33rd week of 2009 patent applcation highlights part 58 |
Patent application number | Title | Published |
20090205030 | Controlling Access to a Process Using a Separate Hardware Device - A method and apparatus for automatic user authentication are described. The method includes receiving information at a device, the device including a credential container; storing the information at the credential container and performing cryptographic calculations on the received information and providing the encrypted information upon request. | 2009-08-13 |
20090205031 | NETWORK SYSTEM, SERVER DEVICE, UNAUTHORIZED USE DETECTING METHOD, RECORDING MEDIUM, AND PROGRAM - A log-in information receiving unit ( | 2009-08-13 |
20090205032 | IDENTIFICATION AND ACCESS CONTROL OF USERS IN A DISCONNECTED MODE ENVIRONMENT - The present invention provides identification and access control for an end user mobile device in a disconnected mode environment, which refers generally to the situation where, in a mobile environment, a mobile device is disconnected from or otherwise unable to connect to a wireless network. The inventive method provides the mobile device with a “long term” token, which is obtained from an identity provider coupled to the network. The token may be valid for a given time period. During that time period, the mobile device can enter a disconnected mode but still obtain a mobile device-aided function (e.g., access to a resource) by presenting for authentication the long term token. Upon a given occurrence (e.g., loss of or theft of the mobile device) the long term token is canceled to restrict unauthorized further use of the mobile device in disconnected mode. | 2009-08-13 |
20090205033 | BIOMETRIC FINANCIAL TRANSACTION SYSTEM AND METHOD - Tokenless biometric authorization of transaction between a consumer and a merchant uses an identicator and an access device. A consumer registers with the identicator a biometric sample taken from the consumer. The consumer and merchant establish communications via the access device. The merchant proposes a transaction to the consumer via the access device. The access device communicates to the merchant associated with the access device. After the consumer and merchant have agreed on the transaction, the consumer and the identicator use the access device to establish communications. The access device communicates to the identicator the code associated with the access device. The identicator compares biometric sample from the consumer with registered biometric sample. Upon successful identification, the identicator forwards information regarding the consumer to the merchant. These steps accomplish a biometrically authorized electronic financial transaction without the consumer having to present any personalized man-made memory tokens. | 2009-08-13 |
20090205034 | System for Running Potentially Malicious Code - Systems and methods for creating a secure process on a web server can include creating an application manager process, and creating an application host process, the application host process being created under control of the application manager process. Example methods can also include restricting attributes of the application host process, and assigning a unique logon identifier to the application host process so that the application host process can only communicate with the application manager process. | 2009-08-13 |
20090205035 | INFO CARD SELECTOR RECEPTION OF IDENTITY PROVIDER BASED DATA PERTAINING TO INFO CARDS - A computer system accesses metadata about an information card. The metadata can be stored locally or remotely (for example, at an identity provider). A metadata engine can be used to generate data to be provided to the user from the metadata: this data can take any desired form, such as an advertisement, a state of the user's account, or a policy update, among other possibilities. | 2009-08-13 |
20090205036 | Secure information storage and delivery system and method - A system for secure information storage and delivery includes a vault repository that includes a secure vault associated with a user, wherein the secure vault is associated with a service level including at least one of a data type or a data size limit associated with the secure vault, the secure vault being adapted to receive and at least one data entry and securely store the at least one data entry if the at least one of a size or a type of the at least one data entry is consistent with the service level. A mobile vault server coupled to the vault repository creates a mobile vault on a mobile device based on the secure vault and is capable of authenticating the mobile device based on user authentication information. The mobile vault server includes a mobile device handler that communicates with the mobile device. A synchronization utility determines whether the at least one data entry on the secure vault is transferable to or storable on the mobile vault based on at least one of the size or the type of the at least one data entry and transfers the at least one data entry from the secure vault to a corresponding data entry on the mobile vault if the at least one data entry on the secure vault is determined to be transferable to or storable on the mobile vault. | 2009-08-13 |
20090205037 | Mobile terminal, resource access control system for mobile terminal, and resource access control method in mobile terminal - The present invention provides a mobile terminal, a resource access control system for a mobile terminal, and a resource access control method in a mobile terminal which can flexibly change resources that can be accessed by an application. An application manager | 2009-08-13 |
20090205038 | Enabling Wake on LAN Behind NATs and Firewalls - Exemplary methods, computer-readable media, and systems for maintaining an inbound network path to a host in a sleep or a hibernation mode behind a plurality of network address translators (NAT) or firewalls. A network interface card (NIC) of a host is configured to periodically send or receive keep-alive packets. These packets enable network mappings that would ordinarily expire while a host is in a sleep or a hibernation mode. Power is maintained on the NIC while the host is in such mode, and the NIC responds as programmed including waking a host upon a certain event, such as receiving a data packet matching a preconfigured signature. During such time, the host may be in a wake on LAN mode. | 2009-08-13 |
20090205039 | SECURITY MANAGEMENT SYSTEM FOR MONITORING FIREWALL OPERATION - A test method for Internet-Protocol packet networks that verifies the proper functioning of a dynamic pinhole filtering implementation as well as quantifying network vulnerability statistically, as pinholes are opened and closed is described. Specific potential security vulnerabilities that may be addressed through testing include: 1) excessive delay in opening pinholes, resulting in an unintentional denial of service; 2) excessive delay in closing pinholes, creating a closing delay window of vulnerability; 3) measurement of the length of various windows of vulnerability; 4) setting a threshold on a window of vulnerability such that it triggers an alert when a predetermined value is exceeded; 5) determination of incorrectly allocated pinholes, resulting in a denial of service; 6) determining the opening of extraneous pinhole/IP address combinations through a firewall which increase the network vulnerability through unrecognized backdoors; and 7) determining the inability to correlate call state information with dynamically established rules in the firewall. | 2009-08-13 |
20090205040 | COMPUTER DATA PRODUCT LICENSE INSTALLATION / UPDATE CONFIRMATION - An authenticated digital confirmation of an installation or an update of a licensed computer data product, for providing the licensor with a validation that the installation/update was carried out as intended, and conveying relevant details of the installation/update. The installation/updating facility (internal software, external hardware device, or combination thereof) examines and documents the pre-installation/update state of the target computer system, performs the installation/update, examines and documents the post-installation/update state, and generates the confirmation, which is a summary or digest of the process and the status thereof. The confirmation is securely authenticated and sent to the licensor for validation, to be used for order fulfillment, billing and accounting, and other purposes. | 2009-08-13 |
20090205041 | Emergency Information Access on Portable Electronic Devices - Improved techniques for facilitating emergency access to one or more contacts stored on a portable electronic device are disclosed. One or more contacts on the portable electronic device are designated as emergency contacts. While the portable electronic device is password-locked, a request to display the one or more emergency contacts on the password-locked portable electronic device is received. Without requiring a password, the one or more emergency contacts are displayed on the portable electronic device. | 2009-08-13 |
20090205042 | EXTERNAL USER INTERFACE BASED MEASUREMENT ASSOCIATION - A health management system ( | 2009-08-13 |
20090205043 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND COMPUTER READABLE MEDIUM - An information processing system includes: storage that stores electronic information in which an operation authority for each of a plurality of users is set in each of a plurality of defined work states; an acceptance unit that accepts an operation request for electronic information stored in the storage, and an operation execution unit that executes an operation for the electronic information of operation object in accordance with the operation authority based on a non-administrator authority of the user in the work state of the electronic information if the operation request based on an administrator authority by the user having the administrator authority and the non-administrator authority for the electronic information is accepted by the acceptance unit. | 2009-08-13 |
20090205044 | APPARATUS, SYSTEM, AND METHOD FOR SECURE HARD DRIVE SIGNED AUDIT - An apparatus, system, and method are disclosed for secure hard disk signed audit. The apparatus is provided with a plurality of modules configured to functionally execute the necessary steps of monitoring interactions with an audited system, detecting an interrupt event corresponding to an auditable interaction, and logging an audit record for the auditable interaction in response to the interrupt event, wherein the audit record is logged in an access-restricted portion of a portion-securable hard disk. These modules in the described embodiments include a gate module, a detection module, and a logging module. | 2009-08-13 |
20090205045 | Bootstrap OS protection and recovery - A method, system, and computer program product for protecting a computer system provides bootstrap operating system detection and recovery and provides the capability to detect malware, such as rootkits, before the operating system has been loaded and provides the capability to patch malfunctions that block the ability of the computer system to access the Internet. A method for protecting a computer system includes reading stored status information indicating whether network connectivity was available the last time an operating system of the computer system was operational, when the stored status information indicates that network connectivity was not available, obtaining a software patch, and executing and applying the software patch. | 2009-08-13 |
20090205046 | METHOD AND APPARATUS FOR COMPENSATING FOR AND REDUCING SECURITY ATTACKS ON NETWORK ENTITIES - Security attacks on network entities can be compensated for and reduced through insurance that modifies incentives. In one example, a virtual slice provider includes a secure and non-secure slice having resources to provide network access to users through a service provider. The secure slice is assigned a first security level and a non-secure slice is assigned a second lower security level. In one embodiment, the second slice is isolated from the first slice. The virtual slice provider also has a risk policy between the slice provider and the service provider to establish different rates charged to the service provider for access to the secure and non-secure slices and to provide different levels of payment to the service provider for losses resulting from a lack of security in each slice. | 2009-08-13 |
20090205047 | Method and Apparatus for Security Assessment of a Computing Platform - A system and method for automated security testing are disclosed. The disclosure provides for automated discovery of security vulnerabilities through the monitoring of activities that occur throughout the separate components of a computing platform during a testing session through a communications interface. | 2009-08-13 |
20090205048 | VALIDATION OF PROTECTED INTRA-SYSTEM INTERCONNECTS FOR DIGITAL RIGHTS MANAGEMENT IN ELECTRICAL COMPUTERS AND DIGITAL DATA PROCESSING SYSTEMS - Embodiments for validating protected data paths for digital rights management of digital objects are disclosed. Some embodiments disclosed herein may comprise processes or apparatus for transferring data from one or more peripherals to one or more computers or digital data processing systems for the latter to process, store, and/or further transfer and/or for transferring data from the computers or digital data processing systems to the peripherals. Some embodiments disclosed herein may comprise processes or apparatus for interconnecting or communicating between two or more components connected to an interconnection medium a within a single computer or digital data processing system. | 2009-08-13 |
20090205049 | SECTION BASED SECURITY FOR A SECTIONED SURFACE-BASED COMPUTING DEVICE - The present invention discloses a method, a computer program product, a system, and a device for securing content of a surface-based computing device. In the invention, a delineated region of a surface of a surface-based computing device referred to as a section can be identified. The section can be a computing space owned by at least one user referred to as a section owner. Other regions of the surface exist that are computing spaces distinct from the section. A set of section specific settings can be established that are configurable by the section owner. An attempt to convey at least one software object across a section boundary separating the section from one of the other regions can be identified. The section specific settings can be applied to the attempt. Appropriate programmatic actions can be taken based upon the section specific settings. | 2009-08-13 |
20090205050 | METHOD AND APPARATUS FOR HARDWARE RESET PROTECTION - A method and apparatus for protecting access to sensitive information stored in vulnerable storage areas (e.g., public memory, registers, cache) of a microprocessor. A microprocessor having a reset port to receive external reset commands may have a reset diversion circuit that may be selectively enabled. The microprocessor may operate in an open mode or a secure mode, indicating the absence or the potential presence, respectively, of sensitive information in the vulnerable storage areas. In open mode, the reset diversion circuit may be disabled such that external reset requests triggers a hardware reset. In secure mode, sensitive information may be recorded on vulnerable storage areas. The reset diversion circuit may be enabled to divert external reset requests to an interrupt which may trigger execution of a software code. The software code, when executed, may perform a secured system clean-up routine to erase the vulnerable storage areas prior to reset. | 2009-08-13 |
20090205051 | SYSTEMS AND METHODS FOR SECURING DATA IN ELECTRONIC COMMUNICATIONS - Systems and methods are provided for providing data security. Credit-related data provided by a credit database can be received. The credit-related data can include records. Each record can include a social security number and a name associated with the social security number. Each record can be transformed to generate transformed data using a hashing algorithm. An electronic communication comprising content can be received. Transformed content can be generated by transforming the content. The transformed content can be compared to the transformed data. The transformed content can be determined to match at least one of the transformed records. The electronic communication can be prevented from being transmitted to a network. | 2009-08-13 |
20090205052 | Coupling of a computer program or of data to a reference system and associated verification - The invention relates to a method of coupling a computer program and/or data to a reference system, implementation of the computer program and/or access to the data being carried out by executing software, a group of parameters being associated with the reference system. The method comprises the protection of a value V | 2009-08-13 |
20090205053 | Confidential information protection system and method - Efficient and effective permission confidential information protection systems and methods are described. The secure information protection systems and methods facilitate storage of confidential information in a manner safe from rogue software access. In one embodiment, a confidential information protection method is implemented in hardware and facilitates protection against software and/or Operating System hacks. In one exemplary implementation, a confidential information protection method includes setting a permission sticky bit flag to a default state upon system set up. The permission sticky bit flag access permission indication is adjusted at system reset in accordance with an initial application instruction. Access to the confidential information is restricted in accordance with the permission sticky bit and the permission sticky bit is protected from adjustments attempting to violate the permission indication. For example, another software application can not access or alter confidential information (e.g., an encryption key, initialization vector, etc.) if a permission sticky bit is designated as the highest security rating (e.g., disabling read permission and write permission until system reset). | 2009-08-13 |
20090205054 | PROCESS FOR PROTECTING STORED OPERATING DATA OF MACHINERY OR SIMILAR EQUIPMENT - A process is provided for protecting stored operating data of machinery or similar equipment. The operating data are stored by means of a computer system belonging to a control system or by means of a similar computer system belonging to the equipment and wherein the operating data are acquired continuously in the form of data sets and stored in a data storage medium for later analysis. A security code is generated with the storage of a data set from the currently stored operating data on the basis of parameters (k, l, m, n) of a preset determination rule and stored in the computer system. A comparison code is determined in at preset time intervals on the basis of the same determination rule from the operating data currently recorded in the data storage medium for verifying the operating data currently present in the data storage medium. The comparison code is compared with the security code generated originally, and a warning signal is generated or a protective action is triggered in a fourth step in case of a deviation between the comparison code and the security code generated originally. | 2009-08-13 |
20090205055 | SYSTEM AND METHOD FOR ELECTRONIC LICENSE DISTRIBUTION FOR PRE-INSTALLED SOFTWARE - The subject application is directed to a system and method for electronic license distribution for pre-installed software. Data communication is first commenced between a data processing device and an associated portable data device. License data is then communicated between the portable data device and the data processing device, with the license data corresponding to a software license associated with the previously installed software resident in a data storage associated with the data processing device. The previously installed software is then activated in accordance with the communicated license data. | 2009-08-13 |
20090205056 | METHOD OF SCREENING FOR MODULATORS OF MAP3K11 IN LIVER CANCER CELLS - Detection of expression of the provided protein kinase in cancers is useful as a diagnostic, for determining the effectiveness of drugs, and determining patient prognosis. The encoded polypeptides further provides a target for screening pharmaceutical agents effective in inhibiting the growth or metastasis of tumor cells. | 2009-08-13 |
20090205057 | MITE COMPOSITION COMPRISING GLYCYPHAGIDAE AND PHYTOSEIID MITES, USE THEREOF, METHOD FOR REARING A PHYTOSEIID PREDATORY MITE, REARING SYSTEM FOR REARING SAID PHYTOSEIID PREDATORY MITE AND METHODS FOR BIOLOGICAL PEST CONTROL ON A CROP - The present invention relates to a novel mite composition comprising a population of a phytoseiid predatory mite species and a factitious host population comprising a species selected from the Glycyphagidae, which may be employed for rearing said phytoseiid predatory mite species or for releasing the phytoseiid predatory mite species in a crop. According to further aspects the invention relates to a method for rearing a phytoseiid predatory mite species, to the use of the mite composition and to a method for biological pest control in a crop, which employ the mite composition. | 2009-08-13 |
20090205058 | GENETICALLY MODIFIED NON-HUMAN MAMMALS AND CELLS - Genetically modified mammals are described which lack the mannan binding lectin associated serine protease MASP-2, together with methods and constructs for their production. Such mammals are useful as models for disorders of the complement system, and in the identification of treatments for such disorders. Also described are mammals which lack the associated protein MAp19; such mammals may also lack MASP-2. | 2009-08-13 |
20090205059 | Methods, Compositions and Systems for Production of Recombinant Spider Silk Polypeptides - Disclosed are methods, compositions, and systems for transforming silkworms to produce spider silk and analogs of spider silk. In certain embodiments, the method may include inserting a DNA sequence coding for at least a portion of a spider silk fibroin polypeptide, or an analog of a spider silk fibroin polypeptide, positioned between at least a portion of the 5′ and 3′ ends of a silkworm fibroin gene to generate a fusion gene construct having a sequence that encodes for a polypeptide comprising both spider silk fibroin and silkworm silk fibroin sequences. In certain embodiments, the fused gene is able to replace a native gene present in the silkworm such that the transformed silkworm expresses a polypeptide comprising a spider silk fibroin polypeptide, or an analog thereof, and expresses significantly less of the native silkworm silk. | 2009-08-13 |
20090205060 | SESQUITERPENE SYNTHASES FROM PATCHOULI - The invention relates to sesquiterpene synthases from Patchouli plants ( | 2009-08-13 |
20090205061 | Taste Receptors Of The T1R Family From Domestic Cat - The present invention relates to the discovery of several genes of the domestic cat ( | 2009-08-13 |
20090205062 | Caspase-9 deficient animals and the use thereof - The invention relates to genetically manipulated animals that are deficient in the expression of Casapse-9, a protein involved in programmed cell death. The invention further relates to methods for preventing specific types of cell death associated with Caspase-9 activation. | 2009-08-13 |
20090205063 | Plant polynucleotides for improved yield and quality - The invention relates to plant transcription factor polypeptides, polynucleotides that encode them, homologs from a variety of plant species, and methods of using the polynucleotides and polypeptides to produce transgenic plants having advantageous properties, including increased soluble solids, lycopene, and improved plant volume or yield, as compared to wild-type or control plants. The invention also pertains to expression systems that may be used to regulate these transcription factor polynucleotides, providing constitutive, transient, inducible and tissue-specific regulation. | 2009-08-13 |
20090205064 | Mutated Acetohydroxyacid Synthase Genes in Brassica - Provided are mutated acetohydroxyacid synthase (AHAS) nucleic acids and the proteins encoded by the mutated nucleic acids. Also provided are canola plants, cells, and seeds comprising the mutated genes. | 2009-08-13 |
20090205065 | Brassica Ogura Restorer Lines with Shortened Raphanus Fragment (SRF) | 2009-08-13 |
20090205066 | FATTY ACID DESATURASE GENES FROM PLANTS - The preparation and use of nucleic acid fragments encoding fatty acid desaturase enzymes are described. The invention permits alteration of plant lipid composition. Chimeric genes incorporating such nucleic acid fragments with suitable regulatory sequences may be used to create transgenic plants with altered levels of unsaturated fatty acids. | 2009-08-13 |
20090205067 | Zea mays ABA Signaling Genes and Methods of Use - Compositions and methods for modulating abscisic acid (ABA) perception and signal transduction in developing seed are provided. The methods and compositions find use in increasing yield in plants, particularly under abiotic stress. Compositions comprise genetic constructs known to affect ABA sensitivity, particularly ABA biosynthetic mutants and fragments and variants thereof. | 2009-08-13 |
20090205068 | Method for Producing Genetically Modified Plant Expressing Miraculin - The present invention relates to: a method for producing a transgenic plant expressing miraculin, comprising introducing a miraculin gene into a useful plant that can be easily produced and cultivated throughout the year using plant molecular breeding technology; a transgenic plant expressing miraculin, which is produced by the method; and the use thereof. The present invention also relates to a food additive, a food or drink, or an antidiabetic drug, which contains miraculin that is produced by the transgenic plant. | 2009-08-13 |
20090205069 | Method and means to modulate programmed cell death in eukaryotic cells - The invention provides for the use of isolated polynucleotides encoding maize poly (ADP-ribose) polymerase (PARP) proteins to produce eukaryotic cells and organisms, particularly plant cells and plants, with modified programmed cell death. Eukaryotic cells and organisms particularly plant cells and plants, are provided wherein either in at least part of the cells, preferably selected cells, the programmed cell death (PCD) is provoked, or wherein, on the contrary, PCD of the cells or of at least part of the cells in an organism is inhibited, by modulation of the level or activity or PARP proteins in those cells. | 2009-08-13 |
20090205070 | High Grain Protein Content Gene - The present invention NAC nucleic acids and proteins that modulate grain protein content and senescence in plants. The invention also provides methods of using the nucleic acids to produce transgenic plants with altered grain protein content or senescence. | 2009-08-13 |
20090205071 | Compositions and methods for drought tolerance - The present inventions relate to compositions and methods for providing drought resistant grass plants comprising | 2009-08-13 |
20090205072 | ALTERATION OF TOBACCO ALKALOID CONTENT THROUGH MODIFICATION OF SPECIFIC CYTOCHROME P450 GENES - Compositions and methods for reducing the level of nornicotine and N′-nitrosonornicotine (NNN) in | 2009-08-13 |
20090205073 | TRANSGENIC PLANTS AND METHODS FOR CONTROLLING BOLTING IN SUGAR BEET - This invention relates to the field of sugar beet bolting and flowering control, specifically methods and transgenic sugar beet plants for suppressing the vernalization response. In particular, the present invention includes sugar beet plants and methods for modulating sugar beet vernalization by over expression of an FLC gene or by suppressing AGL20 gene expression. | 2009-08-13 |
20090205074 | TRANSCRIPTION REGULATORS FOR REPRODUCTION ASSOCIATED PLANT PART TISSUE SPECIFIC EXPRESSION - The present invention relates generally to transcriptional control sequences for effecting expression of a nucleotide sequence of interest in a plant. The present invention is predicated, in part, on the identification and functional characterisation of transcriptional control sequences derived from genes which encode polypeptides comprising the amino acid sequence set forth in SEQ ID NO: 1 and homologs thereof. Among other things, the present invention has identified that transcriptional control sequences derived from the subject genes can effect specific or preferential expression of an operably connected nucleotide sequence in a reproduction-associated plant part such as a seed or anther. | 2009-08-13 |
20090205075 | USE OF PLASTID TRANSIT PEPTIDES DERIVED FROM GLAUCOCYSTOPHYTES - Compositions and methods for targeting polypeptides to plastids are provided. Compositions comprise plastid transit peptides as well as nucleotide sequences encoding such transit peptides and variants thereof. Compositions further comprise DNA constructs comprising a nucleotide sequence encoding the plastid transit peptide operably linked to a nucleotide sequence encoding a polypeptide of interest. These DNA constructs find use in expression and targeting of the polypeptide of interest to a plastid. Compositions also comprise expression cassettes, vectors, transformed plants, transformed plant cells, and stably transformed plant seeds wherein a polypeptide of interest is targeted to a plastid by the plastid transit peptide of the invention. | 2009-08-13 |
20090205076 | DIRECTED EVOLUTION OF GRG31 AND GRG36 EPSP SYNTHASE ENZYMES - Compositions and methods for conferring herbicide resistance or tolerance to bacteria, plants, plant cells, tissues and seeds are provided. Compositions include polynucleotides encoding herbicide resistance or tolerance polypeptides, vectors comprising those polynucleotides, and host cells comprising the vectors. The nucleotide sequences of the invention can be used in DNA constructs or expression cassettes for transformation and expression in organisms, including microorganisms and plants. Compositions also include transformed bacteria, plants, plant cells, tissues, and seeds. In particular, isolated polynucleotides encoding glyphosate resistance or tolerance polypeptides are provided, particularly polypeptide variants of SEQ ID NO:2 and 4. Additionally, amino acid sequences corresponding to the polynucleotides are encompassed. In particular, the present invention provides for isolated polynucleotides containing nucleotide sequences encoding the amino acid sequence shown in SEQ ID NO:7-28, or the nucleotide sequence set forth in SEQ ID NO:29 or 30. | 2009-08-13 |
20090205077 | COMPOSITIONS AND METHODS FOR THE MODIFICATION OF GENE EXPRESSION - Novel isolated plant polynucleotide promoter sequences are provided, together with genetic constructs comprising such polynucleotides. Methods for using such constructs in modulating the transcription of DNA sequences of interest are also disclosed, together with transgenic plants comprising such constructs. | 2009-08-13 |
20090205078 | Maize Leaf- and Stalk-Preferred Promoter - The present disclosure provides compositions and methods for regulating expression of heterologous nucleotide sequences in a plant. Compositions include a novel nucleotide sequence for a tissue-preferred maize promoter. A method for expressing a heterologous nucleotide sequence in a plant using the promoter sequence disclosed herein is provided. The method comprises stably incorporating into the genome of a plant cell a nucleotide sequence operably linked to the tissue-preferred promoter of the present invention and regenerating a stably transformed plant that expresses the nucleotide sequence. | 2009-08-13 |
20090205079 | ACETYL CoA CARBOXYLASE (ACCase) GENE FROM JATROPHA CURAS - The present invention provides methods for increasing oil content in | 2009-08-13 |
20090205080 | CHLAMYDOMONAS GLUCAN DIKINASE GENE, ENZYME AND MODIFIED STARCH, USES, METHODS FOR PRODUCTION THEREOF - The present invention relates the nucleotide sequence from | 2009-08-13 |
20090205081 | Nucleic acid molecules and other molecules associated with plants - Expressed Sequence Tags (ESTs) isolated from lily are disclosed. The ESTs provide a unique molecular tool for the targeting and isolation of novel genes for plant protection and improvement. The disclosed ESTs have utility in the development of new strategies for understanding critical plant developmental and metabolic pathways. The disclosed ESTs have particular utility in isolating genes and promoters, identifying and mapping the genes involved in developmental and metabolic pathways, and determining gene function. Sequence homology analyses using the ESTs provided in the present invention, will result in more efficient gene screening for desirable agronomic traits. An expanding database of these select pieces of the plant genomics puzzle will quickly expand the knowledge necessary for subsequent functional validation, a key limitation in current plant biotechnology efforts. | 2009-08-13 |
20090205082 | Rc, Brown Pericarp and Seed Coat - The present invention relates to the production of red pericarp and seed coat in rice, and in particular, compositions comprising a basic helix-turn-helix red anthocyanin transcription factor, Rc, and methods using Rc for identifying rice germplasm comprising Rc including but not limited to grain quality grading and seed certification analysis. In a preferred embodiment, the present invention further relates to promoter sequences Rc binding elements including but not limited to regulatory elements of genes associated with anthocyanidin/proanthocyanidin pathways and the use of these elements for controlling weedy red rice plants and controlling the spread of transgenes into weedy red rice plants. | 2009-08-13 |
20090205083 | Engineered zinc finger proteins targeting 5-enolpyruvyl shikimate-3-phosphate synthase genes - The present disclosure relates to engineered zinc finger proteins that target 5-enolpyruvyl shikimate-3-phosphate synthase (EPSPS) genes in plants and methods of using such zinc finger proteins in modulating gene expression, gene inactivation, and targeted gene modification. In particular, the disclosure pertains to zinc finger nucleases for targeted cleavage and alteration of EPSPS genes. | 2009-08-13 |
20090205084 | Nucleotide and amino acid sequences from xenorhabdus and uses thereof - The invention provides isolated nucleotide sequences from | 2009-08-13 |
20090205085 | Nucleotide and amino acid sequences from Xenorhabdus bovienii strain Xs85831 and uses thereof - The present invention relates to nucleic acid sequences from | 2009-08-13 |
20090205086 | Commercial production of polysaccharide degrading enzymes in plants and methods of using same - Expression of recombinant polysaccharide degrading enzymes in plants is described. In one embodiment, expression of the enzyme is preferentially directed to the seed of the plant. Expression may also be preferentially targeted to specific locations within the plant cell. Expression of cellulases in corn is shown. The result is the capacity to produce polysaccharide degrading enzymes in plants at commercially acceptable levels in a reliable manner. Methods of using same in production of ethanol is also described, including use of the plant-produced enzymes in the ethanol production process. | 2009-08-13 |
20090205087 | Modified Cry34 Proteins - This invention provides modified, insecticidal Cry34 proteins with enhanced properties as compared to wild-type Cry34 proteins. The modifications to these proteins were based in part on an analysis of the three-dimensional (3D) structure of this protein and other proteins in the Cry34 class. The subject invention also includes polynucleotides that encode these modified proteins, and transgenic plants that produce these modified proteins. This invention further provides methods of controlling plant pests, including rootworms, with these modified proteins. The modified proteins of the subject invention include chimeric toxins involving exchanged segments, domains, and motifs as discussed herein. The subject invention also provides methods of modifying Cry34 proteins. | 2009-08-13 |
20090205088 | Optical Scanning Probe - The present invention relates to a scanning probe ( | 2009-08-13 |
20090205089 | Method for Examining a Measurement Object, and Apparatus - The invention relates to a method for examining a measurement object ( | 2009-08-13 |
20090205090 | OPTICAL COMPONENT OPERATING IN NEAR-FIELD TRANSMISSION - This is a near-field detection optical component operating in transmission. It includes at least one portion ( | 2009-08-13 |
20090205091 | Array and cantilever array leveling - Faster and better methods for leveling arrays including software and user interface for instruments. A method comprising: (i) providing at least one array of cantilevers supported by at least one support structure, (ii) providing at least one substrate, (iii) providing at least one instrument to control the position of the array with respect to the substrate, (iv) leveling the array with respect to the substrate, wherein the leveling is performed via a user interface on the instrument which is adapted to have the user input positional information from the motors and piezoelectric extender when at least one cantilever deflects from the substrate. Uniform z-displacements can be achieved. | 2009-08-13 |
20090205092 | METHOD OF FABRICATING A PROBE DEVICE FOR A METROLOGY INSTRUMENT AND A PROBE DEVICE PRODUCED THEREBY - A method of producing a probe device for a metrology instrument such as an AFM includes providing a substrate and forming a tip stock extending upwardly from the substrate. The tip stock is preferably FIB milled to form a tip of the probe device. The tip preferably has a high aspect ratio, with a height that is at least about 1 micron for performing critical dimension (e.g., deep trench) atomic force microscopy. The stock is preferably pedestal shaped having a distal end that is substantially planar which can be machined into a tip in at least less than about 2 minutes. With the preferred embodiments, the FIB milling step can be completed in substantially fewer and less complicated steps than known techniques to produce a high aspect ratio tip suitable for DT-AFM in less than about one minute. | 2009-08-13 |
20090205093 | Hybrid tea rose plant named 'Meitelov' - A new and distinct variety of Hybrid Tea rose plant is provided which abundantly forms attractive large double yellow blossoms that are lightly perfumed. The plant exhibits a strong vigorous growth habit, semi-glossy decorative dark green foliage, and excellent disease resistance. The attractive dark green foliage contrasts nicely with the yellow blossoms. The new variety is particularly well suited for growing as attractive ornamentation in the landscape such as in parks and gardens. | 2009-08-13 |
20090205094 | CALLA LILY PLANT NAMED 'YELLOW JACKET BLZ' - A calla lily plant particularly distinguished by yellow spathes, high density maculation of the leaves that is visible from both sides of the leaf and produces 2 to 4 inflorescences per 3-cm tuber, is described. | 2009-08-13 |