling analysis is applied to the suspicious code. Preferably, if the suspicious code passes the dissembling analysis, dynamic analysis is applied to the suspicious code. | 2013-05-09 |
20130117854 | System and Method for Bidirectional Trust Between Downloaded Applications and Mobile Devices Including a Secure Charger and Malware Scanner - A system and method are described that will enable mobile smart devices, such as a cellular phones, PDAs, or iPads, smartphones, mobile payment systems, mobile healthcare systems, handheld law enforcement systems, and other types of tablet devices, to trust download applications and for the download applications to trust the mobile smart devices onto which they are downloaded. The system and method enables charging a mobile smart device and while charging the mobile smart device scans for malware and other viruses in the applications and the operating system on the mobile smart device. | 2013-05-09 |
20130117855 | APPARATUS FOR AUTOMATICALLY INSPECTING SECURITY OF APPLICATIONS AND METHOD THEREOF - An apparatus automatically inspects security of mobile applications. The apparatus includes a static analyzer to perform a static analysis by reversing an execution file of the mobile application, and an automatic execution processor to generate an automatic execution script used to automatically execute the execution file and execute the automatic execution script automatically to generate a log. The apparatus further includes a dynamic analyzer to analyze whether a pattern of malicious codes was executed in the execution file using the result of the static analysis and the log resulted from the automatic execution. | 2013-05-09 |
20130117856 | WAN TRANSPORT OF FRAMES WITH MAC SECURITY - A physical layer device provides security processing on communication frames that may include tags or headers that are for use in a wide area network. As frames pass through the physical layer device, the frames are classified for a type of security processing. Depending on the classification a cipher is applied to the frames for integrity checking of data in the frames. Some frames are also encrypted. The security processing may exclude some of the tags or headers. The frames may also be filtered and buffered. | 2013-05-09 |
20130117857 | Method for Processing Data in One or More Control Devices of a Vehicle, in Particular a Motor Vehicle - The invention relates to a method for processing data in one or more control devices of a vehicle, in particular a motor vehicle. According to the invention, a data protection mode for the control device(s) can be activated by a user of the vehicle. In this data protection mode the predetermined data, to which the control device(s) has and/or have access during usage of the vehicle, are prevented from being transmitted out of the vehicle; or transmission of said predetermined data is permitted exclusively after entry of a confirmation requested by the user of the vehicle. As an alternative or in addition, in the data protection mode the predetermined data, which are stored in the control device(s) during usage of the vehicle, are deleted after a predefined period of time. | 2013-05-09 |
20130117858 | Method and System for Ensuring a Sharing Violation Free Environment for a Trusted Software Agent - A method and system is provided by which a trusted software agent can perform in a sharing violation free environment, which reduces complexity and eliminates interference with applications. A method for handling sharing violations in a computer system comprises intercepting a request by an application for access to a file, capturing a sharing violation raised by the operating system, determining whether the sharing violation is due to the trusted agent, and if so holding the request by the application for access to the file until the trusted agent no longer holds the file, and then reprocessing the request by the application for access to the file. The application is not aware that the sharing violation due to the trusted agent occurred, or that the request was pending and reprocessed because at the end of the process the application receives a file handle as if a sharing violation did not occur. | 2013-05-09 |
20130117859 | DISTINGUISHING LEGITIMATE HARDWARE UPGRADES FROM UNAUTHORIZED INSTALLATIONS OF SOFTWARE ON ADDITIONAL COMPUTERS - A client transmits requests to access features of a software program to a server. The requests include an identifier for a hardware profile of the computer on which the user is attempting to run the software. The client receives a response from the server that indicates whether the client is licensed to access the software and/or a feature of the software. The client creates a current identifier for the hardware configuration of the computer and compares the current identifier to the received identifier to determine whether the client is licensed to access the software and/or the feature. | 2013-05-09 |
20130117860 | Controlling Access Within a Protected Data Environment - Controlling a user access through a computer network within a protected data environment of a computer environment. An exception list comprising an Identifier (URI) stored within the protected data environment for granting user access of an unauthorized user is defined. At least one allowed access property relation for user access is defined when accessed by the unauthorized user. A URI of a user access request of unauthorized user is checked in the exception list. A One-Time URI is created. The One-Time URI is assigned to the electronic data resource according to the allowed property relation. The requested is delivered to the unauthorized user by using the assigned One-Time URI. | 2013-05-09 |
20130117861 | SYSTEM ALLOWING THE DISPLAY OF A PRIVATE COMPUTER FILE ON A SCREEN OF A TELECOMMUNICATIONS TERMINAL AND CORRESPONDING METHOD - A system allows the display of a private file on a screen of a telecommunications terminal. This system includes a first and a second Internet site. In the first Internet site, a first image contains a coded link to an address of a file of the second Internet site. The private file is stored in encrypted form in the meta data of the file in the second Internet site. A program recognizes the coded link and searches the meta data of the file whose Internet address corresponds to the coded link for authorization of a person connected to the first Internet site to view the private file. The program downloads the private file of the second Internet site via a remote protocol from the telecommunications terminal if viewing is authorized, to display the private file on the screen. | 2013-05-09 |
20130117862 | METHOD OF AUTHENTICATING SUBSCRIPTION TO A MOBILE CONTENT SERVICE - This invention relates to a method of authenticating subscription to a mobile content service. Currently, the known methods of authenticating subscription to a mobile content service are unsatisfactory due to their susceptibility to fraud and their complexity. The present invention obviates the problems with the known methods by introducing a third party Unique Identifier verifier | 2013-05-09 |
20130117863 | Method and Apparatus for Enabling Secure Distribution of Digital Content - A digital content management system includes a host machine and a delivery machine remote from the host machine. The host machine sends validation agent software to the delivery machine, which executes the validation agent. The validation agent performs one or more tests or observations to determine whether the delivery machine has been compromised, and communicates the results of the tests or observations to the host machine. If the host machine determines that the delivery machine has not been compromised, the host machine sends digital content to the delivery machine, and a player module at the delivery machine delivers the content to the user according to an appropriate set of access rights. After delivering the content, the delivery machine deletes the content to prevent unwanted access to the content. The content can contain signals indicative that the content is legitimate, such as watermarks or bad code segments or sectors. | 2013-05-09 |
20130117864 | AUTHENTICATION SYSTEM - An authentication system includes: a host device; a storage device which is electrically connected to the host device through a first interface and which is configured to store contents; and an authentication device which is electrically connected to at least one module included in the storage device and which is configured to store copy protection information for the contents. | 2013-05-09 |
20130117865 | MESSAGE CONTROL SYSTEM FOR A PORTABLE DEVICE - A message control system for a portable device that communicates through a link with a packet switched network. Integrated sensors in the portable device are configured to generate speed data. The system comprises a message manager that logs when and where messages are received, monitors the speed data, and uses the data to determine if an incoming message is authorized. If the message is authorized it is displayed on the portable device, and if it is not authorized the system sends an outgoing message over the network link indicating that the incoming message is not authorized. | 2013-05-09 |
20130117866 | METHOD AND SYSTEM FOR SECURING ACCESS TO CONFIGURATION INFORMATION STORED IN UNIVERSAL PLUG AND PLAY DATA MODELS - A method and system for securing access to configuration information stored in universal plug and play data models are provided. The method includes receiving a request to operate on at least one node of a data model from a Control Point (CP), where the data model includes a plurality of nodes and each of the plurality of nodes represents configuration information, determining a role associated with the CP, determining whether the role of CP is in a recommended role list, allowing, if the role is present, the CP to operate on the at least one node, and determining, if the role is not present, whether the CP has a role appropriate for operating on the at least one node based on ACL data associated with the at least one node. Accordingly, the CP is allowed to operate on the at least one node or an error message is returned on a display of the CP. | 2013-05-09 |
20130117867 | Theft Prevention for Networked Robot - The robot in this invention can detect the fading or loss of wireless network signal as an indication of being removed from its working area and enter into alert mode. The purpose of robot entering into alert mode is to deter physical theft, e.g., by sounding an alarm, to protect confidential data loss, and to render the robot useless to an unauthorized person, reducing the incentives for theft. A number of techniques are employed in this invention: confidential data stored on the robot is encrypted; administrator is required to log in the robot to enable robot operations; robot is to detect abnormal conditions such as fading of wireless network signal, sudden loss of wireless network signal, loss of connectivity to management server, and physical disconnection of any computing part from itself; robot is to resume normal operations without administrator intervention when abnormal condition is rectified; an Internet management server instructs the robot to delete stored data when the robot fails to authenticate itself; and place the reset button of a computing part of the robot such that the reset button is only accessible when the computing part is physically disconnected from the robot. | 2013-05-09 |
20130117868 | Animal Model Expressing Luciferase under Control of the Myelin Basic Protein Promoter (MBP-luci) and Use of the Model for Bioluminescence In Vivo Imaging - A Myelin Basic Protein-luciferase bioimaging noninvasive model to visualize and quantify demyelination and remyelination events in the CNS at transcriptional level in vivo is provided. Luciferase-expressing transgenic animals were generated with myelin basic protein (MBP) promoter coupled to firefly luciferase reporter. The MBP-luci bioimaging model provides a means to monitor myelination status and the efficacy of a remyelination modulating test compound. An advantage of bioimaging is that a subject in a longitudinal study can serve as its own control. The same subject can be tracked over a demyelination and remyelination process continuously over a period of at least 10 weeks. This model enables normalization of individual animal imaging response and provides quality data with considerably reduced variance. In addition, because cohorts of animals need not be sacrificed at different time points, reduction in the number necessary for a compound efficacy study is possible. | 2013-05-09 |
20130117869 | METHOD FOR THE GENERATION OF COMPACT TALE-NUCLEASES AND USES THEREOF - The present invention relates to a method for the generation of compact Transcription Activator-Like Effector Nucleases (TALENs) that can efficiently target and process double-stranded DNA. More specifically, the present invention concerns a method for the creation of TALENs that consist of a single TALE DNA binding domain fused to at least one catalytic domain such that the active entity is composed of a single polypeptide chain for simple and efficient vectorization and does not require dimerization to target a specific single double-stranded DNA target sequence of interest and process DNA nearby said DNA target sequence. The present invention also relates to compact TALENs, vectors, compositions and kits used to implement the method. | 2013-05-09 |
20130117870 | GENETICALLY MODIFIED ANIMALS AND METHODS FOR MAKING THE SAME - Compositions and methods for use of TALENs to make genetically modified livestock or other animals are set forth. Some of the embodiments of the invention provide for making an founder animal that is completely free of all unplanned genetic modifications. Some embodiments are directed to removing genetic faults in established breeds without making other alterations to the genome. Other embodiments are directed to particular tools or processes such as a TALENs with a preferred truncation. | 2013-05-09 |
20130117871 | Human Antibodies Derived from Immunized Xenomice - Fully human antibodies against a specific antigen can be prepared by administering the antigen to a transgenic animal which has been modified to produce such antibodies in response to antigenic challenge, but whose endogenous loci have been disabled. Various subsequent manipulations can be performed to obtain either antibodies per se or analogs thereof. | 2013-05-09 |
20130117872 | Novel Substitution Mutant Receptors and Their Use in a Nuclear Receptor-Based Inducible Gene Expression System - This invention relates to the field of biotechnology or genetic engineering. Specifically, this invention relates to the field of gene expression. More specifically, this invention relates to novel substitution mutant receptors and their use in a Group H nuclear receptor-based inducible gene expression system and methods of modulating the expression of a gene in a host cell for applications such as gene therapy, large scale production of proteins and antibodies, cell-based high throughput screening assays, functional genomics and regulation of traits in transgenic organisms. | 2013-05-09 |
20130117873 | HUMANIZED IL-6 AND IL-6 RECEPTOR - Mice that comprise a replacement of endogenous mouse IL-6 and/or IL-6 receptor genes are described, and methods for making and using the mice. Mice comprising a replacement at an endogenous IL-6Rα locus of mouse ectodomain-encoding sequence with human ectodomain-encoding sequence is provided. Mice comprising a human IL-6 gene under control of mouse IL-6 regulatory elements is also provided, including mice that have a replacement of mouse IL-6-encoding sequence with human IL-6-encoding sequence at an endogenous mouse IL-6 locus. | 2013-05-09 |
20130117874 | Wheat variety XW10Q - A wheat variety designated XW10Q, the plants and seeds of wheat variety XW10Q, methods for producing a wheat plant produced by crossing the variety XW10Q with another wheat plant, and hybrid wheat seeds and plants produced by crossing the variety XW10Q with another wheat line or plant, and the creation of variants by mutagenesis or transformation of variety XW10Q. This invention also relates to methods for producing other wheat varieties or breeding lines derived from wheat variety XW10Q and to wheat varieties or breeding lines produced by those methods. | 2013-05-09 |
20130117875 | COTTON VARIETY PHY499WRF - The disclosure relates to a cotton variety, designated PHY499WRF, the plants and seeds of the cotton variety PHY499WRF, methods for producing a cotton plant, either varietal or hybrid, produced by crossing the cotton variety PHY499WRF with itself or with another cotton plant, hybrid cotton seeds and plants produced by crossing the variety PHY499WRF with another cotton variety or plant, methods for producing a cotton plant containing in its genetic material one or more transgenes, and the transgenic cotton plants produced by that method. This disclosure also relates to cotton varieties derived from cotton variety PHY499WRF, to methods for producing other cotton varieties derived from cotton variety PHY499WRF, and to the varieties derived by the use of those methods. | 2013-05-09 |
20130117876 | COTTON VARIETY P04X.3074 - The disclosure relates to a cotton variety, designated P04X.3074, the plants and seeds of the cotton variety P04X.3074, methods for producing a cotton plant, either varietal or hybrid, produced by crossing the cotton variety P04X.3074 with itself or with another cotton plant, hybrid cotton seeds and plants produced by crossing the variety P04X.3074 with another cotton variety or plant, methods for producing a cotton plant containing in its genetic material one or more transgenes, and the transgenic cotton plants produced by that method. This disclosure also relates to cotton varieties derived from cotton variety P04X.3074, to methods for producing other cotton varieties derived from cotton variety P04X.3074, and to the varieties derived by the use of those methods. | 2013-05-09 |
20130117877 | METHODS FOR DETERMINING FITNESS IN PLANTS - Means and methods are provided to produce abiotic stress tolerant plants with improved yield based on the specific identification of a DNA methylation signature in said plants out of a population of said plants. | 2013-05-09 |
20130117878 | STATISTICAL APPROACH FOR OPTIMAL USE OF GENETIC INFORMATION COLLECTED ON HISTORICAL PEDIGREES - This invention provides a novel means of predicting plant phenotypes that incorporates previously unusable dense marker data derived from historical pedigrees. The method operates by collecting information from a population pertaining to one or more loci, which is used to build one or more matrices by calculating, for the alleles present at the measured loci, the probability that the alleles are identical by descent. These matrices are then used to develop a second set of one or more matrices in which each value represents the probability that a certain individual in the population descended from a certain ancestral (founder) genotype. This set of second matrices can then be used as part of a breeding program for selecting and breeding individuals from the population or can be used to better classify the individuals in the population, leading to improved plant phenotypes. | 2013-05-09 |
20130117879 | Plant Eukaryotic Translation Initiation Factor 4E - The invention relates to plants, and in particular to virus-resistant plants, and to methods of generating such plants. The invention extends to eukaryotic translation initiation factor variants and isoforms thereof, and to nucleic acids involved in the splicing of such variant factors, and uses thereof in methods for producing plants that are resistant to viral infections. | 2013-05-09 |
20130117880 | TRANSGENIC PLANTS EXPRESSING A VIRAL ANTIFUNGAL PROTEIN - Transgenic plants expressing the KP4 antifungal protein are provided which exhibit high levels of antifungal resistance. Such transgenic plants contain a recombinant DNA construct comprising a heterologous signal peptide sequence that is oper ably linked to a non-native nucleic acid sequence encoding a mature KP4 antifungal protein. | 2013-05-09 |
20130117881 | PROMOTER, PROMOTER CONTROL ELEMENTS, AND COMBINATIONS, AND USES THEREOF - The present invention is directed to promoter sequences and promoter control elements, polynucleotide constructs comprising the promoters and control elements, and methods of identifying the promoters, control elements, or fragments thereof. The invention further relates to the use of the present promoters or promoter control elements to modulate transcript levels. | 2013-05-09 |
20130117882 | METHODS AND COMPOSITIONS FOR ENHANCED RESISTANCE TO ABIOTIC STRESS IN PLANTS - The present invention provides transgenic plants having increased tolerance to abiotic stress comprising a recombinant nucleic acid molecule, said recombinant nucleic acid molecule comprising a nucleotide sequence encoding miR319 operatively associated with a promoter, a nucleotide sequence that is antisense to a portion of consecutive nucleotides of a nucleotide sequence encoding PCF5, and/or a nucleotide sequence that encodes a portion of consecutive nucleotides of a nucleotide sequence encoding PCF5, which when expressed produces an antisense nucleotide sequence, wherein expression of the nucleotide sequence confers increased tolerance to abiotic stress. Also provided are methods and compositions for making said transgenic plants. | 2013-05-09 |
20130117883 | REGULATORY POLYNUCLEOTIDES AND USES THEREOF - The present disclosure provides compositions and methods for regulating expression of transcribable polynucleotides in plant cells, plant tissues, and plants. Compositions include regulatory polynucleotide molecules capable of providing expression in plant tissues and plants. Methods for expressing polynucleotides in a plant cell, plant tissue, or plants using the regulatory polynucleotide molecules disclosed herein are also provided. | 2013-05-09 |
20130117884 | AXMI-001, AXMI-002, AXMI-030, AXMI-035, AND AXMI-045: TOXIN GENES AND METHODS FOR THEIR USE - Compositions and methods for conferring pesticidal activity to bacteria, plants, plant cells, tissues and seeds are provided. Compositions comprising a coding sequence for a delta-endotoxin polypeptide are provided. The coding sequences can be used in DNA constructs or expression cassettes for transformation and expression in plants and bacteria. Compositions also comprise transformed bacteria, plants, plant cells, tissues, and seeds. In particular, isolated delta-endotoxin nucleic acid molecules are provided. Additionally, amino acid sequences corresponding to the polynucleotides are encompassed, and antibodies specifically binding to those amino acid sequences. In particular, the present invention provides for isolated nucleic acid molecules comprising nucleotide sequences encoding the amino acid sequence shown in SEQ ID NO:6-11, or the nucleotide sequence set forth in SEQ ID NO:1-5, as well as variants and fragments thereof. | 2013-05-09 |
20130117885 | Novel Microrna Precursor and Methods of Use for Regulation of Target Gene Expression - Methods for modulating target gene expression in plants by expression of recombinant microRNA precursors are provided. Uses of the said recombinant microRNA precursors for the control of nematodes, in particular the control of soybean cyst nematodes are also provided. Methods for introduction of genetic material into plants that are susceptible to nematodes in order to increase resistance to nematodes are further provided. | 2013-05-09 |
20130117886 | NUCLEOTIDE SEQUENCES AND CORRESPONDING POLYPEPTIDES CONFERRING MODULATED PLANT CHARACTERISTICS - The present invention relates to isolated nucleic acid molecules and their corresponding encoded polypeptides able confer the trait of modulated plant size, vegetative growth, organ number, plant architecture, sterility or seedling lethality in plants. The present invention further relates to the use of these nucleic acid molecules and polypeptides in making transgenic plants, plant cells, plant materials or seeds of a plant having such modulated growth or phenotype characteristics that are altered with respect to wild type plants grown under similar conditions. | 2013-05-09 |
20130117887 | Herbicide resistant Camelina Sativa - This disclosure provides a novel herbicide resistant plant, a method to transform | 2013-05-09 |
20130117888 | Plants Having Enhanced Yield-Related Traits and a Method for Making the Same - Nucleic acids and the encoded CER2-like polypeptides, At1g68440-like polypeptides or DEAD-box RNA helicase polypeptides are provided. A method of enhancing yield-related traits in plants by modulating expression of nucleic acids encoding CER2-like polypeptides or At1g68440-like polypeptides is provided. A method of enhancing yield-related traits in plants by reducing or substantially eliminating expression of nucleic acids encoding DEAD-box RNA helicase polypeptides and/or the activity of DEAD-box RNA helicase polypeptides in said plants is provided. Plants with modulated expression of the nucleic acids encoding CER2-like polypeptides or At1g68440-like polypeptides have enhanced yield-related traits relative to control plants. Plants with reduction or elimination of the expression of endogenous nucleic acids encoding DEAD-box RNA helicase polypeptides have enhanced yield-related traits relative to control plants. | 2013-05-09 |
20130117889 | POLYNUCLEOTIDE, POLYPEPTIDE SEQUENCES AND METHODS THEREOF - The present disclosure relates to identifying and characterizing polynucleotide sequences encoding proteins more particularly from | 2013-05-09 |
20130117890 | PROCESSES FOR ACCELERATING PLANT GROWTH AND INCREASING CELLULOSE YIELD - A polynucleotide including a gibberellin 20 oxidase gene and a promoter, more specifically a vascular specific promoter that includes one of (a) a nucleotide sequence of SEQ ID No. 2; (b) a nucleotide sequence of substantial sequence similarity to SEQ ID No. 2; (c) a nucleotide sequence that complements or is able to hybridize to (a) or (b); and (d) a nucleotide sequence which is the reverse complement of (a), (b), or (c). The gibberellin 20 oxidase gene includes one of (1) a nucleotide sequence listed in SEQ ID No. 1 as shown in FIG. | 2013-05-09 |
20130117891 | GROWTH PROMOTING FUSION PROTEINS - The present invention relates to fusion proteins that promote plant growth. More specifically, it relates to fusion proteins of polypeptides of the SAUR family fused to a heterologous polypeptide, preferably fused at the N-terminal end of the SAUR polypeptide. Said polypeptide can be expressed in a transgenic plant, possible in combination with other recombinant genes, to obtain an additive or even synergistic effect. | 2013-05-09 |
20130117892 | Polypeptides Having Cellulolytic Enhancing Activity And Polynucleotides Encoding Same - The present invention relates to isolated polypeptides having cellulolytic enhancing activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides. | 2013-05-09 |
20130117893 | Expression Cassette Encoding a 5-Enolpyruvylshikimate-3-phosphate Synthase (EPSPS) and Herbicide-tolerant Plants Containing It - The present invention relates to a novel expression cassette comprising a nucleic acid sequence encoding an EPSPS. In particular, the present invention relates to a novel expression cassette comprising, in the direction of transcription, functionally linked to one another, a promoter regulatory sequence which is functional in plant cells or plants, a nucleic acid sequence encoding an EPSPS and a terminator sequence which is functional in plant cells or plants, characterized in that the promoter regulatory sequence is a nucleic acid sequence chosen from the promoter regulatory sequences of the CsVMV (Cassava Vein Mosaic Virus) plant virus. | 2013-05-09 |
20130117894 | OVEREXPRESSION OF STARCH SYNTHASE IN PLANTS - The present invention relates to a process for increasing the phosphate content of starches of genetically modified plant cells in comparison with starches from corresponding wild-type plant cells by introducing a foreign nucleic acid molecule which codes for a soluble starch synthase II. The present invention furthermore relates to the overexpression of this soluble starch synthase II in the genetically modified plant cells. Furthermore, the present invention relates to rice starch and rice flour with improved quality characteristics, to rice grains comprising this rice starch, and to rice plants on which these rice grains grow. | 2013-05-09 |
20130117895 | Quantitative measurements using multiple frequency atomic force microscopy - The imaging mode presented here combines the features and benefits of amplitude modulated (AM) atomic force microscopy (AFM), sometimes called AC mode AFM, with frequency modulated (FM) AFM. In AM-FM imaging, the topographic feedback from the first resonant drive frequency operates in AM mode while the second resonant drive frequency operates in FM mode and is adjusted to keep the phase at 90 degrees, on resonance. With this approach, frequency feedback on the second resonant mode and topographic feedback on the first are decoupled, allowing much more stable, robust operation. | 2013-05-09 |
20130117896 | Blackberry plant named 'Drisblackthree' - This invention relates to a new and distinct variety of Blackberry plant named ‘DrisBlackThree’, which is primarily characterized by medium-sized, oblong fruit that matures to a black color, and having an early time of bud burst, is disclosed. | 2013-05-09 |
20130117897 | Thuja plant named 'Concesarini' | 2013-05-09 |
20130117898 | Nepeta plant named 'Blue Lagoon' - A new and distinct form of | 2013-05-09 |