01st week of 2011 patent applcation highlights part 50 |
Patent application number | Title | Published |
20110004912 | METHOD OF CODING A SCALABLE VIDEO STREAM DESTINED FOR USERS WITH DIFFERENT PROFILES - A method is provided of coding a video sequence as a video stream having a base layer and one or more refinement layers destined for users having different user profiles. A visual object is coded in at least one of the refinement layers codes, which is distinct from visual objects coded in the base layer or in another of the refinement layers. The visual object corresponds to semantic content destined specifically for the users of one of the profiles. | 2011-01-06 |
20110004913 | ARCHITECTURE FOR SEAMLESS ENFORCEMENT OF SECURITY POLICIES WHEN ROAMING ACROSS IP SUBNETS IN IEEE 802.11 WIRELESS NETWORKS - In a network which includes a first subnet which includes a home wireless switch which includes at least one first interface, and a second subnet which includes a current wireless switch, a method is provided for applying a first set of original security policies associated with the at least one first interface to a packet transmitted from a particular wireless communication device after the particular wireless communication device roams from the first subnet to the second subnet. A method is also provided for applying a first set of original security policies associated with the at least one first interface to a packet being transmitted to a particular wireless communication device after the particular wireless communication device roams from the first subnet to the second subnet. | 2011-01-06 |
20110004914 | Methods and Apparatus for Identifying the Impact of Changes in Computer Networks - The impact of device configuration changes on operational issues and policy compliance in a computer network can be discerned from a visual data presentation that jointly shows representations of changes, issues, and policy compliance in a common view for a group of network devices. Configuration information is collected from devices in the computer network and processed to determine whether a change has occurred in a configuration of any of the devices, whether any operational issues exist for each of the devices, and whether any of the devices are not in compliance with any applicable operational policies. A display device displays the visual data presentation to allow an operator to see trends and relationships between device configuration changes and operational issues and incidents of policy non-compliance. The visual data presentation can be depicted as a graphical timeline view, a network topology view, or a table view of the information. | 2011-01-06 |
20110004915 | METHOD AND APPARATUS FOR MANAGING ACCESS TO IDENTITY INFORMATION - Various methods for managing access to identity information are provided. One example method includes accessing media content received via a broadcast. The media content may be formatted such that a presentation of the media content is adaptable based at least in part on user identity information. The example method may also include determining whether the user identity information is accessible for retrieval based at least in part on an access control rule. Similar and related example methods and example apparatuses are also provided. | 2011-01-06 |
20110004916 | SECURELY USING SERVICE PROVIDERS IN ELASTIC COMPUTING SYSTEMS AND ENVIRONMENTS - Access permission can be assigned to a particular individually executable portion of computer executable code (“component-specific access permission”) and enforced in connection with accessing the services of a service provider by the individually executable portion (or component). It should be noted that least one of the individually executable portions can request the services when executed by a dynamically scalable computing resource provider. In addition, general and component-specific access permissions respectively associated with executable computer code as a whole or one of it specific portions (or components) can be cancelled or rendered inoperable in response to an explicit request for cancellation. | 2011-01-06 |
20110004917 | Integration Platform for Collecting Security Audit Trail - An audit processor is interposed between production servers and an auditing server, and is a client to both. The audit processor is an integration point, receiving security audit data from production servers, processing the data (e.g., converting the data from binary to text format), and sending processed audit trails to the auditing server. The audit processor includes data buffering capacity and flow control; accordingly, temporary unavailability of the auditing server does not impact the production servers. The production servers will purge stale audit data; accordingly, temporary unavailability of the audit processor does not impact the production servers. Since the audit processor may process security audit data according to any protocol or format imposed or requested by the auditing server; the production servers are unaffected by auditing server changes. The audit processor integrates production servers with existing auditing servers without jeopardizing the telecom grade availability of the wireless telecommunication network. | 2011-01-06 |
20110004918 | Facilitating heterogeneous authentication for allowing network access - A method comprises an operation for facilitating authentication of a client device attempting to connect to a port of a network element. Facilitating authentication includes determining whether the client device is configured for being authenticated using a first authentication mechanism and, in response to determining that the client device is not configured for being authenticated using the first authentication mechanism, determining whether the client device is configured for being authenticated using at least one other authentication mechanism. For each one of the authentication mechanisms, an operation is provided for providing the client device with network connectivity dependent upon a respective first classification policy structure in response to the client device being successfully authenticated and an operation is provided for providing the client device with network connectivity dependent upon a respective second classification policy structure different that the first classification policy structure in response to the client device failing to be successfully authenticated. | 2011-01-06 |
20110004919 | Method for Processing Emails in a Private Email Network - A postal inspector gatekeeper function is implemented in an electronic email communication system to process email. Various methods of processing email in a private email network approve or reject specific emails for delivery after determining whether the email sender and/or the intended email recipient are included in directories such as a member directory, enterprise member client directory, and a non-member whitelist. | 2011-01-06 |
20110004920 | WIRELESS COMMUNICATION SYSTEM, WIRELESS HOST, AND WIRELESS DEVICE - A wireless communication system includes a wireless host and a wireless device. The wireless device includes a user authentication unit that authenticates a requesting user that is using the wireless host based on a result of comparison between a requesting-user ID of the requesting user received from the host and a user ID of a user that is permitted to establish communication with the wireless device. When the requesting user is authenticated by the user authentication unit, information required prior to connection is stored in the wireless device and the wireless host. The wireless device permits to continue the association process with the wireless host, when the information required prior to connection received from the wireless host and the information required prior to connection stored in the wireless device match. | 2011-01-06 |
20110004921 | PERSONALIZED SECURITY MANAGEMENT - Systems and methods for personalized security management of online applications are provided. A determination may be made that a condition for constructing an increased authentication proposal for access to an online financial service is satisfied. The increased authentication proposal may be associated with (i) a user of the online financial service and (ii) a user request option associated with the online financial service. Based upon the determination that the condition is satisfied, the increased authentication proposal may be generated and transmitted for presentation to the user. An increased authentication proposal response may then be received, and the increased authentication proposal response may be processed in order to store, in association with the user and the user request option, (i) an indication of an increased authentication condition and (ii) an indication of an increased authentication mechanism. | 2011-01-06 |
20110004922 | User Specified Privacy Settings - Customized content sharing techniques are described. In an implementation, an input is accepted that describes a particular type of content. The input is provided via selection of one or more privacy settings for a user of a social network service. The input is also used to control which other users of the social network service are permitted to communicate content to the user. | 2011-01-06 |
20110004923 | METHOD AND SYSTEM FOR GENERATING USER GROUP IDENTIFIERS - A method and apparatus for generating user group identifiers using a permissions matrix is disclosed. The permissions matrix includes an entry that is associated with a row and a column of the permissions matrix. The row of the permissions matrix is indexed with a first role and the column of the permissions matrix is indexed with a second role. A data structure implementing such a method can include, for example, a user group identifier matrix. Alternatively, a method is disclosed in which the expiration of a user group identifier is detected. In such a case, the user group identifier is updated by accessing a user group identifier matrix. | 2011-01-06 |
20110004924 | CHALLENGE-RESPONSE SYSTEM AND METHOD - A content-based authorisation method is described, wherein the method is operable to validate that a user has access to certain content. By having access to the content, the system is able to decide that the user is authorised to access the content, and may perform operations or set access rights accordingly. | 2011-01-06 |
20110004925 | DATA PROCESSING WITH A POSTERIORI OR A PRIORI AUTHENTICATION - A method and apparatus are provided for processing data. The method includes a step of receiving, during a first communication session established with said server, a request formulated by a first user defining at least one processing operation to be executed on first data, and a step of executing said processing operation on said first data, during a second communication session established with said server after said first session for a second user. The step of executing is applied on condition that the second user has been authenticated via a strong authentication method during the second session and that a relationship between the first and second users has been verified. | 2011-01-06 |
20110004926 | Automatically Handling Proxy Server and Web Server Authentication - A mechanism is provided for automatically handling server authentication. Responsive to receiving a response to a synthetic transaction from a server, a determination is made as to whether the response contains an authentication challenge. If the response contains the authentication challenge, the response is parsed to identify one or more attributes associated with the authentication challenge. A determination is made as to whether one or more attributes associated with each realm in a set of realms stored in a realm list matches the one or more attributes associated with the authentication challenge. If there is a match, an authentication response to the authentication challenge is generated for the matched realm. The authentication response is then sent automatically to the server in order to authenticate the synthetic transaction. | 2011-01-06 |
20110004927 | SYSTEM, METHOD AND PROGRAM PRODUCT FOR MEMBERSHIP BASED INFORMATION/FUNCTIONS ACCESS OVER A NETWORK - A system, method and computer program product for membership based access over a network includes an external electronic community having a plurality of registered members. The external electronic community maintains a database of identities of the plurality of registered members. An electronic community has established at least one private area for registered members of the external electronic community and a connection with the external electronic community. Registered users of the electronic community request information access to the private area by supplying at least one unique identifier associated with a membership for membership verification and storage of the membership verification. The electronic community uses the connection to verify the unique identifier with the external electronic community. The registered users log into the electronic community. The electronic community uses information obtained during the logging to stored membership verification to enable information access to the private area. | 2011-01-06 |
20110004928 | PASSWORD INPUT SYSTEM USING ALPHANUMERIC MATRICES AND PASSWORD INPUT METHOD USING THE SAME - The present invention relates to a password input algorithm, more particularly to a password input system and method using alphanumeric matrices. An aspect of the invention can provide a password input system and method using alphanumeric matrices that can defend against keylogging attacks and shoulder surfing attacks by including a movable second alphanumeric matrix and a fixed first alphanumeric matrix and enabling a user to input a password by moving the password letters of the second alphanumeric matrix to the user-defined value of the first alphanumeric matrix. Another aspect of the invention can provide a password input system and method using alphanumeric matrices that can defend against shoulder surfing attacks by enabling a user to input a password by dividing the password by every two digits and moving the cross-points for the two digits, respectively, to the user-defined value of the first alphanumeric matrix. | 2011-01-06 |
20110004929 | Flexible Token For Use In Content Delivery - An embodiment of a system for managing delivery of content to end users includes a semantics generator configured to generate name/value pair semantics for name/value pairs that can be included in flexible tokens, a semantics publisher configured to publish the name/value pair semantics in a menu, wherein the name/value pair semantics are selectable, a flexible token interpreter configured to interpret name/value pairs included in flexible tokens according to the name/value pair semantics, the flexible token interpreter further configured to determine responses to content requests based on the name/value pairs included in flexible tokens, and an edge server configured to generate token-dependent responses to content requests based on determined responses from the flexible token interpreter. | 2011-01-06 |
20110004930 | GLOBAL NETWORK COMPUTERS - A computer that is configured for connection to a network including the Internet, including, but not limited to the following. A microchip including a microprocessor, the microprocessor including a master control unit and at least two processing units and wherein the master control unit is configured to control the processing units. The computer also includes a Faraday Cage substantially surrounding the microchip. The Microchip further includes a firewall being configured with hardware to make the master control unit inaccessible from the network including the Internet when the computer is connected to the network including the Internet. The fire wall is further configured in a manner that permits access by another computer in the network including the Internet to at least one of the processing units of the microprocessor for an operation with another computer when the computer is connected to the network including the Internet. | 2011-01-06 |
20110004931 | GLOBAL NETWORK COMPUTERS FOR SHARED PROCESSING - A computer configured for a connection to a network of computers including the Internet, comprising: a microchip including a microprocessor including a master control unit configured using hardware and firmware, and two processing units; an internal hardware firewall that is located between a protected portion and an unprotected portion of the microchip; said protected portion including said master control unit and one of the processing units, said unprotected portion including one or more of the processing units that are separate from and located outside of the internal hardware firewall; said hardware firewall denying access to said protected portion by the network; and said hardware firewall permitting access by another computer in the network to one or more of the processing units included in the unprotected portion for an operation with said another computer in the network; and an active configuration of a circuit integrated into the microchip. | 2011-01-06 |
20110004932 | Firewall for tunneled IPv6 traffic - A NAT device and method implemented on the device for filtering tunneled IPv6 traffic is disclosed. The method comprises: receiving an IP traffic stream at an ingress network interface to the NAT, performing deep packet inspection on the traffic stream to detect the tunneled IPv6 packets, and applying a filter to the IPv6 packets. | 2011-01-06 |
20110004933 | Context Sensitive Dynamic Authentication in A Cryptographic System - A system for performing authentication of a first user to a second user includes the ability for the first user to submit multiple instances of authentication data which are evaluated and then used to generate an overall level of confidence in the claimed identity of the first user. The individual authentication instances are evaluated based upon: the degree of match between the user provided by the first user during the authentication and the data provided by the first user during his enrollment; the inherent reliability of the authentication technique being used; the circumstances surrounding the generation of the authentication data by the first user; and the circumstances surrounding the generation of the enrollment data by the first user. This confidence level is compared with a required trust level which is based at least in part upon the requirements of the second user, and the authentication result is based upon this comparison. | 2011-01-06 |
20110004934 | Computer Access Educational Tools System - Computers are currently often used for entertainment when they have been primarily provided to the user—often a child—primarily for education or work use. This invention aims to build in a gateway that makes access to the computer conditional upon passing a test or demonstrating completion of prior tasks such as homework or assignments. | 2011-01-06 |
20110004935 | VMM-BASED INTRUSION DETECTION SYSTEM - An intrusion detection system collects architectural level events from a Virtual Machine Monitor where the collected events represent operation of a corresponding Virtual Machine. The events are consolidated into features that are compared with features from a known normal operating system. If an amount of any differences between the collected features and the normal features exceeds a threshold value, a compromised Virtual Machine may be indicated. The comparison thresholds are determined by training on normal and abnormal systems and analyzing the collected events with machine learning algorithms to arrive at a model of normal operation. | 2011-01-06 |
20110004936 | BOTNET EARLY DETECTION USING HYBRID HIDDEN MARKOV MODEL ALGORITHM - A botnet detection system is provided. A bursty feature extractor receives an Internet Relay Chat (IRC) packet value from a detection object network, and determines a bursty feature accordingly. A Hybrid Hidden Markov Model (HHMM) parameter estimator determines probability parameters for a Hybrid Hidden Markov Model according to the bursty feature. A traffic profile generator establishes a probability sequential model for the Hybrid Hidden Markov Model according to the probability parameters and pre-defined network traffic categories. A dubious state detector determines a traffic state corresponding to a network relaying the IRC packet in response to reception of a new IRC packet, determines whether the IRC packet flow of the object network is dubious by applying the bursty feature to the probability sequential model for the Hybrid Hidden Markov Model, and generates a warning signal when the IRC packet flow is regarded as having a dubious traffic state. | 2011-01-06 |
20110004937 | SYSTEMS AND METHODS FOR MANAGING A NETWORK - A method of managing a network. The method includes receiving an activation key transmitted from a device connected to the network, automatically transmitting a configuration to the device, automatically maintaining the configuration of the device, and receiving log information from the device. | 2011-01-06 |
20110004938 | Method and Apparatus for Erasure of Data from a Data Storage Device Located on a Vehicle - A method and system for destroying information stored on a data storage device located onboard a vehicle in order to prevent unfriendly forces from obtaining the information is described. The method and system are initiated when the operator of the vehicle activates a triggering mechanism. The information may be destroyed by physically damaging the data storage device on which the information is stored or by releasing a software virus into the device on which the sensitive information is stored. A software virus may also be transmitted to a computer of an unfriendly force attempting to access the sensitive information. | 2011-01-06 |
20110004939 | Obfuscating identity of a source entity affiliated with a communique in accordance with conditional directive provided by a receiving entity - A computationally implemented method includes, but is not limited to: receiving a first communiqué that is affiliated with a source entity and that is directed to a receiving entity; and transmitting to the receiving entity, in lieu of the first communiqué, a second communiqué that is provided in accordance with one or more conditional directives to conditionally obfuscate identity of the source entity, the one or more conditional directives provided by the receiving entity. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 2011-01-06 |
20110004940 | Obfuscating identity of a source entity affiliated with a communique in accordance with conditional directive provided by a receiving entity - A computationally implemented method includes, but is not limited to: receiving a first communiqué that is affiliated with a source entity and that is directed to a receiving entity; and transmitting to the receiving entity, in lieu of the first communiqué, a second communiqué that is provided in accordance with one or more conditional directives to conditionally obfuscate identity of the source entity, the one or more conditional directives provided by the receiving entity. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 2011-01-06 |
20110004941 | SYSTEM AND METHOD FOR PREVENTING ACCESS TO DATA ON A COMPROMISED REMOTE DEVICE - This invention discloses a system and method for selective erasure, encryption and or copying of data on a remote device if the remote device has been compromised or the level of authorization of a roaming user in charge of the remote device has been modified. | 2011-01-06 |
20110004942 | METHOD AND APPARATUSES FOR AUTHORISING PROVISION OF INDIRECTED CONTENT ASSOCIATED WITH A PRESENTITY OF A PRESENCE SERVICE - The invention provides a method of authorising provision of in-directed content to a user of an IPcommunications network. The in-directed content is associated with a presentity subscriber of a presence service, the presence service including authorisation rules regarding users to which the in-directed content may be provided. The in-directed content is stored at a content server that is not controlled by the presence service. The method includes receiving at an authorisation proxy in the network a request from the user to be provided with the in-directed content, and identifying the presentity subscriber associated with the requested in-directed content. The authorisation proxy retrieves the authorisation rules to verify that the user is authorised to receive the in-directed content. Subject to the verification, the in-directed content is provided from the content server the user. | 2011-01-06 |
20110004943 | Online personal library - A method and an apparatus for creating an online library by establishing an account for a user on a first server computer, allocating storage space for the user on the first computer, the receiving from a second server computer a document to be stored in the first server computer in the user's allocated storage space. The library is made accessible to selected groups of others by the user based on access criteria. The library holds documents, which can be modified by another person who is authorized to so modify, whereupon the modifications may be transmitted to or approved by a group of users. | 2011-01-06 |
20110004944 | METHODS AND SYSTEMS FOR FINGERPRINT-BASED COPYRIGHT PROTECTION OF REAL-TIME CONTENT - The present invention provides methods and systems for fingerprint-based copyright protection of real-time content. A first fingerprint is provided for content from a fingerprint ingesting device to a central server. The first fingerprint is associated with one or more business rules for the content at the central server. At least one of (a) a second fingerprint is provided for the content from a broadcast device to the central server, and (b) a third fingerprint is provided for the content from a receiving device to the central server. The first fingerprint is then compared with the at least one of the second and third fingerprints at the central server. One or more corresponding business rules may then be determined for the content based on the comparing. | 2011-01-06 |
20110004945 | DEVICE MANAGING APPARATUS, DEVICE MANAGING SYSTEM, AND RECORDING MEDIUM STORING A SOFTWARE MANAGEMENT PROGRAM - A device managing apparatus for managing software installed in at least one device includes a determination unit configured to determine whether a software item to be installed in the device requires license validation; a validation unit configured to perform a license validation operation on the software item for which the determination unit determines that license validation is required, depending on an available license for the software item; and a setting unit configured to set a license issued by the validation unit in the device in which the software item is installed. | 2011-01-06 |
20110004946 | TEXT-BASED COMMUNICATION CONTROL FOR PERSONAL COMMUNICATION DEVICES - Systems, devices, and methods are provided for enabling a user to control the content of text-based messages sent to or received from an administered device. In some embodiments, a message will be blocked (incoming or outgoing) if the message includes forbidden content. In other embodiments, the objectionable content is removed from the message prior to transmission or as part of the receiving process. The content of such a message is controlled by filtering the message based on defined criteria. The criteria may be defined according to a parental control application. These techniques also may be used, in accordance with instructional embodiments, to require the administered devices to include certain text in messages. These embodiments might, for example, require that a certain number of Spanish words per day be included in e-mails for a child learning Spanish. | 2011-01-06 |
20110004947 | COMPOSITIONS AND METHODS FOR OSTEOGENIC GENE THERAPY - The present disclosure provides compositions and methods for increasing bone growth and/or enhancing wound healing, for example, fracture repair. The disclosure provides recombinant nucleic acids useful for promoting bone growth. For example, the disclosure provides recombinant nucleic acids that encode a fibroblast growth factor-2 (FGF-2) analog. The disclosure also provides vectors and cells incorporating these nucleic acids, as well as FGF-2 analogs encode by them. The disclosure also provides a mouse system of bone marrow transplantation and methods for producing as well as methods for using the system. Methods for inducing division and/or inducing differentiation of a hematopoietic stem cell are also provided, as are methods for enhancing bone growth and/or wound repair (for example, fracture repair). | 2011-01-06 |
20110004948 | IMMUNOGLOBULIN 2 - The present invention relates to a method for the generation of single chain immunoglobulins in a mammal. In particular, the present invention relates to a method for the generation of single chain camelid VHH antibodies in a mammal which undergo the process of class-switching and affinity maturation found within antibody producing B cells. Single chain antibodies generated using the method of the present invention and the uses thereof are also described. | 2011-01-06 |
20110004949 | IMMUNOGLOBULIN 1 - The present invention relates to a method for the generation of single chain immunoglobulins in a mammal. In particular, the present invention relates to a method for the generation of single chain camelid VHH antibodies in a mammal which undergo the process of class-switching and affinity maturation found within antibody producing B cells. Single chain antibodies generated using the method of the present invention and the uses thereof are also described. | 2011-01-06 |
20110004950 | Method for Manufacturing Animal Model for Researching Pulmonary Tumor and Use Thereof - The present invention is a method for manufacturing an animal model for researching a pulmonary tumor and a use thereof. A transgenic non-human animal of the present invention is prepared by embryonic gene microinjection and possesses a tissue-specific expression of vascular endothelial growth factor A | 2011-01-06 |
20110004951 | METHODS AND COMPOSITIONS FOR IDENTIFYING COMPOUNDS THAT INHIBIT HIV-1 SUBUNIT-SPECIFIC REVERSE TRANSCRIPTASE - This invention relates to methods and compositions for identifying compounds that inhibit HIV-1 subunit-specific reverse transcriptase. | 2011-01-06 |
20110004952 | METHOD FOR THE SEPARATION OF CELLS - The invention relates to a cell containing a gene encoding a conditional transgenic surface marker that is detectable upon expression on the surface of the cell, wherein the gene encoding a conditional transgenic surface marker comprises: (i) a promoter, operably linked to (ii) a first transcription sequence, and (iii) a second transcription sequence encoding the surface marker, whereby the first transcription sequence prevents the transcription of the second transcription sequence, whereby the first transcription sequence is conditionally removable such that the second transcription sequence is transcribable, and whereby the surface marker renders the cell sortable through the detection of the conditional transgenic surface marker. Furthermore, the invention relates to a construct for generating such a cell, and to a method for separating such a cell from a population of cells. | 2011-01-06 |
20110004953 | Method Of Identifying A Compound For Preventing And/Or Treating An Autoimmune Disease - A method of identifying a compound for preventing and/or treating an autoimmune disease is described which comprises obtaining a (BTLA | 2011-01-06 |
20110004954 | Inbred Cucurbita Pepo Pumpkin HSPMR7B1 Having a Mutant Allele For Powdery Mildew Resistance - The present invention relates to a plant, seed, variety and hybrid of the inbred | 2011-01-06 |
20110004955 | Transgenic plants with enhanced agronomic traits - This invention provides transgenic plant cells with recombinant DNA for expression of proteins that are useful for imparting enhanced agronomic trait(s) to transgenic crop plants. This invention also provides transgenic plants and progeny seed comprising the transgenic plant cells where the plants are selected for having an enhanced trait selected from the group of traits consisting of enhanced water use efficiency, enhanced cold tolerance, increased yield, enhanced nitrogen use efficiency, enhanced seed protein and enhanced seed oil. Also disclosed are methods for manufacturing transgenic seed and plants with enhanced traits. | 2011-01-06 |
20110004956 | GENES FOR ENHANCING NITROGEN UTILIZATION EFFICIENCY IN CROP PLANTS - The invention provides isolated NUE (nitrogen utilization efficiency) nucleic acids and their encoded proteins. The present invention provides methods and compositions relating to altering nitrogen utilization and/or uptake in plants. The invention further provides recombinant expression cassettes, host cells and transgenic plants. | 2011-01-06 |
20110004957 | GENETICALLY MODIFIED REDUCED-BROWNING FRUIT-PRODUCING PLANT AND PRODUCED FRUIT THEREOF, AND METHOD OF OBTAINING SUCH - A genetically modified fruit-producing plant, said plant having sufficiently reduced total Polyphenol Oxidase (PPO) activity relative to a wild type of said plant to reduce browning in the fruit of said plant relative to said wild type, wherein the reduced total PPO activity results from a reduction in activity of at least two PPO isoenzymes in said plant relative to said wild type, or a cell, seed, seedling, part, tissue, cell, fruit or progeny of said plant. | 2011-01-06 |
20110004958 | COMPOSITIONS FOR SILENCING THE EXPRESSION OF GIBBERELLIN 2-OXIDASE AND USES THEREOF - The present invention provides an isolated nucleic acid sequence encoding gibberellin 2-oxidase enzyme (GA 2-oxidase) of | 2011-01-06 |
20110004959 | DOWN-REGULATION AND SILENCING OF ALLERGEN GENES IN TRANSGENIC PEANUT SEEDS - An allergen-free transgenic peanut seed is produced by recombinant methods. Peanut plants are transformed with multiple copies of each of the allergen genes, or fragments thereof, to suppress gene expression and allergen protein production. Alternatively, peanut plants are transformed with peanut allergen antisense genes introduced into the peanut genome as antisense fragments, sense fragments, or combinations of both antisense and sense fragments. Peanut transgenes are under the control of the 35S promoter, or the promoter of the Ara h2 gene to produce antisense RNAs, sense RNAs, and double-stranded RNAs for suppressing allergen protein production in peanut plants. A full length genomic clone for allergen Ara h2 is isolated and sequenced. The ORF is 622 nucleotides long. The predicted encoded protein is 207 amino acids long and includes a putative transit peptide of 21 residues. One polyadenilation signal is identified at position 951. Six additional stop codons are observed. A promoter region was revealed containing a putative TATA box located at position −72. Homologous regions were identified between Ara h2, h6, and h7, and between Ara h3 and h4, and between Ara h1P41B and Ara h1P17. The homologous regions will be used for the screening of peanut genomic library to isolate all peanut allergen genes and for down-regulation and silencing of multiple peanut allergen genes. | 2011-01-06 |
20110004960 | Methods and Compositions for Increasing the Nitrogen Storage Capacity of a Plant - The present invention provides methods and compositions for making and using transgenic plants that exhibit increased nitrogen storage capacity compared to wild-type plants. Methods of the invention comprise inducing overexpression of monocot-derived vegetative storage proteins (VSPs) in plants, particularly in monocots. In some embodiments, at least one nucleotide construct comprising a nucleotide sequence encoding the ZmLox6 protein or a biologically active fragment or variant thereof is introduced into a plant. Depending upon the objective, the nucleotide construct may optionally comprise an operably linked coding sequence for a vacuolar sorting signal or plastid transit peptide in order to direct storage of the ZmLox6 protein or biologically active fragment or variant thereof into the vacuolar compartment or plastid compartment, respectively, of the cells in which the VSP is expressed. The invention further provides methods for producing plants with increased nitrogen content and/or increased nutritional value, which is desirable in commercial crops, including those used for forage, silage, and grain production. | 2011-01-06 |
20110004961 | Plant glutamine phenylpyruvate transaminase gene and transgenic plants carrying same - The invention relates to transgenic plants exhibiting enhanced growth rates, seed and fruit yields, and overall biomass yields, as well as methods for generating growth-enhanced transgenic plants. In one embodiment, transgenic plants engineered to over-express glutamine phenylpyruvate transaminase (GPT) are provided. | 2011-01-06 |
20110004962 | METHODS OF CONTROLLING PLANT SEE AND ORGAN SIZE - This invention relates to the identification of a regulator protein (termed DA) which controls the size of plant seeds and organs in | 2011-01-06 |
20110004963 | Plants Having Increased Yield-Related Traits And A Method For Making The Same - The present invention relates generally to the field of molecular biology and concerns a method for increasing various plant yield-related traits by increasing expression in a plant of a nucleic acid sequence encoding an | 2011-01-06 |
20110004964 | INSECTICIDAL PROTEINS DERIVED FROM BACILLUS THURINGIENSIS - The present invention relates to the field of plant pest control, particularly insect control. Provided are nucleotide sequences from | 2011-01-06 |
20110004965 | COMPOSITIONS AND METHODS FOR MODULATION OF PLANT CELL DIVISION - The present invention provides compositions and methods for modulating cell division in plants. In particular, the present invention provides polynucleotides that encode REVOLUTA. In addition, REVOLUTA vectors and transformed plants are provided wherein plant cell division is modulated by expression of a REVOLUTA transgene as compared to a control population of untransformed plants. The present invention also provides methods for the isolation and identification of REVOLUTA genes from higher plants. | 2011-01-06 |
20110004966 | DRY BLENDING AID - A method of monitoring and evaluating the dry-blending of powders and granular materials via the use of non-dissolvable particulate matter such as mustard seed as a blending aid. The mustard seed is blended into the total batch of dry blend materials and the mustard send can subsequently be extracted by a process of sieving from a known volume of sample taken of the mixture since the mustard seed is larger than the other particles that are being blended. The weight and or sight count of the extracted mustard seed present in the sample is determined and compared with the amount of seed that should be present in a perfect blend to determine if the dry blend materials are thoroughly mixed. | 2011-01-06 |
20110004967 | BAND EXCITATION METHOD APPLICABLE TO SCANNING PROBE MICROSCOPY - Methods and apparatus are described for scanning probe microscopy. A method includes generating a band excitation (BE) signal having finite and predefined amplitude and phase spectrum in at least a first predefined frequency band; exciting a probe using the band excitation signal; obtaining data by measuring a response of the probe in at least a second predefined frequency band; and extracting at least one relevant dynamic parameter of the response of the probe in a predefined range including analyzing the obtained data. The BE signal can be synthesized prior to imaging (static band excitation), or adjusted at each pixel or spectroscopy step to accommodate changes in sample properties (adaptive band excitation). An apparatus includes a band excitation signal generator; a probe coupled to the band excitation signal generator; a detector coupled to the probe; and a relevant dynamic parameter extractor component coupled to the detector, the relevant dynamic parameter extractor including a processor that performs a mathematical transform selected from the group consisting of an integral transform and a discrete transform. | 2011-01-06 |