26th week of 2009 patent applcation highlights part 62 |
Patent application number | Title | Published |
20090165083 | METHOD AND APPARATUS FOR MANAGING POLICIES FOR TIME-BASED LICENSES ON MOBILE DEVICES - Methods and devices provide for creating, managing, modifying, and/or enforcing flexible digital rights management license policies for protecting games, media, data, or other software with a time-based license. Embodiments are especially directed toward situations in which a source of time is unavailable, untrustworthy, or unreliable. Licenses are defined by a small number of parameters. Parameter values may be defined by and included with protected content or applications. The parameter values may be chosen to define and enforce a desired level of compromise between usability and security characteristics. | 2009-06-25 |
20090165084 | SECURITY POLICY SWITCHING DEVICE, SECURITY POLICY MANAGEMENT SYSTEM, AND STORAGE MEDIUM - A security policy switching device includes a policy information storage that stores policy setting information and identification information of a policy in correspondence to each other, the policy setting information including setting content of the policy and identification information of a user to whom the policy is attached, a data information storage that stores identification information of data for which a policy is set and identification information of a policy attached to the data in correspondence to each other, and a policy switching unit that switches, in response to a switching request designating identification information of data for which the policy is to be switched and identification information of a user instructing the switch, a policy attached to the data by updating identification information of the policy attached to the data stored in the data information storage with identification information of another policy. | 2009-06-25 |
20090165085 | VECTOR GENERATION DEVICE, VECTOR GENERATING METHOD, AND INTEGRATED CIRCUIT - An object of the invention is to provide a vector generation apparatus, a vector generation method, and an integrated circuit for generating data (vector) as a basis for authentication processing such as biometric authentication while protecting information that can be authenticated at high speed using the resources of a server and should be handled as secrete information typified by a biometric template against secondary use. | 2009-06-25 |
20090165086 | RANDOM NUMBER GENERATION THROUGH USE OF MEMORY CELL ACTIVITY - Systems and/or methods that facilitate security of data are presented. A random number generation component generates random numbers based in part on electron activity in a select memory cell(s) to facilitate data security. Sensor components that are highly sensitive can be employed to sense activity of the select memory cell(s) and/or reference memory cell in a noise margin associated with respective memory cells in the memory component. The activity of the select memory cell is compared to the reference memory cell(s) to facilitate generating binary data. The binary data is provided to the random number generation component where the binary data is evaluated to determine whether a predetermined level of entropy exists in the binary data. The binary data, or a portion thereof, can be processed to generate random numbers that are utilized in cryptographic processes and/or as a physical signature to facilitate data security. | 2009-06-25 |
20090165087 | Media registration and validation service to protect against unauthorized media sharing - A Media Registration and Validation Service (“MRVS”) facilitates protection against unauthorized media sharing. In the media registration function, the MRVS receives, registers and stores one or more samples of media content defining source content. In the media evaluation function, the MRVS receives samples of media content (“examination content”) submitted for examination relative to the source content. The MRVS searches the database to determine instances of source content corresponding to the examination content, yielding corresponding content; and produces a report including indicia of the corresponding content. Protection against media sharing is thereby accomplished in one aspect by providing notice of registered source content to one or more prospective disclosers of corresponding content (including, without limitation, the submitters of examination content); and in another aspect, the prospective disclosers can rely on the notice to decide whether or not to disseminate their corresponding content. | 2009-06-25 |
20090165088 | METHOD AND SYSTEM FOR PROVIDING A CONTENT LIST AND CONTENT CLIPS TO A USER NETWORK DEVICE THROUGH AN INTERMEDIATE WEB PROVIDER - A method and system for providing content includes an intermediate web provider having content therein and a user network device communicating a user identifier data to the intermediate web provider. The intermediate web provider communicates the user identifier data for the user network device to a primary service provider. The system also includes a primary service provider authenticating the user network device using the user identifier. The intermediate web device forms a content list corresponding to at least some of the content provided to the intermediate web provider. The intermediate web provider communicates the content list to the user network device from the intermediate web provider. The user network device forms a selection from the content list at the user network device and communicates the selection to the partner service provider. The intermediate user device communicates the content corresponding to the selection to the user network device. The user network device displays the content on a display associated therewith. | 2009-06-25 |
20090165089 | Methods and Apparatus for Management of User Presence in Communication Activities - Systems and techniques for mediating user communications. A user persona manager maintains one or more user profiles and manages user interactions with other parties and with service providers based on user preferences associated with the user profile or profiles selected for a particular interaction. The persona manager receives a single set of user authentication information to establish the user identity, and provides previously stored information to other parties and service providers as appropriate, and otherwise conducts user interactions involving communications initiated by or on behalf of the user. The persona manager also examines interactions initiated by others, selects user profiles appropriate to the interactions, and routes and responds to the interactions based on information stored in the user profiles. | 2009-06-25 |
20090165090 | METHODS, SYSTEMS AND PROGRAM PRODUCTS FOR CREATION OF MULTIPLE VIEWS AND OPTIMIZED COMMUNICATIONS PATHWAYS BASED ON PERSONAL DESCRIPTORS - Multiple views and optimized communications pathways of personal descriptors are provided over a communications network for a globally accessible contact list of contacts in a database. User descriptors are automatically populated in a dynamic repository, and subsequently form personal descriptors. User queries and contact information are received anonymously and stored in a dynamic repository, based on adding the contact to an instant messaging roster state database, where the contact information is categorized, based on identifiable relationships between user descriptors and a group of user defined rules. Such user contact information is transmitted and/or received to and/or from contacts in the globally accessible contact list so as to share presence and access information, and where the user is an authorized user providing varying levels of access information. Sharing access to the personal descriptor includes the use of a communications broker, rendering an animated personal descriptor and completing social and business interactions. | 2009-06-25 |
20090165091 | METHOD AND SYSTEM FOR NETWORK ACCESS AND NETWORK CONNECTION DEVICE - A network access method and system and a network connection device are provided. A network connection device connected between a first network and a second network obtains first network attribute information about a first network device according to an access request for accessing the second network from the first network device on the first network. The network connection device performs authentication on whether the first network device has a right to access the second network based on the first network attribute information. If the authentication is passed, the network connection device connects the first network device into the second network. If the authentication is not passed, the network connection device prohibits the first network device from accessing the second network. | 2009-06-25 |
20090165092 | Sustained authentication of a customer in a physical environment - A system for use in allowing a user to conduct one or more transactions at one or more touchpoints in a business facility includes an authentication component, a tracking component, and a control component. The authentication component is configured to authenticate the user as a person allowed to conduct the one or more transactions. The tracking component is configured to track the user's location within the facility as the user moves through the facility. The control component is configured (a) to receive authentication information from the authentication component, (b) to receive location information from the tracking component, (c) to use the location information to recognize that the user has moved into position to engage one of the touchpoints, and (d) to deliver a message to the touchpoint authorizing the touchpoint to engage in one or more transactions with the user. | 2009-06-25 |
20090165093 | INFORMATION PROCESSING APPARATUS AND IDENTIFICATION CONTROL METHOD - According to one embodiment, an information processing apparatus includes a cabinet, a first storage module contained in the cabinet, a communication unit which is detachably inserted into the cabinet, equipped with a second storage module, and used for connecting to a communication line, a verification module which verifies identification information of the communication unit stored in the first storage module against that of the communication unit stored in the second storage module after receiving an instruction of activation of the information processing apparatus, a registration module which registers with the predetermined server unit for use of the communication unit when verification is performed against the identification information of the communication unit stored in the predetermined server unit and the use of the communication unit is determined to be matching. | 2009-06-25 |
20090165094 | Terminal activation method - The invention relates to a method for activating a terminal ( | 2009-06-25 |
20090165095 | NETWORK CONNECTION TERMINAL AUTHENTICATION METHOD AND APPARATUS - A network connection terminal authenticating method that authenticates a terminal device demands communication with other terminal device in a computer network. The network connection terminal authenticating method include authenticating the terminal device outside a communication path between the terminal device and the other terminal device in response to a demand for communication of the terminal device with the other terminal device and determining whether communication with the other terminal device is permitted, and starting data transmission from the terminal device to the other terminal device when the terminal device is authenticated in the authenticating. | 2009-06-25 |
20090165096 | DYNAMIC RADIUS - A system includes a remote authentication dial in user service (RADIUS) server in communication with a network access server. The network access server provides an authentication request to the RADIUS server. The authentication request includes at least a user identifier and a device identifier. The RADIUS server determines an authentication format utilized by the network access server based on the received authentication request. The system may also determine an authorization level to provide with an authentication response. | 2009-06-25 |
20090165097 | SINGLE SIGN-ON FOR OS BOOT IMAGE PROVISIONING AND OS LOGIN BASED ON USER IDENTITY - A method for single sign-one for operating system (OS) boot image provisioning and OS login based on user identity includes receiving authentication information from an information handling system (IHS) over a network. The authentication information is associated with a user. The authentication information is sent to network services. Boot image information is received from the network services. The boot image information is associated with a boot image and the authentication information. The boot image is provisioned to the IHS over the network, wherein the boot image includes an OS that is configured to read the authentication information from a shared memory region of the IHS and use the authentication information to auto-login the user to the OS. | 2009-06-25 |
20090165098 | METHOD OF AND SYSTEM FOR CONDUCTING A TRUSTED TRANSACTION AND/OR COMMUNICATION - A method of conducting a communication over a communication network. It comprises registering a user as a member user of a securing entity, the securing entity authenticating personal data of the member user via a trusted third party entity; sorting the personal data of the member user according to categories comprising identifying, non-identifying and semi-identifying data, non-identifying and semi-identifying data being correlated to identifying data by a sworn person, only non-identifying and/or semi-identifying data being requestable by any client entity during a transaction and/or a communication; archiving identifying data in a trusted third party entity; and electronically storing at least a part of semi-identifying data in a trusted third party entity database, and non-identifying data in a securing entity database. A system for conducting a communication over a communication network and a medium for storing processor instructions for controlling a system for communicating over a communication network are also disclosed. | 2009-06-25 |
20090165099 | PROVISIONING ACTIVE MANAGEMENT TECHNOLOGY (AMT) IN COMPUTER SYSTEMS - Active management technology (AMT) may be provisioned in a client device automatically, which may provide a secure connection between the provisioning server and the client device. The client device comprising the active management technology may support zero-touch provisioning and one-touch provisioning. | 2009-06-25 |
20090165100 | WEB PAGE SAFETY JUDGMENT SYSTEM - A user terminal displays on its display unit a target web page including an authentication information input field into which input authentication information is inputted by the user terminal. The user terminal judges first to third validity levels for a plurality of login history information by referring to a login information list and a service group information. The user terminal selects a corresponding process from a plurality of predetermined processes for the input authentication information based on existence or absence of the login history information in the first or second validity level and on a result of checking the input authentication information with login information in the login history information in the first to third validity levels. The user terminal executes the corresponding process. | 2009-06-25 |
20090165101 | Domain Membership Rights Object - A method of providing permissions to consume content objects within a domain includes creating a domain and a domain membership rights object for each member. The domain facilitates the sharing of content objects amongst the members of the domain. The domain membership rights objects for each member include permissions for each member in the domain to consume content objects in the domain. | 2009-06-25 |
20090165102 | ONLINE PASSWORD MANAGEMENT - This disclosure describes, generally, methods and systems for password management. In one embodiment, a method may include receiving, at a centralized password repository, requests from users. Each request may be configured to request a password to allow access to an associated application. In one embodiment, at least two of the users are at different locations. The method may further include performing a validation analysis for the users' credentials, and in response to verification of a user's credentials, transmitting a response including the password configured to provide access to the associated application. | 2009-06-25 |
20090165103 | APPARATUS AND METHOD FOR SHARING USER CONTROL ENHANCED DIGITAL IDENTITY - The present invention provides an apparatus for sharing a user control enhanced digital identity that allows a user to have all controls and control the flow of identity sharing on the user basis when the user shares user's personal information. According to the present invention, a user can decrease infringement of personal information due to illegal usage of the personal information by allowing a user to control usage of user's personal information and prevent the user's personal information from being carelessly used. Further, a provider that provides the services can efficiently associate the services between providers. | 2009-06-25 |
20090165104 | METHOD FOR IMPROVING SECURITY IN LOGIN AND SINGLE SIGN-ON PROCEDURES - In a method for improving client's login and sign-on security in accessing services offered by service providers over shared network resources such as Internet and particularly working within the framework of the www, a password is created for the client at a first attempt to access the service provider. The client's password is generated either at an authentication authority in trust relationship with the service provider and transmitted to the client, or the client is allowed to create his or her password on the basis of random character sequences transmitted from the authentication authority. For subsequent access to the service provider the authentication authority presents a client for characters in ordered sequences or in a diagram containing in an appropriate order a single occurrence of each password character. The client performs a selection of the password for validation and transmits the validation back to the authentication authority, which verifies the password and informs the service provider of the verification. In a most preferred embodiment the password characters are never transmitted between the authentication authority and the client in a validation and verification procedure, and the former is wholly disconnected from either the client's credentials or any transactions subsequently to be undertaken between the service provider and the client. | 2009-06-25 |
20090165105 | METHOD AND APPARATUS FOR COMMUNICATING BETWEEN A USER DEVICE AND A USER DEVICE LOCATING MODULE TO ALLOW A PARTNER SERVICE TO BE PROVIDED TO A USER DEVICE - A system and method for communicating between a user device locator module and a user receiving device includes forming a secure connection with the user device locator module. The user receiving device communicates user identifier data and port data to the user device locator module. An authentication module authenticates the user data from the user device locator module and generates an authentication signal. The user device locator module registers the port data at the user device locator module in response to the authentication signal. | 2009-06-25 |
20090165106 | Network Security Management for Ambiguous User Names - A method of managing network security can include receiving a user input comprising a user name and a password, determining whether the input user name potentially corresponds to a plurality of user accounts, determining whether the password is valid, and determining whether each of the user accounts is locked. The method can include selecting a security response to the user input based upon whether the input user name potentially corresponds to the plurality of user accounts, whether the password is valid, whether each of the user accounts is locked, and outputting the security response. | 2009-06-25 |
20090165107 | IDENTIFICATION MANAGMENT SYSTEM FOR ELECTRONIC DEVICE AUTHENTICATION - The conventional vertical integration system management form has a problem that a first user cannot receive a service provided by a second user belonging to another service system. To cope with this, a following system is suggested. That is, according to a second judgment server use request from a first electronic device used by a first user, an identification management server which has received a guarantee request outputted from a first judgment server searches for master-slave relationship information based on a common identifier. According to the search result, a guarantee is outputted. According to the guarantee, the first judgment server outputs a guaranteed service request to the second judgment server. Thus, the first user can receive the service used by the second user belonging to other vertical integration type system. | 2009-06-25 |
20090165108 | METHOD FOR VERIFYING SERVER END APPARATUS - A method for verifying a server end apparatus, suitable for verifying the identity of a server end apparatus from a client end apparatus, is provided. In the present invention, authentication data is sent to the server end apparatus by the client end apparatus, such that the server end apparatus verifies the authentication data. Afterwards, the server end apparatus must return an initial number, which is preset by the user, to the client end apparatus to verify whether the initial number is correct or not. If the initial number is incorrect, the connection with the server end apparatus is shut down. Therefore, the efficiency for verifying the server end identity is strengthened, so as to enhance the security. | 2009-06-25 |
20090165109 | CONTROLLED AND CLIENT-SIDE AUTHENTICATION MODULE - A computerized method of accessing a secure resource using an application associated with a user's computing device is provided. The application is programmed, in part, to monitor user browsing activity and wherein the application has associated therewith one or more predefined Uniform Resource Locaters (URLs) to trusted sites, each having an associated trusted root certificate and security key. The method includes the application detecting a user attempt to log into a secure resource, the application scanning in-process browser processes to identify a browser process that is in a login state, the application associating the browser process in a login state with one of the trusted sites, the application initiating a new browser session with the trusted site using the associated predefined URL, the application obtaining a login password from the user, the application supplying to the trusted site the associated security key and login password, and the user's computer displaying subsequent browsing activity. | 2009-06-25 |
20090165110 | DELEGATION IN LOGIC-BASED ACCESS CONTROL - Access to a resource may be controlled by a policy, such that a request to access the resource is either granted or denied based on what assertions have been made by various principals. To find the assertions that support a grant of access to the resource, a template may be created that defines the nature of assertions that would cause access to succeed. Assertions may be stored in the form of tokens. The template may be used to search an existing token store to find assertions that have been made, and/or to generate assertions that have not been found in the token store and that would satisfy the template. The assertions in the template may be created by performing an abductive reasoning process on an access query. | 2009-06-25 |
20090165111 | METHOD AND APPARATUS FOR SECURE MANAGEMENT OF DEBUGGING PROCESSES WITHIN COMMUNICATION DEVICES - A method, device and system for securely managing debugging processes within a communication device, such as a set top box or other multimedia processing device. For example, a security processor (SP) within the communication device manages the lifetime (LT) of any access token issued for use in activating debugging privileges within the communication device. The security processor authenticates an issued access token and securely delivers appropriate debug authorization information to the device controller. The security processor uses its secure, internal timer to count down the lifetime and update the remaining lifetime of the issued access token during the processing of each command by the security processor. In addition to securely managing the issuance of the access token and it's remaining lifetime, the updating process reduces any impact on the normal communications within the device. The method overcomes the issue of the communication device not having a secure internal clock. | 2009-06-25 |
20090165112 | METHODS AND APPARATUSES FOR USING CONTENT, CONTROLLING USE OF CONTENT IN CLUSTER, AND AUTHENTICATING AUTHORIZATION TO ACCESS CONTENT - Provided is a method of controlling use of content in a cluster by a source device, the method including receiving a request from a sync device to transmit content, authenticating an authorization of the sync device to access the content, and transmitting a stream of the content to the sync device. Thus, copyrights of content used by the source device or the sync device of the home network can be efficiently protected. | 2009-06-25 |
20090165113 | SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR FIREWALL USE OF CERTIFIED BINARIES - Systems, methods and computer program products for firewall use of certified binaries. Exemplary embodiments include a method including reading a plaintext component from a digital signature, searching the plaintext component for an identifier, reading in a TotalTCPIPPorts field for a total number of sockets to be opened for an application, reading in ports and descriptions for each of the ports, displaying information from the plaintext component up to a block including the identifier, the port being opened and the port description, prompting an instruction, displaying on the screen information from the plaintext component up to a block including the identifier, displaying a warning that the application is opening additional ports beyond the default number specified displaying a warning that opening the additional ports should be avoided and prompting the instruction. | 2009-06-25 |
20090165114 | Takeover Processes in Security Network Integrated with Premise Security System - An integrated security system is described comprising a gateway located at a first location. The gateway includes a takeover component that establishes a coupling with a first controller of a security system installed at the first location. The security system includes security system components coupled to the first controller. The takeover component automatically extracts security data of the security system from the first controller. The gateway automatically transfers the security data extracted from the controller to a second controller. The second controller is coupled to the security system components and replaces the first controller. | 2009-06-25 |
20090165115 | Service providing system, gateway, and server - A large-scale content delivery system may be achieved, which may send a large amount of contents without intensive management of the contents in the server. In a service providing system where a client, a service gateway, and a server are connected to each other through a network, the client sends a first message to the server by way of the service gateway. The service gateway inquires a processing method of the first message from the client of the server by using a second message that includes a part of the first message content. The server replies to the inquiry of the processing method from the service gateway with a program that describes the processing method, and the service gateway processes the first message from the client on the basis of the received processing method. | 2009-06-25 |
20090165116 | Methods And Systems For Providing A Trust Indicator Associated With Geospatial Information From A Network Entity - Methods and systems are described for providing a trust indicator associated with geospatial information from a network entity. In one embodiment, first geospatial information identifying a first geospatial region reported as associated with a first network entity is received. The first geospatial information is included in a message from the first network entity. Second geospatial information is received from a second network entity associated with the first network entity. The second geospatial information identifies a second geospatial region verified as associated with the second network entity. A geospatial relationship between the first geospatial region reported as associated with the first network entity and the second geospatial region verified as associated with the second network entity is determined. A trust indicator identifying a level of trust associated with the first geospatial region is generated based on the determined geospatial relationship. | 2009-06-25 |
20090165117 | Methods And Apparatus Supporting Access To Physical And Virtual Trusted Platform Modules - A data processing system features a hardware trusted platform module (TPM), and a virtual TPM (vTPM) manager. When executed, the vTPM manager detects a first request from a service virtual machine (VM) in the processing system, the first request to involve access to the hardware TPM (hTPM). In response, the vTPM manager automatically determines whether the first request should be allowed, based on filter rules identifying allowed or disallowed operations for the hTPM. The vTPM manager may also detect a second request to involve access to a software TPM (sTPM) in the processing system. In response, the vTPM manager may automatically determine whether the second request should be allowed, based on a second filter list identifying allowed or disallowed operations for the sTPM. Other embodiments are described and claimed. | 2009-06-25 |
20090165118 | Method and Arrangement for Position-Dependent Configuration of a Mobile Appliance - An access element and method for controlling access of a network element are provided. A plurality of network elements which are connected to a connection of an access element and at least one second network element is connected to the access element via a first network element. The first network element is authenticated at the access element. Another operation of authenticating the first network element at the access element is initiated by the first network element. An authentication request which is transmitted by the access element and is received at the first network element is forwarded to the second network element. The second network element responds to the authentication request with a response message and the response message is forwarded to the access element via the first network element. | 2009-06-25 |
20090165119 | METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR PROVIDING POWER CONTROL SECURITY FEATURES - A method, apparatus and computer program product are provided for power control security features. More particularly, the utilization of a supplemental power source can be permitted or prevented based on a comparison of access information to security information. In some embodiments, utilization of the supplemental power source can include the ability to charge a battery. | 2009-06-25 |
20090165120 | Mobile Terminal for a Traffic Information System, and Method for Activating an Access Control Device in a Mobile Terminal - Disclosed is a mobile terminal characterized by a first manipulation unit ( | 2009-06-25 |
20090165121 | Touch Pad based Authentication of Users - Touch pad based authentication of users. In an embodiment, a user can touch (and move on) a touch pad in a specific pattern (e.g., up, down, etc.) to authenticate oneself. In an embodiment, a device translates the touch movement to the same set of characters as those a user can manually enter using a keyboard to authenticate oneself. As a result, the user can use the same password when accessing the same application from other systems which have only keyboards, but not touch pads. | 2009-06-25 |
20090165122 | Image processing apparatus and copy machine control method - An image processing apparatus is an image processing apparatus capable of reading a security paper document that has a ground design pattern and performing image processing, and is provided with: a second modification processing unit that visualizes a latent image included in the ground design pattern; a first modification processing unit that performs a modification process so that the latent image included in the ground design pattern is not visualized; a CPU that performs authentication regarding whether or not a user of the security paper document is an authorized user; and a CPU that performs control so that the first modification processing unit performs modification processing and the latent image is not visualized, or performs control so that the latent image is not visualized by the second modification processing unit, in the case where the user has been authenticated as an authorized user of the security paper document. | 2009-06-25 |
20090165123 | SECURITY SYSTEM AND METHOD FOR CONTROLLING ACCESS TO COMPUTING RESOURCES - A security system comprises a personal digital key (PDK), a reader and a computing device. The PDK is a portable, personal transceiver that includes a controller and one or more passwords or codes. The computing device includes a detection engine, vault storage and a set up module. The detection engine detect events relating to the access of any files and third-party systems by the computing device and receives information from the reader as to whether the PDK is present/linked. The detection engine controls whether a user is able to access any of the functionality provided by the computing device based upon whether the PDK is in communication with the reader or not. The present invention also includes a number of methods such as a method for initializing the security system, a method for setting up a computing device, and a method for controlling access to computing resources. | 2009-06-25 |
20090165124 | REDUCING CROSS-SITE SCRIPTING ATTACKS BY SEGREGATING HTTP RESOURCES BY SUBDOMAIN - An arrangement for reducing the occurrence of harmful cross-site scripting is provided by segregating on-line content or other resources so that they are accessible at different domains or subdomains, each of which corresponds to a set of users, called a “sharing set,” where each user in the set has identical access privileges to certain resources. The sharing set is provided with an identifier (which may or may not be unique), so that the identifier may be used as the name of the domain or subdomain for which any member of the sharing set is authorized to access the resources located there. In this way, script that is embedded with the content can only be executed among members of the sharing set. Users who are not members of the sharing set are unable to invoke cross site-scripting attacks that would allow them to gain access to data from sharing set members. | 2009-06-25 |
20090165125 | SYSTEM AND METHOD FOR CONTROLLING USER ACCESS TO A COMPUTING DEVICE - A system and method for controlling user access to a computing device (e.g. a mobile device). In some embodiments, access rights are provided to a user based on successfully verified authentication factors, even where the user is unable to provide all the authentication factors typically required for access to the computing device. In one broad aspect, one or more authentication factors are provided by a user, and are received and verified by a security module application residing and executing on the computing device. When less than all of the authentication factors that would typically be expected in authenticating a user for access to the computing device is received and successfully verified, a subset of the available access rights selected from a plurality of different pre-defined subsets of access rights is provided to the user. The specific access rights provided to the user are based on the successfully verified authentication factors. | 2009-06-25 |
20090165126 | Manufacturing control system - Methods and systems for a manufacturing control system include but are not limited to identifying at least one object data file configured to produce an object by a manufacturing machine; confirming that an authorization code is associated with the object data file, the authorization code configured to be received by the manufacturing machine, the manufacturing machine adapted to receive the authorization code; and enabling the manufacturing machine to interface with the object data file only if the authorization code meets one or more predetermined conditions. | 2009-06-25 |
20090165127 | Authorization rights for operational components - Various methods and systems include exemplary implementations for a security-activated operational component. Possible embodiments include but are not limited to obtaining access to an object data file configured to implement various functional operation regarding one or more objects; verifying validity of an authorization code associated with the object data file; and controlling operation of the operational component to enable or prevent its activation pursuant to the authorization code in accordance with one or more predetermined conditions. | 2009-06-25 |
20090165128 | Authentication of a Contributor of Online Content - Methods, computer program products and systems are described for online-content management. Online content from multiple contributors is received at one or more first computers for public online display. An authentication score is determined for a contributor of the multiple contributors. The contributor's name and a representation of the contributor's authentication score is published online for display on one or more second computers in association with the online content received from the contributor. | 2009-06-25 |
20090165129 | METHOD FOR DELEGATING PRIVILEGES TO A LOWER-LEVEL PRIVILEGE INSTANCE BY A HIGHER-LEVEL PRIVILEGE INSTANCE - A method for a higher-level privilege instance to delegate privileges to a lower-level privilege instance, through which the granting of privileges, P | 2009-06-25 |
20090165130 | CONTENTS TRANSMISSION METHOD AND CONTENTS TRANSMISSION SYSTEM - Mobile unit | 2009-06-25 |
20090165131 | DETECTION AND PREVENTION OF MALICIOUS CODE EXECUTION USING RISK SCORING - A system and method for preventing malicious code execution, includes detecting a request for execution of a file. The file is scanned for risk before processing the request. A score is assigned to the risk. Execution of the file is either allowed or prohibited responsive to the risk score. | 2009-06-25 |
20090165132 | SYSTEM AND METHOD FOR SECURITY AGENT MONITORING AND PROTECTION - A security agent monitoring and protection system is provided. A security agent on an end point computing device can be accompanied by or can load into the device's memory at startup one or more independent software processes whose primary function is to directly protect the security agent itself and take protective actions against the end point computing device should a security agent protecting the device become disabled. Protection of the security agent can be achieved in several ways, including installing the security agent with restricted permissions, making it difficult to shutdown, restarting the security agent automatically if it is halted without authorization, disabling network connectivity of the end point device if the security agent does not successfully start or restart, protecting executable and dynamic link library (DLL) files of the security agent, and controlling access to the security agent's Common Object Model (COM) interfaces. These protective aspects can also be used by the monitoring agent itself to protect it from unauthorized access or disabling, further providing protection to the device. | 2009-06-25 |
20090165133 | SYSTEM FOR EXECUTING PROGRAM USING VIRTUAL MACHINE MONITOR AND METHOD OF CONTROLLING THE SYSTEM - A system for executing a program using a virtual machine monitor and a method of controlling the system are provided. The system includes a virtual machine monitor which divides an operating system (OS) into at least one root domain and a plurality of domains having different trust levels, and a trust-management module which is included in the root domain and periodically measures the trust level of an application program currently being executed in the OS. The virtual machine monitor executes the application program in one of the domains in consideration of the trust level of the application program. The method includes dividing an OS into at least a root domain and a plurality of domains having different trust levels by using a virtual machine monitor, enabling the root domain to periodically measure the trust level of an application program currently being executed in the OS, and executing the application program in one of the domains according to the trust level of the application program. | 2009-06-25 |
20090165134 | Look ahead of links/alter links - A computationally-implemented method comprising retrieving at least a portion of data from a data source, determining an effect of the data, determining an acceptability of the effect of the data at least in part via a virtual machine representation of at least a part of a real machine having one or more end-user specified preferences and providing at least one data display option based on the determining acceptability of the effect of the data. | 2009-06-25 |
20090165135 | SYSTEM AND METHODS FOR DETECTING SOFTWARE VULNERABILITIES AND MALICIOUS CODE - A system and method determines whether software includes malicious code. A validation machine is instrumented with tools and monitors that capture the static and dynamic behavior of software. Software under examination is executed on the validation machine, and the tools and monitors are used to log data representative of the behavior of the software to detect vulnerable or malicious code. If possible, one or more operations are automatically performed on the software to enhance the security of the software by neutralizing the vulnerable or malicious code. Activities that cannot be neutralized automatically are flagged for human inspection. The software executed on the validation machine may be source code or non-source code, with different operations being disclosed and described in each case. | 2009-06-25 |
20090165136 | Detection of Window Replacement by a Malicious Software Program - Various embodiments of a system and method for providing protection against malicious software programs are disclosed. The system and method may be operable to detect that a first window of a legitimate software program has been replaced by a second window of a malicious software program, e.g., where the second window includes features to mimic the first window in an effort to fool the user into inputting sensitive information into the second window. The method may operate to alert the user when the window replacement is detected. | 2009-06-25 |
20090165137 | Mobile device having self-defense function against virus and network-based attacks and self-defense method using the same - Provided are a mobile device having a self-defense function against virus and network-based attacks and a self-defense method using the same. The mobile device includes a virus checking module, which receives information on files required for virus checking on a basis of input/output (I/O) information created from a file system of an operating system, and determines whether or not the files are infected with a virus using distribution of similarity between data; a malicious packet determination module, which examines information on an Internet protocol (IP) packet created from a network to interrupt a denial-of-service attack (DoS attack); and a control module, which receives the I/O information created from the file system of the operating system, selects the files required for the virus checking, and transmits the selected files to the virus checking module, or receives information on the IP packet created from the network to transmit the received information to the malicious packet determination module, thereby preventing damage caused by the virus in advance, and effectively preventing a denial-of-service attack (DoS attack) caused by wireless network resource depletion and battery consumption that may occur in a wireless environment. | 2009-06-25 |
20090165138 | Computer Virus Protection - A network is protected from e-mail viruses through the use of a sacrificial server. Any executable programs or other suspicious parts of incoming e-mail messages are forwarded to a sacrificial server, where they are converted to non-executable format such as Adobe Acrobat PDF and sent to the recipient. The sacrificial server is then checked for virus activity. After the execution is completed, the sacrificial server is rebooted. | 2009-06-25 |
20090165139 | Secure Computer System and Method - An apparatus is configured to perform secure processing of confidential information. The apparatus comprises a secure disk configured to store confidential information arranged inside a lockable container; a processor configured to process the confidential information arranged inside the lockable container; an insecure network arranged outside the lockable container; and means for connecting the processor only to the secure disk or alternatively to the insecure network at any one time, but not to both the secure disk and the insecure network at the same time. | 2009-06-25 |
20090165140 | System for inserting/overlaying markers, data packets and objects relative to viewable content and enabling live social networking, n-dimensional virtual environments and/or other value derivable from the content - A system by which a User can associate selectable Markers, Data Packets and/or Objects with Content. The Content may generally be distributed electronically, and the Markers allow for insertion and/or overlay of Objects when the Content is selected for viewing by a Viewer. Objects and Data Packets are generally provided by a User, Promoter, Host, Service, or other entity to convey information to a Viewer. A Service provides tools and capabilities to both the User and the Promoter to facilitate their respective actions according to embodiments of the invention, including enabling the creation of live social networks (such as those linked to a specific Service provider, a specific User group, activities by a specific Promoter, and/or to specific Data Packets) and the creation of n-dimensional Virtual Environments. | 2009-06-25 |
20090165141 | INFORMATION USAGE CONTROL SYSTEM AND INFORMATION USAGE CONTROL DEVICE - A system includes: first and second devices that each register, in response to a request from a user, control information for target information in a memory, and provide, upon receipt of a request for usage information concerning the target information from the user, the user with the usage information, based on the control information in the memory, wherein the first device includes a first unit that provides, in response to the request from the user, the user with a list of the control information for the second device, and upon receipt of selection of the information from the list, sends the selected information to the second device so as to be associated with target information, and the second device includes a second unit that receives the control information associated with the target information and registers the control information in the memory so as to be associated with the target information. | 2009-06-25 |
20090165142 | EXTENSIBLE SOFTWARE TOOL FOR INVESTIGATING PEER-TO-PEER USAGE ON A TARGET DEVICE - In general, the invention provides for analyzing a target computer for computer crimes such as illegal sharing of files or sharing of illegal files on peer-to-peer clients. The target computer may have software for a plurality of peer-to-peer clients. Only one extensible forensic device may be necessary to analyze the plurality of peer-to-peer clients for downloaded or shared files. For example, the invention may provide for a method comprising determining whether one or more peer-to-peer clients are or have been installed on a target device by identifying information associated with one or more peer-to-peer modules, wherein each module is associated with a different one of the one or more peer-to-peer clients. The method further includes, gathering usage information for the one or more peer-to-peer clients that had been determined to be installed on the target computer, analyzing the usage information, and automatically generating a report of the analyzed usage information. | 2009-06-25 |
20090165143 | METHOD FOR MOVING RIGHTS OBJECT AND METHOD FOR MANAGING RIGHTS OF ISSUING RIGHTS OBJECT AND SYSTEM THEREOF - Disclosed is a method for managing rights of issuing a Rights Object (RO), and a method for moving an RO created by a Local Rights Manager (LRM) between Digital Rights Management (DRM) Agents. A Right Issuer (RI) permits an LRM to move an RO created (or issued) by the LRM to move via the RI, and a first DRM Agent moves the RO to a second DRM Agent via the RI. | 2009-06-25 |
20090165144 | CONTRACTED PRODUCT SUPPLY METHOD, CLIENT DEVICE, SERVER AND RECORDING MEDIUM HAVING PROGRAM RECORDED THEREIN - A contracted product supply method includes a notifying step of sending identification information to a server, an extracting step of extracting contract information, a transmitting step of transmitting the contract information, a certifying step of certifying permission and a setting step of setting a license of the contracted software products certified in the certifying step. | 2009-06-25 |
20090165145 | CHANGING MODES IN A DEVICE - A method including storing one or more user profile modes in a device, activating a user profile from the stored profiles where activating a user profile mode comprises configuring a user interface of the device to allow access to only applications and/or information associated with the activated user profile mode and displaying only applications and/or information associated with the activated user profile mode. | 2009-06-25 |
20090165146 | METHOD FOR MANAGING USER RIGHTS FOR A CODE PROTECTED OBJECT - The invention relates to a process for managing user rights for a code-protected object ( | 2009-06-25 |
20090165147 | Control technique for object production rights - Methods for a control technique for object production rights include but are not limited to receiving at the duplication control system a digital rights management code, the digital rights management code associated with one or more object data files; generating an authorization status based on the digital rights management code; and configuring one or more manufacturing machines to operate as a function of the authorization status. | 2009-06-25 |
20090165148 | METHOD FOR AUTHENTICATING APPLICATIONS OF A COMPUTER SYSTEM - The invention relates to a method for authenticating applications of a computer system including: a microprocessor, a plurality of applications, a general operating system (OS2) which can execute and manage the applications and which can associate each application identifier ( | 2009-06-25 |
20090165149 | Method for Making Secure the Execution of an Intermediate Language Software Code in a Portable Device - A method for executing an application compiled in intermediate code on a portable digital appliance equipped with a virtual executing machine for interpreting the intermediate code. The method includes a step of applying a secure execution mode wherein the interpretation of the intermediate code by the virtual machine includes the following steps: for each item of data the code handled for execution of an arithmetic and/or logical operation defined by the code, generating control data, related to the data of the code via a predetermined function; in parallel with the execution of the operation, executing a control operation related to the operation defined by the code via the predetermined function, and acting on the control data. | 2009-06-25 |
20090165150 | DIRECTED COMPLEMENTATION WITH REMOVABLE GENE OF INTEREST - The invention provides an improved directed complementation method for generating a conditionally tumorigenic mouse cell. In a directed complementation method, the tumorigenicity of a conditionally tumorigenic mouse cell depends on either the expression of an inducible recombinant oncogene or the expression of a recombinant gene of interest that functionally complements an uninduced recombinant oncogene. The invention provides a method of producing a tumorigenic mouse cell containing an uninduced oncogene, a recombinant gene of interest that functionally complements the uninduced oncogene, and a Cre-ER system capable of excising the recombinant gene of interest. When the Cre-ER system is activated, the recombinant gene of interest is excised. From the effect on the mouse cell it is possible to determine whether the recombinant gene of interest is a tumor maintenance gene. | 2009-06-25 |
20090165151 | CANINE TRANSIENT RECEPTOR POTENTIAL V2 (CTRPV2) AND METHODS OF SCREENING FOR TRPV2 CHANNEL MODULATORS - A recombinant canine TRPV2 channel which has been prepared by cDNA cloning and polymerase chain reaction techniques is disclosed. Expression systems for these channels and an assay using the expression systems are also disclosed. The recombinant TRPV2 channel can be used in assays to evaluate compounds which directly or indirectly interact with or bind to TRPV2 channel. | 2009-06-25 |
20090165152 | Mesothelin Vaccines and Model Systems - Mesothelin can be used as an immunotherapeutic target. It induces a cytolytic T cell response. Portions of mesothelin which induce such responses are identified. Vaccines can be either polynucleotide- or polypeptide-based. Carriers for raising a cytolytic T cell response include bacteria and viruses. A mouse model for testing vaccines and other anti-tumor therapeutics and prophylactics comprises a strongly mesothelin-expressing, transformed peritoneal cell line. | 2009-06-25 |
20090165153 | Modified gene-silencing RNA and uses thereof - Methods and means for efficiently downregulating the expression of any gene of interest in eukaryotic cells and organisms are provided. To this end, the invention provides modified antisense and sense RNA molecules, chimeric genes encoding such modified antisense or sense RNA molecules and eukaryotic organisms such as plants, animals or fungi, yeast or molds, comprising the modified antisense and/or sense RNA molecules or the encoding chimeric genes. | 2009-06-25 |
20090165154 | Transgenic ungulates having reduced prion protein activity and uses thereof - The invention provides cloned transgenic ungulates (e.g., bovines) in which prion protein activity is reduced by one or more genetically engineered mutations. Desirably, these transgenic bovines are also genetically modified to express xenogenous (e.g., human) antibodies. Because of their resistance to prion-related diseases such as bovine spongiform encephalopy (also known as mad cow disease), these bovines are a safer source of human antibodies for pharmaceutical uses and a safer source of agricultural products. | 2009-06-25 |
20090165155 | Tissue Specific Expression of Exogenous Proteins in Transgenic Chickens - Transgenes encoding exogenous proteins are stably integrated into embryonic stem cells and are present in the somatic tissue of transgenic or chimeric birds. The transgenes encode exogenous proteins and are expressed in any of endodermal, ectodermal, mesodermal, or extra embryonic tissue. Tissue specificity is provided by selecting the content of the transgene accordingly. Transgenic birds whose genome is comprised of trangene derived exogenous DNA express exogenous proteins with tissue specificity, and specifically express exogenous proteins in the tubular gland cells of the oviduct to concentrate exogenous proteins in egg white. | 2009-06-25 |
20090165156 | METHOD FOR INCREASING THE SALTWATER TOLERANCE OF A FISH - The present invention relates to a method for obtaining an indication of the saltwater tolerance of a fish, and methods for increasing the saltwater tolerance of a fish. In particular, the invention relates to methods involving biomarkers in the transferrin gene which are correlated with high or low saltwater tolerance. | 2009-06-25 |
20090165157 | COTTON VARIETY 00H29 - The invention relates to the novel cotton variety designated 00H29. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 00H29. Also provided by the invention are tissue cultures of the cotton variety 00H29 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 00H29 with itself or another cotton variety and plants produced by such methods. | 2009-06-25 |
20090165158 | COTTON VARIETY 05H229 - The invention relates to the novel cotton variety designated 05H229. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 05H229. Also provided by the invention are tissue cultures of the cotton variety 05H229 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 05H229 with itself or another cotton variety and plants produced by such methods. | 2009-06-25 |
20090165159 | COTTON VARIETY 05H270 - The invention relates to the novel cotton variety designated 05H270. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 05H270. Also provided by the invention are tissue cultures of the cotton variety 05H270 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 05H270 with itself or another cotton variety and plants produced by such methods. | 2009-06-25 |
20090165160 | COTTON VARIETY 04V073 - The invention relates to the novel cotton variety designated 04V073. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 04V073. Also provided by the invention are tissue cultures of the cotton variety 04V073 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 04V073 with itself or another cotton variety and plants produced by such methods. | 2009-06-25 |
20090165161 | COTTON VARIETY 05Z855 - The invention relates to the novel cotton variety designated 05Z855. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 05Z855. Also provided by the invention are tissue cultures of the cotton variety 05Z855 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 05Z855 with itself or another cotton variety and plants produced by such methods. | 2009-06-25 |
20090165162 | COTTON VARIETY 03H070 - The invention relates to the novel cotton variety designated 03H070. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 03H070. Also provided by the invention are tissue cultures of the cotton variety 03H070 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 03H070 with itself or another cotton variety and plants produced by such methods. | 2009-06-25 |
20090165163 | COTTON VARIETY 05H210 - The invention relates to the novel cotton variety designated 05H210. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 05H210. Also provided by the invention are tissue cultures of the cotton variety 05H210 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 05H210 with itself or another cotton variety and plants produced by such methods. | 2009-06-25 |
20090165164 | COTTON VARIETY 05H284 - The invention relates to the novel cotton variety designated 05H284. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 05H284. Also provided by the invention are tissue cultures of the cotton variety 05H284 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 05H284 with itself or another cotton variety and plants produced by such methods. | 2009-06-25 |
20090165165 | Transgenic plants with enhanced agronomic traits - This invention provides transgenic plant cells with recombinant DNA for expression of proteins that are useful for imparting enhanced agronomic trait(s) to transgenic crop plants. This invention also provides transgenic plants and progeny seed comprising the transgenic plant cells where the plants are selected for having an enhanced trait selected from the group of traits consisting of enhanced water use efficiency, enhanced cold tolerance, increased yield, enhanced nitrogen use efficiency, enhanced seed protein and enhanced seed oil. Also disclosed are methods for manufacturing transgenic seed and plants with enhanced traits. | 2009-06-25 |
20090165166 | METHOD TO ENHANCE YIELD AND PURITY OF HYBRID CROPS - The present invention provides a method of herbicide treatment of selected female and male parents in a hybrid seed production system. The system results in enhanced trait purity and efficiency in the hybrid seed production system. | 2009-06-25 |
20090165167 | Means and Methods to Enhance the Production of Vinblastine and Vincristine in Catharanthus Roseus - The present invention relates to the field of plant secondary metabolites, particularly terpenoid indole alkaloids. More particularly the present invention relates to the production of the anti-cancer metabolites vincristine and vinblastine. The invention provides novel polynucleotide sequences derived from | 2009-06-25 |
20090165168 | DROUGHT TOLERANT PLANTS AND RELATED CONSTRUCTS AND METHODS INVOLVING GENES ENCODING miR827 - Isolated polynucleotides and polypeptides and recombinant DNA constructs useful for conferring drought tolerance, compositions (such as plants or seeds) comprising these recombinant DNA constructs, and methods utilizing these recombinant DNA constructs. The recombinant DNA construct comprises a polynucleotide operably linked to a promoter that is functional in a plant, wherein said polynucleotide encodes a miR827 microRNA. | 2009-06-25 |
20090165169 | POPLAR TRANSCRIPTION FACTORS - A nucleic acid molecule comprising a nucleotide sequence selected from the group consisting of nucleotide sequences set forth in SEQ ID NO: 1-6 and 11, particularly SEQ ID NO: 3. The nucleotide sequence encodes at least a corresponding amino acid sequence set forth in SEQ ID NO: 12-17 and 26. The nucleic acid sequences and corresponding amino acid sequences regulate the flavonoid pathway, and more particularly they regulate the proanthocynanidin biosynthetic pathway and proanthocynanidin biosynthesis in a plant. One embodiment relates to methods of producing transformed plants comprising introducing into a cell of a plant a nucleic acid sequence selected from the group consisting of SEQ ID NO: 1-6 and 11, particularly SEQ ID NO: 3 and regenerating a transformed plant from the transformed cell. Another embodiment relates to a host plant cell comprising at least one of the nucleic acid sequences set forth in SEQ ID NO: 1-6 and 11. | 2009-06-25 |
20090165170 | Phosphatase Stress-Related Proteins and Methods of Use in Plants - A transgenic plant transformed by a phosphatase stress-related protein (PHSRP) coding nucleic acid, wherein expression of the nucleic acid sequence in the plant results in increased tolerance to environmental stress as compared to a wild type variety of the plant. Also provided are agricultural products, including seeds, produced by the transgenic plants. Also provided are isolated PHSRPs, and isolated nucleic acid coding PHSRPs, and vectors and host cells containing the latter. | 2009-06-25 |
20090165171 | Transgenic Plants Exhibiting Increased Tolerance to Stress and Methods of Generating Same - Methods of increasing tolerance of a plant to stress are provided. According to an exemplary aspect a method of increasing tolerance of a plant to a biotic stress is provided. The method comprising expressing within the plant an exogenous thereby increasing the tolerance of the plant to the biotic stress. Also provided are nucleic acid constructs and transgenic plants comprising same. | 2009-06-25 |
20090165172 | METHODS AND COMPOSITIONS FOR INCREASING BIOMASS IN GENETICALLY MODIFIED PERENNIALS USED FOR BIOFUELS - Genes can be introduced into plants that confer desirable traits such as, drought and stress tolerance, insect and pest resistance, as well as traits for enhancing biofuel production, such as increased vegetative biomass and prolonged vegetative growth. The development of reproductive structures diverts resources from vegetative growth resulting in lower biomass and fixed growing seasons. Disclosed herein are methods and compositions for generating controlled vegetative growth and prolonged growing seasons for the purpose of increasing biomass in plants used for biofuels. | 2009-06-25 |
20090165173 | NOVEL NUCLEIC ACID SEQUENCES AND THEIR USE IN METHODS FOR ACHIEVING PATHOGEN RESISTANCE IN PLANTS - The invention relates to novel RacB cDNA sequences from barley and to expression cassettes and vectors comprising these promoter sequences. The invention furthermore relates to transgenic plants transformed with these expression cassettes or vectors, to cultures, parts or transgenic propagation material derived from them, and to their use for the production of foodstuffs, feeding stuffs, seed, pharmaceuticals or fine chemicals. The invention furthermore relates to methods of generating or increasing a pathogen resistance in plants by reducing the expression of an RacB protein or of a functional equivalent thereof. | 2009-06-25 |
20090165174 | Cytokinin Oxidase Sequences and Methods of Use - Methods and compositions for modulating plant development are provided. Polynucleotide sequences and amino acid sequences encoding cytokinin oxidase polypeptides are provided. The sequences can be used in a variety of methods including modulating root development, modulating floral development, modulating leaf and/or shoot development, modulating seed size and/or weight, modulating tolerance under abiotic stress, and modulating resistance to pathogens. Polynucleotides comprising CKX promoters are also provided. The promoters can be used to regulate expression of a sequence of interest. Transformed plants, plant cells, tissues, and seed are also provided. | 2009-06-25 |
20090165175 | Methods for high efficiency transformation and regeneration of plant suspension cultures - The present invention provides methods for high efficiency plant transformation via | 2009-06-25 |
20090165176 | Artificial Plant Minichromosomes - Artificial plant minichromosomes comprising a functional centromere which specifically bind centromeric protein C (CENPC) and methods for making such minichromosomes are described. | 2009-06-25 |
20090165177 | ISOPENTENYL TRANSFERASE SEQUENCES AND METHODS OF USE - Methods and compositions for modulating plant development are provided. Polynucleotide sequences and amino acid sequences encoding isopentenyl transferase (IPT) polypeptides are provided. The sequences can be used in a variety of methods including modulating root development, modulating floral development, modulating leaf and/or shoot development, modulating senescence, modulating seed size and/or weight, and modulating tolerance of plants to abiotic stress. Polynucleotides comprising an IPT promoter are also provided. The promoter can be used to regulate expression of a sequence of interest. Transformed plants, plant cell, tissues, and seed are also provided. | 2009-06-25 |
20090165178 | POINSETTIA PLANT NAMED 'NPCW07120' - A new Poinsettia plant particularly distinguished by its compact, V-shape plant habit, strong stems, good branching and pink bracts is disclosed. | 2009-06-25 |
20090165179 | Beallara Big Shot 'Hilo Sparkle' - A new variety of orchid plant of the Oncidiinae Intergenerics, | 2009-06-25 |
20090165180 | Cuphea plant named 'Cuped' | 2009-06-25 |
20090165181 | Heuchera plant named 'Pinot Noir' - A new cultivar of | 2009-06-25 |
20090165182 | Heuchera plant named "Tiramisu" - A new cultivar of | 2009-06-25 |