03rd week of 2014 patent applcation highlights part 67 |
Patent application number | Title | Published |
20140020086 | VIRTUAL MACHINE SYSTEM, CONFIDENTIAL INFORMATION PROTECTION METHOD, AND CONFIDENTIAL INFORMATION PROTECTION PROGRAM - A virtual machine system that restricts use of confidential information only to the case where an authentication has resulted in success. The virtual machine system includes first virtual machine, second virtual machine, and hypervisor. The first virtual machine includes: storage unit storing confidential information; and authentication unit configured to perform authentication and notify the hypervisor of result of the authentication. The second virtual machine uses virtual device that is virtualized storage device. When having received authentication result indicating authentication success from the authentication unit, the hypervisor enables the second virtual machine to access, as substance of the virtual device, storage area storing the confidential information, and when not having received the authentication result indicating the authentication success from the authentication unit, the hypervisor disables the second virtual machine from accessing the storage area storing the confidential information. | 2014-01-16 |
20140020087 | SENSORY ASSOCIATION PASSCODE - A device is secured against unauthorized use with a passcode based on a sensory association of a visual item with one or both of a sound clip and a tactile pattern. The sensory association passcode is encoded from one or more frames containing a user-selected combination of the visual item with the sound clip and/or the tactile pattern. The sensory association passcode can be further encoded with a sequence that indicates an order of the one or more frames of the passcode. Users can retrieve a portion of the sensory association passcode to facilitate recall of a forgotten passcode. The user-selected combination of the visual item with the sound clip and/or the tactile pattern facilitates easier recall of a passcode than might be possible with conventional passcode techniques. | 2014-01-16 |
20140020088 | AURAL CUING PATTERN BASED MOBILE DEVICE SECURITY - When visual focus on a mobile device is limited, aural cues can be used to aid in entering a pattern based access code. The mobile device displays a plurality of positions from which an access code for accessing a mobile device can be selected. Indications of a set of positions of the plurality of positions in a sequence are received. The sequence of the set of the positions form an access code. For at least the first of the set of positions, an aural cue associated with the first position is determined, and the aural cue is emitted to indicate the first position based on the aural cue. It is determined whether the access code is correct. Access to the mobile device is allowed if the access code is correct. | 2014-01-16 |
20140020089 | Access Control System using Stimulus Evoked Cognitive Response - The ACSSECR invention is a biometric access control system and methodology that measures cognitive, psychophysiological responses to stimuli to confirm the identity of an individual. As an alternative to “Logging in” with a user ID and password, this cognitive biometric authentication system is used for “Cogging in” to a system with user ID and user-selected “Cogkey”. ACSSECR is designed for strict access control scenarios where significant authentication confidence is required to gain access to controlled information, facilities, systems, vehicles, or devices. The system takes advantage of a behavioral and physiological characteristic of humans that is an unconscious response to a stimulus. The Event Related Potential (ERP) response (specifically the P3 ERP) involuntarily occurs when an individual perceives and reacts to an unexpected, task-relevant event. The task is for the user to recognize their Cogkey which is presented infrequently amidst more frequent non-target stimuli. There is no requirement for extensive enrollment by users, only the recognition of their Cogkey. The basic system does not store biometric data for comparison, but rather measures the user's Cogkey recognition responses in comparison to non-Cogkey stimulus responses. An individual can have multiple personas with different Cog keys. | 2014-01-16 |
20140020090 | BIOMETRIC AUTHENTICATION SYSTEM, BIOMETRIC AUTHENTICATION METHOD, AND RECORDING MEDIUM - A biometric authentication system ( | 2014-01-16 |
20140020091 | LOGIN METHOD BASED ON DIRECTION OF GAZE - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. A plurality of objects is displayed on a display screen. The plurality of objects includes at least objects that make up a plurality of objects of the user's passcode. In response to a trigger signal an image of the user's face is captured while looking at one of the objects on the display screen. A determination of which object is in the direction of the user's gaze is made from the image and whether or not the gaze is on an object which is part of the passcode. A plurality of trigger signals may be generated to capture a plurality of images. | 2014-01-16 |
20140020092 | Mitigation of function pointer overwrite attacks - Methods are disclosed for improving security of computer software and preventing potential attackers from gaining control of computer software via function pointer overwrite attacks. One or more additional layers of complexity may be imposed that would have to be circumvented in order to gain execution control over portions of software. One or more function pointers can be encoded using a value that may be generated on program initialization and decoded before any dynamic function call occurs. In the event of memory corruption that affects an encoded function pointer, the value will cause the destination of the function pointer to decode to an invalid and random address and will induce an error. An application may be prevented from calling an attacker corrupted function pointer by introducing various checks around the call point at compile time that check the validity of the destination to which the function pointer points. | 2014-01-16 |
20140020093 | PRESERVING WEB DOCUMENT INTEGRITY THROUGH WEB TEMPLATE LEARNING - The embodiments provide a runtime validation apparatus including a runtime interceptor configured to intercept a server request for a requested web resource and a response including response data, and an output validation policy identifier configured to identify an output validation policy from a database storing a plurality of output validation policies based on the requested web resource. The identified output validation policy may represent a template that encompasses allowed responses for the requested web resource. The runtime validation apparatus may further include a validation evaluator configured to compare the response data with the template, and a validation controller configured to permit the response to be transmitted if the response data complies with the template and block the response if at least a portion of the response data does not comply with the template. | 2014-01-16 |
20140020094 | COMPUTING ENVIRONMENT SECURITY METHOD AND ELECTRONIC COMPUTING SYSTEM - A computing environment security method is provided. The method includes: a) dissolving an application package to be tested to obtain at least one data set, wherein each data set corresponds to contents with respect to one of a plurality of aspects of the application package; and b) evaluating whether the application package is a repackaged application according to the at least one data set. Step (b) includes: c) for each data set, analyzing a characteristic relationship of the contents with respect to the aspect corresponding to the data set to accordingly generate characteristic data for the data set; and d) determining whether the application package to be tested is a repackaged application package according to the characteristic data of the at least one data set and a search result obtained from a database, wherein the search result corresponds to the characteristic data within a corresponding distance. | 2014-01-16 |
20140020095 | DATA PROCESSING DEVICE AND A SECURE MEMORY DEVICE INCLUDING THE SAME - A data processing device includes a first register unit, a second register unit and a data handling unit. The first register unit generates an address signal based on a first control signal. The address signal points to a region in an external storage device where first data is stored. The second register unit receives the first data output from the external storage device, generates second data based on the first data and a second control signal, and selectively generates a detectable error in the second data according to an operating mode when a fault is injected into the first data. A bit number of the detectable error in the second data is larger than a bit number of the fault injected into the first data. The data handling unit selectively processes the second data depending on whether the detectable error is generated. | 2014-01-16 |
20140020096 | SYSTEM TO PROFILE APPLICATION SOFTWARE - In an example, a system is provided, the system including mobile device having an instance of a operating system installed thereon and a remote device coupled to the mobile device via a network, the remote device having an instrumented instance of the same operating system installed thereon. The remote device may be configured to install an instance of a new application on the remote device responsive to receiving a signal that originates from the mobile device and is indicative of the new application on the mobile device. The remote device may be configured to run the installed instance and determine whether the remote device performed any operations included in a preset list of operations. | 2014-01-16 |
20140020097 | METHOD OF DETECTING FAULT ATTACK - In a method of detecting a fault attack in a secure memory device, payload data is initialized by determining whether the payload data is consistent. The payload data is stored in a plurality of ephemeral registers included in the secure memory device. A count value included in the payload data is increased by detecting whether a fault is injected in the secure memory device from outside, during a processing operation of secure data, stored in the secure memory device. It is determined whether the fault injected in the secure memory device from the outside is caused by the fault attack based on the count value and a threshold value. | 2014-01-16 |
20140020098 | Method and Vehicle-to-X Communication System for Selectively Checking Data Security Sequences of Received Vehicle-to-X Messages - A method for selectively checking data security sequences of received vehicle-to-X messages, in which a number of the vehicle-to-X messages are received and/or sent in an operating cycle of a vehicle-to-X communication system. In an operating cycle, a reliability assessment of the received vehicle-to-X message is performed by checking the data security sequence, an information content of the received messages is read without prior checking of the data security sequence. In the operating cycle, a subset of the number of received vehicle-to-X messages is selected on the basis of the information contents, and solely the data security sequences of selected vehicle-to-X messages are checked. This results in the advantage that a reliability assessment is no longer carried out on all the received vehicle-to-X messages before they are processed, thereby enabling a reduction in the checking capacity that must be reserved for checking the data security sequence. | 2014-01-16 |
20140020099 | SYSTEM AND METHOD FOR CREATING BGP ROUTE-BASED NETWORK TRAFFIC PROFILES TO DETECT SPOOFED TRAFFIC - An inventive system and method for creating source profiles to detect spoofed traffic comprises obtaining a routing path for data to traverse nodes using traffic profiles, each routing path comprising at least a target AS, initializing one or more AS sets with last hop ASes, enhancing the AS sets by connecting the AS sets to routers, for each enhanced AS set, filtering observed traffic flows, and using the filtered flows to associate enhanced AS sets with network monitoring points to create the source profiles. In one aspect, filtering flows comprise TCP session filtering and/or destination bogon filtering. In one aspect, the routers are border gateway protocol routers. In one aspect, the last hop ASes are one hop away from the target AS. | 2014-01-16 |
20140020100 | DETECTING NETWORK ANOMALY - A method for detecting an anomaly in a network can include combining a number of data-created sketch-sets and requesting a finer sketch-set for an identified sketch-set among the combined number of sketch-sets using an aggregator, and creating the finer sketch-set for the identified sketch-set to detect the anomaly in the network using a monitor. | 2014-01-16 |
20140020101 | TRUSTED ZONE PROTECTION - A trusted zone protector in exemplary embodiments of an electronic system helps reduce unwanted attempts to use a consumer machine in a trusted zone to address a network resource that lies inside the trusted zone on behalf of a website that lies outside of the trusted zone. An address manager in the electronic system is arranged to provide an indication whether an element retrieved by a network-enabled application executing on the consumer machine is arranged to address a network resource that lies inside the trusted zone. The trusted zone protector is arranged to generate a protective action in response to the indication that the element retrieved by the network-enabled application is arranged to address the network resource that lies inside the trusted zone. | 2014-01-16 |
20140020102 | INTEGRATED NETWORK ARCHITECTURE - An integrated network architecture can provide information centric and Internet Protocol processing. The integrated network architecture can comprise a packet core that supports packet processing for information centric network packets and Internet Protocol packets, a service core that comprises services supporting a plurality of different operation modes that can be enabled and disabled independently (including an access operation mode, an edge operation mode, a core operation mode, and a proxy operation mode), a client management service that supports network client mobility between network devices, and/or a cache management service that supports cache lookup and cache update services. | 2014-01-16 |
20140020103 | System and Method of Opportunistically Protecting a Computer from Malware - The present invention provides a system, method, and computer-readable medium that opportunistically install a software update on a computer that closes a vulnerability that existed on the computer. In accordance with one aspect of the present invention, when antivirus software on a computer identifies malware, a method causes a software update that closes the vulnerability exploited by the malware to be installed on the computer. The method includes identifying the vulnerability exploited by the malware, using a software update system to obtain a software update that is configured to close the vulnerability; and causing the software update to be installed on the computer where the vulnerability exists. | 2014-01-16 |
20140020104 | System and Method of Opportunistically Protecting a Computer from Malware - The present invention provides a system, method, and computer-readable medium that opportunistically install a software update on a computer that closes a vulnerability that existed on the computer. In accordance with one aspect of the present invention, when antivirus software on a computer identifies malware, a method causes a software update that closes the vulnerability exploited by the malware to be installed on the computer. The method includes identifying the vulnerability exploited by the malware, using a software update system to obtain a software update that is configured to close the vulnerability; and causing the software update to be installed on the computer where the vulnerability exists. | 2014-01-16 |
20140020105 | Distributing Software Images with Mixed Licensing - A system, method, and computer-readable medium are disclosed for managing the licensing of digital assets associated with a system image. A system image is processed to identify digital asset identification information, which in turn is processed to determine whether its associated digital asset is available for licensing from a system manufacturer. If the digital asset could not be identified, or if it is unavailable for licensing from the system manufacturer, then it is marked as “custom.” Otherwise, it is marked as “available” and presented to a system purchaser. Any digital assets that the system purchaser elects to license are marked as “license” and all other digital assets are marked as “custom.” Digital assets marked as “license” are then licensed from the system manufacturer. Both licensed and “custom” digital assets are installed and their corresponding licenses are applied to the system image, which in turn is applied to the target system. | 2014-01-16 |
20140020106 | LINK ANALYSIS TOOL FOR SECURITY INFORMATION HANDLING SYSTEM - A security information handling system (IHS) receives a request to navigate to a webpage, such as a link, from a user IHS. A security IHS link analysis tool analyzes the link and determines if the link contains sensitive content. The security IHS link analysis tool transmits a network selection message to the user IHS indicating which network the user IHS should utilize based upon the content of the link. | 2014-01-16 |
20140020107 | DYNAMIC LICENSING - Dynamic licensing improves the utilization of licenses available within a computer network. License sinks, such as gateways, within a computer network may request licenses from a license source. The license source may be provisioned with a number of licenses from a secure fob plugged into the license source. If the license source has the number of licenses requested from the license sink, the license source may assign the licenses to the license sink. After a certain period of time, the license sink may renew the licenses or let the licenses return to the license source to be assigned to another license sink. The license requests may be passed through the network, including through a proxy and/or a relay, to a license server provisioned with licenses. Dynamic licensing software may execute as a service on each of the license sources and license sinks to pass dynamic licensing messages between devices. | 2014-01-16 |
20140020108 | SAFETY PROTOCOLS FOR MESSAGING SERVICE-ENABLED CLOUD SERVICES - In one embodiment, a cloud service interface | 2014-01-16 |
20140020109 | FILE MANIFEST FILTER FOR UNIDIRECTIONAL TRANSFER OF FILES - A manifest transfer engine for a one-way file transfer system is disclosed. The manifest transfer engine comprises a send side, a receive side, and a one-way data link enforcing unidirectional data flow from the send side to the receive side. The send side receives and stores a file manifest table from an administrator server. The send side also receives a file from a user and compares it with the file manifest table. Transfer of the file to the receive side via the one-way data link is allowed only when there is a match between the file and the file manifest table. In an alternative embodiment, the receive side instead receives and stores the file manifest table from the administrator server and compares it with the file received from the send side via the one-way data link to determine whether to allow transfer of the file. | 2014-01-16 |
20140020110 | LINK ANALYSIS TOOL FOR SECURITY INFORMATION HANDLING SYSTEM - A security information handling system (IHS) receives a request to navigate to a webpage, such as a link, from a user IHS. A security IHS link analysis tool analyzes the link and determines if the link contains sensitive content. The security IHS link analysis tool transmits a network selection message to the user IHS indicating which network the user IHS should utilize based upon the content of the link. | 2014-01-16 |
20140020111 | Signaling and Handling Content Encryption and Rights Management in Content Transport and Delivery - An apparatus comprising a memory, a processor coupled to the memory and configured to obtain a protection description for media content comprising a plurality of content items, wherein the protection description comprises data signaling at least two protection mechanisms for at least two content items in a media content, wherein each of the at least two content items is protected by one or more of the at least two protection mechanisms, and wherein the protection mechanisms for the at least two content items are different, determine the protection mechanisms for the at least two content items from the data, and process the at least two content items according to their associated protection mechanisms. | 2014-01-16 |
20140020112 | Method of Securing Memory Against Malicious Attack - A method and system for secure dynamic memory management using heap memory, or analogous dynamic memory allocation, that includes initializing a heap memory segment, having a plurality of buffers, within a random access memory. When an allocation request to store data in the heap memory segment is received, one of the buffers is randomly selected. Metadata, containing details of allocated and unallocated buffers of the heap memory segment, is then maintained in a portion of the memory separate from the heap object. According to certain embodiments, the secure heap of the present disclosure can securely implement the functions of those portions of the C/C++ stdlib library related to dynamic memory management, specifically malloc ( ) free ( ) and their variants. | 2014-01-16 |
20140020113 | Mechanism to Synchronize Clients in a Digital Rights Management Environment - Disclosed are embodiments for determining where a license period for consuming content is expired. An exemplary embodiment involves receiving content for consumption on a client device, the content being associated with a license agreement defining a license period for consumption and determining whether the license period has expired based at least in part on a current time received from a server, the server being separate from the client device. The embodiment then involves terminating access to the content based on a determination that the license period has expired. | 2014-01-16 |
20140020114 | METHODS AND APPARATUSES FOR INTEGRATING A PORTION OF SECURE ELEMENT COMPONENTS ON A SYSTEM ON CHIP - A method, an apparatus, and a computer program product for wireless communication are provided in connection with providing efficient SE functionality. In one example, a communications device includes a SE which includes a processor, RAM, and NVM, and secured and unsecured components. The SE may be equipped to receive a request to access a function that is accessible through information stored in the SE, retrieve a first portion of the information associated with the function that is stored in the secured component, obtain a second portion of the information associated with the function that is stored in the unsecured component, and facilitate access to the function using the first retrieved portion of the information to enable access to the second obtained portion of the information. In an aspect, the secured component may include the processor and the RAM, and the unsecured component may include substantially all of the NVM. | 2014-01-16 |
20140020115 | Social Sharing of Multilayered Document - A method for sharing multilayered electronic content among users of a social network within a digital education platform is provided. In one embodiment, the digital education platform allows a user to create user-generated content associated with a multilayered document and share the content with other users in an education social network. The user can specify which users to share the user-generated content and assign an access right to each of those users that may access the user-generated content. When the digital education platform receives a request to access the user-generated content from a certain user, an access right associated with that user for the user-generated content is determined and access is granted according to the access right. | 2014-01-16 |
20140020116 | BLOCKING OF UNLICENSED AUDIO CONTENT IN VIDEO FILES ON A VIDEO HOSTING WEBSITE - A system, method and various software tools enable a video hosting website to automatically identified unlicensed audio content in video files uploaded by users, and initiate a process by which the user can replace the unlicensed content with licensed audio content. An audio replacement tool is provided that enables the user to permanently mute the original, unlicensed audio content of a video file, or select a licensed audio file from a collection of licensed audio, and insert the selected in place of the original audio. Where a video file includes unlicensed audio, the video hosting website provides access to video files to a client device, along with an indication to the client device to mute the audio during playback of the video. | 2014-01-16 |
20140020117 | SERVER, RECORDING MEDIUM, AND IMAGE DISPLAY SYSTEM - A server connectable to an apparatus providing contents and an image display apparatus includes an index information processing part configured to provide the image display apparatus with index information for causing a list of information items associated with the contents to be displayed by the image display apparatus, an image data processing part configured to provide the image display apparatus with image data for causing a content associated with an information item selected from the list to be displayed by the image display apparatus, and an apparatus authentication part configured to cause the index information processing part and the image data processing part to execute respective processes when the identification information of the image display apparatus that has requested to obtain the content associated with the selected information item by using access authority information regarding authority to access the content is managed in correlation with the access authority information. | 2014-01-16 |
20140020118 | Authorization Method and Terminal Device - Embodiments of the present invention provide an authorization method and a terminal device. A terminal device receives a right application request from a control device having no access right. The terminal device notifies a control device having an administrator right to assign a right to the control device having no access right. The terminal device receives a right assignment command from the control device having an administrator right and assigning a right to the control device having no access right. | 2014-01-16 |
20140020119 | SYSTEM AND METHOD FOR DETECTING ACTIVE STREAMS USING A HEARTBEAT AND SECURE STOP MECHANISM - One embodiment of the present invention sets forth a technique for identifying active streaming connections associated with a particular user account. Each active streaming connection transmits heartbeat packets periodically to a server that tracks the receipt of the heartbeat packets. If, for a particular streaming connection, the server stops receiving heartbeat packets, then the server is able to infer that the streaming connection has been terminated. | 2014-01-16 |
20140020120 | SYSTEM AND METHOD FOR ACCESS CONTROL FOR DATA OF HETEROGENEOUS ORIGIN - Systems and methods are provided for controlling access to data of heterogeneous origin. A system creates combined access rights from access rights and other access rights for combined data that includes data and other data. The system receives a request to access data that is part of the combined data. The system determines whether to provide access to at least part of the data based on access rights that are part of the combined access rights. The system provides access to at least part of the data in response to a determination to provide access to at least part of the data based on the access rights that are part of the combined access rights. | 2014-01-16 |
20140020121 | ALWAYS-AVAILABLE EMBEDDED THEFT REACTION SUBSYSTEM - A platform including a security system is described. The security system comprises, in one embodiment, a multi-state system having a plurality of modes, available whenever the platform has a source of power. The modes comprise an unarmed mode, in which the security system is not protecting the platform, an armed mode, in which the platform is protected, the armed mode reached from the unarmed mode, after an arming command, and a suspecting mode, in which the platform is suspecting theft, the suspecting mode reached from the armed mode, when a risk behavior is detected. | 2014-01-16 |
20140020122 | ALWAYS-AVAILABLE EMBEDDED THEFT REACTION SUBSYSTEM - A platform including an always-available theft protection system is described. In one embodiment, the system comprises an arming logic to arm the platform, when an arming command is received, a risk behavior logic to detect a potential problem when the platform is armed, and a core logic component to provide logic to analyze the potential problem, and to move the platform to a suspecting mode, when the potential problem indicates a theft suspicion. The system, in one embodiment, further comprises configuration logic to configure settings for the system when the platform is in an unarmed mode, the configuration logic including a user logic enabling an authorized user to alter settings and an administrator logic enabling an administrator to alter the settings using an authenticated set request. | 2014-01-16 |
20140020123 | ALWAYS-AVAILABLE EMBEDDED THEFT REACTION SUBSYSTEM - A platform protected by an always-available security system to protect against platform loss and platform theft is described. The system comprises, in one embodiment, a pairing logic to pair the platform with an other device, the other device reached via a network connection, an interface to detect when the proximity to the other device is lost. The system further comprises, in one embodiment, the arming logic to arm the platform in response to the loss of proximity, and move the system to an armed mode, and a core logic to evaluate the risk behavior and determine whether a security action logic should take a security action. | 2014-01-16 |
20140020124 | Methods of Modifying Eukaryotic Cells - A method for engineering and utilizing large DNA vectors to target, via homologous recombination, and modify, in any desirable fashion, endogenous genes and chromosomal loci in eukaryotic cells. These large DNA targeting vectors for eukaryotic cells, termed LTVECs, are derived from fragments of cloned genomic DNA larger than those typically used by other approaches intended to perform homologous targeting in eukaryotic cells. Also provided is a rapid and convenient method of detecting eukaryotic cells in which the LTVEC has correctly targeted and modified the desired endogenous gene(s) or chromosomal locus (loci) as well as the use of these cells to generate organisms bearing the genetic modification. | 2014-01-16 |
20140020125 | Methods of Modifying Eukaryotic Cells - A method for engineering and utilizing large DNA vectors to target, via homologous recombination, and modify, in any desirable fashion, endogenous genes and chromosomal loci in eukaryotic cells. These large DNA targeting vectors for eukaryotic cells, termed LTVECs, are derived from fragments of cloned genomic DNA larger than those typically used by other approaches intended to perform homologous targeting in eukaryotic cells. Also provided is a rapid and convenient method of detecting eukaryotic cells in which the LTVEC has correctly targeted and modified the desired endogenous gene(s) or chromosomal locus (loci) as well as the use of these cells to generate organisms bearing the genetic modification. | 2014-01-16 |
20140020126 | MIRNA EXPRESSION VECTOR - A miRNA expression vector including SEQ ID NO. 11. The vector is capable of improving the fertility of animals by inhibiting the expression of inhibin. | 2014-01-16 |
20140020127 | DUAL PURPOSE POLLENIZER WATERMELONS - The application relates to the field of plant breeding, in particular watermelon breeding. Provided are diploid watermelon plants (and seeds from which these plants can be grown) which produce small, diploid, red watermelon fruits. Also provided are small, diploid watermelon fruits having an average weight of less than 1.8 kg. | 2014-01-16 |
20140020128 | MOLECULAR MARKERS FOR VARIOUS TRAITS IN WHEAT AND METHODS OF USE - This disclosure relates to methods of identifying and/or selecting wheat plants or germplasm by detecting markers associated with flowering date, anther-extrusion, heading date and/or | 2014-01-16 |
20140020129 | LETTUCE VARIETY 41-137 RZ, "DELIBES RZ" - The present invention relates to a | 2014-01-16 |
20140020130 | csRRM2 GENE AND ITS USE FOR IMPROVING TRAITS IN INDUSTRIAL CROPS - The present invention clones the second RNA recognition motif (RRM2) gene of FCA-γ gene in | 2014-01-16 |
20140020131 | METHODS AND COMPOSITIONS FOR PRODUCING MALE STERILE PLANTS - Methods of making a targeted modification in a male fertility gene in the genome of a plant are disclosed. The methods involve contacting a plant cell with an engineered double-strand-break-inducing agent capable of inducing a double-strand break in a target sequence in the male fertility gene and identifying a cell comprising an alteration in the target sequence. Also disclosed are plants, plant cells, plant parts, and seeds comprising a male fertility gene with an alteration in a male fertility gene. Nucleic acid molecules comprising male fertility genes with at least one targeted modification therein, optimized nucleic acid molecules encoding endonucleases that are engineered double-strand-break-inducing agents and expression cassettes, host cells, and plants comprising one or more of the nucleic acid molecules are further disclosed. | 2014-01-16 |
20140020132 | PLANTS HAVING INCREASED DESICCATION TOLERANCE, INCREASED DROUGHT TOLERANCE OR INCREASED WATER USE EFFICIENCY - A transgenic plant engineered to have increased desiccation tolerance, increased drought tolerance or increased water use efficiency, the plant transformed with an artificial DNA construct comprising a transcribable nucleic acid molecule encoding a polypeptide requiring both ABA and ABI3 to influence desiccation tolerance. Also provided are DNA constructs and methods of producing a transgenic plant engineered to have increased desiccation tolerance, increased drought tolerance or increased water use efficiency. | 2014-01-16 |
20140020133 | Genetically Engineered Plants with Increased Vegetative Oil Content - The invention relates to genetically modified agricultural plants with increased oil content in vegetative tissues, as well as to expression systems, plant cells, seeds and vegetative tissues related thereto. | 2014-01-16 |
20140020134 | FRUIT-SPECIFIC PROMOTER - The present invention relates to a fruit-specific promoter, which is suitable for the expression in a broader range of developmental stages of a fruit. Provided is a fruit-specific promoter DNA, which consists of a nucleotide sequence having 85% or more identity with the nucleotide sequence as shown in SEQ ID NO: 1 or 2 and has promoter activity in mature-green fruits. | 2014-01-16 |
20140020135 | Novel Use of a Dense and Erect Panicle 1 Gene in Improving Nitrogen Utilization Efficiency - The present invention provides methods of increasing nitrogen utilization efficiency (NUE) in a transgenic plant comprising the introduction of a nucleic acid encoding a dep1 polypeptide into a plant to produce a transgenic plant that expresses the nucleic acid to produce the dep1 polypeptide, thereby resulting in an increased NUE as compared with a control plant. Also provided are methods of increasing NUE in a plant comprising reducing the amount and/or activity of a DEP1 polypeptide. | 2014-01-16 |
20140020136 | SERRATIA PLYMUTHICA FOR BIOLOGICAL CONTROL OF BACTERIAL PLANT PATHOGENS - strain A30, BCCM Deposit No. LMG P-26170, its analogues or functionally equivalent strains thereto, provides a biological control agent against plant disease caused by a bacterial pathogen, particularly a soft rot, e.g. blackleg. The pathogen is | 2014-01-16 |
20140020137 | METHOD FOR UTILIZING MONOTERPENE GLYCOSYLTRANSFERASE - The object of the present invention is to provide a novel method for producing a terpene 8-glycoside. | 2014-01-16 |
20140020138 | TRANSGENIC PLANTS EXPRESSING DISPERSINB - Methods and compositions for producing genetically transformed plants exhibiting antibiofilm activity against bacterial pathogens are disclosed. Bacterial cells and plant transformation vectors include dspB genes encoding DispersinB antibiofilm enzymes of Aggregatibacter actinomycetemcomitans. | 2014-01-16 |
20140020139 | DUAL PURPOSE POLLENIZER WATERMELONS - The application relates to the field of plant breeding, in particular watermelon breeding. Provided are diploid watermelon plants (and seeds from which these plants can be grown) which produce small, diploid, red watermelon fruits. Also provided are small, diploid watermelon fruits having an average weight of less than 1.8 kg. | 2014-01-16 |
20140020140 | MULTI-HEAD PROBE AND MANUFACTURING AND SCANNING METHODS THEREOF - A multi-head probe suitable for an atomic force microscopy (AFM) comprises a tip base, a single cantilever beam and at least two tips. The tip base has a tip end, which is ground to form a surface. The cantilever beam is connected to the tip base and for supporting the tip base. The at least two tips are disposed on the surface. | 2014-01-16 |
20140020141 | MODE-SYNTHESIZING ATOMIC FORCE MICROSCOPY AND MODE-SYNTHESIZING SENSING - A method of analyzing a sample that includes applying a first set of energies at a first set of frequencies to a sample and applying, simultaneously with the applying the first set of energies, a second set of energies at a second set of frequencies, wherein the first set of energies and the second set of energies form a multi-mode coupling. The method further includes detecting an effect of the multi-mode coupling. | 2014-01-16 |
20140020142 | Avocado tree named 'Eugenin' - The ‘Eugenin’ avocado variety is notable for its larger fruit size than that of the ‘Hass’ variety. | 2014-01-16 |
20140020143 | Strawberry plant named 'MARISOL' - A new and distinct short-day strawberry cultivar is provided. Attractive semi-early ripening bright red primarily conical fruit having a firm flesh is formed in good yields. Additionally, some fruit having a forked tip commonly is produced in a lesser yield. White inflorescence is formed on a semi-early basis that commonly is disposed slightly above the foliage. A calyx commonly is displayed having a diameter when open that is generally smaller than the diameter of the open corolla. A dense upright generally globose growth habit is displayed. | 2014-01-16 |
20140020144 | Strawberry plant named 'MARGHERITA' - A new and distinct short-day strawberry cultivar is provided. Attractive early-ripening substantially uniform bright red conical fruit having a firm flesh is formed in good yields. White inflorescence is formed on an early basis that is disposed at approximately the same level as the foliage. A calyx commonly is displayed that is smaller than the corolla when open. A dense upright globular growth habit is displayed. | 2014-01-16 |
20140020145 | Calla Lily plant named 'Amarillo BLZ' - A calla lily plant particularly distinguished by yellow spathes, medium density maculation of the leaves that is visible from both sides of the leaf and produces 2 to 3 inflorescences per 3-cm tuber, is described. | 2014-01-16 |