Patent application number | Description | Published |
20090100550 | Artificial Plant Minichromosomes - Artificial plant minichromosomes comprising a functional centromere which specifically bind centromeric protein C (CENPC) and methods for making such minichromosomes are described. | 04-16-2009 |
20090165176 | Artificial Plant Minichromosomes - Artificial plant minichromosomes comprising a functional centromere which specifically bind centromeric protein C (CENPC) and methods for making such minichromosomes are described. | 06-25-2009 |
20090320162 | METHODS FOR IMPROVING CROP PLANT ARCHITECTURE AND YIELD - The present invention provides methods for altering plant characteristics by introducing into plants, isolated nucleic acid molecules that can be used to produce transgenic plants characterized by altered plant architecture, plant maturity, carbon and nitrogen partitioning and or improved harvestable yield. Also provided are isolated nucleic acids that encode PDR polypeptides, vectors capable of expressing such nucleic acid molecules, host cells containing such vectors, and polypeptides encoded by such nucleic acids. | 12-24-2009 |
20090320163 | METHODS FOR IMPROVING CROP PLANT ARCHITECTURE AND YIELD - The present invention provides methods for altering plant characteristics by introducing into plants, isolated nucleic acid molecules that can be used to produce transgenic plants characterized by altered plant architecture, plant maturity, carbon and nitrogen partitioning and or improved harvestable yield. Also provided are isolated nucleic acids that encode PDR polypeptides, vectors capable of expressing such nucleic acid molecules, host cells containing such vectors and polypeptides encoded by such nucleic acids. | 12-24-2009 |
20100281579 | Methods for Improving Crop Plant Architecture and Yield - The present invention provides methods for altering plant characteristics by introducing into plants, isolated nucleic acid molecules that can be used to produce transgenic plants characterized by altered plant architecture, plant maturity, carbon and nitrogen partitioning and or improved harvestable yield. Also provided are isolated nucleic acids that encode PDR polypeptides, vectors capable of expressing such nucleic acid molecules, host cells containing such vectors, and polypeptides encoded by such nucleic acids. | 11-04-2010 |
20110010799 | Floral Transition Genes in Maize and Uses Thereof - The invention provides isolated floral transition nucleic acids and their encoded proteins. The present invention provides methods and compositions relating to altering floral transition in plants. The invention further provides regulatory elements, recombinant expression cassettes, host cells, and transgenic plants. | 01-13-2011 |
20110023191 | METHODS FOR IMPROVING CROP PLANT ARCHITECTURE AND YIELD - The present invention provides methods for altering plant characteristics by introducing into plants, isolated nucleic acid molecules that can be used to produce transgenic plants characterized by altered plant architecture, plant maturity, carbon and nitrogen partitioning and or improved harvestable yield. Also provided are isolated nucleic acids that encode PDR polypeptides, vectors capable of expressing such nucleic acid molecules, host cells containing such vectors and polypeptides encoded by such nucleic acids. | 01-27-2011 |
20120047608 | Floral Transition Genes in Maize and Uses Thereof - The invention provides isolated floral transition nucleic acids and their encoded proteins. The present invention provides methods and compositions relating to altering floral transition in plants. The invention further provides regulatory elements, recombinant expression cassettes, host cells and transgenic plants. | 02-23-2012 |
Patent application number | Description | Published |
20090177514 | SERVICES USING GLOBALLY DISTRIBUTED INFRASTRUCTURE FOR SECURE CONTENT MANAGEMENT - Secure content management is enabled as a cloud-based service through which security protection and policy enforcement may be implemented for both on-premise network users and roaming users. The global SCM service integrates the security functionalities—such as anti-virus, spyware, and phishing protection, firewall, intrusion detection, centralized management, and the like—that are typically provided by enterprise network SCM appliance hardware or servers into a cloud-based service that users reach via Internet-based points-of-presence (“POPs”). The POPs are configured with forward proxy servers, and in some implementations, caching and network acceleration components, and coupled to hubs which provide configuration management and identity management services such as active directory services. | 07-09-2009 |
20090178108 | ENTERPRISE SECURITY ASSESSMENT SHARING FOR OFF-PREMISE USERS USING GLOBALLY DISTRIBUTED INFRASTRUCTURE - Secure content management is enabled as a cloud-based service through which security protection and policy enforcement may be implemented for both on-premise network users and off-premise or roaming users. The global SCM service integrates the security functionalities—such as anti-virus, spyware, and phishing protection, firewall, intrusion detection, centralized management, and the like—that are typically provided by enterprise network SCM appliance hardware or servers into a cloud-based service that users reach via Internet-based points-of-presence (“POPs”). The POPs are configured with forward proxy servers, and in some implementations, caching and network acceleration components, and coupled to hubs which provide configuration management and identity management services such as active directory services. | 07-09-2009 |
20090178109 | Authentication in a globally distributed infrastructure for secure content management - Secure content management is enabled as a cloud-based service through which security protection and policy enforcement may be implemented for both on-premise network users and roaming users. The global SCM service integrates the security functionalities—such as anti-virus, spyware, and phishing protection, firewall, intrusion detection, centralized management, and the like—that are typically provided by enterprise network SCM appliance hardware or servers into a cloud-based service that users reach via Internet-based points-of-presence (“POPs”). The POPs are configured with forward proxy servers, and in some implementations, caching and network acceleration components, and coupled to hubs which provide configuration management and identity management services such as active directory services. | 07-09-2009 |
20090178132 | Enterprise Security Assessment Sharing For Consumers Using Globally Distributed Infrastructure - Secure content management is enabled as a cloud-based service through which security protection and policy enforcement may be implemented for both on-premise network users and roaming users. The global SCM service integrates the security functionalities—such as anti-virus, spyware, and phishing protection, firewall, intrusion detection, centralized management, and the like—that are typically provided by enterprise network SCM appliance hardware or servers into a cloud-based service that users reach via Internet-based points-of-presence (“POPs”). The POPs are configured with forward proxy servers, and in some implementations, caching and network acceleration components, and coupled to hubs which provide configuration management and identity management services such as active directory services. | 07-09-2009 |
20090300739 | Authentication for distributed secure content management system - Aspects of the subject matter described herein relate to authentication for a distributed secure content management system. In aspects, a request to access a resource available through the Internet is routed to a security component. The security component is one of a plurality of security components distributed throughout the Internet and responsible for authenticating entities associated with an enterprise. The security component determines an authentication protocol to use with the entity and then authenticates the entity. If the entity is authenticated, the entity is allowed to use a forward proxy. | 12-03-2009 |
20110307947 | FLEXIBLE END-POINT COMPLIANCE AND STRONG AUTHENTICATION FOR DISTRIBUTED HYBRID ENTERPRISES - Systems, methods and apparatus for accessing at least one resource hosted by at least one server of a cloud service provider. In some embodiments, a client computer sends authentication information associated with a user of the client computer and a statement of health regarding the client computer to an access control gateway deployed in an enterprise's managed network. The access control gateway authenticates the user and determines whether the user is authorized to access the at least one resource hosted in the cloud. If the user authentication and authorization succeeds, the access control gateway requests a security token from a security token service trusted by an access control component in the cloud and forwards the security token to the client computer. The client computer sends the security token to the access component in the cloud to access the at least one resource from the at least one server. | 12-15-2011 |
20110321130 | NETWORK LAYER CLAIMS BASED ACCESS CONTROL - Embodiments of the invention provide techniques for basing access control decisions at the network layer at least in part on information provided in claims, which may describe attributes of a computer requesting access, one or more resources to which access is requested, the user, the circumstances surrounding the requested access, and/or other information. The information may be evaluated based on one or more access control policies, which may be pre-set or dynamically generated, and used in making a decision whether to grant or deny the computer access to the specified resource(s). | 12-29-2011 |
20110321152 | TRUSTED INTERMEDIARY FOR NETWORK LAYER CLAIMS-ENABLED ACCESS CONTROL - Embodiments of the invention provide a trusted intermediary for use in a system in which access control decisions may be based at least in part on information provided in claims. The intermediary may request claims on behalf of a network resource to which access is requested, and submit the claims for a decision whether to grant or deny access. The decision may be based at least in part on one or more access control policies, which may be pre-set or dynamically generated. Because the intermediary requests the claims and submits the claims for an access control decision, the network resource (e.g., a server application) need not be configured to process claims information. | 12-29-2011 |