35th week of 2013 patent applcation highlights part 82 |
Patent application number | Title | Published |
20130227695 | SYSTEMS AND METHODS FOR FIXING APPLICATION VULNERABILITIES THROUGH A CORRELATED REMEDIATION APPROACH - The invention relates to a system and method for fixing application vulnerabilities through a correlated remediation approach. This invention involves identifying application vulnerabilities through dynamic and static assessment of an application. The vulnerability instances reported in the static assessment is fixed using standard code fixes. The assessment results obtained from the static and the dynamic assessment are then correlated to identify how many vulnerability instances reported in the static assessment are by fixing the code based on the standard code fix. If a vulnerability instance reported in the dynamic assessment corresponds to more than one vulnerability instances reported in the static assessment then the shortest and cost effective path to fix the vulnerability instance is determined. These results are stored in a graph database and based on the graph database the application vulnerabilities are fixed. An inference engine can be used to identify the correct fix for an application vulnerability. | 2013-08-29 |
20130227696 | Automated Security Management - A computerized method and system for managing security risk, where risk associated with a breach of security is analyzed and quantified according to weighted risk variables. The analysis is accomplished by a computerized security risk management system that receives information relating to physical, informational, communication and surveillance risk, and structures the information such that it can be related to risk variables and a security risk level can be calculated according to a relevance of associated risk variables. The security risk level can be indicative of a likelihood that a breach of security may occur relating to a particular transaction or facility. Similarly, a security confidence level can be indicative of how secure a particular facility or practice is and a security maintenance level can be indicative of a level of security that should be maintained in relation to an analyzed subject. | 2013-08-29 |
20130227697 | SYSTEM AND METHOD FOR CYBER ATTACKS ANALYSIS AND DECISION SUPPORT - A method for cyber attack risk assessment, the method comprising operating at least one hardware processor for: collecting global cyber attack data from a networked resource; collecting organizational profile data from a user, wherein the organizational profile data comprises: types of computerized defensive controls employed by the organization, a maturity of each of the computerized defensive controls, and organizational assets each pertaining to a business environment and each associated with at least one of the computerized defensive controls; and computing a cyber attack risk of the organization in real time, by continuously performing said collecting of global cyber attack data and comparing the global cyber attack data to the organizational profile data, to compute a cyber attack risk score for each of the organizational assets. | 2013-08-29 |
20130227698 | VULNERABILITY-DIAGNOSIS DEVICE - To diagnose vulnerabilities such as SQL injection, even for web-server devices that change the content of responses to requests in accordance with prescribed conditions. A normal-response collection means ( | 2013-08-29 |
20130227699 | SYSTEM AND METHOD FOR VIRTUAL IMAGE SECURITY IN A CLOUD ENVIRONMENT - Provided herein are systems and method enabling secure virtual image access in a virtual or cloud computing environment. The systems and methods include assigning a status to indicator to guest virtual machines (virtual images) that provide applications and other services to cloud consumers in the cloud environment. A virtual appliance machine in the cloud environment maintains the status of the guest virtual machines and makes decisions based on the status as to whether to allow access to the guest virtual machines. These decisions are transmitted to local elements on the guest virtual machines, which enforce access control on a local level. In this manner, unauthorized virtual image access is prevented providing increased security and data integrity. | 2013-08-29 |
20130227700 | Dynamic Trust Score for Evaulating Ongoing Online Relationships - A method is provided for a dynamic trust score for evaluating ongoing online relationships. By considering a plurality of user data variables and using validation data from internal and external database sources, a trust score with a high degree of confidence may be provided for establishing and verifying online relationships. Since the trust score may be dynamically recalculated periodically or on demand, the trust score may also validate over continuing periods of time, as opposed to conventional verification systems that only validate at a single point in time. Thus, a higher degree of safety, reliability, and control is provided for online services directed towards children or other user classes that may require greater protection. | 2013-08-29 |
20130227701 | Masking Mobile Message Content - A method, an apparatus and an article of manufacture for masking a message on an electronic device. The method includes receiving a message on an electronic device, determining if a message category label is included in the message, mapping the message category to a corresponding masking format if a message category label is included in the message, extracting the content of the message to generate a message category if a message category label is not included in the message, wherein each message category generated corresponds to a masking format, and masking the message on the electronic device by transforming the message into the masking format that corresponds to the message category for the message. | 2013-08-29 |
20130227702 | SYSTEM AND METHOD FOR SYNTAGMATICALLY MANAGING AND OPERATING CERTIFICATION USING ANONYMITY CODE AND QUASI-PUBLIC SYNTAGMATIC CERTIFICATION CENTER - A method for syntagmatically managing and operating certification using an anonymity code is provided, which includes causing a quasi-public syntagmatic certification center to receive basic information including a terminal identification number when the terminal requests certification, causing the quasi-public syntagmatic certification center to detect whether there is an identity between a first resultant code and a preset corresponding anonymity code, causing the quasi-public syntagmatic certification center to determine whether to perform the certification with respect to the certification request depending on whether there is the identity between the first resultant code and the anonymity code, and causing the quasi-public syntagmatic certification center to send the certification result to the user terminal as a reply. | 2013-08-29 |
20130227703 | Device, Method, and System for Secure Mobile Data Storage - A device, method, and system for secure mobile data storage includes a mobile data storage device having a short-range communication circuit, a long-range communication circuit, and a data storage for storing data. The mobile data storage device is used to store data used by a paired mobile communication device. The mobile data storage device and the mobile communication device communicate control signals over a wireless control link established using the short-range communication circuit and data over a wireless data link, different from the wireless control link, established using the long-range communication circuit. The mobile data storage device and/or mobile communication device may monitor a distance between the devices and perform a security function in response the devices being separated from each other. The mobile data storage device may backup data on a remote data server and/or repopulate data from the remote data server using the mobile communication device. | 2013-08-29 |
20130227704 | PROCESSOR AND DATA PROCESSING METHOD WITH NON-HIERARCHICAL COMPUTER SECURITY ENHANCEMENTS FOR CONTEXT STATES - Disclosed are a processor and processing method that provide non-hierarchical computer security enhancements for context states. The processor can comprise a context control unit that uses context identifier tags associated with corresponding contexts to control access by the contexts to context information (i.e., context states) contained in the processor's non-stackable and/or stackable registers. For example, in response to an access request, the context control unit can grant a specific context access to a register only when that register is tagged with a specific context identifier tag. If the register is tagged with another context identifier tag, the contents of the specific register are saved in a context save area of memory and the previous context states of the specific context are restored to the specific register before access can be granted. The context control unit can also provide such computer security enhancements while still facilitating authorized cross-context and/or cross-level communications. | 2013-08-29 |
20130227705 | TERMINAL AND METHOD FOR HIDING AND RESTORING MESSAGE - A terminal to hide a message includes an input unit to receive a signal to hide a message and a signal to restore a hidden message; a display unit to display the message and the hidden message; and a control unit to control display of the message. The terminal hides messages or applications on a separate screen. The separate screen may be a virtual screen or a different display screen. A hidden message may be displayed on the separate screen according to a conversation partner. A hidden message may be restored to a location in which the message would have originally been displayed. A portion of the stored message may be extracted and provided to an application of the terminal. | 2013-08-29 |
20130227706 | METHOD, APPARATUS AND SYSTEM FOR CONTROLLING READ RIGHTS OF DIGITAL CONTENTS - A method for controlling read rights of digital contents includes receiving, by a first service node, digital content information from a second service node implemented by a second server, wherein the digital content information includes digital contents and read rights of the digital contents, and both the first service node and the second service node are service nodes authenticated by a root service node, transmitting, by the first service node, a verification request to the root service node to verify whether the digital content information is authorized by the root service node, and parsing, by the first service node, the digital content information to obtain the digital contents and the read rights of the digital contents if a verification result shows that the digital content information is authorized by the root service node. An apparatus and system for implementing the method are also provided. | 2013-08-29 |
20130227707 | RELATIONSHIP MANAGEMENT SYSTEM AND METHOD OF OPERATION THEREROF - A communication method to publish a user message suitable for one or more vendors. The communication method may be performed by one or more controllers and may include one or more acts of receiving a message from a user station of a user; processing the received message to anonymize the message to conceal an identity of the user; publishing the anonymized message and anonymous link information; receiving a request from a vendor of the one or more vendors for user context information corresponding to the user in response to the published anonymized message; receiving restriction information in accordance with a user persona selected by the user from a plurality of user personas that are each associated with the user; and providing the user context information in accordance with the restriction information. | 2013-08-29 |
20130227708 | SYSTEM AND METHOD FOR DELIVERING GEOGRAPHICALLY RESTRICTED CONTENT, SUCH AS OVER-AIR BROADCAST PROGRAMMING, TO A RECIPIENT OVER A NETWORK, NAMELY THE INTERNET - A system and method for delivering geographically restricted content, including but not limited to over-air broadcast programming, to a recipient over a computer network, namely the Internet. The content is only delivered over the computer network if the recipient's computer or network device requesting the content over the network is verified to be located in the geographically restricted area. A conventional tuner is employed by the recipient's computer to receive one or more over-air signals having a broadcast range deemed to be synonymous with the geographically restricted area for the requested content. If the tuner is able to receive such over-air signal(s), the requested content is delivered over the network to the recipient's computer. This is because the recipient is known to be physically located in the geographically restricted area by the ability of the tuner to receive the over-air signal(s). | 2013-08-29 |
20130227709 | Content Control System - The present invention relates to a content control system. The system allows a user to navigate the internet using a desktop computer and selectively access content at various websites. For example, if a user were to visit a news website, some of the online content may be locked. However, using the present invention, a user can selectively access the locked content by scanning a barcode associated with the locked content. In this example, the content on the news website may have a barcode (or QR code) next to it on a user's computer screen (e.g., desktop computer). The user can scan the barcode on the computer screen using a mobile device (e.g., mobile phone). By scanning the barcode, an app on the user's mobile device sends a signal that instructs the desired website to unlock the content, which allows the user to view the unlocked content on their desktop computer. | 2013-08-29 |
20130227710 | SYSTEM AND METHOD FOR SECURING LEASED IMAGES IN A CLOUD ENVIRONMENT - Provided is a system, method, and computer-readable storage medium having one or more computer-readable instructions thereon for providing leased images in cloud computing environments. The method includes monitoring a usage of a leased image provided by a cloud vendor, by a client computing device. A threshold period of time associated with the usage is determined. Whether an access to the leased image should be terminated based upon an expiry of the threshold period of time or based upon a request received from the client computing device is determined. The image is locked based upon whether the access to the leased image should be terminated. An access request received for the locked image is monitored; and access to the locked image is enabled when it is determined that the access request is valid. | 2013-08-29 |
20130227711 | Controlled Access by Applications to Mobile Device Resources - There is provided a system and method for controlled access by applications to mobile device resources. The method comprises receiving a request from one of a plurality of applications to access a first resource of a plurality of resources, determining whether the first resource of the plurality of resources is classified as a protected resource, if the determining determines that the first resource of the plurality of resources is classified as the protected resource, identifying an application authorization for the first resource, and configuring access by the one of the plurality of applications to the first resource according to the application authorization. Based on the application authorization, the method may further configure access by the one of the plurality of applications to a second resource of the plurality of resources. Additionally, the first resource of the plurality of resources may be connected to a communication network resource. | 2013-08-29 |
20130227712 | METHOD AND SYSTEM FOR RESOURCE MANAGEMENT BASED ON ADAPTIVE RISK-BASED ACCESS CONTROLS - Systems, methods, and computer program products are provided for adaptively controlling access to resources, such as selectively granting a user's request to access a confidential document. In one embodiment, the method may include making real-time access control decisions that respond promptly to changing organizational environments, thus reducing risks of the unauthorized use or access of resources. In addition, the method may include selectively granting a user's request to access a resource based on dynamic risk factors including, for example, the user's trust level, the sensitivity of the information resource requested, and the overall system status. Furthermore, the method may include adjusting those factors based on a change in conditions or organizational need. | 2013-08-29 |
20130227713 | METHOD FOR ENCRYPTING AND EMBEDDING INFORMATION IN A URL FOR CONTENT DELIVERY - A method for accessing a remote network includes identifying a content server associated with the remote network, generating a uniform resource locator, embedding additional data in the uniform resource locator, encrypting the uniform resource locator, and accessing a server in the remote network identified by the uniform resource locator. The method further includes wherein the additional data comprises authentication data, a delivery session identification, a time stamp, or comprises subscriber identification data. The URL may provide access to the content server for a time period indicated by the time stamp. The method includes wherein at least the subscriber identification data prevents unauthorized sharing of the URL. | 2013-08-29 |
20130227714 | SYSTEM AND METHOD FOR USING FILE HASHES TO TRACK DATA LEAKAGE AND DOCUMENT PROPAGATION IN A NETWORK - The system and method described herein may use file hashes to track data leakage and document propagation in a network. For example, file systems associated with known reference systems and various user devices may be compared to classify the user devices into various groups based on differences between the respective file systems, identify files unique to the various groups, and detect potential data leakage or document propagation if user devices classified in certain groups include any files that are unique to other groups. Additionally, various algorithms may track locations, movements, changes, and other events that relate to normal or typical activity in the network, which may be used to generate statistics that can be compared to subsequent activities that occur in the network to detect potentially anomalous activity that may represent potential data leakage or document propagation. | 2013-08-29 |
20130227715 | USE OF ENDONUCLEASES FOR INSERTING TRANSGENES INTO SAFE HARBOR LOCI - The present invention concerns the endonucleases capable of cleaving a target sequence located in a “safe harbor loci”, i.e. a loci allowing safe expression of a transgene. The present invention further concerns the use of such endonucleases for inserting transgenes into a cell, tissue or individual. | 2013-08-29 |
20130227716 | METHODS AND COMPOSITIONS FOR TARGETED PROTEIN DEGRADATION - Coronatine has been found to enhance binding of the JAZ1 degron to the | 2013-08-29 |
20130227717 | HDAC INHIBITORS TO TREAT CHARCOT-MARIE-TOOTH DISEASE - The present application relates to diseases in the peripheral nervous system, particularly hereditary neuropathies, most particularly, Charcot-Marie-Tooth (CMT) disease. It is shown that this disease is associated with decreased acetylated tubulin levels, which can be overcome by inhibition of histone deacetylases (HDACs). Using HDAC inhibitors, it is shown herein that the symptoms of the CMT phenotype can be overcome both in vitro and in vivo. Also provided herein are two different mouse models of CMT disease. | 2013-08-29 |
20130227718 | LINKER FOR UNIMOLECULAR FRET BIOSENSOR BASED ON PRINCIPLE OF FLUORESCENCE RESONANCE ENERGY TRANSFER - A linker for a unimolecular FRET biosensor based on a principle of fluorescence resonance energy transfer, the linker including: a polypeptide containing 52 to 400 amino acids residues, wherein at least 45% of a total number of the amino acid residues are glycine, alanine, or both thereof, and at least 10% of the total number of the amino acid residues are alanine. | 2013-08-29 |
20130227719 | Indoleamine 2,3-Dioxygenase-2 - The nucleotide and amino acid sequences of indoleamine 2,3-dioxygenase-2 (IDO2) and methods of use thereof are provided. | 2013-08-29 |
20130227720 | Rationally Designed Meganucleases With Altered Sequence Specificity and DNA-Binding Affinity - Rationally-designed LAGLIDADG meganucleases and methods of making such meganucleases are provided. In addition, methods are provided for using the meganucleases to generate recombinant cells and organisms having a desired DNA sequence inserted into a limited number of loci within the genome, as well as methods of gene therapy, for treatment of pathogenic infections, and for in vitro applications in diagnostics and research. | 2013-08-29 |
20130227721 | DOWNY MILDEW RESISTANCE IN TABLE BEET - The present invention relates to a beet plant, seed, variety and hybrid. More specifically, the invention relates to a beet plant having a mutant allele designated ACSDMR001 which confers resistance to downy mildew infection. The invention also relates to crossing inbreds, varieties and hybrids containing the ACSDMR001 allele to produce novel types and varieties of beet plants having downy mildew resistance. | 2013-08-29 |
20130227722 | PEA LINE EX 08260893 - The invention provides seed and plants of the pea line designated EX 08260893. The invention thus relates to the plants, seeds and tissue cultures of pea line EX 08260893, and to methods for producing a pea plant produced by crossing a plant of pea line EX 08260893 with itself or with another pea plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of pea line EX 08260893, including the seed, pod, and gametes of such plants. | 2013-08-29 |
20130227723 | Cotton PHYA1 RNAi Improves Fiber Quality, Root Elongation, Flowering, Maturity and Yield Potential in Gossypium hirsutum L. - Improvement of fiber quality of Upland cultivars ( | 2013-08-29 |
20130227724 | TRANSGENIC PLANTS WITH IMPROVED SACCHARIFICATION YIELDS AND METHODS OF GENERATING SAME - A method of engineering a plant having reduced acetylation in a cell wall is disclosed. The method comprising expressing in the plant cell wall at least one isolated heterologous polynucleotide encoding an acetylxylan esterase (AXE) enzyme under the transcriptional control of a developmentally regulated promoter specifically active in the plant cell wall upon secondary cell wall deposit, thereby engineering the plant having reduced acetylation in the cell wall. | 2013-08-29 |
20130227725 | Loci Associated Charcoal Rot Drought Complex Tolerance in Soybean - The invention relates to methods and compositions for identifying soybean plants that are tolerant, have improved tolerance or are susceptible to Charcoal Rot Drought Complex. The methods use molecular genetic markers to identify, select and/or construct tolerant plants or identify and counter-select susceptible plants. Soybean plants that display tolerance or improved tolerance to Charcoal Rot Drought Complex that are generated by the methods of the invention are also a feature of the invention. | 2013-08-29 |
20130227726 | Variety Corn Line FF5130 - The present invention provides an inbred corn line designated FF5130, methods for producing a corn plant by crossing plants of the inbred line FF5130 with plants of another corn plant. The invention further encompasses all parts of inbred corn line FF5130, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line FF5130, and plants produced according to these methods. | 2013-08-29 |
20130227727 | VARIETY CORN LINE AA2205 - The present invention provides an inbred corn line designated AA2205, methods for producing a corn plant by crossing plants of the inbred line AA2205 with plants of another corn plant. The invention further encompasses all parts of inbred corn line AA2205, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line AA2205, and plants produced according to these methods. | 2013-08-29 |
20130227728 | VARIETY CORN LINE LFX6244 - The present invention provides an inbred corn line designated LFX6244, methods for producing a corn plant by crossing plants of the inbred line LFX6244 with plants of another corn plant. The invention further encompasses all parts of inbred corn line LFX6244, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line LFX6244, and plants produced according to these methods. | 2013-08-29 |
20130227729 | Variety Corn Line XF6752 - The present invention provides an inbred corn line designated XF6752, methods for producing a corn plant by crossing plants of the inbred line XF6752 with plants of another corn plant. The invention further encompasses all parts of inbred corn line XF6752, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line XF6752, and plants produced according to these methods. | 2013-08-29 |
20130227730 | Variety Corn Line KDC7040 - The present invention provides an inbred corn line designated KDC7040, methods for producing a corn plant by crossing plants of the inbred line KDC7040 with plants of another corn plant. The invention further encompasses all parts of inbred corn line KDC7040, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line KDC7040, and plants produced according to these methods. | 2013-08-29 |
20130227731 | Variety Corn Line IH6506 - The present invention provides an inbred corn line designated IH6506, methods for producing a corn plant by crossing plants of the inbred line IH6506 with plants of another corn plant. The invention further encompasses all parts of inbred corn line IH6506, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line IH6506, and plants produced according to these methods. | 2013-08-29 |
20130227732 | Variety Corn Line LC6108 - The present invention provides an inbred corn line designated LC6108, methods for producing a corn plant by crossing plants of the inbred line LC6108 with plants of another corn plant. The invention further encompasses all parts of inbred corn line LC6108, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line LC6108, and plants produced according to these methods. | 2013-08-29 |
20130227733 | VARIETY CORN LINE LIC7382 - The present invention provides an inbred corn line designated LIC7382, methods for producing a corn plant by crossing plants of the inbred line LIC7382 with plants of another corn plant. The invention further encompasses all parts of inbred corn line LIC7382, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line LIC7382, and plants produced according to these methods. | 2013-08-29 |
20130227734 | VARIETY CORN LINE FX6815 - The present invention provides an inbred corn line designated FX6815, methods for producing a corn plant by crossing plants of the inbred line FX6815 with plants of another corn plant. The invention further encompasses all parts of inbred corn line FX6815, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line FX6815, and plants produced according to these methods. | 2013-08-29 |
20130227735 | VARIETY CORN LINE FF7354 - The present invention provides an inbred corn line designated FF7354, methods for producing a corn plant by crossing plants of the inbred line FF7354 with plants of another corn plant. The invention further encompasses all parts of inbred corn line FF7354, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line FF7354, and plants produced according to these methods. | 2013-08-29 |
20130227736 | VARIETY CORN LINE ID6053 - The present invention provides an inbred corn line designated ID6053, methods for producing a corn plant by crossing plants of the inbred line ID6053 with plants of another corn plant. The invention further encompasses all parts of inbred corn line ID6053, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line ID6053, and plants produced according to these methods. | 2013-08-29 |
20130227737 | VARIETY CORN LINE KIJ7023 - The present invention provides an inbred corn line designated KIJ7023, methods for producing a corn plant by crossing plants of the inbred line KIJ7023 with plants of another corn plant. The invention further encompasses all parts of inbred corn line KIJ7023, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line KIJ7023, and plants produced according to these methods. | 2013-08-29 |
20130227738 | VARIETY CORN LINE FF6224 - The present invention provides an inbred corn line designated FF6224, methods for producing a corn plant by crossing plants of the inbred line FF6224 with plants of another corn plant. The invention further encompasses all parts of inbred corn line FF6224, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line FF6224, and plants produced according to these methods. | 2013-08-29 |
20130227739 | VARIETY CORN LINE IID3528 - The present invention provides an inbred corn line designated IID3528, methods for producing a corn plant by crossing plants of the inbred line IID3528 with plants of another corn plant. The invention further encompasses all parts of inbred corn line IID3528, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line IID3528, and plants produced according to these methods. | 2013-08-29 |
20130227740 | USE OF NAP GENE TO MANIPULATE LEAF SENESCENCE IN PLANTS - The present invention discloses transgenic plants having an altered level of NAP protein compared to that of a non-transgenic plant, where the transgenic plants display an altered leaf senescence phenotype relative to a non-transgenic plant, as well as mutant plants comprising an inactivated NAP gene, where mutant plants display a delayed leaf senescence phenotype compared to that of a non-mutant plant. The present invention also discloses methods for delaying leaf senescence in a plant, as well as methods of making a mutant plant having a decreased level of NAP protein compared to that of a non-mutant plant, where the mutant plant displays a delayed leaf senescence phenotype relative to a non-mutant plant. Methods for causing precocious leaf senescence or promoting leaf senescence in a plant are also disclosed. Also disclosed are methods of identifying a candidate plant suitable for breeding that displays a delayed leaf senescence and/or enhanced yield phenotype. | 2013-08-29 |
20130227741 | CELLULOYTIC ENZYMES, NUCLEIC ACIDS ENCODING THEM AND METHODS FOR MAKING AND USING THEM - The invention is directed to polypeptides having any cellulolytic activity, e.g., a cellulase activity, e.g., endoglucanase, cellobiohydrolase, beta-glucosidase, xylanase, mannanse, β-xylosidase, arabinofuranosidase, and/or oligomerase activity, including thermostable and thermotolerant activity, and polynucleotides encoding these enzymes, and making and using these polynucleotides and polypeptides. The polypeptides of the invention can be used in a variety of pharmaceutical, agricultural, food and feed processing and industrial contexts. The invention also provides compositions or products of manufacture comprising mixtures of enzymes comprising at least one enzyme of this invention. | 2013-08-29 |
20130227742 | UBIQUITIN REGULATORY ELEMENTS - The present invention provides compositions and methods for regulating expression of heterologous nucleotide sequences in a plant. Compositions are novel nucleotide sequences for a constitutive regulatory element isolated from sorghum. A method for expressing a heterologous nucleotide sequence in a plant using the regulatory sequences disclosed herein is provided. The method comprises transforming a plant cell to comprise a heterologous nucleotide sequence operably linked to one or more of the regulatory sequences of the present invention and regenerating a stably transformed plant from the transformed plant cell. | 2013-08-29 |
20130227743 | INTEGRATED METHOD FOR HIGH-THROUGHPUT IDENTIFICATION OF NOVEL PESTICIDAL COMPOSITIONS AND USES THEREFOR - Methods to rapidly identify nucleic acid sequences encoding novel biotoxins are provided. Particularly, methods to rapidly sample and screen extrachromosomal genetic content of microorganisms for novel sequences of interest are described. Compositions comprising coding sequences for biotoxins, and polypeptides and uses derived therefrom are provided. Compositions and methods are useful, for example, for conferring pesticidal activity to bacteria, plants, plant cells, tissues, and seeds. | 2013-08-29 |
20130227744 | MOLECULAR INTERACTION BETWEEN XA10 AND AVRXA10 - The present invention provides nucleic acids and methods for conferring resistance to bacterial disease in plants. The present invention also provides promoters and promoter sequences useful for controlling expression in transgenic plants. | 2013-08-29 |
20130227745 | Method for Increasing Seed Yield or Biomass by Expressing RNA Binding Proteins in Transgenic Plants - The invention concerns a method for improving growth characteristics of plants by increasing activity in a plant of an RNA-binding protein which is:
| 2013-08-29 |
20130227746 | METHODS AND COMPOSITIONS TO REGULATE PLANT TRANSFORMATION SUSCEPTIBILITY - A genetic screen for | 2013-08-29 |
20130227747 | CHITINOUS POLYSACCHARIDE ANTIGEN-BINDING PROTEINS - Described is an antigen-binding protein, preferably comprising an amino acid sequence that comprises four framework regions and three complementarity-determining regions, wherein the antigen-binding protein is capable of binding a chitinous polysaccharide, and uses thereof. | 2013-08-29 |
20130227748 | "Variants of polypeptides having cellulolytic enhancing activity and polynucleotides encoding same" - The present invention relates to polypeptide having cellulolytic enhancing activity variants. The present invention also relates to polynucleotides encoding the variants; nucleic acid constructs, vectors, and host cells comprising the polynucleotides; and methods of using the variants. | 2013-08-29 |
20130227749 | ATOMIC FORCE MICROSCOPE PROBE - An atomic force microscope probe includes a carbon nanotube micro-tip structure. The carbon nanotube micro-tip structure includes an insulating substrate and a patterned carbon nanotube film structure. The insulating substrate includes a surface. The surface includes an edge. The patterned carbon nanotube film structure is partially arranged on the surface of the insulating substrate. The patterned carbon nanotube film structure includes two strip-shaped arms joined together to form a tip portion protruding and suspending from the edge of the surface of the insulating substrate. The two strip-shaped arms include a number of carbon nanotubes parallel to the surface of the insulating substrate. | 2013-08-29 |
20130227750 | Apple tree named 'WA 38' - A new and distinctive variety of a | 2013-08-29 |
20130227751 | Orange tree named 'KARNINKA' - A new and distinct variety of sweet orange tree ( | 2013-08-29 |
20130227752 | Fast growing willow shrub named 'Preble' - A distinct female cultivar of | 2013-08-29 |
20130227753 | Peperomia plant named 'Eden Rosso' - A new and distinct | 2013-08-29 |
20130227754 | Dracaena plant named ' 2004030D' - A new and distinct | 2013-08-29 |