26th week of 2012 patent applcation highlights part 76 |
Patent application number | Title | Published |
20120167196 | Automatic Virtual Private Network - An embodiment of the invention provides a method for secure access to data a VPN. Parameters for connecting to the VPN are established by a VPN manager connected to a local network and a user connected to a remote network, wherein an automatic VPN identification number is generated based on the parameters. A remote IP address is installed on an automatic VPN device of the user. The automatic VPN identification number is tied to an access list; and, the access list is attached to the automatic VPN device of the user. A request to access the VPN is received from the user. Access to the VPN is provided through a secure encryption tunnel if the request includes the automatic VPN identification number. The secure encryption tunnel provides automatic access to multiple sites within the VPN without the user having to re-enter the automatic VPN identification number. | 2012-06-28 |
20120167197 | ENABLING GRANULAR DISCRETIONARY ACCESS CONTROL FOR DATA STORED IN A CLOUD COMPUTING ENVIRONMENT - Enabling discretionary data access control in a cloud computing environment can begin with the obtainment of a data request and response message by an access manager service. The response message can be generated by a data storage service in response to the data request. The access manager service can identify owner-specified access rules and/or access exceptions applicable to the data request. An access response can be determined using the applicable owner-specified access rules and/or access exceptions. Both the response message and the access response can indicate the allowance or denial of access to the requested data artifact. The access response can be compared to the response message. If the access response does not match the response message, the response message can be overridden to express the access response. If the access response matches the response message, the response message can be conveyed to the originating entity of the data request. | 2012-06-28 |
20120167198 | Resource Protection from Unauthorized Access Using State Transition Histories - A resource protection program, apparatus, and method for protecting resources to be processed on a computer. The resource protection program causes a computer to implement: a preparatory function as a function for preparing multiple defined state transition histories and multiple defined actions, both of which are associated with each other, wherein each of the defined state transition histories defines a state transition history of the computer upon execution of predetermined access to a predetermined resource, and each of the defined actions defined to be executable when a transition is made from a defined state to the next defined state; and an action execution function for selecting, upon execution of the real access to the real resource, a defined action associated with a marched defined state transition history from among one or more defined actions to execute die defined action selected. | 2012-06-28 |
20120167199 | COMPUTING DEVICE WITH GRAPHICAL AUTHENTICATION INTERFACE - A computing device with a graphical authentication interface in which the device displays a base image and authenticates a user when a pre-selected element in a secondary image overlying the base image is aligned with a pre-selected element in the base image. | 2012-06-28 |
20120167200 | SYSTEM AND METHOD FOR A BUSINESS DATA PROVISIONING FOR A PRE-EMPTIVE SECURITY AUDIT - Embodiments of the present invention may provide a system and method for business data provisioning for a pre-emptive security audit. In one aspect, a method embodiment may comprise the steps of identifying the business resources as expressed in business terms, ensuring that applications dealing with (parts of) the business resources are aware of the link to the resource, transmitting the information about the used business resources throughout the call stack up to the UI, making use of the highest access enforcement point possible where it can be ensured that access to the protected resource is only done through either authorized users or trusted code, and having this access enforcement point taken over by a framework to ensure adequate protection even in extensibility scenarios. | 2012-06-28 |
20120167201 | IMAGE FORMING APPARATUS AND CONTROL METHOD FOR IMAGE FORMING APPARATUS - An image forming apparatus includes a display unit, a login information storage unit, a login information reception unit, a login authentication unit, an authorization limitation information storage unit, an execution instruction reception unit, a control unit and an execution permission determination unit. The authorization limitation information storage unit stores functions permitted to be executed by the logged-in user and a default user, who is a non-logged-in user. The control unit executes a function in accordance with an execution instruction received by the execution instruction reception unit. The execution permission determination unit determines whether the function indicated in the received execution instruction is a default function that is permitted to be executed by the default user, causes the control unit to execute the function if the function is the default function, and displays the login screen on the display unit if the function is not the default function. | 2012-06-28 |
20120167202 | APPARATUS AND METHOD FOR UNLOCKING A USER EQUIPMENT - An apparatus and method for unlocking a user equipment. The apparatus may include a first input unit, a second input unit, a controller, and a memory. The first input unit may be configured to set up a first password and to receive a first input. The second input unit may be configured to set up a second password and to receive a second input. The controller may be configured to compare the first input with the first password, compare the second input with the second password, and initiate an unlock operation of the user equipment based on a result of the comparisons. The memory may be configured to store at least the first password and the second password. | 2012-06-28 |
20120167203 | MANAGEMENT SYSTEM OF TEST DEVICE AND MANAGEMENT METHOD THEREOF - Assigning identifiers to a plurality of test devices to manage the test devices, and displaying the assigned identifiers on the test devices to distinguish the test devices. | 2012-06-28 |
20120167204 | ISOLATION TOOL FOR USER ASSISTANCE IN SOLVING A CAPTCHA TEST - A method includes displaying a CAPTCHA test comprising an image with distorted alphanumeric characters. The method also includes associating a mask with the image that maps the alphanumeric characters to coordinates. Further, the method includes, enhancing a portion of the image corresponding to one of the alphanumeric characters responsive to a user positioning an assistance tool proximate to one alphanumeric character to reduce distortion. | 2012-06-28 |
20120167205 | RUNTIME PLATFORM FIRMWARE VERIFICATION - Embodiments of the invention are directed towards logic and/or modules stored in processor secure storage to determine whether a first platform firmware image (e.g., basic input/output system (BIOS), device read-only memory (ROM), manageability engine firmware) loaded onto a processor cache is valid. The processor executes the first platform firmware image if it is determined to be valid. If the first platform image is determined to be invalid, a second platform firmware image is located. If this platform firmware image is determined to be valid, the processor will execute said second platform image. | 2012-06-28 |
20120167206 | SYSTEM AND METHOD FOR ENABLING SECURE DISPLAY OF EXTERNAL IMAGES - A system and method for securely displaying to a user images retrieved from an external image source. Upon the request for a product catalog by the user via a user interface a backend retrieves images for the product catalog from external image sources and converts the retrieved images to render inoperable potentially malicious code embedded in the images. The converted images may then be used in the product catalog displayed to the user via the user interface. In an embodiment, the frontend compiles the product catalog and requests images from the backend. Product catalog information may be stored in a database implemented at the backend. | 2012-06-28 |
20120167207 | Unauthorized Location Detection and Countermeasures - A location sentry system is provided for use within a mobile device. The sentry system can be configured to detect unauthorized attempts to locate mobile devices by monitoring messages passed between the mobile device and the wireless network and/or messages passed between components of the mobile device, and determining that one or more of the messages is/are indicative of an attempt to locate the mobile device. In response to a determination that an unauthorized attempt has been detected, the location sentry can be configured to take one or more actions. For example, the location sentry system could prevent location information from being sent back to the wireless network and/or the location sentry system could cause incorrect information to be sent to the wireless network. | 2012-06-28 |
20120167208 | SYSTEM AND METHOD FOR VOIP HONEYPOT FOR CONVERGED VOIP SERVICES - Disclosed herein are systems, methods, and computer-readable storage media for a honeypot addressing cyber threats enabled by convergence of data and communication services in an enterprise network. Suspicious incoming VoIP calls from the Internet to the enterprise network are intercepted and directed to a VoIP honeypot that acts as a network decoy and responds automatically during call sessions for the suspicious incoming VOIP calls while tracing the suspicious incoming VOIP calls. Suspicious outgoing VoIP calls from the enterprise network to the Internet are also intercepted and directed to the VoIP honeypot. Moreover, an unsolicited VoIP call is redirected to the VoIP honeypot when the unsolicited VoIP call has been received by a user agent in the enterprise network and a human user of the user agent confirms that the unsolicited VoIP call was unsolicited. | 2012-06-28 |
20120167209 | AUTOMATIC CONTEXT-SENSITIVE SANITIZATION - An automatic context-sensitive sanitization technique detects errors due to the mismatch of a sanitizer sequence with a browser parsing context. A pre-deployment analyzer automatically detects violating paths that contain a sanitizer sequence that is inconsistent with a browsing context associated with outputting an untrusted input. The pre-deployment analyzer determines a correct sanitizer sequence which is stored in a sanitization cache. During the runtime execution of the web application, a path detector tracks execution of the web application in relation to the violating paths. The correct sanitizer sequence can be applied when the runtime execution follows a violating path. | 2012-06-28 |
20120167210 | METHOD AND SYSTEM FOR ESTIMATING THE RELIABILITY OF BLACKLISTS OF BOTNET-INFECTED COMPUTERS - A system and a method for determining the reliability of blacklists is disclosed. Each blacklist comprises IP addresses of supposedly infected computers. The reliability is computed by analyzing whether the blacklist reports or not controlled infections from sandboxed environments and by measuring the elapsed time between reported infections and disinfections. The obtained information is then used in combination with several metrics for determining the trustworthiness of the IP address of a given Internet host that requests an online transaction with the purpose of granting or denying access to a service. | 2012-06-28 |
20120167211 | Method and Apparatus to Harden a Software Execution in Random Access Memory - Example embodiments of the present invention relate to a system, apparatus and methods for preserving the integrity of a code to prevent it from being modified, maliciously or inadvertently, while it is in execution in the RAM of a computer platform. This method also may be referred to as code hardening. Code to be hardened in example embodiments of the present invention may be referred to as protected code. Example embodiments of the present invention are able to externally detect unauthorized stoppage of the hypervisor by employing (1) a launch-time metric of the protected code; (2) a run-time metric of the protected code; and (3) a liveliness indicator of the protected code. | 2012-06-28 |
20120167212 | METHODS FOR INSPECTING SECURITY CERTIFICATES BY NETWORK SECURITY DEVICES TO DETECT AND PREVENT THE USE OF INVALID CERTIFICATES - Disclosed are methods and media for inspecting security certificates. Methods include the steps of: scanning, by a network security device, messages of a security protocol between a server and a client system; detecting the messages having a security certificate; detecting suspicious security certificates from the messages; and aborting particular sessions of the security protocol associated with the suspicious certificates. Preferably, the step of scanning is performed only on messages of server certificate records. Preferably, the method further includes the step of sending an invalid-certificate notice to the server and the client system. Preferably, the step of detecting the suspicious certificates includes detecting a use of an incorrectly-generated private key for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting an unavailability of revocation information for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting a use of an invalid cryptographic algorithm for the certificates. | 2012-06-28 |
20120167213 | SAFE FILE TRANSMISSION AND REPUTATION LOOKUP - A method of safe file transmission and reputation lookup is provided. As a part of the safe file transmission and reputation lookup methodology, a data file that is to be made available to a data file receiver is accessed and it is determined whether the data file needs to be provided a protective file. The data file is wrapped in a protective file to create a non-executing package file. Access is provided to the non-executing package file where the associated data file is prevented from being executed until data file reputation information is received. | 2012-06-28 |
20120167214 | METHOD AND SYSTEM FOR CLOAKED OBSERVATION AND REMEDIATION OF SOFTWARE ATTACKS - A method and system provide security for a communication network and for one or more nodes within the network. Software can be distributed throughout the network from a centralized location or administrative console. The software can be made resident in the kernel of the operating system of a receiving node. The software can provide an observation functionality, an analysis functionality, a reporting functionality and a remediation functionality or some subset of those functionalities. | 2012-06-28 |
20120167215 | SYSTEM AND METHOD OF FACILITATING THE IDENTIFICATION OF A COMPUTER ON A NETWORK - A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack. | 2012-06-28 |
20120167216 | METHOD AND APPARATUS HAVING RESISTANCE TO FORCED TERMINATION ATTACK ON MONITORING PROGRAM FOR MONITORING A PREDETERMINED RESOURCE - Exemplary embodiments include a method and system having resistance to a forced termination attack on a monitoring program for monitoring a predetermined resource. Aspects of the exemplary embodiment include a device that executes a predetermined process including a monitoring program that monitors a predetermined resource, wherein the predetermined process is a process for which the predetermined resource becomes unavailable in response to termination of the predetermined process; a program starting unit for starting the monitoring program in response to an execution of the predetermined process; and a terminator for terminating the predetermined process in the case where the monitoring program is forcibly terminated from the outside. | 2012-06-28 |
20120167217 | SYSTEMS AND METHODS TO DETECT AND NEUTRALIZE MALWARE INFECTED ELECTRONIC COMMUNICATIONS - Systems and methods to detect and neutralize malware infected electronic communications are described. The system may receive a request for interface information from over a network from a client machine. In response to receiving the request the system may generate the interface information to include at least one input mechanism to receive user information from the user and countermeasure information for utilization on the client machine to detect whether the interface information is modified on the client machine to receive user information from the user that is not authorized. Finally, the system may communicate the interface information, over the network, to the client machine. | 2012-06-28 |
20120167218 | SIGNATURE-INDEPENDENT, SYSTEM BEHAVIOR-BASED MALWARE DETECTION - A method, system, and computer program product for detecting malware based upon system behavior. At least one process expected to be active is identified for a current mode of operation of a processing system comprising one or more resources. An expected activity level of the one or more resources of the processing system is calculated based upon the current mode of operation and the at least one process expected to be active. An actual activity level of the plurality of resources is determined. If a deviation is detected between the expected activity level and the actual activity level, a source of unexpected activity is identified as a potential cause of the deviation. Policy guidelines are used to determine whether the unexpected activity is legitimate. If the unexpected activity is not legitimate, the source of the unexpected activity is classified as malware. | 2012-06-28 |
20120167219 | OPTIMIZATION OF ANTI-MALWARE PROCESSING BY AUTOMATED CORRECTION OF DETECTION RULES - A system, method and computer program product for optimization of execution of anti-malware (AV) applications. A number of false-positive determinations by an AV system are reduced by correcting malware detection rules using correction coefficients. A number of malware objects detected by the AV system are increased by correction of ratings determined by the rules using correction coefficients. An automated testing of new detection rules used by the AV system is provided. The new rules having zero correction coefficients are added to the rules database and results of application of the new rules are analyzed and the rules are corrected or modified for further testing. | 2012-06-28 |
20120167220 | SEED INFORMATION COLLECTING DEVICE AND METHOD FOR DETECTING MALICIOUS CODE LANDING/HOPPING/DISTRIBUTION SITES - Provided is seed information collecting device for detecting malicious code landing/hopping/distribution sites. The device comprises: a seed information collecting module collecting social issue keywords from a seed information collecting channel and collecting address information of potential malicious code landing/hopping/distribution sites using the collected social issue keywords; a web source code collecting module collecting web source code of the potential malicious code landing/hopping/distribution sites using the address information of the potential malicious code landing/hopping/distribution sites collected by the seed information collecting module; and a policy management module managing collection policies of the seed information collecting module and the web source code collecting module. | 2012-06-28 |
20120167221 | APPARATUS FOR ANALYZING TRAFFIC - An apparatus for analyzing traffic is provided. The apparatus may precisely identify and analyze web traffic through 5 tuple-, HTTP-, and request/response pair-based packet analysis by monitoring the correlation between sessions. | 2012-06-28 |
20120167222 | METHOD AND APPARATUS FOR DIAGNOSING MALICOUS FILE, AND METHOD AND APPARATUS FOR MONITORING MALICOUS FILE - An apparatus for diagnosing malicious files includes a information transferring unit configured to receive information regarding a malicious file distributed in a management network and an execution file generated by assembling packets collected from the management network; an anti-virus engine configured to determine whether or not the execution file is malicious to generate information regarding a new malicious file; and a management unit configured to transfer the information regarding the malicious file and the information regarding the new malicious file to a terminal device on the management network through the information transferring unit. | 2012-06-28 |
20120167223 | Virus Localization Using Cryptographic Hashing - Methods for using integrity checking techniques to identify and locate computer viruses are provided. A method for virus localization for each of three types of virus infections is provided, including the steps of computing a sequence of file blocks, calculating hashes for the sequences of file blocks from a host file and calculating hashes for the same or related sequences of file blocks from an infected file, and comparing the hashes from host file to the hashes from the infected file from the same or related sequences of file blocks such that when some of said first hashes and said second hashes do not match, a location of a virus is output. Methods for computing the sequence of file blocks depending on the type of virus infection, and for calculating the hashes using a collision resistant hash function, a digital signature scheme, a message authentication code, or a pseudo-random function. | 2012-06-28 |
20120167224 | PROTECTED AND VIRTUAL INTERFACES FOR COM AGGREGATION - An outer COM object can be provided with privileged access to protected functionality in an inner COM object. An inner COM object can offer a custom protected interface to an outer COM object by creating a new inner internals COM object that is not available to a calling application or by creating a new extension IUnknown interface that can be used to access the protected content. An outer COM object can override behavior in an inner COM object. An inner COM object can offer access to custom behavior to an outer COM object by creating a new inner internals COM object that is not available to a calling application. The new inner internals COM object can implement a new interface that provides access to the customized (override) content or can create a new extension IUnknown interface that can be used to provide access to the customized (override) content. | 2012-06-28 |
20120167225 | PASSWORD PROTECTION USING PERSONAL INFORMATION - Provided personal information from a user may be determined, the provided personal information being associated with network publication thereof. A comparison of the provided personal information with password-related information may be performed. Based on the comparison, it may be determined that a risk level associated with the network publication relative to password security of at least one password associated with the password-related information exceeds a predetermined risk level. The user may be notified that the network publication of the provided personal information is associated with potential compromise of the password security of the at least one password. | 2012-06-28 |
20120167226 | METHOD AND SYSTEM FOR RESTORING DOMAIN MANAGEMENT - The invention relates to a method and a system for restoring domain management for a domain ( | 2012-06-28 |
20120167227 | OBSCURING INFORMATION IN MESSAGES USING COMPRESSION WITH SITE-SPECIFIC PREBUILT DICTIONARY - Obscuring information in messages to be exchanged over a communications network. In one aspect, the information comprises path name information and parameters for use in a Uniform Resource Locator (“URL”). In another aspect, the information comprises links and parameters used in forms, where hidden parameters are removed from a form and used as URL parameters. A compression dictionary is used to create a compressed form of the information. An identifier of the dictionary and an error detection code (such as a checksum) computed over the compressed information are concatenated with the compressed information, and this is encoded for sending on an outbound message. The original information is then recovered from an inbound message which contains the obscured information by reversing the processing used for the obscuring. | 2012-06-28 |
20120167228 | METHOD AND SYSTEM FOR SUBSCRIPTION DIGITAL RIGHTS MANAGEMENT - A system and method for managing use of items having usage rights associated therewith. The system includes an activation device adapted to issue a software package having a public and private key pair, the public key being associated with a user, a license device adapted to issue a license, a usage device adapted to receive the software package, receive the license and allow the user to access the item in accordance with the license, and a subscription managing device adapted to maintain a subscription list including the public key associated with the user. License's is issued by the license device upon verifying presence of the public key in the subscription list corresponding to requested content. | 2012-06-28 |
20120167229 | METHOD AND SYSTEM FOR SUBSCRIPTION DIGITAL RIGHTS MANAGEMENT - A system and method for managing use of items having usage rights associated therewith. The system includes an activation device adapted to issue a software package having a public and private key pair, the public key being associated with a user, a license device adapted to issue a license, a usage device adapted to receive the software package, receive the license and allow the user to access the item in accordance with the license, and a subscription managing device adapted to maintain a subscription list including the public key associated with the user. License's is issued by the license device upon verifying presence of the public key in the subscription list corresponding to requested content. | 2012-06-28 |
20120167230 | DIGITAL RIGHTS MANAGEMENT OF CONTENT WHEN CONTENT IS A FUTURE LIVE EVENT - A method and system for managing use of items having usage rights associated therewith including a point of capture system adapted to generate content of a future event when the event occurs, a content distributor adapted to generate a rights label having usage rights associated with content of the future event before the content is created, the rights label having a distribution key for encrypting the content as the content is generated, the distribution key being encrypted with a public key. The system also includes a license server adapted to generate a license associate with the content from the rights label before the content is generated, the license including the distribution key encrypted with the public key, and a content distributor adapted to distribute the license before the content is generated. | 2012-06-28 |
20120167231 | CLIENT-SIDE ACCESS CONTROL OF ELECTRONIC CONTENT - Systems, methods and computer program products for controlling access to electronic content on a client device are provided. Whether access to electronic content is allowed or blocked is based on information and processes performed at the client device. Controlling access to electronic content on a client device can involve locally determining whether access to the electronic content will be allowed, blocked, or will depend upon further analysis performed by a remote device, such as a server. If a webpage is requested, for example, a client device may compare the URL address of the requested webpage, along with keywords and phrases found on the webpage, to locally-stored updateable lists of banned URL addresses and banned keywords and phrases to determining whether access to the electronic content will be allowed, blocked, or will depend upon further analysis. | 2012-06-28 |
20120167232 | Mobile Device for Authenticating A Device Accessory - A mobile device for authenticating a device accessory is disclosed. The mobile device receives a unique identifier from a device accessory, sends the received unique identifier to a server via a communication network, and receives information from the server relating to the unique identifier. | 2012-06-28 |
20120167233 | EMAIL TRUST SERVICE - In embodiments of an email trust service, an email message is received at an email distribution service for distribution to a client device that corresponds to a recipient of the email message. Authentication techniques can be applied to verify that the email message is received from an authorized domain as specified in a sender address field of the email message. Additionally, it can be determined whether an Extended Validation certificate is associated with the authorized domain. Responsive to determining that an Extended Validation certificate is associated with the authorized domain, a trust indicator is associated with the email message to generate a trusted email message. The trust indicator indicates that the trusted email message is from an authorized domain when the email message is displayed at the client device. | 2012-06-28 |
20120167234 | PERSONA-BASED IDENTITY MANAGEMENT SYSTEM - A method, performed by a computer device, may include receiving personal data from a user device associated with personas, where each of the personas corresponds to at least one classification of requesters, associating the received personal data with at least one of the personas, and identifying any of the classifications that correspond to the personas associated with received personal data. The method may further include receiving, from a data requester, a query including a request for the personal data; associating the data requester with a classification; and comparing the classification associated with the data requester to the classifications associated with personal data. The method may further include sending, to the data requester, a message containing the personal data in response to the classification of the data requester corresponding to the classifications of the personal data. | 2012-06-28 |
20120167235 | UNIVERSAL IDENTITY SERVICE AVATAR ECOSYSTEM - A system is configured to receive personal data associated with a user, verify one or more facts from the personal data, and form an avatar based on a first subset of the received personal data, where a second, differing, subset of the received personal data is not associated with the avatar. The system is also configured to receive, from a data requester, a query including a request for the avatar, and send, to the data requester, a message that includes information associated with the avatar and an indication that the one or more facts from the personal data were verified. | 2012-06-28 |
20120167236 | METHOD OF PREDICTING A BEHAVIOR OF ONE OR MORE DRUGS - The present invention is directed to the production, breeding and use of transgenic non-human animals such as mice in which specific genes or portions of genes have been replaced by homologues from another animal to make the physiology of the animals so modified more like that of the other animal with respect to drug pharmacokinetics and metabolism. The invention also extends to the use of the genetically modified non-human animals of the invention for pharmacological and/or toxicological studies. | 2012-06-28 |
20120167237 | ANIMAL MODELS AND THERAPEUTIC MOLECULES - The invention discloses methods for the generation of chimaeric human-non-human antibodies and chimaeric antibody chains, antibodies and antibody chains so produced, and derivatives thereof including fully humanised antibodies; compositions comprising said antibodies, antibody chains and derivatives, as well as cells, non-human mammals and vectors, suitable for use in said methods. | 2012-06-28 |
20120167238 | UNIVERSAL PEPTIDE TAGS FOR TRANSGENE POLYPEPTIDE ANALYSIS BY MASS SPECTROMETRY - Compositions and methods that allow for the rapid detection and accurate quantification of any polypeptides of interest are provided. Compositions include isolated polypeptides comprising at least one universal peptide tag, as well as isolated polynucleotides encoding such polypeptides. The universal peptide tags can be quantified by methods including, but not limited to, mass spectrometry, and can act as surrogates for determining the concentration of the polypeptides comprising the universal peptide tags. Methods provide for the detection and/or quantification of any polypeptides of interest that comprise at least one universal peptide tag, including methods using mass spectroscopy techniques. Methods are also provided for producing hosts, or cells or parts thereof, that comprise polypeptides comprising at least one universal peptide tag. Hosts, or cells, or parts thereof, include mammalian, bacterial, insect, yeast, viral or plant. | 2012-06-28 |
20120167239 | Novel ecdysone receptor/invertebrate retinoid X receptor-based inducible gene expression system - This invention relates to the field of biotechnology or genetic engineering. Specifically, this invention relates to the field of gene expression. More specifically, this invention relates to a novel ecdysone receptor/invertebrate retinoid X receptor-based inducible gene expression system and methods of modulating gene expression in a host cell for applications such as gene therapy, large-scale production of proteins and antibodies, cell-based high throughput screening assays, functional genomics and regulation of traits in transgenic organisms. | 2012-06-28 |
20120167240 | Compositions and Methods for Modulating PGC-1Alpha to Treat Neurological Diseases and Disorders - The present invention provides methods for modulating mitochondrial function, modulating lesion formation in the brain, modulating neurite growth, modulating neuronal degeneration, and treating and preventing neurological diseases or disorders comprising modulating the expression of activity of PGC-1α. The present invention also provides an animal, e.g., transgenic mouse, in which the PGC-1α gene is misexpressed. Methods for identifying compounds which are capable of treating or preventing a neurological disease or disorder are also described. | 2012-06-28 |
20120167241 | CHIMERIC GENE CONSTRUCTS FOR GENERATION OF FLUORESCENT TRANSGENIC ORNAMENTAL FISH - Four zebrafish gene promoters, which are skin specific, muscle specific, skeletal muscle specific and ubiquitously expressed respectively, were isolated and ligated to the 5′ end of the EGFP gene. When the resulting chimeric gene constructs were introduced into zebrafish, the transgenic zebrafish emit green fluorescence under a blue light or ultraviolet light according to the specificity of the promoters used. Thus, new varieties of ornamental fish of different fluorescence patterns, e.g., skin fluorescence, muscle fluorescence, skeletal muscle-specific and/or ubiquitous fluorescence, are developed. | 2012-06-28 |
20120167242 | COMPOSITIONS AND METHODS RELATING TO NON-HUMAN ANIMALS MODIFIED TO PROMOTE PRODUCTION OF SELECTED GAMETES - Methods and compositions for producing selected non-human mammalian germ cells and gametes and for making non-human animals using the produced germ cells and gametes are provided by the present invention. Methods of generating a non-human embryo and/or animal derived from donor stem cells, methods of generating chimeric non-human animals having substantially all gametes and/or germ cells derived from the donor stem cells, methods of producing a non-human host embryo lacking functional endogenous germ cells and non-human host embryos incapable of developing endogenous gametes of the present invention are described herein. | 2012-06-28 |
20120167243 | PEA LINE EX 08250826 - The invention provides seed and plants of the pea line designated EX 08250826. The invention thus relates to the plants, seeds and tissue cultures of pea line EX 08250826, and to methods for producing a pea plant produced by crossing a plant of pea line EX 08250826 with itself or with another pea plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of pea line EX 08250826, including the seed, pod, and gametes of such plants. | 2012-06-28 |
20120167244 | TOMATO HYBRID PS01059664 - The invention provides seed and plants of tomato hybrid PS01059664 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid PS01059664 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2012-06-28 |
20120167245 | GENES AND USES FOR PLANT IMPROVEMENT - Transgenic seed for crops with improved traits are provided by trait-improving recombinant DNA in the nucleus of cells of the seed where plants grown from such transgenic seed exhibit one or more improved traits as compared to a control plant. Of particular interest are transgenic plants that have increased yield. The present invention also provides recombinant DNA molecules for expression of a protein, and recombinant DNA molecules for suppression of a protein. | 2012-06-28 |
20120167246 | PLANT NUCLEIC ACIDS ASSOCIATED WITH CELLULAR pH AND USES THEREOF - The present invention relates generally to the field of plant molecular biology and agents useful in the manipulation of plant physiological and biochemical properties. More particularly, the present invention provides genetic and proteinaceous agents capable of modulating or altering the level of acidity or alkalinity in a cell, group of cells, organelle, part or reproductive portion of a plant. Genetically altered plants, plant parts, progeny, subsequent generations and reproductive material including flowers or flowering parts having cells exhibiting an altered cellular including vacuolar pH compared to a non-genetically altered plant are also provided. | 2012-06-28 |
20120167247 | INHIBITION OF BOLTING AND FLOWERING OF A SUGAR BEET PLANT - The present invention provides means for inhibiting the bolting and flowering of sugar beet plant, including an isolated nucleic acid having a sequence or partial sequence of SEQ ID NO: 1-3, which can be used to produce a sugar beet, in which bolting post-vernalization is inhibited. | 2012-06-28 |
20120167248 | Regulatory Nucleic Acid Molecules for Enhancing Constitutive Gene Expression in Plants - The present invention is in the field of plant molecular biology and provides methods for production of high expressing constitutive promoters and the production of plants with enhanced constitutive expression of nucleic acids wherein nucleic acid expression enhancing nucleic acids (NEENAs) are functionally linked to said promoters and/or introduced into plants. | 2012-06-28 |
20120167249 | VIRAL PROMOTER, TRUNCATIONS THEREOF, AND METHODS OF USE - The present disclosure provides compositions and methods for regulating expression of heterologous nucleotide sequences in a plant. Compositions include a novel nucleotide sequence for a promoter. A method for expressing a heterologous nucleotide sequence in a plant using the promoter sequence disclosed herein is provided. The method comprises stably incorporating into the genome of a plant cell a nucleotide sequence operably linked to the promoter of the present invention and regenerating a stably transformed plant that expresses the nucleotide sequence. | 2012-06-28 |
20120167250 | VIRAL PROMOTER, TRUNCATIONS THEREOF, AND METHODS OF USE - The present disclosure provides compositions and methods for regulating expression of heterologous nucleotide sequences in a plant. Compositions include a novel nucleotide sequence for a promoter. A method for expressing a heterologous nucleotide sequence in a plant using the promoter sequence disclosed herein is provided. The method comprises stably incorporating into the genome of a plant cell a nucleotide sequence operably linked to the promoter of the present invention and regenerating a stably transformed plant that expresses the nucleotide sequence. | 2012-06-28 |
20120167251 | AXMI-031, AXMI-039, AXMI-040 AND AXMI-049, A FAMILY OF NOVEL DELTA-ENDOTOXIN GENES AND METHODS FOR THEIR USE - Compositions and methods for conferring pesticidal activity to bacteria, plants, plant cells, tissues and seeds are provided. Compositions comprising a coding sequence for a delta-endotoxin polypeptide are provided. The coding sequences can be used in DNA constructs or expression cassettes for transformation and expression in plants and bacteria. Compositions also comprise transformed bacteria, plants, plant cells, tissues, and seeds. In particular, isolated delta-endotoxin nucleic acid molecules are provided. Additionally, amino acid sequences corresponding to the polynucleotides are encompassed, and antibodies specifically binding to those amino acid sequences. | 2012-06-28 |
20120167252 | POLYNUCLEOTIDES, DNA CONSTRUCTS AND METHODS FOR THE ALTERATION OF PLANT CELLULOSE CONTENT - Polynucleotide, DNA constructs and methods are disclosed for the modification of cellulose content in plant tissues. Plants are transformed with constructs encoding either an active | 2012-06-28 |
20120167253 | POLYNUCLEOTIDE COMPRISING SEQUENCES OF WHEAT GLIADINS AND USE THEREOF FOR SILENCING BY RNAI - The present invention relates to the specific silencing of the α (alpha), β (beta), γ (gamma) and ω (omega)-gliadins of hard wheat for flour by RNA interference (RNAi) through employment of a polynucleotide which is transcribed into an hpRNA (hairpin RNA). Furthermore the present invention additionally relates to a vector, cell, plant or seed comprising the polynucleotide, the expression whereof is specifically directed in particular tissues of wheat seeds through gene expression-regulating sequences such as, for example, the promoter of a gene of γ-gliadins or the promoter of the gene encoding for a D-hordein. | 2012-06-28 |
20120167254 | Disruption of CKX3 and at least one other CKX gene in a plant or plant cell leads to improved traits - The present invention is directed to isolated plant cells and transgenic plants comprising a disruption in at least a CKX3 gene and in one further gene encoding for a cytokininoxidase/dehydrogenase and being different from CKX3 well as to methods of producing such transgenic plants and to methods of increasing seed yield in a plant and/or plant height. | 2012-06-28 |
20120167256 | HYBRID MUSHROOM STRAIN J9277 AND ITS DESCENDANTS - A novel hybrid fungus culture, designated J9277, of the mushroom species | 2012-06-28 |
20120167257 | METHOD FOR ALTERING THE METABOLISM OF PLANT - The invention is related to a method of altering the metabolism of a plant by carrying out the steps of treating seeds of the plant with non-genetically engineered selected mutant pink-pigmented facultative methylotroph having a plant altering capability, and growing the plants from the treated seeds, wherein the plants that grow from such treated seeds exhibit an altered characteristic relative to non-treated plants. | 2012-06-28 |
20120167258 | Temporal Regulation of Gene Expression by MicroRNAs - This invention provides molecular constructs and methods for the temporally specific control of gene expression in plants or in plant pests or pathogens. More specifically, this invention provides plant miRNA genes having novel circadian expression patterns that are useful for designing recombinant DNA constructs for temporally specific expression of at least one gene. Also provided are non-natural transgenic plant cells, plants, and seeds containing in their genome a recombinant DNA construct of this invention. | 2012-06-28 |
20120167259 | NOVEL BACILLUS THURINGIENSIS GENE WITH LEPIDOPTERAN ACTIVITY - The invention provides nucleic acids, and variants and fragments thereof, obtained from strains of | 2012-06-28 |
20120167260 | CORN EVENT MIR162 - A novel transgenic corn event designated MIR162 is disclosed. The invention relates to nucleic acids that are unique to event MIR162 and to methods for detecting the presence of the MIR162 event based on DNA sequences of the recombinant constructs inserted into the corn genome that resulted in the MIR162 event and of genomic sequences flanking the insertion site. The invention further relates to corn plants comprising the transgenic genotype of MIR162 and to methods for producing a corn plant by crossing a corn plant comprising the MIR162 genotype with itself or another corn variety. Seeds of corn plants comprising the MIR162 genotype are also objects of the present invention. The invention also relates to methods of controlling insects using MIR162 corn plants. | 2012-06-28 |
20120167261 | High Frequency Deflection Measurement of IR Absorption - An AFM based technique has been demonstrated for performing highly localized IR spectroscopy on a sample surface by using the AFM probe to detect wavelength dependent IR radiation interaction, typically absorption with the sample in the region of the tip. The tip may be configured to produce electric field enhancement when illuminated by a radiation source. This enhancement allows for significantly reduced illumination power levels resulting in improved spatial resolution by confining the sample-radiation interaction to the region of field enhancement which is highly localized to the tip. | 2012-06-28 |
20120167262 | SILICON PEN NANOLITHOGRAPHY - Disclosed are methods of lithography using a tip array having a plurality of pens attached to a backing layer, where the tips can comprise a metal, metalloid, and/or semi-conducting material, and the backing layer can comprise an elastomeric polymer. The tip array can be used to perform a lithography process in which the tips are coated with an ink (e.g., a patterning composition) that is deposited onto a substrate upon contact of the tip with the substrate surface. The tips can be easily leveled onto a substrate and the leveling can be monitored optically by a change in light reflection of the backing layer and/or near the vicinity of the tips upon contact of the tip to the substrate surface. | 2012-06-28 |
20120167263 | Hot plant named 'HBC 366' - A new hop plant named ‘HBC 366’ is disclosed. The cones of ‘HBC 366’ mature in late September, and yield a crop of 2200 to 2700 pounds per acre. ‘HBC 366’ is used for its unique aromatic quality, high alpha acid content and exceptional yield. | 2012-06-28 |
20120167264 | CAMPANULA PLANT NAMED 'PKMF03' - A new and distinct cultivar of | 2012-06-28 |
20120167265 | CAMPANULA PLANT NAMED 'PKMP08' - A new and distinct cultivar of | 2012-06-28 |
20120167266 | CAMPANULA PLANT NAMED 'PKMP09' - A new and distinct cultivar of | 2012-06-28 |