10th week of 2009 patent applcation highlights part 84 |
Patent application number | Title | Published |
20090064306 | Network access control based on program state - A gateway controls access to a region of a network by either granting or denying a client machine access to the network region based on whether a particular program is running on the client machine. A program is installed on the client machine which sends a detectable indication that the program is running. When it is detected that the program is running, the gateway allows the client machine access to the network region. When the program is not detected to be running, the gateway denies the client machine access to the network region. | 2009-03-05 |
20090064307 | Systems and/or methods for streaming reverse HTTP gateway, and network including the same - In certain example embodiments of this invention, there is provided systems and/or methods for a streaming reverse HTTP gateway, and/or networks including the same. In such a network, a reverse HTTP gateway is located within a demilitarized zone (DMZ) disposed between public (or external) and private (or internal) networks for providing security therebetween. Requests from external clients may be streamed from the external network to the internal network over various connections and ports, including a substantially persistent reverse connection between an internal server and a reverse HTTP gateway. The reverse HTTP gateway architecture of certain example embodiments removes the need for proprietary protocols implemented between the reverse HTTP gateway located in the DMZ and the internal server located in the internal network. In certain example embodiments, the reverse HTTP gateway architecture is configured to leverage the capabilities of HTTP 1.1. | 2009-03-05 |
20090064308 | SECURITY GATEWAY SYSTEM, METHOD THEREOF, AND PROGRAM - A non-secure network gateway | 2009-03-05 |
20090064309 | BROWSER PLUG-IN FIREWALL - A browser plug-in firewall manages data exchanged between a browser and a plug-in according to a pre-defined list of rights. | 2009-03-05 |
20090064310 | Data relay device and data relay method - A data relay device has a plurality of security functions sequentially executes security functions on inputted data based on a predetermined rule, to determine whether or not to permit the relay of the data, and denies the relay of the data the relay is determined to be rejected. The data relay device has a determination result acquisition unit that acquires a determination result indicating permission or rejection of relay of the data, and a rule change unit that changes, based on the determination result acquired by the determination result acquisition unit, a rule defined for any one of the security functions located forward of the security function that has determined relay rejection, so that the relay of the communication data is determined to be rejected. | 2009-03-05 |
20090064311 | SECURE WEB INTERACTIONS USING A DESKTOP AGENT - An application server enables a secure network interaction. The application server receives a request for the secure network interaction from a third-party server. In response, the application server determines a security procedure, such as an authentication procedure, and a client corresponding to the secure network interaction. The client includes a secure desktop agent (SDA). The application server sends a message to the client that activates the SDA. The SDA establishes a secure connection with the application server. The SDA receives user credentials in a secure desktop environment and transmits them to the application server over the secure connection. The application verifies the user credentials and sends a digitally-signed authenticated response to the third-party server. | 2009-03-05 |
20090064312 | SYSTEM, METHOD AND PROGRAM FOR PROTECTING INFORMATION ON COMPUTER SCREEN - Whenever a drawing command is executed, a computer system having a graphic user interface such as a multi-window system determines, from the logical operation pattern of the drawing command, what kind of information is inherited by a drawing result from the drawing command, preferably without performing a complicated step such as an image process. At the same time, the computer system controls information flow of an image outputted to a screen by managing labeled area maps which correspond one to one to images on the screen and in a memory. | 2009-03-05 |
20090064313 | APPARATUS AND METHOD FOR MONITORING COMMUNICATIONS - A system that incorporates teachings of the present disclosure may include, for example, a server having a controller to transmit a tracking request to a session information retriever for a targeted user of a network with the session information retriever storing session information for users of the network and with the tracking request having identification information associated with the targeted user, transmit a query to the session information retriever for relevant session information associated with the targeted user with the relevant session information being selected by the session information retriever from the session information based at least in part on the identification information associated with the targeted user and with the relevant session information being stored in a single file associated with the targeted user, and receive at least a portion of the relevant session information transmitted from the session information retriever. Other embodiments are disclosed. | 2009-03-05 |
20090064314 | Method and Apparatus for Implementing Parental Controls for a Portable Media Device - Methods and apparatus which allow parents to control the access of their children to features of a portable electronic device are disclosed. According to one aspect, a method for controlling the use of features associated with a portable electronic device includes setting at least one constraint associated with access to a feature of the portable electronic device and processing a user request to access the feature. The method can also include determining whether the constraint indicates that the feature is currently accessible to the user, and permitting access to the feature when the indication is that the feature is currently accessible to the user. Finally, access to the feature can be denied if the indication is that the feature is not currently accessible to the user. | 2009-03-05 |
20090064315 | APPARATUS AND METHOD FOR AUTOMATICALLY CONVERTING USER INTERFACE - An apparatus and a method are provided for automatically converting a user interface (UI). A Bluetooth-automatic authentication function is performed so as to automatically convert a current set UI to a stored UI corresponding to an authenticated Bluetooth terminal. In order to automatically convert UI of a terminal which is automatically authenticated in a short communication mode, at least one terminal ID for automatic authentication and UI configuration information corresponding to the terminal ID are set. When a terminal ID for automatic authentication is searched in a short distance communicating mode, a terminal corresponding to the searched terminal ID is automatically authenticated. The present UI configuration information corresponding to the automatically authenticated terminal is automatically applied to a current terminal UI, so that a current UI such as a main screen and a main menu category can be automatically converted to a preset UI corresponding to each authenticated Bluetooth terminal. | 2009-03-05 |
20090064316 | Method and Apparatus for Enhancing Information Security in a Computer System - A method of enhancing information security in a computer system comprises receiving an input signal, reading a starting password, comparing the input signal with the starting password for generating a comparison result, and controlling an operating status of a basic input and output system of the computer system according to the comparison result. | 2009-03-05 |
20090064317 | DATA PROTECTION SYSTEM AND METHOD THEREOF - An exemplary data protection system includes a storage module, an input module, and a logistic module. The storage module is configured for storing data and a preset password. The input module is configured for inputting a password. The logistic module is configured for comparing the input password with the preset password. If the input password is identical to the preset password, the data stored in the storage module is set to accessible. When operations of accessing to data are finished, the data is blocked from accessing. | 2009-03-05 |
20090064318 | METHOD OF INPUTTING BOOTING PASSWORD - A method of inputting a booting password includes the following steps. When a computer is powered on, firstly, a first password input screen is outputted, which waits for a first password to be inputted. Next, if a second password input activating signal is received during the waiting process, a second password input screen is outputted, which waits for a second password to be inputted. Then, after the input of the first password or the second password is finished, an operating system is booted. | 2009-03-05 |
20090064319 | ELECTRONIC TRIP UNITS WITH LIMITED READ/WRITE ACCESS - A method of limiting read/write access of information stored on an electronic trip unit is disclosed. The method includes requesting a valid password on one of a communication port of the electronic trip unit and a display device of the electronic trip unit, receiving a password at a processor of the electronic trip unit in response to the request, determining if the received password is valid based on password information stored on a memory of the electronic trip unit, and limiting read/write access of information stored on the electronic trip unit based on the determination. | 2009-03-05 |
20090064320 | Image processing apparatus and image processing system - An image processing apparatus and an image processing system, in which burdensome operation for user authentication is unnecessary, are provided. | 2009-03-05 |
20090064321 | Methods for Providing User Authentication in a Computer Network or System - Embodiments of the present invention relate to methods for providing user authentication for a computer-type device or for a computer network. The method includes showing an interactive display comprising a plurality of media items. The plurality of media items may include a pre-designated authentication media item. A user is prompted to select the pre-designated media item from the plurality of media items, and may further be prompted to select a pre-designated location in the pre-designated media item. Network or other authentication may be provided if the user selects the pre-designated media item (and location) from the plurality of media. | 2009-03-05 |
20090064322 | Security Process Model for Tasks Within a Software Factory - Security for a software factory is provided by detecting a request by a user to utilize the software factory. Upon being authenticated, the user is granted permission to access specific areas of the software factory. A log is created of locations in software factory that have been accessed by the user. This log is then utilized in an audit that describes how effective the software factory is in creating deliverable software. | 2009-03-05 |
20090064323 | USE OF GLOBAL INTELLIGENCE TO MAKE LOCAL INFORMATION CLASSIFICATION DECISIONS - Methods and systems are provided for delaying local information classification until global intelligence has an opportunity to be gathered. According to one embodiment, an initial information identification process, e.g., an initial spam detection, is performed on received electronic information, e.g., an e-mail message. Based on the initial information identification process, classification of the received electronic information is attempted. If the received electronic information cannot be unambiguously classified as being within one of a set of predetermined categories (e.g., spam or clean), then an opportunity is provided for global intelligence to be gathered regarding the received electronic information by queuing the received electronic information for re-evaluation. The electronic information is subsequently classified by performing a re-evaluation information identification process, e.g., re-evaluation spam detection, which provides a more accurate categorization result than the initial information identification process. Handling the electronic information in accordance with a policy associated with the categorization result. | 2009-03-05 |
20090064324 | NON-INTRUSIVE MONITORING OF SERVICES IN A SERVICE-ORIENTED ARCHITECTURE - A method for monitoring a service provided in a service-oriented architecture may include submitting a subscription request to a plurality of intermediaries in the service-oriented architecture from which to receive monitored data related to the service and determining which ones of the plurality of intermediaries to rely upon for monitoring the service. The method may also include receiving the monitored data from the determined ones of the plurality of intermediaries and presenting the monitored data for monitoring the service. | 2009-03-05 |
20090064325 | PHISHING NOTIFICATION SERVICE - A method includes determining whether new phishing site identifiers (URLs and/or IP addresses) have been created. Upon a determination that the new phishing site identifiers have been created, the new phishing site identifiers are compared to site identifiers of sites to which critical values have been provided in the past. Upon a determination that at least one of the new phishing site identifiers matches at least one of the site identifiers, a phishing notification is provided that the user was successfully phished in the past. | 2009-03-05 |
20090064326 | METHOD AND A SYSTEM FOR ADVANCED CONTENT SECURITY IN COMPUTER NETWORKS - The present invention relates to a method and a system for protecting data in a computer network. A device is placed on a network edge in such a way, that all outgoing data has to pass through it. Separately, a set of data that is not allowed to leave the network is defined and stored in a secure form (typically, one way hash). The device determines the network protocol, file type, transforms and normalizes the passing data, and seeks the presence of the data from the defined set. If a threshold amount of the protected data is present, the device takes one of the following actions: block, alert, log, redact, store, redirect, encrypt, notify sender. | 2009-03-05 |
20090064327 | Low cost high efficiency anti-phishing method and system called 'safety gates' - A low-cost, secure, reliable, convenient, and efficient way to reduce the efficiency of phishing attacks method and system, which consists in putting before login page one or several complimentary login pages, called ‘safety gates’, which lead to web pages with content known only to a legitimate user, who created the online account and pre-loaded digital content displayed after login into the ‘safety gate’. | 2009-03-05 |
20090064328 | SYSTEM, APPARATUS AND METHOD OF MALWARE DIAGNOSIS MECHANISM BASED ON IMMUNIZATION DATABASE - An immunization system including: an immunization client apparatus which determines whether a target code is a malicious code by performing an immunization operation with respect to a first immunization signature and a code signature that is extracted from the target code and reports the result of the determination to an immunization server; and the immunization server which diagnoses whether the target code is the malicious code, updates a second immunization signature based on the reported result of the determination, and transmits to the immunization client apparatus an update message about the updated second immunization signature, wherein the immunization client apparatus updates the first immunization signature based on the received update message is provided. | 2009-03-05 |
20090064329 | Zero-hour quarantine of suspect electronic messages - The zero-hour quarantine comprises a tool for flagging potentially harmful messages/files prior to having an anti-virus signature published for a particular virus. The suspect file is sent to the zero-hour quarantine and periodically scanned, giving time for creation of a signature file that would then detect the virus. An example method may include receiving and examining a message for attributes indicative of its undesirability, and assigning a threat score to the message. The method may comprise disposing of the message by comparing the threat score to first and second thresholds, and the message sent to a permanent quarantine if the threat score passes the first threshold. The message is sent to the zero-hour quarantine if the assigned threat score does not pass the second threshold but passes the second threshold, or is delivered to the recipient if the assigned threat score does not pass the first or second threshold. | 2009-03-05 |
20090064330 | METHODS AND SYSTEMS FOR ANALYZING DATA RELATED TO POSSIBLE ONLINE FRAUD - Various embodiments of the invention provide methods, systems and software for analyzing data. In particular embodiments, for example, a set of data about a web site may be analyzed to determine whether the web site is likely to be illegitimate (e.g., to be involved in a fraudulent scheme, such as a phishing scheme, the sale of gray market goods, etc.). In an exemplary embodiment, a set of data may be divided into a plurality of components (each of which, in some cases, may be considered a separate data set). Merely by way of example, a set of data may comprise data gathered from a plurality of data sources, and/or each component may comprise data gathered from one of the plurality of data sources. As another example, a set of data may comprise a document with a plurality of sections, and each component may comprise one of the plurality of sections. Those skilled in the art will appreciate that the analysis of a particular component may comprise certain tests and/or evaluations, and that the analysis of another component may comprise different tests and/or evaluations. In other cases, the analysis of each component may comprise similar tests and/or evaluations. The variety of tests and/or evaluations generally will be implementation specific. | 2009-03-05 |
20090064331 | System and method for preventing detection of a selected process running on a computer - A system and method are disclosed for preventing detection of a monitoring process running on a computer. A request to access a process file concerning a process running on the computer is received from a user. It is determined whether the process file requested by the user relates to the selected process. If the requested process file does not relate to the selected process, the user is provided with access to the file. | 2009-03-05 |
20090064332 | METHOD AND APPARATUS FOR GENERATING HIGHLY PREDICTIVE BLACKLISTS - In one embodiment, the present invention is a method and apparatus for generating highly predictive blacklists. One embodiment of a method for generating a blacklist of network addresses for a user of a network includes collecting security log data from users of the network, the security log data identifying observed attacks by attack sources, assigning the attack sources to the blacklist based on a combination of the relevance each attack source to the user and the maliciousness of the attack source, and outputting the blacklist. | 2009-03-05 |
20090064333 | Pattern Discovery in a Network System - Patterns can be discovered in events collected by a network system. In one embodiment, the present invention includes collecting and storing events from a variety of monitor devices. In one embodiment, a subset of the stored events is provided to a manager as an event stream. In one embodiment, the present invention further includes the manager discovering one or more previously unknown event patterns in the event stream. | 2009-03-05 |
20090064334 | Adaptive Autonomic Threat Detection and Quarantine - Autonomic threat detection is performed by collecting traffic samples of traffic patterns associated with a networked device having a device resident validation module. A threat analysis system is used to recognize a pattern of traffic indicative of a compromised device based at least in part upon the traffic samples. If the samples indicate a compromised device, the device is quarantined and a security check is performed on the device. The security check may include requesting data from the corresponding device resident validation module to determine if the device is compromised, analyzing data from the device resident validation module of the quarantined device and taking an action based upon analysis of the data. At least one of the data from the device resident validation module of the quarantined device or the traffic samples is utilized to autonomically train the threat analysis system to identify compromised devices. | 2009-03-05 |
20090064335 | INSTANT MESSAGING MALWARE PROTECTION - A system including a content server and a plurality of instant messaging clients is configured to enable each client device to scan for malware on incoming or outgoing instant messages. The content server may receive malware configuration information and distribute the malware configuration information to each client device. Each client device may employ the malware configuration information to perform a number of actions, including determining one or more malware scanners to use, selectively scanning incoming or outgoing instant messages, reporting instances of malware that are detected, or selectively restricting one or more instant messaging functions. The system may include a malware information repository that receives and reports of detected malware, analyzes the reports, and determines sources of malware. | 2009-03-05 |
20090064336 | Virus detection in a network - A computer system and storage medium that in an embodiment count the number of times that a file or registry entry is added, changed, or deleted at clients in a network. If the count exceeds a threshold, then a warning is sent to the clients. The warning may prompt the clients to delete or rename the file or registry entry, run an anti-virus program, quarantine the file or registry entry, or issue a message. In this way, viruses may be detected at clients. | 2009-03-05 |
20090064337 | METHOD AND APPARATUS FOR PREVENTING WEB PAGE ATTACKS - A method and apparatus for preventing web page attacks are disclosed. Specifically, one embodiment of the present invention sets forth a method, which includes the steps of examining an object property from a web page requested by a client computer in real-time before the client computer receives the web page, assessing a collective risk level associated with the web page causing harm to the client computer based on the result of examining the object property, and performing an action with regards to the web page according to the collective risk level. | 2009-03-05 |
20090064338 | PROXIMITY SENSITIVE BLADE SERVER SECURITY - Embodiments of the present invention address deficiencies of the art in respect to blade server security and provide a method, system and computer program product for proximity sensitive blade server security. In one embodiment of the invention, a method for proximity sensitive blade server security can be provided. The method can include sensing proximity of a systems administrator relative to a blade center, detecting a loss of proximity of the systems administrator, and triggering automated securing of at least one blade server in the blade server in response to detecting the loss of proximity. For example, sensing proximity of a systems administrator relative to a blade center can include establishing a wireless radio connection with a personal article associated with the systems administrator, and determining a loss of proximity when the connection is lost. | 2009-03-05 |
20090064339 | SYSTEM AND METHOD FOR AUDIT GOVERNANCE IN EMAIL - A system and method, where messages which are exchanged in email, provide recipients (and originators) with the capability to confirm authenticity. A substring of a message is examined, is validated and, if any modifications have been made, the modifications are highlighted to the originator and the receivers so that the originator and the receivers know that the original message has been modified. Also, the system and method of the present invention preserve the time, date and identity of the maker of the modifications. | 2009-03-05 |
20090064340 | Apparatus and Method to Prevent the Illegal Reading of Smart Cards - An apparatus to prevent smart cards from being read illegally is provided, wherein the apparatus is installed in a smart card reader comprises a CPU and a socket with a plurality of fingers, and the apparatus comprises: an electric circuits board (ECB), an inner circuit and a supplementary circuit. The ECB is disposed to cover the fingers and wired with an inner circuit electrically connected to a power supply. The supplementary circuit has an input terminal and an output terminal, wherein the input terminal is electrically connected to the power supply through the inner circuit of the ECB, and the output terminal is electrically connected to the CPU of the smart card reader; when the inner circuit is interrupted, an alarm signal is outputted by the supplementary circuit to the CPU to terminate the reading of the smart card by the smart card reader. | 2009-03-05 |
20090064341 | Technique for registering a device with a rights issuer system - A technique for registering a device ( | 2009-03-05 |
20090064342 | SENSITIVITY-ENABLED ACCESS CONTROL MODEL - Apparatus, methods, and computer program products are disclosed that determine Rights to an entity. The disclosed technology maintains data structures representing a set of entities. These entities include protected-entities and sensitivity-entities. Each of the sensitivity-entities is associated with a respective sensitivity access-control-list. The sensitivity-entities include a first sensitivity-entity that is associated with a first sensitivity-access-control-list. A first protected-entity being one of one or more of the protected-entities associated with the first sensitivity-entity. The technology evaluates Rights to the first protected-entity with respect to the first sensitivity-access-control-list and enables access to the first protected-entity responsive to the Rights evaluation and presents the first protected-entity when access is enabled. | 2009-03-05 |
20090064343 | ACCESS CONTROL METHOD AND A SYSTEM FOR PRIVACY PROTECTION - A method for protecting information in a distributed stream processing system, including: assigning a principal label to a processing component; assigning a first channel label to a first communication channel that is input to the processing component; comparing the principal label to the first channel label to determine if the processing component can read data attributes of the first channel label; and reading the data attributes of the first channel label when the principal label is equal to or has precedence over the first channel label, wherein the principal label includes a read label and a write label and at least one of a selection label, an addition label or a suppression label. | 2009-03-05 |
20090064344 | METHOD AND APPARATUS FOR MANAGING DIGITAL RIGHTS MANAGEMENT RIGHTS OBJECTS - Provided are a method and apparatus for managing digital rights management (DRM) rights objects, and more particularly, to a method and apparatus for downloading and managing DRM rights objects by accessing a device, which does not support DRM technology, using a universal plug and play (UPnP) network. The method includes requesting a media server, which has downloaded specified content, to provide meta information of the content; determining whether to download a rights object for the content based on the meta information of the content; requesting an approval for the download of the rights object if it is determined to download the rights object; and providing the downloaded rights object to the media server. | 2009-03-05 |
20090064345 | INFORMATION MANAGEMENT APPARATUS, INFORMATION MANAGEMENT SYSTEM AND COMPUTER READABLE MEDIUM - An information management apparatus includes: a registration unit that registers electronic information in association with access right information representing whether a user has an access right; a condition storage that stores a condition for prohibiting an access to the electronic information registered by the registration unit on the basis of an administrator's right for the apparatus; a determination unit that determines whether the changed access right information satisfies the condition stored in the condition storage; a transmission unit that transmits the electronic information to a predetermined transmission destination in a case where the determination unit determines that the access right information of the electronic information satisfies the condition; and a deletion unit that deletes the electronic information stored in a transmission source after the electronic information is transmitted by the transmission unit. | 2009-03-05 |
20090064346 | PROVIDING SERVICES TO A GUEST DEVICE IN A PERSONAL NETWORK - A method may include sending personal network connection information from a mobile device to a guest device; sending authentication credentials from the mobile device to the guest device; receiving the authentication credentials in the personal network from the guest device; authenticating the guest device based on the authentication credentials; and granting access to the guest device to content stored in the personal network for a guest session. | 2009-03-05 |
20090064347 | Protection Against Unauthorized Copying of Digital Medial Cotent - Protection against unauthorized copying of digital media content is achieved by receiving information from a client device related to its storing function used to store digital media content that is to be sent to the client device; and performing a procedure to protect against unauthorized copying of the digital media content if the client device is able to store the digital media content using its storing function. | 2009-03-05 |
20090064348 | Protection Against Unauthorized Copying of Digital Medial Cotent - Protection against unauthorized copying of digital media content is achieved by receiving a request to provide digital media content to a client device, sending instructions to the client device regarding a processor executable function that provides protection against unauthorized copying of the digital media content, and sending the digital media content to the client device upon activation of the processor executable function. | 2009-03-05 |
20090064349 | Chimeric Avian-Based Screening System Containing Mammalian Grafts - The present invention relates to animal model systems comprising a chimera between an avian embryo and a mammalian organism. Specifically, chimeric model systems comprising normal, diseased or genetically transformed mammalian cells and tissues transplanted into avian embryos, and uses thereof for in vivo testing of drugs and therapeutic modalities are disclosed. | 2009-03-05 |
20090064350 | DETECTION AND TREATMENT OF DRUG ASSOCIATED ANGIOEDEMA - The present invention relates to an in vitro method of diagnosing a drug-associated angioedema or a predisposition thereto in a subject being suspected to having developed or of having a predisposition to develop a drug-associated angioedema or in a subject being intended to be treated with a drug associated with the development of angioedema, the method comprising determining in a biological sample from said subject the presence or absence of a disease-associated mutation in a nucleic acid molecule regulating the expression of or encoding coagulation factor XII; wherein the presence of such a mutation is indicative of a drug-associated angioedema or a predisposition thereto. | 2009-03-05 |
20090064351 | TRANSGENIC BIRD PRODUCING ERYTHROPOIETIN AND METHOD OF CONSTRUCTING THE SAME - The present invention has its object to provide a transgenic bird producing erythropoietin at high concentration levels as well as a method for constructing the same. The present invention provides a G0 transgenic chimera bird as obtained by incubating a fertilized avian egg, infecting the early embryo formed after egg laying, except for the blastoderm stage immediately following egg laying, with a replication-deficient retroviral vector containing a foreign erythropoietin gene and allowing the embryo to hatch. | 2009-03-05 |
20090064352 | CREATING POULTRY AND OTHER ANIMALS RESISTANT TO VIRAL DISEASE - The invention is directed to genetically modified animals which are resistant to viral infections. Also provided are methods for creating animals which are resistant to viral infections. | 2009-03-05 |
20090064353 | Transgenic or recombinant non-human mammals and their uses in screening psychoactive medicines - The invention concerns transgenic or recombinant non-human mammals, wherein the expression of the gene coding for a microtubule associated protein (MAP) is modified (STOP gene) (inactivation or overexpression) and their uses in screening medicines useful in schizophrenia and schizo-affective disorders, with anxious, paranoiac or depressive component. | 2009-03-05 |
20090064354 | Methods and Compositions for Selecting Soybean Plants Resistant to Southern Root Knot Nematode - The present invention is in the field of plant breeding and disease resistance. More specifically, the invention includes a method for breeding soybean plants containing one or more quantitative trait loci (QTL) associated with resistance to Southern Root Knot Nematode (SRKN). The invention further provides germplasm and the use of germplasm containing QTL conferring disease resistance for introgression into elite germplasm in a breeding program, thus producing novel elite germplasm comprising one or more SRKN resistance QTL. | 2009-03-05 |
20090064355 | CUCUMBER LINE APD147-5007Gy - The invention provides seed and plants of the cucumber line designated APD147-5007Gy. The invention thus relates to the plants, seeds and tissue cultures of cucumber line APD147-5007Gy, and to methods for producing a cucumber plant produced by crossing a plant of cucumber line APD147-5007Gy with itself or with another cucumber plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of cucumber line APD147-5007Gy, including the fruit and gametes of such plants. | 2009-03-05 |
20090064356 | Rice Mutant Allele - A rice mutant allele designated phd is disclosed. The invention relates to rice seeds containing mutant allele phd, to rice plants containing allele phd and to methods for producing a rice plant containing the mutant allele phd produced by crossing a rice plant containing allele phd with itself or another rice variety. The invention further relates to hybrid rice seeds and hybrid rice plants containing mutant allele phd. | 2009-03-05 |
20090064357 | Barley Cultivar Pronghorn - A barley cultivar, designated Pronghorn, is disclosed. The invention relates to the seeds of barley cultivar Pronghorn, to the plants of barley Pronghorn, and to methods for producing a barley plant produced by crossing barley cultivar Pronghorn with itself or another barley variety. The invention also relates to methods for producing a barley plant containing in its genetic material one or more transgenes and to the transgenic barley plants and plant parts produced by those methods. The invention also relates to barley varieties or breeding varieties and plant parts derived from barley cultivar Pronghorn, to methods for producing other barley varieties, lines or plant parts derived from barley cultivar Pronghorn, and to the barley plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid barley seeds and plants produced by crossing barley cultivar Pronghorn with another barley cultivar. This invention further relates to methods for developing other barley varieties or breeding lines derived from variety Pronghorn including cell and tissue culture, haploid systems, mutagenesis, and transgenic derived lines. Pronghorn demonstrates a unique combination of traits for the human food market including waxy starch, hulless seed and increased levels of Beta-glucan fiber and Beta-glucan fiber viscosity. | 2009-03-05 |
20090064358 | FORWARD BREEDING - A method for plant breeding comprising the steps of: selecting a donor parent possessing a trait of interest; crossing the donor parent to a first hybrid parent; selecting a first generation progeny of the cross; and crossing the first generation progeny with a second hybrid parent to produce a hybrid back cross. | 2009-03-05 |
20090064359 | Canola Line GB083 - A canola line designated GB083 is disclosed. The invention relates to the seeds of canola line GB083, to the plants of canola GB083, to plant parts of canola line GB083 and to methods for producing a canola plant produced by crossing canola line GB083 with itself or with another canola line. The invention also relates to methods for producing a canola plant containing in its genetic material one or more transgenes and to the transgenic canola plants and plant parts produced by those methods. This invention also relates to canola lines or breeding lines and plant parts derived from canola line GB083, to methods for producing other canola lines, lines or plant parts derived from canola line GB083 and to the canola plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid canola seeds, plants and plant parts produced by crossing the line GB083 with another canola line. | 2009-03-05 |
20090064360 | Methods and Compositions for Gray Leaf Spot Resistance in Corn - The present invention relates to the field of plant breeding. More specifically, the present invention includes a method of using haploid plants for genetic mapping of traits of interest such as disease resistance. Further, the invention includes a method for breeding corn plants containing quantitative trait loci (QTL) that are associated with resistance to Gray Leaf Spot, a fungal disease associated with | 2009-03-05 |
20090064361 | Methods and Compositions for Haploid Mapping - The present invention relates to the field of plant breeding. More specifically, the present invention includes a method of using haploid plants for genetic mapping of traits of interest such as disease resistance. Further, the invention includes a method for breeding corn plants containing quantitative trait loci (QTL) that are associated with resistance to Gray Leaf Spot (GLS), a fungal disease associated with | 2009-03-05 |
20090064362 | PUMPKIN LINE HWN 130-1018T - The invention provides seed and plants of the pumpkin line designated HWN 130-1018T. The invention thus relates to the plants, seeds and tissue cultures of pumpkin line HWN 130-1018T, and to methods for producing a pumpkin plant produced by crossing a plant of pumpkin line HWN 130-1018T with itself or with another pumpkin plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of pumpkin line HWN 130-1018T, including the fruit and gametes of such plants. | 2009-03-05 |
20090064363 | PUMPKIN LINE HWN 130-1039T - The invention provides seed and plants of the pumpkin line designated HWN 130-1039T. The invention thus relates to the plants, seeds and tissue cultures of pumpkin line HWN 130-1039T, and to methods for producing a pumpkin plant produced by crossing a plant of pumpkin line HWN 130-1039T with itself or with another pumpkin plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of pumpkin line HWN 130-1039T, including the fruit and gametes of such plants. | 2009-03-05 |
20090064364 | SQUASH LINE YPC 130-1035T - The invention provides seed and plants of the squash line designated YPC 130-1035T. The invention thus relates to the plants, seeds and tissue cultures of squash line YPC 130-1035T, and to methods for producing a squash plant produced by crossing a plant of squash line YPC 130-1035T with itself or with another squash plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of squash line YPC 130-1035T, including the fruit and gametes of such plants. | 2009-03-05 |
20090064365 | SQUASH LINE YCN 130-1053T - The invention provides seed and plants of the squash line designated YCN 130-1053T. The invention thus relates to the plants, seeds and tissue cultures of squash line YCN 130-1053T, and to methods for producing a squash plant produced by crossing a plant of squash line YCN 130-1053T with itself or with another squash plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of squash line YCN 130-1053T, including the fruit and gametes of such plants. | 2009-03-05 |
20090064366 | SQUASH LINE ZGN 130-1041T - The invention provides seed and plants of the squash line designated ZGN 130-1041T. The invention thus relates to the plants, seeds and tissue cultures of squash line ZGN 130-1041T, and to methods for producing a squash plant produced by crossing a plant of squash line ZGN 130-1041T with itself or with another squash plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of squash line ZGN 130-1041T, including the fruit and gametes of such plants. | 2009-03-05 |
20090064367 | TOMATO LINE CHD 15-2062 - The invention provides seed and plants of the tomato line designated CHD 15-2062. The invention thus relates to the plants, seeds and tissue cultures of tomato line CHD 15-2062, and to methods for producing a tomato plant produced by crossing a plant of tomato line CHD 15-2062 with itself or with another tomato plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of tomato line CHD 15-2062, including the fruit and gametes of such plants. | 2009-03-05 |
20090064368 | WATERMELON LINE WAS146-4197 - The invention provides seed and plants of the watermelon line designated WAS146-4197. The invention thus relates to the plants, seeds and tissue cultures of watermelon line WAS146-4197, and to methods for producing a watermelon plant produced by crossing a plant of watermelon line WAS146-4197 with itself or with another watermelon plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of watermelon line WAS146-4197, including the fruit and gametes of such plants. | 2009-03-05 |
20090064369 | HABANERO PEPPER HYBRID PX11423486 - The invention provides seed and plants of the habanero pepper line designated PX11423486. The invention thus relates to the plants, seeds and tissue cultures of habanero pepper hybrid PX11423486, and to methods for producing a habanero pepper plant produced by crossing a plant of pepper hybrid PX11423486 with itself or with another pepper plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of habanero pepper hybrid PX11423486, including the fruit and gametes of such plants. | 2009-03-05 |
20090064370 | HABANERO PEPPER HYBRID PX11423487 - The invention provides seed and plants of the habanero pepper line designated PX11423487. The invention thus relates to the plants, seeds and tissue cultures of habanero pepper hybrid PX11423487, and to methods for producing a habanero pepper plant produced by crossing a plant of pepper hybrid PX11423487 with itself or with another pepper plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of habanero pepper hybrid PX11423487, including the fruit and gametes of such plants. | 2009-03-05 |
20090064371 | Methods for Increasing the Resistance of Plants to Hypoxic Conditions - Methods are provided for increasing the resistance of plants to hypoxic or anoxic conditions. Such methods may be applied to increase the penetrance of plant roots in the growth medium or into soil. The methods according to the invention may include providing plants with a stress tolerance gene. Similar effects can be obtained by applying chemical compounds, including neonicotinoid compounds, to the plants. | 2009-03-05 |
20090064372 | Transformed Plant Expressing a Dextransucrase and Synthesizing a Modified Starch - The present invention relates to plant cells and plants, which are genetically modified, wherein the genetic modification leads to the expression in plastids of such plant cells and plants of an enzyme having the activity of a dextransucrase. Furthermore, the present invention relates to means and methods for the manufacture of such plant cells and plants. Plant cells and plants of this type synthesis a modified starch. The present invention therefore also relates to the starch synthesized by the plant cells and plants according to the invention as well as to methods for the manufacture of the starch and to the manufacture of starch derivatives of this modified starch. | 2009-03-05 |
20090064373 | PLANTS WITH ALTERED ROOT ARCHITECTURE, RELATED CONSTRUCTS AND METHODS INVOLVING GENES ENCODING NUCLEOSIDE DIPHOSPHATASE KINASE (NDK) POLYPEPTIDES AND HOMOLOGS THEREOF - Isolated polynucleotides and polypeptides and recombinant DNA constructs particularly useful for altering root structure of plants, compositions (such as plants or seeds) comprising these recombinant DNA constructs, and methods utilizing these recombinant DNA constructs. The recombinant DNA construct comprises a polynucleotide operably linked to a promoter functional in a plant, wherein said polynucleotide encodes a polypeptide useful for altering plant root architecture. | 2009-03-05 |
20090064374 | Expression cassettes for seed-preferential expression in plants - The present invention relates to expression cassettes comprising transcription regulating nucleotide sequences with seed-preferential or seed-specific expression profiles in plants obtainable from a tonoplast intrinsic protein gamma 2 gene, preferably from the | 2009-03-05 |
20090064375 | Paraquat Resistance Gene and a Vascular Tissue- and Trichome-specific Promoter - A paraquat resistance gene and a vascular tissue- and trichome-specific promoter are provided. The paraquat resistance gene and the vascular tissue- and trichome-specific promoter are isolated by identifying and analyzing genes of | 2009-03-05 |
20090064376 | Use of untranslated region of osmotin gene to enhance transgene expression in plants - The present invention provides methods, vectors and gene constructs for enhancing expression of a recombinant nucleic acid sequence in transgenic plants and plant tissues. According to the present invention, nucleic acid sequences are obtained and/or derived from the 5′ and 3′ untranslated regions of genes encoding osmotin proteins and engineered to flank respective portions of a selected coding region of a vector. The vector construct may be introduced into plants and/or plant tissues through conventional procedures, resulting in enhanced expression of the selected coding region. In a preferred embodiment, the selected coding region is a chimeric gene or gene fragment expressing one or more proteins known to impart a level of insecticidal activity to a transgenic plant and/or plant tissue. | 2009-03-05 |
20090064377 | METHOD AND MEANS FOR TARGETED NUCLEOTIDE EXCHANGE - The invention pertains to a method for targeted alteration of a duplex acceptor DNA sequence, comprising combining the duplex acceptor DNA sequence with a donor oligonucleotide, wherein the duplex acceptor DNA sequence contains a first DNA sequence and a second DNA sequence which is the complement of the first DNA sequence and wherein the donor oligonucleotide comprises a domain that comprises at least one mismatch with respect to the duplex acceptor DNA sequence to be altered, preferably with respect to the first DNA sequence, and wherein a section of the donor oligonucleotide is methylated to a higher degree than the second DNA sequence and/or wherein the second DNA is methylated to a lower degree than the corresponding section of the donor oligonucleotide, optionally in the presence of proteins that are capable of targeted nucleotide exchange and to oligonucleotides for use in the method. | 2009-03-05 |
20090064378 | NOVEL 7S-ALPHA REGULATORY ELEMENTS FOR EXPRESSING TRANSGENES IN PLANTS - The present invention provides novel non-coding gene regulatory element polynucleotide molecules isolated or identified from the beta-conglycinin gene of | 2009-03-05 |
20090064379 | Grapevine (Sheegene-13) - A new and distinct variety characterized by the large, red-colored seedless grapes that ripen in late August to early September, approximately six weeks later than the Flame Seedless Grape (unpatented) when grown in the San Joaquin Valley of Central California. The grapes of this new variety are produced on strong woody stems and branches and are well adapted to commercial harvesting. | 2009-03-05 |
20090064380 | Grapevine (Sheegene-8) - A new and distinct variety characterized by red-colored nearly seedless grapes that ripen in late June, approximately two to three weeks earlier than the Flame Seedless Grape (unpatented) when grown in the San Joaquin Valley of Central California. The grapes of this new variety are produced on strong woody stems and branches that are well adapted to commercial handling. | 2009-03-05 |
20090064381 | Grapevine (Sheegene-12) - The new and distinct variety characterized by a dark red-colored, medium sized seedless grape that ripens in early August approximately two weeks later than the Flame Seedless Grape (unpatented) when grown in the San Joaquin Valley of Central California. The grapes of this variety are produced on strong woody stem and branches and are well adapted to commercial handling. | 2009-03-05 |
20090064382 | Grapevine (Sheegene-14) - A new and distinct variety characterized by a green-colored, large sized seedless grape that ripens during the first week of September, approximately four weeks later than the Thompson Seedless Grape (unpatented) when grown in the San Joaquin Valley of Central California. The grapes of this new variety are produced on strong woody branches and are well adapted to commercial handling. | 2009-03-05 |
20090064383 | Grapevine (Sheegene-9) - A new and distinct variety characterized by a green-colored, medium to large sized seedless grape that ripens during mid-July, approximately one week earlier than the Thompson Seedless Grape (unpatented) when grown in the San Joaquin Valley of Central California. The grapes of this new variety are produced on strong woody branches and are well adapted to commercial handling. | 2009-03-05 |
20090064384 | POINSETTIA PLANT NAMED 'FISMARS LIPINK' - A Poinsettia cultivar particularly distinguished by light pink bracts, medium-sized, ovate bracts in a flat, rosette-like arrangement, deep-green ovate-shaped foliage with nearly no lobes, a medium-sized, v-shaped plant habit and a mid-season flowering response, is disclosed. | 2009-03-05 |