19th week of 2012 patent applcation highlights part 70 |
Patent application number | Title | Published |
20120117624 | Method and Apparatus for use in an IP Multimedia Subsystem - A method is provided for use in an IP Multimedia Subsystem, IMS, in which a Serving 5 Call Session Control Function, S-CSCF, of the IMS cooperates with a Home Subscriber Server, HSS, of the IMS, to lock a user following a predetermined number of failed authentications of the user at the S-CSCF and/or to unlock that user thereafter, with any request received from the user at a node of the IMS where the lock is in effect and requiring an authentication challenge being caused by the node to be rejected. In one example, a locking signal is sent from the S-CSCF to the HSS, following the predetermined number of failed authentications, to indicate to the HSS that the user should be locked at the HSS. The locking signal could be carried by a Server Assignment Request, SAR, message. In another example, the user is unlocked at the S-CSCF in response to receipt of an unlock signal sent from the HSS to the S-CSCF. The unlock signal could be carried by a Registration Termination Request, RTR, message. | 2012-05-10 |
20120117625 | SECURITY SYSTEM FOR COMPUTING RESOURCES PRE-RELEASES - Technology is provided for provisioning a user computer system with membership in a privilege set in order to execute a pre-release resource. Some examples of pre-release resources are alpha and beta versions of firmware or software which can be downloaded to user computer systems. The pre-release resources are associated with different privilege sets based on their security risk levels. In one example, a security risk level may represent a number of user computer systems at risk of an integrity failure of the pre-release resource. In other examples, the security risk may represent an operational layer of the user computer system affected by the resource or a level of security testing certification success for the pre-release resource. A privilege set identifier indicates membership in one or more privilege sets. | 2012-05-10 |
20120117626 | Business pre-permissioning in delegated third party authorization - A method to manage access to end user-protected resources hosted in a shared pool of configurable computing resources, such as a cloud computing environment, begins by registering a particular application or service into the environment. The application or service is one that is being permitted to access resources on behalf of end users via a delegated authorization protocol, such as OAuth. For at least one end user associated with the organization, a permission is set, preferably by an organization entity, such as an organization administrator. The permission determines whether the application or service is permitted to access one or more resources associated with the end user. Then, in response to a request by the third party application to access a resource, where the request is received via the delegated authorization protocol, the permission is then used to determine whether the third party application is permitted to access the resource. | 2012-05-10 |
20120117627 | Authority Control Systems and Methods - Authority control systems and methods are provided. The system at least includes a first electronic device and a second electronic device. The second electronic device is coupled to the first electronic device. The second electronic device receives an authority setting for the first electronic device, and transmits the authority setting to the first electronic device. The first electronic device determines an access control operation regarding the first electronic device towards the second electronic device according to the authority setting. | 2012-05-10 |
20120117628 | Global Account Lockout (GAL) and Expiration Using an Ordered Message Service (OMS) - A method, apparatus and computer program product for providing Global Account Lockout (GAL) using an Ordered Messaging Service (OMS) is presented. A database operation is received from a client, and a determination made regarding whether the operation contains an authentication mechanism. When the operation does not contain an authentication mechanism, then the operation is returned from. When the operation does contain an authentication mechanism, then the following steps are performed: locating the entry and checking its authentication mechanism, determining whether the authentication mechanism in the operation is good, sending a bind message to a GAL manager, checking and updating GAL state, committing updates to GAL state, and returning operation to the client. | 2012-05-10 |
20120117629 | RELAY APPARATUS, COMMUNICATION APPARATUS AND RELAY METHOD - A relay apparatus connected to a communication apparatus, a service providing apparatus and a browser-equipped apparatus, includes: a registering unit registering provisional registration information, the provisional registration information being used in an authentication procedure performed between the service providing apparatus and the browser-equipped apparatus; an acquiring unit acquiring permission information representing that use of the service is permitted, the permission information being issued by the service providing apparatus in the authentication procedure; a communication unit transmitting the provisional registration information to the browser-equipped apparatus; a receiving unit receiving input information transmitted from the communication apparatus, the input information being generated in response to the provisional registration information; and a communication unit transmitting the permission information to the communication apparatus which has transmitted the input information if the receiving unit receives the input information. | 2012-05-10 |
20120117630 | Method and System for Secure Management of Co-Located Customer Premises Equipment - A method, system, and apparatus for managing customer premise equipment according to one embodiment includes establishing a secure connection between a first transport unit and a second transport unit. The secure connection includes an embedded operations channel and is operable to isolate a management plane from a data plane. The method further includes the first transport unit receiving a request for access to the first transport unit from the second transport unit. The method further includes establishing a secure terminal session between the first transport unit and the second transport unit using the embedded operations channel in response to receiving the request for access. The first transport unit then receives a management command from the second transport unit and the first transport unit performs at least one management function in response to receiving the management command. | 2012-05-10 |
20120117631 | SYSTEM AND METHOD FOR PROVISIONING AN EMAIL ACCOUNT USING MAIL EXCHANGE AND ADDRESS RECORDS - A system for provisioning an electronic mail (email) account of a user for allowing access to an electronic mailbox from a remote device to retrieve email includes a communications module that receives email address parameters entered by the user and transmits a domain name system (DNS) query to the Internet for returning mail exchange (MX) and address (A) records corresponding to the entered email address parameters of the user. A configuration module processes any returned MX and A records to determine whether the email address parameters entered by the user are valid before attempting to provision the email account of the user. | 2012-05-10 |
20120117632 | METHOD AND SYSTEM FOR AUTHENTICATING A DATA STREAM - A method and apparatus for obtaining digital content. A credential is extracted from a first data stream that corresponds to a media item. The credential is provided to a content provider. If the credential is authenticated, the content provider sends a second data stream that corresponds to the media item. | 2012-05-10 |
20120117633 | Enhanced Security For Pervasive Devices Using A Weighting System - An approach is provided where one or more biometric inputs are received at a biometric receiver accessible by a mobile pervasive computing device. The biometric inputs are from a current user of the mobile pervasive computing device. One or more sets of expected biometric data are retrieved with the sets of expected biometric data corresponding to one or more authorized users of the mobile pervasive computing device. The received biometric inputs are compared with the retrieved sets of expected biometric data. Themobile pervasive computing device is secured using one or more security actions if the comparison reveals a mismatch between the biometric inputs and the retrieved sets of expected biometric data. | 2012-05-10 |
20120117634 | SYSTEMS AND METHODS FOR FACILITATING DISTRIBUTED AUTHENTICATION - A method for facilitating distributed authentication includes the step of requesting, by a user of a client machine residing in a first domain, access to a resource residing in a second domain. The client machine authenticates the user to an intermediate machine. The intermediate machine impersonates the client machine. The intermediate machine impersonating the client machine requests access to the second domain from a domain controller residing in the second domain. The domain controller authorizes the requested access, responsive to a determination that the impersonated client machine is trusted for delegation. The domain controller transmits to an application server residing in the second domain, authentication data associated with the impersonated client machine. The application server transmits, to the intermediate machine, a launch ticket uniquely identifying a logon token. The client machine provides, to the application server, the launch ticket to access the resource residing in the second domain. | 2012-05-10 |
20120117635 | SIMULACRUM OF PHYSICAL SECURITY DEVICE AND METHODS - A simulacrum security device and methods. In one embodiment, a simulacrum or likeness of a physical security device is provided for use in conjunction with a software emulation of the security device. In one implementation, a “faux SIM card” is provided that does not contain Subscriber Identification Module (SIM) information itself, but instead enables a user to download Electronic SIM (eSIM) information (e.g., from a network or eSIM server) which is loaded into a software emulation of a Universal Integrated Circuit Card (UICC) device. The faux card is printed with an activation code, scan pattern, or other activation or access information. The subscriber purchases the faux card, and enters the activation code into a device; the entered activation code enables the device to log onto a network, and download the appropriate eSIM data. Delivery of eSIM information as enabled by the faux card addresses deficiencies in existing SIM distribution schemes, provides users with an enhanced perception of security, and further addresses various legal requirements. | 2012-05-10 |
20120117636 | MANAGEMENT OF MULTIPLE CONNECTIONS TO A SECURITY TOKEN ACCESS DEVICE - An electronic device, system and method for automatically managing wireless connections with a plurality of other devices are provided. The electronic device may be a security token access device and may be adapted to wirelessly pair and optionally securely pair with other devices. Connection information, which may comprise security information, is maintained at the electronic device for each connected device. When a connected device becomes stale, the electronic device implements one or more steps to manage the stale device's connection. | 2012-05-10 |
20120117637 | MANAGEMENT OF MULTIPLE CONNECTIONS TO A SECURITY TOKEN ACCESS DEVICE - A security token access device, a user device such as a computing device or communications device, and a method for managing multiple connections between multiple user devices and the access device. The access device maintains connection information, including security information, for each user device securely paired with the access device. Each time a new user device is paired with the access device, the access device transmits a notification to the user devices already paired to the user device. A user may provide instructions to the access device to terminate a pairing with one of the user devices by overwriting at least a portion of the connection information associated with the designated user device. A user device may further request a listing of all user devices currently paired with the access device. | 2012-05-10 |
20120117638 | TECHNIQUE FOR CONTROLLING ACCESS BY A CLIENT ENTITY TO A SERVICE - A technique of controlling access by a client entity to a service in a communications network. Processing modules are interconnected in the network in order to supply the service to the client entity. A processing module implements an individual function of a chain of individual functions associated with the service. The access method includes the following steps implemented by an access control device associated with an access node giving access to the service, the device being referred to as a main device: receiving a chain of processing modules from the access node; sending, to a secondary access control device associated with a processing module of the chain, a request to access the processing module under consideration, the request including an access token negotiated between the main device and the client entity; receiving a response to the access request from the secondary device; and notifying the access node of the response. | 2012-05-10 |
20120117639 | REMOTE AUTHENTICATION BASED ON CHALLENGE-RESPONSE USING DIGITAL CERTIFICATES - Embodiments of the invention provide for authenticating users of web-based applications by presenting a previously acquired signed digital signature. Examples establish secure user sessions between a client and a user in response to a verification of an identification of the user by the client, the client creating a unique username for the user and unlocking access by the user to a client digital signature for use with a request for service from a third party web server. A secure facilitator session is established between the client and a third party web server, wherein messages exchanged with the unique username and a unique session identification indicia of the secure facilitator session signed by the unlocked digital signature result in executed processes requested by the service identifier data if the messages are validated without the client requiring the user to verify user identification for any message until a secure facilitator session ends. | 2012-05-10 |
20120117640 | Integrated Computer Security Management System and Method - The present disclosure is generally directed to a computer security management system that integrates a firewall with an intrusion detection system (IDS). In other words, the firewall and IDS of the present disclosure can be designed to communicate process or status information and packets with one another. The present disclosure can facilitate centralized control of the firewall and the IDS and can increase the speed at which packets are passed between a secured computer network and an external network. Increased packet processing speed can be achieved in several ways. For example, the firewall and IDS can process packets in series, in parallel, and sometimes singularly when one of the components is not permitted to process a packet. Alternatively, singular processing can also be performed when one component is permitted to pass a packet to the secured computer network without checking with the other component. | 2012-05-10 |
20120117641 | METHODS AND APPARATUSES FOR PROVIDING INTERNET-BASED PROXY SERVICES - A proxy server receives, from multiple visitors of multiple client devices, a plurality of requests for actions to be performed on identified network resources belonging to a plurality of origin servers. At least some of the origin servers belong to different domains and are owned by different entities. The proxy server and the origin servers are also owned by different entities. The proxy server analyzes each request it receives to determine whether that request poses a threat and whether the visitor belonging to the request poses a threat. The proxy server blocks those requests from visitors that pose a threat or in which the request itself poses a threat. The proxy server transmits the requests that are not a threat and is from a visitor that is not a threat to the appropriate origin server. | 2012-05-10 |
20120117642 | INFORMATION SECURITY PROTECTION HOST - An information security protection host is provided. The information security protection host comprises a network interface and a virtual machine monitor (VMM) device. The network interface is connected to a computer network and is configured to receive a fist packet. The VMM device is configured to run a first operating system, wherein the fist operating system provides a first network service. The VMM device is further configured to provide a first operating system information of the first operating system and a first network service information of the first network service instantaneously so as to determine the security of the first packet. | 2012-05-10 |
20120117643 | SYSTEM AND METHOD FOR LOCKING AND UNLOCKING ACCESS TO AN ELECTRONIC DEVICE - The disclosure relates to a system and method for unlocking and unlocking access to a device. The system comprises: a graphical user interface (GUI) module providing instructions to a microprocessor operating on the electronic device and an access management module providing instructions to the microprocessor. The GUI module provides instructions to generate on a display of the electronic device an interface for entry and modification of a tap pattern used to change an access state of the electronic device; and process inputs from an input device through the interface that select described levels of movement and described locations for expected tap signals for the tap pattern. The access management module provides instructions to receive signals from a monitoring circuit in the electronic device that processes a tap signal received from an accelerometer in the electronic device; and determine whether the tap signal completes a match for the tap pattern. | 2012-05-10 |
20120117644 | System and Method for Internet Security - A computer implemented method for preventing SQL injection attacks comprises intercepting a web request associated with a web service at a first software hook in a first web service execution context, persisting at least a portion of the intercepted web request in a storage location associated with the first software hook and accessible to at least one additional execution context, intercepting a database query generated by at least one web service processing operation at a second software hook associated with the execution of the query, wherein the query is generated in response to the intercepted web request and the second hook retrieves the persisted portion of the intercepted web request, comparing a portion of the persisted portion of the intercepted web request with at least a portion of the intercepted database query, and determining, prior to the query being executed, whether the query corresponds to a potential SQL injection attack. | 2012-05-10 |
20120117645 | DETECTION CIRCUIT, DETECTION METHOD THEREOF, AND MEMORY SYSTEM INCLUDING THE DETECTION CIRCUIT - A detection circuit, including a sensing circuit configured to sense whether there is an external attack and generate second data from first data, a data conversion circuit configured to convert the first data to third data, and a comparator configured to compare the second data with the third data. | 2012-05-10 |
20120117646 | TRANSMISSION CONTROL PROTOCOL FLOODING ATTACK PREVENTION METHOD AND APPARATUS - Disclosed herein is a Transmission Control Protocol (TCP) flooding attack prevention method. The TCP flooding attack prevention method includes identifying the type of a packet received at an intermediate stage between a client and a server; determining the direction of the packet; defining a plurality of session states based on the type and the direction of the packet; detecting a TCP flooding attack by tracking the session states for each flow; and responding to the TCP flooding attack based on the type of the TCP flooding attack. | 2012-05-10 |
20120117647 | Computer Worm Curing System and Method and Computer Readable Storage Medium for Storing Computer Worm Curing Method - A computer worm curing system includes a string receiving module, a string generating module and a string replying module. The string receiving module receives an infected string, which is generated by a computer worm, from an infected host, which is infected by the computer worm, through a network. The infected string includes a shellcode, and the shellcode is executed utilizing a vulnerable process. The string generating module generates a curing code for curing the computer worm, and replaces the shellcode in the infected string with the curing code to generate a curing string, such that the curing string can be executed utilizing the vulnerable process. The string replying module replies the curing string to the infected host, such that the curing code of the curing string can be executed utilizing the vulnerable process of the infected host to cure the infected host of the computer worm. | 2012-05-10 |
20120117648 | Malware Determination - A method and apparatus for a determining whether an electronic file stored at a client device is malware. A server receives from the client device a request message that signature information of the electronic file. The server queries a database of signature information of a multiplicity of electronic files. If the signature information of the electronic file corresponds to signature information stored on the database, a determination is made as to whether the electronic file is malware. If the signature information of the electronic file does not correspond to signature information stored on the database, a determination is made as to whether a predetermined number of further request messages for the electronic file are received from further client devices within a predetermined time period. If fewer request messages are received within the time period, it is likely that the electronic file is malware. | 2012-05-10 |
20120117649 | INTERNET-BASED PROXY SECURITY SERVICES - A proxy server receives from a client device a request to perform an action on an identified resource that is hosted at an origin server for a domain. The proxy server receives the request as a result of a DNS request for the domain resolving to the proxy server. The origin server is one of multiple origin servers that belong to different domains that resolve to the proxy server and are owned by different entities. The proxy server and the origin servers are owned by different entities. The proxy server analyzes the request to determine whether a visitor belonging to that request poses a threat. If the proxy server determines that the visitor poses a threat, the proxy server blocks the request and transmits a block page to the client device that indicates that the request has been blocked. | 2012-05-10 |
20120117650 | IP-BASED BLOCKING OF MALWARE - A security module on a client monitors file download activities at the client and reports hosting website data to a security server. A download analysis module at the security server receives a hosting website data report from the client, where the hosting website data report describes a domain name and an IP address of a website hosting a file the client is attempting to download. The download analysis module analyzes the domain name and IP address of the website to generate file download control data indicating whether to allow downloading of the file to the client. The download analysis module reports the file download control data to the security module of the client. The security module uses the file download control data to selectively block downloading of the file. | 2012-05-10 |
20120117651 | Malicious Mobile Code Runtime Monitoring System and Methods - Protection systems and methods provide for protecting one or more personal computers (“PCs”) and/or other intermittently or persistently network accessible devices or processes from undesirable or otherwise malicious operations of Java TN applets, ActiveX™ controls, JavaScript™ scripts, Visual Basic scripts, add-ins, downloaded/uploaded programs or other “Downloadables” or “mobile code” in whole or part. A protection engine embodiment provides for monitoring information received, determining whether received information does or is likely to include executable code, and if so, causes mobile protection code (MPC) to be transferred to and rendered operable within a destination device of the received information. An MPC embodiment further provides, within a Downloadable-destination, for initiating the Downloadable, enabling malicious Downloadable operation attempts to be received by the MPC, and causing (predetermined) corresponding operations to be executed in response to the attempts. | 2012-05-10 |
20120117652 | Network-Based Binary File Extraction and Analysis for Malware Detection - A system and method are disclosed for network-based file analysis for malware detection. Network content is received from a network tap. A binary packet is identified in the network content. A binary file, including the binary packet, is extracted from the network content. It is determined whether the extracted binary file is detected to be malware. | 2012-05-10 |
20120117653 | MALWARE DETECTION SYSTEM AND METHOD - Methods and systems are presented for detection of malware such as worms in which a network switch entices the malware into sending scan packets by allocating one or more ports as bait addresses, sending outgoing bait packets, and identifying compromised hosts that send unexpected incoming packets to a bait address. | 2012-05-10 |
20120117654 | METHODS AND SYSTEMS FOR MANAGING A POTENTIAL SECURITY THREAT TO A NETWORK - Methods, systems and computer readable mediums storing computer executable programs for managing a potential security threat to a network are disclosed. Network data received at a network system within a network is monitored at a network management system. A determination is made at the network management system regarding whether the network data received at the network system poses a potential security threat to the network. A threat type associated with the potential security threat is identified at the network management system based on the determination. A threat assessment system operable to evaluate the identified threat type is identified at the network management system. A command is issued from the network management system to the network system to mirror network data received at the network system to the identified threat assessment system. | 2012-05-10 |
20120117655 | System, Method, and Computer Program Product for Identifying Vulnerabilities Associated with Data Loaded in Memory - A system, method, and computer program product are provided for identifying vulnerabilities associated with data loaded in memory. In operation, a subset of data that is loaded in memory is identified. Additionally, the subset of data is compared to a list of known data. Furthermore, there is a reaction based on the comparison. | 2012-05-10 |
20120117656 | Security Validation of Business Processes - Implementations of methods of the present disclosure include providing a process model based on the process, the process model comprising a plurality of tasks, receiving user input at a computing device, the user input specifying one or more security requirements, the user input relating each of the one or more security requirements to at least one task of the plurality of tasks, generating, using the computing device, a formal model of the process based on the process model and the one or more security requirements, the formal model being based on a specification meta-language, processing the formal model using a model checker that is executed on the computing device to determine whether violation of at least one of the one or more security requirements occurs in the process, generating an analysis result based on the processing, and displaying the analysis result on a display. | 2012-05-10 |
20120117657 | ATTRIBUTE INFORMATION PROVIDING SYSTEM - A system which implements a method for providing attribute data. A request is received from a user device via a network for a virtual ID token relating to attribute information pertaining to a subscriber associated with the user device. A data record including L attributes of the subscriber is read from a database, L being at least 2. The data record is provided to the user device via the network. A selection of M attributes of the L attributes is received from the user device via the network, M being less than L. A virtual record including the M attributes selected from the data record is generated, the virtual record including a virtual ID (VID) for identifying the virtual record. The generated virtual record is stored in the database. The virtual ID token is provided to the user device via the network, wherein the virtual ID token includes the VID. | 2012-05-10 |
20120117658 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD - The information processing apparatus includes: a tampering determination unit ( | 2012-05-10 |
20120117659 | Apparatus and Method for Secure Distribution of Media Data - A technique for distributing media data in a secured fashion that mitigates unwanted or illegal copying/distribution of such data. An initial, degraded version of the media data is sent to one or more recipient(s). After confirming identity of a recipient at a receiving system, a supplemental version of the media data is sent to the receiving system which augments the degraded version such that it can then be played by the recipient(s). The degraded version of the media data has a reduced quality that is obtained by removing portions of the data and filling in the removed portions with dummy data. During a subsequent rebuilding of the media data, a supplemental version of the media data is sent to the receiving data processing system where it is merged/combined with the degraded version to form a copy that corresponds to the original, high-quality version of the media data. | 2012-05-10 |
20120117660 | ACCESS CONTROL FOR SERVER APPLICATIONS - A method, system, and computer program product for access control for a server application provided between a server executing an application and a client. Access control is added to an existing server application (for example, a legacy application) without changing the application or the database. The method includes: capturing a screen from the server application; determining if the screen includes sensitive content; and checking a client user's authorization before sending a screen including sensitive content to the client. Determining if the screen includes sensitive content may include: carrying out text recognition on the screen content; and analyzing the output of the text recognition to identify sensitive content. | 2012-05-10 |
20120117661 | SOFTWARE AUTHORIZATION SYSTEM AND METHOD - A software authorization system has a server end and a user end. A software authorization method includes acquiring a software identification code of a protected software when the user end downloads the protected software from the server end; transmitting the software identification code and an inherent user identification code to the server end; acquiring a first key and main key by the server end according to the user identification code and the software identification code, respectively, so as to generate a second key by operating the main key and the first key and transmit the second key to the user end; restoring the main key by the user end with the second key combined with the first key; and decrypting the protected software by the main key. Therefore, the protected software is hard to be decrypted. | 2012-05-10 |
20120117662 | FILE SYSTEM OPERATION AND DIGITAL RIGHTS MANAGEMENT (DRM) - A file system is configured for use with files protected by digital rights management (DRM) content controls and to interact both with applications that are, and are not, DRM aware. The file system may be configured for use by two applications, in a manner that may provide the second application with protected files if the first application was previously allowed access. In one example, a user context cache of DRM-protected files is created. The files in the cache may have been decrypted in response to a request(s) from the first application. Subsequent requests from the second application may be received for files within the user context cache of DRM-protected files. At least one of the files within the user context cache of DRM-protected files may be provided to the second application if the second application has a joint user context with the first application. | 2012-05-10 |
20120117663 | SEMICONDUCTOR MEMORY CARD AND DATA READING APPARATUS, AND DATA READING/REPRODCUING APPARATUS - A semiconductor memory card comprising a control IC | 2012-05-10 |
20120117664 | SYSTEM FOR SECURE WEB-PROMPT PROCESSING ON POINT OF SALE DEVICES - A point of sale system including at least one proxy server having an internet connection, a web browser operative to download web pages from the internet via the proxy server, and a real time user input limiting trusted computing base module communicating with the web browser and being operative to limit user input to the web pages in real time. | 2012-05-10 |
20120117665 | METHODS AND COMPUTER PROGRAM PRODUCTS FOR CONTROLLING RESTRICTED CONTENT - A method and computer program product for managing restricted content, such as confidential or classified content, using content signatures are provided. A registry is established within an indexed archive system for content signatures of restricted files. Participants enroll in the registry and submit content signatures of all their files to the registry. The registry compares the submitted content signatures to those stored previously in the registry. The registry initiates a control action whenever there is a match between a participant's content signature and a previously stored content signature of a file to which the participant does not have access rights. When there is no match, the participant retains access to the restricted file. | 2012-05-10 |
20120117666 | MULTILAYER SECURING STRUCTURE AND METHOD THEREOF FOR THE PROTECTION OF CRYPTOGRAPHIC KEYS AND CODE - An arrangement for the protection of cryptographic keys and codes from being compromised by external tampering, wherein the arrangement is utilized within a multilayered securing structure. More particularly, there is provided a multilayered securing structure for the protection of cryptographic keys and codes, which may be subject to potential tampering when employed in computers and/or telecommunication systems. A method is provided for producing such multilayered securing structures within a modular substrate with the intent to protect cryptographic keys and codes which are employed in computers and/or telecommunication systems from the dangers of potential tampering or unauthorized access. | 2012-05-10 |
20120117667 | NOVEL COELENTERAZINE SUBSTRATES AND METHODS OF USE - An isolated polynucleotide encoding a modified luciferase polypeptide and novel coelenterazine-based substrates. The OgLuc variant polypeptide has at least 60% amino acid sequence identity to SEQ ID NO: 1 and at least one amino acid substitution at a position corresponding to an amino acid in SEQ ID NO: 1. The OgLuc variant polypeptide has at least one of enhanced luminescence, enhanced signal stability, and enhanced protein stability relative to the corresponding polypeptide of the wild-type | 2012-05-10 |
20120117668 | NUCLEIC ACID EXPRESSION CONSTRUCT AND ITS USE AS A CELL PROLIFERATION MARKER - A nucleic acid expression construct which encodes a fusion protein includes a reporter protein and a protein with a wild-type destruction signal. A sequence encoding the fusion protein is operably linked to a non-endogenous promoter. The fusion protein localizes during a cell cycle progression to subcellular structures selected from a cell cortex, a contractile ring, and a midbody. | 2012-05-10 |
20120117669 | HUMAN ANTIBODIES DERIVED FROM IMMUNIZED XENOMICE - Fully human antibodies against a specific antigen can be prepared by administering the antigen to a transgenic animal which has been modified to produce such antibodies in response to antigenic challenge, but whose endogenous loci have been disabled. Various subsequent manipulations can be performed to obtain either antibodies per se or analogs thereof. | 2012-05-10 |
20120117670 | HUMANIZED AXL ANTIBODIES - The present invention refers to monoclonal humanized antibodies, which bind to the extracellular domain of the AXL receptor tyrosine kinase and which at least partially inhibit AXL activity. | 2012-05-10 |
20120117671 | STEATOHEPATITIS-LIVER CANCER MODEL ANIMAL - Fatty liver was induced by administering agents for inducing organ inflammation to experimental animals to evoke insulin resistance and by rearing them with high-fat diets. As a result, steatohepatitis was successfully induced in the animals. The animals show pathological findings similar to those of humans. By using these model animals, substances for treating or preventing diseases can be efficiently screened and the efficacy of medicinal substances can be effectively evaluated. | 2012-05-10 |
20120117672 | ISOLATION AND GROWTH OF STEM CELLS FROM HEMANGIOMAS - The present invention describes stem cells and progenitor cells derived from hemangiomas, including testing of angiogenic inhibitors using these cells. The invention as described is useful in providing a process to culture and propagate hemangioma stem cells and generate xenograft models to develop treatments for infantile hemangiomas and other types of vascular lesions. | 2012-05-10 |
20120117673 | GENETIC ENCRYPTION - The present invention relates to a method to engineer either the genome of a genetically modified organism, other bioengineered reagent, or in vitro translation system for protein synthesis from specific protein-coding genes so that the protein-coding genes so engineered can only produce proteins with an intended structure when translated within the context of that specifically engineered GMO or in vitro translation system. It also relates to nucleic acids for use in such GMOs or translation systems. | 2012-05-10 |
20120117674 | METHOD FOR GENERATING REPLICATION DEFECTIVE VIRAL VECTORS THAT ARE HELPER FREE - Sequences are provided that are capable of directing circular adeno-associated virus replication, useful in vectors for providing therapeutic agents to a subject in need thereof. The vectors of the invention are particularly useful in the treatment of acute medical conditions requiring rapid gene expression. Further provided are methods for producing packaged defective viral vectors. | 2012-05-10 |
20120117675 | TOMATO HYBRID PX 02461111 AND PARENT LINES THEREOF - The invention provides seed and plants of tomato hybrid PX 02461111 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid PX 02461111 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2012-05-10 |
20120117676 | Soybean Event 127 and Methods Related Thereto - Compositions and methods related to transgenic AHAS-inhibiting herbicide resistant soybean plants are provided. Event 127 soybean plants having a mutated AHAS coding sequence which imparts tolerance to an AHAS-inhibiting herbicide are provided. The event 127 soybean plants having the event 127 nucleic acid molecule at the identified chromosomal location may comprise genomic/transgene junctions having at least the nucleic acid sequence of SEQ ID NO: 5 and/or 6. The characterization of the genomic insertion site of the event 127 provides for an enhanced breeding efficiency and enables the use of molecular markers to track the transgene insert in the breeding populations and progeny thereof. Various methods and compositions for the identification, detection, and use of the event 127 soybean plants are provided. | 2012-05-10 |
20120117677 | LETTUCE CULTIVAR CHAMPION - A lettuce cultivar, designated Champion, is disclosed. The invention relates to the seeds of lettuce cultivar Champion, to the plants of lettuce cultivar Champion and to methods for producing a lettuce plant by crossing the cultivar Champion with itself or another lettuce cultivar. The invention further relates to methods for producing a lettuce plant containing in its genetic material one or more transgenes and to the transgenic lettuce plants and plant parts produced by those methods. This invention also relates to lettuce cultivars or breeding cultivars and plant parts derived from lettuce cultivar Champion, to methods for producing other lettuce cultivars, lines or plant parts derived from lettuce cultivar Champion and to the lettuce plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid lettuce seeds, plants, and plant parts produced by crossing cultivar Champion with another lettuce cultivar. | 2012-05-10 |
20120117678 | YIELD IN CROP PLANTS THROUGH SELECTION OF EPIGENETICALLY MODIFIED POPULATIONS - Methods are provided to select plants and populations of epigenetically fixed crop plants with improved yield. | 2012-05-10 |
20120117679 | WATERMELON VARIETIES HAVING ALTERED SUGAR RATIOS - The present invention relates to watermelon varieties producing fruit with altered sugar ratios having superior taste characteristics. Specifically, the present invention provides watermelon varieties producing fruit having fructose content of at least 50% of the total soluble sugar; varieties producing fruit having sucrose content of at least 65% of the total soluble sugar; and varieties producing fruit having a combined fructose and sucrose content of at least 90% of the total soluble sugar. The present invention further relates to the use of said varieties for the production of watermelons for the fresh and processed fruit market. | 2012-05-10 |
20120117680 | PLANT VIRUS - The invention relates to the field of virology. The invention provides an isolated plant virus (ToTV) named Tomato torrado virus (ToTV), and components thereof. The invention further relates to methods of producing a ToTV-resistant plant comprising the steps of identifying a ToTV-resistant donor plant, crossing said ToTV-resistant donor plant with a recipient plant, and selecting from an offspring plant a resistant plant. | 2012-05-10 |
20120117681 | SOYBEAN MARKERS LINKED TO SCN RESISTANCE - This disclosure concerns compositions and methods for identifying the SCN resistant phenotype in soybean. In some embodiments, the disclosure concerns methods for performing marker-assisted breeding and selection of plants carrying one or more determinants of SCN resistance in soybean. | 2012-05-10 |
20120117682 | LETTUCE CULTIVAR CARLSBAD - A lettuce cultivar, designated Carlsbad, is disclosed. The invention relates to the seeds of lettuce cultivar Carlsbad, to the plants of lettuce cultivar Carlsbad and to methods for producing a lettuce plant by crossing the cultivar Carlsbad with itself or another lettuce cultivar. The invention further relates to methods for producing a lettuce plant containing in its genetic material one or more transgenes and to the transgenic lettuce plants and plant parts produced by those methods. This invention also relates to lettuce cultivars or breeding cultivars and plant parts derived from lettuce cultivar Carlsbad, to methods for producing other lettuce cultivars, lines or plant parts derived from lettuce cultivar Carlsbad and to the lettuce plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid lettuce seeds, plants, and plant parts produced by crossing cultivar Carlsbad with another lettuce cultivar. | 2012-05-10 |
20120117683 | PLANT RESISTANT TO A PATHOGEN - The present invention relates to novel | 2012-05-10 |
20120117684 | TOMATO HYBRID PX 02470002 AND PARENT LINES THEREOF - The invention provides seed and plants of tomato hybrid PX 02470002 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid PX 02470002 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2012-05-10 |
20120117685 | Isolated Novel Nucleic Acid and Protein Molecules from Soybeans and Methods of Using Thos Molecules - This disclosure provides purified nucleic acids and polypeptides and various uses of these sequences such as transcript profiling. Also provided are transgenic plants, seeds, and plant cells containing DNA for expression of the proteins that are useful for imparting enhanced agronomic trait(s) to transgenic crop plants, methods of making such plants and methods of making agricultural commodity including seeds and hybrid seeds from such plants. | 2012-05-10 |
20120117686 | STRESS-TOLERANT PLANTS EXPRESSING MANNOSYLGLYCERATE-PRODUCING ENZYMES - The present invention provides compositions and methods for increasing the level of mannosylglycerate in plants. Plants with increased levels of mannosylglycerate exhibit enhanced tolerance to stress, e.g., drought. | 2012-05-10 |
20120117687 | DROUGHT TOLERANT PLANTS AND RELATED CONSTRUCTS AND METHODS INVOLVING GENES ENCODING MIR827 - Isolated polynucleotides and polypeptides and recombinant DNA constructs useful for conferring drought tolerance, compositions (such as plants or seeds) comprising these recombinant DNA constructs, and methods utilizing these recombinant DNA constructs. The recombinant DNA construct comprises a polynucleotide operably linked to a promoter that is functional in a plant, wherein said polynucleotide encodes a miR827 microRNA. | 2012-05-10 |
20120117689 | CHIMERIC PROMOTERS CAPABLE OF MEDIATING GENE EXPRESSION IN PLANTS UPON PATHOGEN INFECTION AND USES THEREOF - Described are synthetic promoters capable of mediating gene expression in plants upon pathogen infection. Furthermore, recombinant genes and vectors comprising said chimeric promoters as well as host cells transformed with such chimeric promoters, recombinant genes, or vectors are provided. Additionally, diagnostic compositions and kits comprising such chimeric promoters, recombinant genes, vectors or cells are described. Provided are further methods for the identification of compounds being capable of activating or inhibiting genes that are specifically expressed in plants upon pathogen infection employing the above described means. Furthermore, transgenic plant cells, plant tissue, and plants containing the above-described chimeric promoters, recombinant genes, and vectors as well as the use of the aforementioned chimeric promoters, recombinant genes, vectors and/or compounds identified by the method of the invention in plant cell and tissue culture, plant breeding, and/or agriculture are described. | 2012-05-10 |
20120117690 | NOVEL BACILLUS THURINGIENSIS CRYSTAL POLYPEPTIDES, POLYNUCLEOTIDES, AND COMPOSITIONS THEREOF - The present invention provides insecticidal polypeptides related to shuffled | 2012-05-10 |
20120117691 | TRANSCRIPTION FACTORS FOR MODIFICATION OF LIGNIN CONTENT IN PLANTS - The invention provides methods for modifying lignin, cellulose, xylan, and hemicellulose content in plants, and for achieving ectopic lignification and, for instance, secondary cell wall synthesis in pith cells, by altered regulation of a WRKY transcription factor. Nucleic acid constructs for altered WRKY-TF expression are described. Transgenic plants are provided that comprise modified pith cell walls, and lignin, cellulose, and hemicellulose content. Plants described herein may be used, for example, as improved biofuel feedstock and as highly digestible forage crops. | 2012-05-10 |
20120117692 | Constitutive Expression Cassettes for Regulation of Plant Expression - The present invention relates to expression cassettes comprising transcription regulating sequences with constitutive expression profiles in plants obtainable from | 2012-05-10 |
20120117693 | Elite Event A5547-127 and Methods and Kits for Identifying Such Event in Biological Samples - Tools are provided which allow rapid and unequivocal identification of elite event A5547-127 in biological samples. | 2012-05-10 |
20120117694 | Novel Monolignol 4-O-Methyltransferases and Uses Thereof - Modified (iso)eugenol 4-O-methyltransferase enzymes having novel capacity for methylation of monolignols and reduction of lignin polymerization in plant cell wall are disclosed. Sequences encoding the modified enzymes are disclosed. | 2012-05-10 |
20120117695 | AFM MEASURING METHOD AND SYSTEM THEREOF - Provided are an AFM measuring method and a system thereof. The tip of a cantilever is provided to a plurality of points on a substrate, to which incident light is radiated from a light source. Scattered light is generated between the tip of the cantilever and the substrate by the incident light and the intensity of the scattered light is measured. The measured intensity of the scattered light is input to a data processing unit so as to find a point where the intensity of the incident is highest. The tip of the cantilever is moved to the point where the intensity of the incident light is highest. | 2012-05-10 |
20120117696 | INTEGRATED METALLIC MICROTIP COUPON STRUCTURE FOR ATOM PROBE TOMOGRAPHIC ANALYSIS - An integrated coupon structure for atom probe tomography (APT) analysis includes a base portion and an array of microtip posts protruding from the base portion. Both the base portion and the microtip posts formed from a same metal material, and the microtip posts being shaped at an apex thereof so as to be adapted to receive a sample attached thereto. | 2012-05-10 |
20120117697 | POTENTILLA PLANT NAMED 'KUPINPA' | 2012-05-10 |
20120117698 | HOSTA PLANT NAMED 'PURPLE HEART' - A new and distinct | 2012-05-10 |
20120117699 | HOSTA PLANT NAMED 'RASPBERRY SUNDAE' - A new and distinct | 2012-05-10 |