37th week of 2013 patent applcation highlights part 66 |
Patent application number | Title | Published |
20130239166 | Operating Large Scale Systems and Cloud Services With Zero-Standing Elevated Permissions - Large scale system operation may be provided. Upon receiving an action request from a user, a determination may be made as to whether the user requires elevated permissions to perform the action request. In response to determining that the user requires elevated permissions to perform the action request, the action request may be forwarded to a lockbox for evaluation and a permission response may be received from the lockbox. | 2013-09-12 |
20130239167 | CONTROLLING ENTERPRISE ACCESS BY MOBILE DEVICES - A system comprising at least one component running on at least one server and receiving vulnerability data and, for each device of a plurality of devices, device data that includes data of at least one device component. The system includes a trust score corresponding to each device of the plurality of devices and representing a level of security applied to the device. The trust score is generated using a severity of the vulnerability data. The system includes an access control component coupled to the at least one component and controlling access of the plurality of devices to an enterprise using the trust score. | 2013-09-12 |
20130239168 | CONTROLLING ENTERPRISE ACCESS BY MOBILE DEVICES - A system comprising at least one component running on at least one server and receiving vulnerability data and, for each device of a plurality of devices, device data that includes data of at least one device component. The system includes a trust score corresponding to each device of the plurality of devices and representing a level of security applied to the device. The trust score is generated using a severity of the vulnerability data. The system includes an access control component coupled to the at least one component and controlling access of the plurality of devices to an enterprise using the trust score. | 2013-09-12 |
20130239169 | POLICY FOR SECURE PACKET TRANSMISSION USING REQUIRED NODE PATHS AND CRYPTOGRAPHIC SIGNATURES - Techniques ( | 2013-09-12 |
20130239170 | SYSTEM AND METHOD FOR ENHANCING TRUST FOR PERSON-RELATED DATA SOURCES - The technology disclosed relates to enhancing trust for person-related data sources by tracking person-related sources using trust objects that hold trust metadata. In particular, it relates to generating trust-enhanced data by appending trust metadata to social media content and other business-to-business entities, and further using the trust-enhanced data to develop social engagement models based on customer preferences. The trust metadata described includes names, interface categories and origins of the person-related data sources along with customer engagement preferences and connection types. | 2013-09-12 |
20130239171 | DISTRIBUTED SECURITY ARCHITECTURE - A distributed security architecture may include: a mobile anti-tamper hardware policy enforcement point configured to control communication behaviors of a mobile or stationary client by enforcing communication policies within a policy decision point; an anti-tamper hardware policy decision point encapsulated within the anti-tamper hardware policy enforcement point; a policy exchange channel for policy distribution modes configured to distribute and/or update communication and routing security policies to the client; a context manager configured to handle system-wide status change update signaling; and an authentication manager configured to provide clients with registration and credential/role assignments based on access policies. The distributed security architecture may be configured to provide open system interconnection layer 3.5 policy-based secure routing, and open system interconnection layer 2 policy-based mandatory access control address filtering to provide secure communication and computing for layers 4, 5, 6, and 7. | 2013-09-12 |
20130239172 | COMMUNICATION CONTROL APPARATUS, SYSTEM, METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAM THEREON - A communication control apparatus that controls communication via a network between a first communication apparatus for communicating via a virtual communication channel and a second communication apparatus for transmitting a communication request with the first communication apparatus including a storage unit that stores access control policy defining allowance or denial of access to the first communication apparatus, an establishment unit that establishes the virtual communication channel with the first communication apparatus, an authentication unit that authenticates the second communication apparatus based on the communication request received from the second communication apparatus, an access control unit that refers to the access control policy and evaluates whether to allow or deny access from the authenticated second communication apparatus to the first communication apparatus, and a transfer unit that transfers the received communication request to the first communication apparatus when the access control unit evaluates that the access is allowed. | 2013-09-12 |
20130239173 | COMPUTER PROGRAM AND METHOD FOR ADMINISTERING SECURE TRANSACTIONS USING SECONDARY AUTHENTICATION - Administering secure transactions using secondary authentication includes receiving a transaction request from a user using a first client device, determining whether the requested transaction is a type of transaction that is already approved, determining whether one or more current parameters of the transaction are within limits that are already established if the type of transaction is already approved, transmitting a secondary authentication request to the user to approve the transaction if the current parameters are outside of already established limits or if the type of transaction is not already approved, receiving a response to the secondary authentication request from the user, determining from the response whether the user approved the transaction, aborting the transaction if the user denies the transaction, and performing the transaction if the user approves the transaction or if the type of transaction is already approved and the current parameters are within already established limits. | 2013-09-12 |
20130239174 | DATA TRANSMITTING SYSTEM AND METHOD, DRIVE UNIT, ACCESS METHOD, DATA RECORDING MEDIUM, RECORDING MEDIUM PRODUCING APPARATUS AND METHOD - A security module is provided in a data recording medium, data to be written to the data recording medium is encrypted with an content key different from one data to another, and the content key is safely stored in the security module. Also, the security module makes a mutual authentication using the public-key encryption technology with a drive unit to check that the counterpart is an authorized (licensed) unit, and then gives the content key to the counterpart, thereby preventing data from being leaked to any illegal (unlicensed) unit. Thus, it is possible to prevent copyrighted data such as movie, music, etc. from being copied illegally (against the wish of the copyrighter of the data). | 2013-09-12 |
20130239175 | CONTROLLING ENTERPRISE ACCESS BY MOBILE DEVICES - A system comprising at least one component running on at least one server and receiving vulnerability data and, for each device of a plurality of devices, device data that includes data of at least one device component. The system includes a trust score corresponding to each device of the plurality of devices and representing a level of security applied to the device. The trust score is generated using a severity of the vulnerability data. The system includes an access control component coupled to the at least one component and controlling access of the plurality of devices to an enterprise using the trust score. | 2013-09-12 |
20130239176 | METHOD AND SYSTEM FOR MULTI-TIERED DISTRIBUTED SECURITY AUTHENTICATION AND FILTERING - Multi-tiered distributed security authentication and filtering. One embodiment comprises managing user access to one or more computing resources, by centrally maintaining user subscription information comprising user authentication information and system authorization information, and providing relevant subscription information from the user subscription information to one or more remote computing systems. Managing user access further includes, in a remote computing system, authenticating a user login to the remote computing system based on user authentication information from said relevant subscription information, and upon user authentication, selectively authorizing user access to computing resources of the remote computing system based on system authorization information from said relevant subscription information. | 2013-09-12 |
20130239177 | CONTROLLING ENTERPRISE ACCESS BY MOBILE DEVICES - A system comprising at least one component running on at least one server and receiving vulnerability data and, for each device of a plurality of devices, device data that includes data of at least one device component. The system includes a trust score corresponding to each device of the plurality of devices and representing a level of security applied to the device. The trust score is generated using a severity of the vulnerability data. The system includes an access control component coupled to the at least one component and controlling access of the plurality of devices to an enterprise using the trust score. | 2013-09-12 |
20130239178 | SYSTEM AND METHOD FOR EXPANDING, AMALGAMATING, SELECTIVELY UTILIZING AND TRANSFORMING ACCESS TO NETWORKING WEBSITES AND USER INFORMATION THEREIN - Systems and methods of expanding and enhancing the usefulness and accessibility of networking site and member user information therein are disclosed. An e-mailer, instant messenger, text messenger, blogger or other user with accounts at one or more sites (Sender) provides a recipient with access to the site or sites (or Sender's information therein) through a link, software tool, or the like. Alternatively, Recipients are given access to the networking site through an Aggregator site. The Aggregator site may or may not be part of the networking website. Control of access is determined by the Sender or networking site. An amalgamation or best of sites-social networking site can be utilized with embodiments of the disclosure. The amalgamation site is a filtered website that provides information put on other sites. | 2013-09-12 |
20130239179 | APPARATUS, SYSTEM, AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAM - An apparatus with a single function or plural functions includes a user information receiving unit that receives user information about a user; a request unit that requests use permission information from a server; a receiving unit that receives the use permission information transmitted from the server; a memory that stores the received use permission information; a use permission determining unit that performs a first determination process and a second determination process; and an operation controller that, when the use of the function is permitted in the first determination process, performs control such that operations other than a predetermined operation are available before the second determination process is performed and, when it is determined that the function permitted to be used in the first determination process is also permitted to be used in the second determination process, performs control to permit the user to use all operations of the function. | 2013-09-12 |
20130239180 | WEB-BASED CONFERENCE COLLABORATION TOOL WITH DYNAMIC CONTENT AND ROLES - A conference collaboration system has a server connected to a network and configured to generate a page view requested by a client device over the network and provide dynamic content associated with the requested page view for display on the device; and a database configured to store the dynamic content, update the dynamic content in response to commands from the server, and provide the dynamic content to the server in response to requests from the server, wherein the dynamic content is associated with a plurality of services, each shown in a page view, and the dynamic content and the services are associated with a conference. The server can determine an authorization level of a user interacting with the client device and provide a page view and dynamic content in response to the authorization level, and the dynamic content is updated or created in response to or for actions during the conference. | 2013-09-12 |
20130239181 | SECURE TUNNELING PLATFORM SYSTEM AND METHOD - A system identifies a user, even a user behind a wireless router, and provides a virtual tunnel over the internet for communication with the user. A data center at an Internet Service Provider may work in concert with a central data center to authenticate the user and to provide access, for example using a layer 2 tunneling protocol and a point-to-point data (PPP) link protocol. A layer 2 tunneling protocol network server (LNS) may provide public IP address translation services. | 2013-09-12 |
20130239182 | NETWORK SECURITY AND FRAUD DETECTION SYSTEM AND METHOD - A system and method to detect and prevent fraud in a system is provided. The system may uniquely identify physical devices connecting to a network, register unique devices, track end-user logins, associate end-user accounts with specific devices, and share information with multiple network service providers is described. | 2013-09-12 |
20130239183 | CONTENT TRANSMITTER, CONTENT TRANSMITTING METHOD AND PROGRAM - A content transmitter transmits content over a network, and includes: an input section configured to obtain the content, a first kind of information indicating, based on at least one of the destination and transmission method of the content, whether transmission of the content is permitted or not, and a second kind of information specifying the destination of the content; a control section configured to determine, by reference to the first and second kinds of information, whether or not to transmit the content to the destination and rewrites the first kind of information; and an output section configured to output the content and the first kind of information that has been rewritten. | 2013-09-12 |
20130239184 | Method and System for Controlling a Safe from a Remote Computing Device - Systems and methods for controlling a safe are disclosed. The system includes a safe having one or more networked devices, a mobile computing device, and a virtual safe controller server (VCF). The VCF server is configured to initiate a control session of the safe, determine a role of the user, transmit an instruction to the mobile computing device indicating one or more graphical user interfaces to display based on the role of the user, receive a command from the mobile computing device via the network, and transmit the command to the networked device over the network. The control session provides a user of the mobile computing device control of the networked devices. The role of the user is indicative of actions that the user has permission to perform on the networked devices. The command indicates a commanded action to be performed on a networked device. | 2013-09-12 |
20130239185 | METHOD AND SYSTEM FOR USING SOCIAL NETWORKS TO VERIFY ENTITY AFFILIATIONS AND IDENTITIES - Login credentials for at least one website, such as a social networking website, are received from a user purporting to act on behalf of an entity, for example, in the context of registering the entity with a system for electronic bill payment. Social data relating to the entity is retrieved from the websites using the login credentials. The social data comprises a plurality of social connections, each reflecting a respective relationship between the entity and a respective third party. A plurality of relevant social connections comprising at least a subset of the plurality of social connections is determined, each social connection of the plurality of relevant social connections reflecting a relationship to a respective third party that is deemed to be reliable. A reliability rating of the entity is then determined based on the plurality of relevant social connections. | 2013-09-12 |
20130239186 | GLOBAL SECURE SERVICE PROVIDER DIRECTORY - Systems and methods enable members of a secure transaction network to readily identify the appropriate trusted service manager (TSM) to support a particular transaction. A global directory of TSM providers is provided that a secure service provider can use for determining which TSM provider is the authorized manager of a security domain for the particular transaction. In aspect the directory of TSM providers may be stored within a mobile device secure element. In another aspect, the directory of TSM providers may be stored in a central TSM repository. In a further aspect, the directory of TSM providers may be distributed among a number of secondary TSM repositories. The appropriate TSM may be identified based upon a secure element identifier and an application identifier provided by a secure element as part of the transaction. Communication of the identifiers from mobile devices may be via cellular or near field communication links. | 2013-09-12 |
20130239187 | Physiological Response PIN Entry - Methods and systems are provided for facilitating the secure entry of a user's PIN for electronic transactions such as merchant checkout, payment authorization, or access authorization. A physiological response of the user can indicate which one of a random sequence of numbers is a number of the user's PIN. For example, the user can blink, wink, or make a subtle facial movement to provide the indication. | 2013-09-12 |
20130239188 | Authentication Method for a Universal Serial Bus Device and Related Universal Serial Bus Device - The present invention discloses an authentication method for a Universal Serial Bus (USB) device. The authentication method includes performing two-way authentication with an authentication server via a server, to generate an authentication result indicating whether the authentication is successful; and generating a one time password according to the authentication result. | 2013-09-12 |
20130239189 | Bootstrap Authentication Framework - A bootstrap authentication framework may automatically provide stored authentication credentials to an application server on behalf of an application. The bootstrap authentication framework may receive an access request from a protocol handler to access the authentication credentials stored in a subscriber identity module (SIM) of the electronic device. The access request may be initiated by an application that uses the authentication credentials to access a network service on an application server. In turn, the bootstrap authentication framework may provide the authentication credentials to the protocol handler when a digital signature associated with the protocol handler indicates that the protocol handler is allowed to access the authentication credentials. | 2013-09-12 |
20130239190 | PREVENTING IMPERSONATION OF A COMPUTER SYSTEM USER - A system and method for preventing an administrator impersonating a user from accessing sensitive resources on a target system is provided. The method comprises receiving a first request from a user to change the user's password on a target system to be changed, sending a “change password” request for the user to the target system, storing the user's new password, receiving a second request from the target system on behalf of the user for access to a sensitive resource, wherein the second request contains information about the user's password, and denying the second request if the information about the user's password is not consistent with the user's stored new password. | 2013-09-12 |
20130239191 | BIOMETRIC AUTHENTICATION - This document discusses, among other things, apparatus and methods for providing persistent biometric authentication for a computer system. In an example, a method can include collecting behavioral interaction information associated with a user account on the computer system, comparing the behavioral interaction information with a behavioral model associated with the user account; and adjusting an authentication confidence metric based on the comparison. | 2013-09-12 |
20130239192 | METHOD AND APPARATUS FOR SECURING MOBILE APPLICATIONS - A non-transitory processor-readable medium stores code that represents instructions to be executed by a processor. The code includes code to receive an object code of a first application. The first application is defined by an author different from an author of a second application. The code also includes code to dynamically load at least two intercept points into the object code of the first application, using the second application. The code further includes code to, responsive to a read request for data by the first application, intercept the read request by at least one of the two intercept points. The code further includes code to determine, in response to intercepting the read request, whether or not access to read the data is authenticated. The code further includes code to send a signal to provide the data to the first application, based on the determining. | 2013-09-12 |
20130239193 | PHASED BUCKET PRE-FETCH IN A NETWORK PROCESSOR - A packet processor provides for rule matching of packets in a network architecture. The packet processor includes a lookup cluster complex having a number of lookup engines and respective on-chip memory units. The on-chip memory stores rules for matching against packet data. Each of the lookup engines receives a key request associated with a packet and determines a subset of the rules to match against the packet data. Based on a prefetch status, a selection of the subset of rules are retrieved for rule matching. As a result of the rule matching, the lookup engine returns a response message indicating whether a match is found. | 2013-09-12 |
20130239194 | AUTOMATED DEVICE PROVISIONING AND ACTIVATION - A computer-readable medium, a service controller, and a method for obtaining one or more credentials from a device communicatively coupled to the service controller over a network, the credentials identifying an aspect of the device; determining, using the credentials, that a user of the device has not selected a service plan for the device; identifying one or more candidate service plans, at least one of the plans identified based on the one or more credentials; establishing a secure link between the service controller and a service processor of the device over an ambient services connection enabling the user to select one of the candidate service plans for the device; sending, to the service processor over the secure link, information about the candidate service plans; and obtaining, from the service processor over the secure link, a response identifying a service plan selected by the user. | 2013-09-12 |
20130239195 | METHOD AND DEVICE FOR CONFIRMING COMPUTER END-USER IDENTITY - The identity of an end-user operating a computer is confirmed by analyzing user reactions to aberrations in output. More specifically, an aberration is caused in output that the computer provides to an output device, and the end-user's response to the aberration is received. An end-user characteristic is extracted from the response and compared to stored characteristic responses to find a match. A match is indicative of the identity of the computer user. It can also be checked whether, after causing an aberration in output the end-user responded differently to the output than if the output did not have the aberration. The lack of a different response can be interpreted as indicative that the end-user is a bot. | 2013-09-12 |
20130239196 | SECURE EXPANDABLE ADVERTISEMENTS USING AN API AND CROSS-DOMAIN COMMUNICATIONS - A system to present secure expandable advertisements using an API and cross-domain communication. A content publishing system that hosts a website can implement an expandable advertisement using IFRAMEs that are expanded upon receiving an API call from a third party rich media vendor that hosts the expandable advertisement when the content publishing system and the third party media vendor are of differing domains. | 2013-09-12 |
20130239197 | IC CHIP, INFORMATION PROCESSING APPARATUS, SYSTEM, METHOD, AND PROGRAM - An IC chip, an information processing apparatus, system, method, and program are provided. An IC chip includes an authentication control unit configured to authenticate a request using authentication information. The request and/or the authentication information is received from outside the IC chip. | 2013-09-12 |
20130239198 | MANAGING REMOTE NETWORK ADDRESSES IN COMMUNICATIONS - A method for managing routing information in a communications system comprises-defining, in a client network apparatus, a unique private IP address, the unique private IP address uniquely identifying a terminal and the corresponding remote network. The client apparatus defines an IP routing address for the remote network. The client apparatus routes a data packet to a VPN tunnel having the IP routing address defined for the remote network, the data packet being directed to the remote network identified by the unique private IP address. The unique private IP address is translated into a corresponding customer IP address of the terminal in order the data packet to be routable to the terminal in the remote network. | 2013-09-12 |
20130239199 | WALLED GARDEN PROVIDING ACCESS TO ONE OR MORE WEBSITES THAT INCORPORATE CONTENT FROM OTHER WEBSITES - A cleared sites list includes one or more hostname descriptors. A firewall includes rules associated with a cleared IP list including cleared IP addresses, and permits transfer of a cleared HTTP request from a user device to a cleared destination IP address that matches one of the cleared IP addresses. A controller examines a non-cleared HTTP request from the user device to a non-cleared destination IP address that does not match one of the cleared IP addresses, and acts as a transparent proxy between the user device and the non-cleared destination IP address when a destination host header of the non-cleared HTTP request matches a hostname descriptor of the cleared sites list. The controller further acts as a transparent proxy between the user device and the non-cleared destination IP address when a referrer header of the non-cleared HTTP request matches a hostname descriptor of the cleared sites list. | 2013-09-12 |
20130239200 | ELECTRONIC DEVICE AND METHOD FOR OPERATING LOCKED TOUCH SCREENS - An electronic device and a method are used to operate a locked touch screen of the electronic device. A password of unlocking the locked touch screen is set and stored into a storage device of the electronic device. When touches are generated on the touch screen, a count of touch points of each of the touches is obtained to generate a number queue. The number queue is compared with the password stored in the storage device, and the touch screen is unlocked when the number queue is identical to the password. | 2013-09-12 |
20130239201 | SECURE DEVICE SHARING - A device and method for placing the device in a locked state having an associated set of permitted tasks so as to permit the device owner to share the device with others but maintain security over aspects of the device. A task change request is evaluated to determine whether the requested task is permitted and, if so, the requested task is allowed; if not, then an authorization process is invoked to prompt the user to input authorization data. Upon verification of the authorization data, the device may be unlocked and the requested change implemented. The permitted tasks may designate specific applications, specific operations or functions within applications or at the operating system level, one or more currently open windows, and other levels of granularity. | 2013-09-12 |
20130239202 | METHOD, SYSTEM AND MOBILE DEVICE EMPLOYING ENHANCED USER AUTHENTICATION - The described embodiments relate generally to methods and systems for user authentication for a computing device. In one embodiment, the method comprises: enabling receipt of input in relation to selection of a plurality of authenticators for consecutive use by the computing device to authenticate a user; and storing reference information identifying the selected plurality of authenticators in a memory of the computing device. The computing device may comprise a mobile device. | 2013-09-12 |
20130239203 | INFORMATION RECORDING DEVICE, RECORDING MEDIUM, AND INFORMATION RECORDING SYSTEM - An information recording system includes a recording medium capable of limiting a function by password and an information recording device for controlling the recording medium. The recording medium stores an input password, counts updating event (s) of a password, stores the update count of the password, outputs information stored in the password related information storage according to a READ request issued from the information recording device, compares a input password with a password stored in the password register, limits a predetermined function of the recording medium according to the comparison result from the password comparator. The information recording device stores a password and a password identification ID which is associated with the update count of the password, selects a password with reference to the update count of the password and the password identification ID and outputs the selected password into the recording medium to compare the passwords. | 2013-09-12 |
20130239204 | SINGLE SIGN-ON FOR REMOTE DESKTOPS - A mechanism is provided for automatically logging into a cloud based system that does not accept token log-on credentials generated by a single sign-on service. In an embodiment, a one-time password is automatically generated and persisted. The generated password is used to log in automatically to a cloud based system that does not accept tokens generated by the web-ID providers and for connecting to other services. Examples of such systems may include Windows, Linux, and iOS. | 2013-09-12 |
20130239205 | METHOD AND APPARATUS FOR IDENTIFYING AND ASSOCIATING DEVICES USING VISUAL RECOGNITION - In one embodiment, a method includes identifying a request for access to a first system and obtaining a visual image including at least a first piece of information associated with the request. The visual image is associated with a first device and obtained using a second device. The method also includes determining if the at least first piece of information indicates that the access to the first system is to be granted, wherein determining if the at least first piece of information indicates that the access to the first system is to be granted includes implementing a visual recognition algorithm to process the at least first piece of information. Finally, the access to the first system is granted if it is determined that the at least first piece of information indicates that the access to the first system is to be granted. | 2013-09-12 |
20130239206 | AUTHENTICATION USING PHYSICAL INTERACTION CHARACTERISTICS - User physical interaction characteristics information or the way a user physically interacts with a device is analyzed to aid in authenticating a user of a device. User physical interaction characteristics information such as swipe speed, finger area, finger conductivity, finger angle, device angle, movement patterns, acceleration, etc., provide signatures that are distinctive for particular individuals and possibly unique if measured to a sufficiently high level of precision. In some examples, a device measures finger positions, finger pad sizes, moisture level, acceleration, displacement, and changes in finger pad size for a particular user and compares the measurements to physical interaction characteristics measured during subsequent usage of the device to verify that a user is an authorized user. | 2013-09-12 |
20130239207 | INFORMATION RECORDING SYSTEM AND RECORDING MEDIUM - An information recording system includes a recording medium and an information recording device. The information recording device has a group password manager for saving a group password used for a predetermined group and an identification ID of the group password; a password setter for registering the group password in a password register of the recording medium and registering the identification ID in a password related information storage; a password selector for reading the identification ID from the password related information storage of the recording medium and selecting a group password corresponding to the identification ID from at least one group password stored in the group password manager according to the identification ID; and a limitation cancel requester for inputting the password selected by the password selector in the password comparator of the recording medium. | 2013-09-12 |
20130239208 | ENCRYPTION AND AUTHENTICATION SYSTEMS AND METHODS - Methods, apparatus, and systems are disclosed for, among other things, secure passphrase handling for computing devices. In one respect, a method is provided. The method includes receiving a plurality of passphrase elements from an input device. The method also includes performing a sequence of secure delay processing operations, each operation generating a delayed output value from an initial value. The passphrase is verified upon completion of the sequence of secure delay processing operations. Further, initial values of respective secure delay processing operations are based on respective passphrase elements and, for each secure delay processing operation after a first secure delay processing operation, a delayed output value from at least one other secure delay processing operations. | 2013-09-12 |
20130239209 | MANAGING DOMAIN NAME ABUSE - A method for providing an abuse sentry service for responding to domain name abuse is described. The method comprises the following steps. A plurality of disparate abuse feeds is received, each comprising data relating to a subset of potential domain name abuse. Filters are applied to the data to create a custom abuse feed. Data from the custom abuse feed is grouped based on priority levels. For each of the groups, one or more corresponding workflows are executed as a response to the potential domain name abuse. A computer readable medium including instructions for implementing the method is also described. | 2013-09-12 |
20130239210 | SYSTEM AND METHODS FOR DETECTING MALICIOUS EMAIL TRANSMISSION - A system and methods of detecting an occurrence of a violation of an email security policy of a computer system. A model relating to the transmission of prior emails through the computer system is defined which is derived from statistics relating to the prior emails. For selected emails to be analyzed, statistics concerning the selected email are gathered. Such statistics may refer to the behavior or other features of the selected emails, attachments to emails, or email accounts. The determination of whether a violation of an email security policy has occurred is performed by applying the model of prior email transmission to the statistics relating to the selected email. The model may be statistical or probabilistic. A model of prior email transmission may include grouping email recipients into cliques. A determination of a violation of a security policy may occur if email recipients for a particular email are in more than one clique. | 2013-09-12 |
20130239211 | SYSTEM FOR TRACKING MEDIA CONTENT TRANSACTIONS - A system that incorporates teachings of the present disclosure may include, for example, a web server having a controller adapted to manage an archive of media content for a subscriber, and record a transaction description and a corresponding tracking identifier for a transaction that manipulates the archive. Other embodiments are disclosed. | 2013-09-12 |
20130239212 | SEARCH ENGINE WITH WEBPAGE RATING FEEDBACK BASED INTERNET SEARCH OPERATION - Feedback of a web page quality/legitimacy factor, various user interaction parameters, a contact address correlation factor, and an explicit web page rating on the reverse path from the client to the severs for Internet search operations improve the quality of websites/web pages and enhances the efficiency of the Internet search operation. This reverse communication also allows for the automatic blockage of any illegitimate websites due to poor “contact address correlation factor” and poor “web page quality factor.” The rating of the websites is based on a computed number called “web page quality factor.” The “web page quality factor” is communicated in the reverse path of Internet search operation back to various Whois servers, domain registrars, and web servers on the Internet to further improve quality. This facilitates the filtering of scammers, squatters, illegal/unwanted sites, etc., which have low “web page quality factor” rating resulting in high efficiency of search operations. | 2013-09-12 |
20130239213 | METHODS AND SYSTEMS FOR FULL PATTERN MATCHING IN HARDWARE - According to an example, an intrusion-prevention system may include a network interface to receive a subject data word via a network. The intrusion-prevention system may include hardware to determine whether the subject data word partially matches a signature data pattern, and determine whether the subject data word fully matches the signature data pattern if the subject data word partially matches the signature data pattern. | 2013-09-12 |
20130239214 | METHOD FOR DETECTING AND REMOVING MALWARE - A method for detecting and removing a suspicious software code in a computer system, according to which the installation process of the suspicious software code is monitored by a client agent residing within the computer system where predetermined operations of the suspicious software code are identified and registered during the installation process. The predetermined operations are compared with a known software code in order to define whether the software code is similar to the known software code. It is then determined if the suspicious software code is malware and if it is, the client agent is instructed to uninstall the suspicious software code from the OS, or to remove its entry from the boot registry. | 2013-09-12 |
20130239215 | DETECTING MALICIOUS COMPUTER CODE IN AN EXECUTING PROGRAM MODULE - Prior to execution of computer program instructions, the computer identifies one or more addresses in memory corresponding to the locations of one or more of the computer program instructions in the computer program. During execution of the computer program instructions, the computer identifies in the computer program another computer program instruction located in another address in the memory, and in response, the computer makes an indication that the computer program has an indicia of maliciousness. | 2013-09-12 |
20130239216 | System and Method for Bidirectional Trust Between Downloaded Applications and Mobile Devices Including a Secure Charger and Malware Scanner - A system and method are described that will enable mobile smart devices, such as a cellular phones, PDAs, or iPads, smartphones, mobile payment systems, mobile healthcare systems, handheld law enforcement systems, and other types of tablet devices, to trust download applications and for the download applications to trust the mobile smart devices onto which they are downloaded. The system and method enables charging a mobile smart device and while charging the mobile smart device scans for malware and other viruses in the applications and the operating system on the mobile smart device. | 2013-09-12 |
20130239217 | System, Method and Computer Program Product for Determining a Person's Aggregate Online Risk Score - Various embodiments of a system, method and computer program product for assessing an aggregate risk score for a user of a social network's online activities are described. The system may include an interface adapted to obtain information about online activities concerning a subject via a network such as the Internet. An analyzing component may be provided to analyze the collected information in order to find one or more potential dangers to the subject. The analyzing component may then associate a severity level to each identified potential danger and then assigning a weight to each identified potential danger based on its associated severity level and the current age of the identified potential danger. Next, the analyzer may aggregate the weighted identified potential dangers in order to obtain an aggregate online risk score for the subject. | 2013-09-12 |
20130239218 | SECURITY SCANNING SYSTEM AND METHOD - The present disclosure provides a computer-readable medium, method, and system for determining security vulnerabilities for a plurality of application programs used to provide television services to a customer device over a communications network. The method includes running a first scanning program against a first application program relating to a control panel for the customer device; running a second scanning program against a second application program that provides Internet content to the customer device, running a third scanning program against a third application program that relates to a component management system of customer premises equipment; and correlating security vulnerabilities identified utilizing the first, second, and third scanning programs. | 2013-09-12 |
20130239219 | MINING SOURCE CODE FOR VIOLATIONS OF PROGRAMMING RULES - A method for software code analysis includes automatically processing a body of software source code ( | 2013-09-12 |
20130239220 | Monitoring and Managing User Privacy Levels - Various embodiments pertain to techniques for measuring a user's privacy level as a user interacts with various web services. In various embodiments, entities with which the user interacts are detected and sensitive information shared by the user is logged to determine what a given entity knows about the user. In some embodiments, sensitive information that is shared by a user can be processed using a predictive algorithm to ascertain a user's level of privacy. When a user's identity is predicted by the algorithm, a user can be alerted to the loss of anonymity. In various embodiments, user-defined areas of anonymity can be used to measure a user's definition of privacy. In some embodiments, alerts can also be provided to the user when a new, previously undisclosed, piece of information is shared by the user. | 2013-09-12 |
20130239221 | RIGHTS MANAGEMENT MODULE - Assigning and managing rights to media content, including: receiving the media content along with a list of media rights definition from a content provider which describes what media availability rights apply to which media content; applying the defined media availability rights to the media content; and distributing the media content to a content consumer in accordance with the applied media availability rights. Keywords include media content and media availability rights. | 2013-09-12 |
20130239222 | METHODS, DEVICES AND DATA STRUCTURES FOR TRUSTED DATA - An apparatus includes a processor and a memory to implement a method to provide a proof that two or more instances of a data structure type are as trustworthy as each other. | 2013-09-12 |
20130239223 | METHOD AND APPARATUS FOR DETECTING LEAK OF INFORMATION RESOURCE OF DEVICE - A method and apparatus for detecting a leak of an information resource of a device. Source code is obtained from an application and is analyzed to determine whether at least one information resource from among information resources of a device is transmittable to outside the device by tracking a task performed on the at least one information resource, thereby detecting whether the application is externally leaking an information resource from the device. | 2013-09-12 |
20130239224 | METHOD OF LOCATING A COMPUTING DEVICE - The method of location tracking of a computing device (computer, notebook, mobile phone, etc.) that can be used to prevent unauthorized access and/or theft of the device. The essence of the invention is that special software is installed on the computing device that can obtain external and internal IP-addresses of the Internet enabled computing device. The special software then processes this information and forms an electronic massage that includes IP-addresses and an identifier of the computing device. Special software then sends this message to an electronic address preset by the user of the computing device. Only the user of the computing device and the special software installed on the computing device has access to such electronic address. | 2013-09-12 |
20130239225 | Deleting Confidential Information Used to Secure a Communication Link - A system includes a first wireless-enabled device that transparently stores confidential information and a second wireless-enabled device that stores the same confidential information. The confidential information is to be used to secure a wireless communication link between the first device and the second device. One or both of the first device and the second device is to delete the confidential information upon fulfillment of one or more conditions related to the communication link. The conditions include general timeout, device inactivity, loss of connection over the communication link, a decline in signal strength, and a predefined number of transactions having occurred between the first device and the second device. | 2013-09-12 |
20130239226 | INFORMATION PROCESSING SYSTEM, ANONYMIZATION METHOD, INFORMATION PROCESSING DEVICE, AND ITS CONTROL METHOD AND CONTROL PROGRAM - An information processing device for anonymizing personal information being linkable to an individual includes an anonymization policy providing unit which provides an anonymization policy in which priority is added to each of a plurality of kinds of anonymization processes to enhance anonymity for at least one item which can be related to said personal information; an anonymization process selecting unit which selects in sequence from an anonymization process of low priority to an anonymization process of high priority, in case said plurality of kinds of anonymization processes being contained in said anonymization policy which said anonymization policy providing unit provides is applied; an anonymization processing unit which applies said plurality of kinds of anonymization processes in said sequence selected by said anonymization process selecting unit to said personal information which an information user uses; and an anonymity evaluating unit which provides said personal information to which said anonymization process was applied up to the anonymization process concerned to said information user, in case it is judged that said personal information to which said anonymization process was applied had anonymity. | 2013-09-12 |
20130239227 | GROUP LICENSES FOR VIRTUAL OBJECTS IN A DISTRIBUTED VIRTUAL WORLD - A group licensing scheme for validating groups of virtual objects within a distributed virtual world is provided. Each of a number of distributed virtual world servers hosts a cell, or virtual space, of the virtual world. In operation, a first virtual world server categorizes virtual objects into a number of groups. Either before or after creating the groups, the first virtual world server validates each virtual object individually. Once the virtual objects are validated and the groups are formed, the first virtual world server generates a group license for each of the groups. When a group of virtual objects or an avatar associated with one or more groups of virtual objects moves to a virtual space hosted by a second virtual world server, the corresponding group licenses are provided to the second virtual world server, which validates the one or more groups of virtual objects based on the group licenses. | 2013-09-12 |
20130239228 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PUBLICLY PROVIDING WEB CONTENT OF A TENANT USING A MULTI-TENANT ON-DEMAND DATABASE SERVICE - In accordance with embodiments, there are provided mechanisms and methods for publicly providing web content of a tenant using a multi-tenant on-demand database service. These mechanisms and methods for publicly providing web content of a tenant using a multi-tenant on-demand database service can allow the web content to be published by a tenant using the multi-tenant on-demand database service for use by non-tenants of the multi-tenant on-demand database service. | 2013-09-12 |
20130239229 | METHOD, APPARATUS AND SYSTEM FOR MANAGING DOCUMENT RIGHTS - Embodiments of the present invention provide a method, an apparatus and a system for managing document rights. In the method, the apparatus and the system for managing document rights which are provided in the embodiments of the present invention, a server receives a rights request from a client, where the rights request is used for obtaining rights information of a document; determines, according to the rights request, whether the first rights information of the document is saved; when the first rights information is not saved, sends, to the client, the second rights information corresponding to the document confidentiality level, so that the client decrypts the document according to the second rights information; and when the first rights information is saved, sends the first rights information to the client so that the client decrypts the document according to the saved first rights information. | 2013-09-12 |
20130239230 | DOCUMENT ACCESS AUDITING - The present disclosure includes systems and techniques relating to document access auditing. According to an aspect, the invention involves receiving a request relating to an electronic document associated with a document tracking system; retrieving actions-taken information associated with the electronic document and maintained by the document tracking system; combining and signing the electronic document and the actions-taken information to form a signed document that includes the actions-taken information; and providing the signed document to enable access to the actions-taken information independent of the document tracking system. According to another aspect, the invention involves presenting a consent query that requests consent to an audit event to be recorded by a document control system for an electronic document tethered to the document control system; receiving a consent indication with respect to a consent statement relating to the audit event; and sending information corresponding to the consent indication to the document control system. | 2013-09-12 |
20130239231 | Communication Between Web Applications - In an embodiment, communication is controlled between a service provider web application executed in a first web browser instance on a device platform of the device and a partner web application executed in a second web browser instance on the device platform. A signal is received, at a control module at the device, from the partner web application, the signal for initiating communication between the partner web application and the service provider web application. The control module, provided by the service provider and installed on the device, uses technology that is native to the device platform. The control module uses a list of partners approved by the service provider to determine whether the partner web application is approved for communication with the service provider web application. If the control module determines the partner web application is approved, the control module allows communication to proceed. | 2013-09-12 |
20130239232 | ENTERPRISE LICENSE REGISTRAR ANCHOR POINT - Methods and systems for providing an enterprise license registrar anchor point are provided. More particularly, an enterprise license registrar is established within an enterprise system using license files and a certificate provided by an external license authority. The enterprise license registrar operates within the enterprise system to maintain a record of allocations of license rights by license manager servers to application instances. The enterprise license registrar logs the report data. The log files are digitally signed or encrypted to prevent tampering by the enterprise system, and are delivered to the external license authority, without requiring a persistent connection between the external license authority and the enterprise system. The enterprise system can comprise a virtualized environment. | 2013-09-12 |
20130239233 | Interoperable Keychest for Use by Service Providers - There is provided a system and method for distributors to use an interoperable key chest. There is provided a method for use by a distributor to obtain content access authorizations from a key chest or central key repository (CKR), the method comprising receiving a user request from a user device for access to an encrypted content identified by a content identification, transmitting a key request to the CKR including the content identification, receiving an encrypted first key from the CKR, decrypting the encrypted first key using a second key to retrieve the first key, and providing a DRM license for the encrypted content to the user device using the first key for use by the user device to decrypt the encrypted content using the first key. By generating such DRM licenses, distributors can unlock protected content even sourced from distributors using different DRM schemas. | 2013-09-12 |
20130239234 | PHOSPHODIESTERASE ACTIVITY AND REGULATION OF PHOSPHODIESTERASE 1B-MEDIATED SIGNALING IN BRAIN - The present invention provides methods and compositions for modulating the activity of phosphodiesterase 1B (PDE1B) in intracellular signaling pathways, including but not limited to, dopamine D1 intracellular signaling pathways. The invention also provides methods and compositions for modulating the activities of intracellular signaling molecules, including, but not limited to, DARPP-32 and GluR1 AMPA receptor, via modulation of PDE1B. The invention also provides pharmaceutical compositions and methods of screening for compounds that modulate PDE1B activity. The invention also provides methods of treating or ameliorating the symptoms of a disorder, including but not limited to a PDE1B-related disorder or a dopamine D1 receptor intracellular signaling pathway disorder, by administering a modulator of PDE1B, preferably, but not limited to, an inhibitor of PDE1B or an agent that decreases the production of PDE1B. | 2013-09-12 |
20130239235 | METHODS FOR TESTING FOR CALORIC RESTRICTION (CR) MIMETICS - Methods for treating neurological diseases and for testing Caloric Restriction (CR) mimetics or CR mimetic candidates. In one exemplary method, a CR mimetic candidate is administered to a transgenic animal and the effects of the administering are determined; the transgenic animal includes an added gene from another type of animal or a modified gene which is designed to produce a disease or ailment of another type of animal, and the method seeks to determine whether the CR mimetic candidate improves the disease or ailment. Methods relating to neurological disease and other methods relating to CR mimetic testing are also described. | 2013-09-12 |
20130239236 | Regulation of translation of expressed genes - The present invention describes mRNA usage improving and/or translation-enhancing nucleic acid sequences, nucleic acid constructs comprising such sequences, and host cells comprising such nucleic acid constructs. The invention further pertains to a method for expressing a protein of interest in a cell or organism using such nucleic acid sequences, as well as their uses for increasing integration of such nucleic acid construct into a genome, for enhancing mRNA usage and/or translation of a recombinantly expressed polypeptide, and for increasing the number of transformants upon transformation of a cell with such nucleic acid construct. | 2013-09-12 |
20130239237 | ESTROUS CYCLE MONITORING BY COLOR RESPONSE - A method of determining the phase of an estrous cycle that a mammal is in at a given time that a biological sample is obtained from the mammal is provided. The biological sample obtained from the mammal is combined with a flavonol and an anthocyanin and/or iodine on, or which had been stored on and subsequently removed from, a silane-based surface to provide a color response. The estrus phase of the estrous cycle has a corresponding color response that is distinguishable from the color response of each other phase of the estrous cycle to an unaided human eye. The corresponding color response is correlated to the estrus phase of the estrous cycle. | 2013-09-12 |
20130239238 | Immunoglobulin Cleavage Fragments and Disease Indicators and Compositions for Detecting and Binding Such - The invention relates to antibody compositions and use of the composition to detect disease processes associated with elaboration of proteases. The reagents are directed to assessing an IgG breakdown product that is the result of such proteolytic cleavage. The invention further relates to the use of a therapeutic immunospecific for IgG protease cleavage products to restore effector function to antibody compositions that are subject to protease cleavage. | 2013-09-12 |
20130239239 | LMCD1 CANCER MARKERS AND METHODS FOR THEIR USE - The present invention provides LMCD1 cancer markers, and methods, compositions, and kits for their use. The invention also provides expression vectors, host cells, and transgenic animals comprising one or more LMCD1 mutations, and methods for their use in characterizing, diagnosing, and treating cancers, and for identifying potential therapeutics. The invention also provides cancer therapeutics. | 2013-09-12 |
20130239240 | Alfalfa Variety 55Q27 - A novel alfalfa variety designated 55Q27 and seed, plants and plant parts thereof. Methods for producing an alfalfa plant that comprise crossing alfalfa variety 55Q27 with another alfalfa plant. Methods for producing an alfalfa plant containing in its genetic material one or more traits introgressed into 55Q27 through backcross conversion and/or transformation, and to the alfalfa seed, plant and plant part produced thereby. Alfalfa seed, plant or plant part produced by crossing alfalfa variety 55Q27 or a trait conversion of 55Q27 with another alfalfa plant or population. Alfalfa populations derived from alfalfa variety 55Q27, methods for producing other alfalfa populations derived from alfalfa variety 55Q27 and the alfalfa populations and their parts derived by the use of those methods. | 2013-09-12 |
20130239241 | Alfalfa Variety 09N12CY - A novel alfalfa variety designated 09N12CY and seed, plants and plant parts thereof. Methods for producing an alfalfa plant that comprise crossing alfalfa variety 09N12CY with another alfalfa plant. Methods for producing an alfalfa plant containing in its genetic material one or more traits introgressed into 09N12CY through backcross conversion and/or transformation, and to the alfalfa seed, plant and plant part produced thereby. Alfalfa seed, plant or plant part produced by crossing alfalfa variety 09N12CY or a trait conversion of 09N12CY with another alfalfa plant or population. Alfalfa populations derived from alfalfa variety 09N12CY, methods for producing other alfalfa populations derived from alfalfa variety 09N12CY and the alfalfa populations and their parts derived by the use of those methods. | 2013-09-12 |
20130239242 | HYBRID CARROT VARIETY TROOPER - The present invention relates to plants of a carrot variety TROOPER and seeds and progeny thereof. The invention further relates to methods for producing a carrot plant by traditional breeding methods. The invention further relates to a method for producing a carrot plant containing in its genetic material one or more transgenes. | 2013-09-12 |
20130239243 | INBRED CORN LINE BB93 - An inbred corn line, designated BB93, is disclosed. The invention relates to the seeds of inbred corn line BB93, to the plants and plant parts of inbred corn line BB93 and to methods for producing a corn plant, either inbred or hybrid, by crossing inbred corn line BB93 with itself or another corn line. The invention also relates to products produced from the seeds, plants, or parts thereof, of inbred corn line BB93 and/or of the hybrids produced using the inbred as a parent. The invention further relates to methods for producing a corn plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other inbred corn lines derived from inbred corn line BB93. | 2013-09-12 |
20130239244 | INBRED CORN LINE BC115 - An inbred corn line, designated BC115, is disclosed. The invention relates to the seeds of inbred corn line BC115, to the plants and plant parts of inbred corn line BC115 and to methods for producing a corn plant, either inbred or hybrid, by crossing inbred corn line BC115 with itself or another corn line. The invention also relates to products produced from the seeds, plants, or parts thereof, of inbred corn line BC115 and/or of the hybrids produced using the inbred as a parent. The invention further relates to methods for producing a corn plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other inbred corn lines derived from inbred corn line BC115. | 2013-09-12 |
20130239245 | INBRED CORN LINE CB15 - An inbred corn line, designated CB15, is disclosed. The invention relates to the seeds of inbred corn line CB15, to the plants and plant parts of inbred corn line CB15 and to methods for producing a corn plant, either inbred or hybrid, by crossing inbred corn line CB15 with itself or another corn line. The invention also relates to products produced from the seeds, plants, or parts thereof, of inbred corn line CB15 and/or of the hybrids produced using the inbred as a parent. The invention further relates to methods for producing a corn plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other inbred corn lines derived from inbred corn line CB15. | 2013-09-12 |
20130239246 | INBRED CORN LINE LM3 - An inbred corn line, designated LM3, is disclosed. The invention relates to the seeds of inbred corn line LM3, to the plants and plant parts of inbred corn line LM3 and to methods for producing a corn plant, either inbred or hybrid, by crossing inbred corn line LM3 with itself or another corn line. The invention also relates to products produced from the seeds, plants, or parts thereof, of inbred corn line LM3 and/or of the hybrids produced using the inbred as a parent. The invention further relates to methods for producing a corn plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other inbred corn lines derived from inbred corn line LM3. | 2013-09-12 |
20130239247 | INBRED CORN LINE ML12 - An inbred corn line, designated ML12, is disclosed. The invention relates to the seeds of inbred corn line ML12, to the plants and plant parts of inbred corn line ML12 and to methods for producing a corn plant, either inbred or hybrid, by crossing inbred corn line ML12 with itself or another corn line. The invention also relates to products produced from the seeds, plants, or parts thereof, of inbred corn line ML12 and/or of the hybrids produced using the inbred as a parent. The invention further relates to methods for producing a corn plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other inbred corn lines derived from inbred corn line ML12. | 2013-09-12 |
20130239248 | INBRED CORN LINE BC110 - An inbred corn line, designated BC110, is disclosed. The invention relates to the seeds of inbred corn line BC110, to the plants and plant parts of inbred corn line BC110 and to methods for producing a corn plant, either inbred or hybrid, by crossing inbred corn line BC110 with itself or another corn line. The invention also relates to products produced from the seeds, plants, or parts thereof, of inbred corn line BC 110 and/or of the hybrids produced using the inbred as a parent. The invention further relates to methods for producing a corn plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other inbred corn lines derived from inbred corn line BC110. | 2013-09-12 |
20130239249 | INBRED CORN LINE BB86 - An inbred corn line, designated BB86, is disclosed. The invention relates to the seeds of inbred corn line BB86, to the plants and plant parts of inbred corn line BB86 and to methods for producing a corn plant, either inbred or hybrid, by crossing inbred corn line BB86 with itself or another corn line. The invention also relates to products produced from the seeds, plants, or parts thereof, of inbred corn line BB86 and/or of the hybrids produced using the inbred as a parent. The invention further relates to methods for producing a corn plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other inbred corn lines derived from inbred corn line BB86. | 2013-09-12 |
20130239250 | RESISTANCE TO NASONOVIA RIBISNIGRI BIOTYPE 1 (NR:1) FROM LACTUCA SERRIOLA - The present invention relates to a lettuce plant ( | 2013-09-12 |
20130239251 | QUARTET BREEDING - The invention relates to a method for the production of a set of seeds which are genetically identical to the male gametes from which they arise, which may comprise placing a limited number of paternal gametes that have the form of tetrads or dyads on the stigma of a flower to fertilize maternal egg cells to obtain a number of zygotes; and inducing the loss of maternal chromosomes from the zygotes to obtain a seed set containing a limited number of seeds in which the maternal chromosomes are absent. In a preferred embodiment the father plant exhibits suppression of chromosome recombination or second division restitution (SDR) during meiosis. | 2013-09-12 |
20130239252 | Methods and Compositions for Altering Temperature Sensing in Eukaryotic Organisms - H2A.Z containing nucleosomes mediate the thermosensory response in plants and other eukaryotes and modifications to H2A.Z alter such responses. | 2013-09-12 |
20130239253 | METHODS FOR RAPIDLY TRANSFORMING MONOCOTS - The present invention provides methods for transforming monocot plants via a simple and rapid protocol, to obtain regenerated plants capable of being planted to soil in as little as 4-8 weeks. Associated cell culture media and growth conditions are also provided, as well as plants and plant parts obtained by the method. Further, a method for screening recalcitrant plant genotypes for transformability by the methods of the present invention is also provided. Further, a system for expanding priority development window for producing transgenic plants by the methods of the present invention is also provided. | 2013-09-12 |
20130239254 | MODULATION OF RECEPTOR-LIKE KINASES FOR PROMOTION OF PLANT GROWTH - The invention provides the disclosure of a novel plant growth pathway involving several receptor like kinases. The pathway was shown to work largely independent of brassinosteroids and involves several members of the CrRLK1L family of receptor kinases. According to the invention, HERK1, HERK2, FER, THE1 and the brassinosteroid BES1 may be modulated to influence plant growth and elongation. The invention includes methods, and transformed plants, cells tissues and seeds with increased cellular elongation and other related yield traits. | 2013-09-12 |
20130239255 | METHODS OF INCREASING ABIOTIC STRESS TOLERANCE AND/OR BIOMASS IN PLANTS AND PLANTS GENERATED THEREBY - Provided are methods of increasing the tolerance of a plant to abiotic stresses and/or increasing the biomass and/or increasing the yield of a plant by expressing within the plant an exogenous polynucleotide homologous to SEQ ID NO:13. | 2013-09-12 |
20130239256 | TRANSGENIC PLANTS WITH ENHANCED GROWTH CHARACTERISTICS - The invention relates to transgenic plants exhibiting dramatically enhanced growth rates, greater seed and fruit/pod yields, earlier and more productive flowering, more efficient nitrogen utilization, increased tolerance to high salt conditions, and increased biomass yields. In one embodiment, transgenic plants engineered to over-express both glutamine phenylpyruvate transaminase (GPT) and glutamine synthetase (GS) are provided. The GPT+GS double-transgenic plants of the invention consistently exhibit enhanced growth characteristics, with T0 generation lines showing an increase in biomass over wild type counterparts of between 50% and 300%. Generations that result from sexual crosses and/or selfing typically perform even better, with some of the double-transgenic plants achieving an astounding four-fold biomass increase over wild type plants. | 2013-09-12 |
20130239257 | LETTUCE VARIETY 41-123 RZ - The present invention relates to a | 2013-09-12 |
20130239258 | FRUIT FORMATION IN THE ABSENCE OF FERTILISATION - The present invention relates to a pepper plant showing the trait fruit formation in the absence of fertilisation wherein said trait is obtainable by introgression from a plant grown from seed that was deposited with the NCIMB under accession number NCIMB 41678, NCIMB 41680, or NCIMB 41684. The invention further relates to progeny of the plant, propagation material for producing the plant, to fruits of the plant and to a food product comprising the fruit or parts thereof. | 2013-09-12 |
20130239259 | Blueberry plant named 'ZF05-196' - The new blueberry plant variety ‘ZF05-196’ is provided. ‘ZF05-196’ is a nursery variety intended for the landscape and home garden markets. The variety produces high yields of medium sized fruit with nice flavor and firmness. ‘ZF05-196’ is a mid-season variety, ripening after Draper and before Liberty. The variety is very vigorous with an upright stature and attractive, long fruit clusters. | 2013-09-12 |
20130239260 | Blueberry plant named 'CARGO' - The new blueberry plant variety ‘Cargo’ is provided. ‘Cargo’ is a commercial variety intended to be machine harvested for both the fresh and processed markets. The variety has a very uniform crop of medium sized fruit with good flavor and excellent firmness, and has consistently high yields. ‘Cargo’ is a vigorous plant, with a narrow crown and upright growing habit, and has an estimated chilling requirement of 800 to 1,000 hours. | 2013-09-12 |
20130239261 | Blueberry plant named 'TOP SHELF' - The new blueberry plant variety ‘Top Shelf’ is provided. ‘Top Shelf’ is a commercial variety intended for the hand harvest market. The variety has jumbo-sized sky-blue fruit with excellent flavor. ‘Top Shelf’ ripens mid-season, approximately 2 to 3 weeks later than ‘Duke,’ and holds up well in storage trials. The plant is vigorous, with an upright, vase shaped growth habit, and has an estimated chilling requirement of 700 to 1,000 hours. | 2013-09-12 |
20130239262 | Blueberry plant named 'OVERTIME' - The new blueberry plant variety ‘Overtime’ is provided. ‘Overtime’ is a commercial variety intended for the hand harvest fresh market. The variety has medium sized, light blue fruit which has and an excellent fruity flavor and lacks the typical grittiness of rabbiteye blueberries. ‘Overtime’ ripens about one week earlier than ‘Powderblue’ and ‘Ochlockonee’, and has comparable yields. The variety shows good tolerance to bacterial canker caused by | 2013-09-12 |
20130239263 | Blueberry plant named 'ZF06-179' - The new blueberry plant variety ‘ZF06-179’ is provided. ‘ZF06-179’ is a cold hardy ornamental variety intended for nursery, landscape, and home garden use. The variety has a dwarf growing habit with attractive foliage that is light green with red tips throughout the growing season, turning to yellow and red in the fall. ‘ZF06-179’ ripens in mid-July and produces high quality, medium sized fruit. The plant has an estimated chilling requirement of 1000-1200 hours. | 2013-09-12 |
20130239264 | Blueberry plant named 'CLOCKWORK' - The new blueberry plant variety ‘Clockwork’ is provided. ‘Clockwork’ is a commercial variety with excellent machine harvest characteristics, and is intended for the processed foods market. The variety has a concentrated mid-season ripening schedule, with the potential to be harvested only once per season. ‘Clockwork’ holds up well in freezer trials, with excellent flavor and texture. The plant is vigorous, with an upright growth habit, and has an estimated chilling requirement of 800 to 1,000 hours. | 2013-09-12 |
20130239265 | Blueberry plant named 'BLUE RIBBON' - The new blueberry plant variety ‘Blue Ribbon’ is provided. ‘Blue Ribbon’ is a commercial variety intended for the hand harvest market. The variety produces a large berry with exceptional flavor and crunch. ‘Blue Ribbon’ is an early to mid-season variety, ripening after Duke but before Draper, and producing high yields of excellent quality fruit, with good post-harvest shelf life. The plant is vigorous with a semi-upright to spreading growth habit, and an estimated chilling requirement of 800-1000 hours. | 2013-09-12 |