20th week of 2011 patent applcation highlights part 63 |
Patent application number | Title | Published |
20110119734 | ACCESS CONTROL IN A SECURED FACILITY - In one embodiment, a system processes access decisions for individuals where the system includes a portable handheld housing for the processor, display, internal memory, and card reader of the system. The system further includes software comprising: code for downloading, in a first mode of operation through the wireless communication circuitry, to the internal memory, access rights information from a distribution server, the access rights information, for multiple users, independently originating and being cryptographically authenticated from multiple sources, the access rights information revocation data that is specific to respective identified individual users; code for reading and processing identity information and access rights information from a portable memory card via the reader in a second mode of operation, the identify information comprising first and last name information pertaining to a specific user and employer organization information of the specific user, the code for reading and processing cryptographically authenticating information. | 2011-05-19 |
20110119735 | APPARATUS AND SYSTEM EFFECTIVELY USING A PLURALITY OF AUTHENTICATION SERVERS - An authentication system and apparatus having an authentication process distributing function for individually setting an authenticating method and an authentication server on a port unit basis of a network apparatus and selecting an authentication processing unit which authenticates every port are provided. More specifically speaking, there is provided a packet transfer apparatus or system having: a plurality of connecting ports; a plurality of authentication processing units for authenticating apparatuses connected through the connecting ports; and an authentication process distributing unit for selecting the authentication processing unit to be authenticated every connecting port, wherein any one of the plurality of authentication processing units is made to correspond to each of the plurality of connecting ports, and when a packet is received from the apparatus connected to one of the connecting ports, the authentication process distributing unit selects the authentication processing unit which was made to correspond to the connecting port to which the apparatus to which the packet was transmitted has been connected and allows an authenticating process of the packet-transmitted apparatus to be executed. | 2011-05-19 |
20110119736 | APPARATUS AND METHOD FOR PREVENTING CHARGE CAUSED BY UTILIZING APPLICATION IN PORTABLE TERMINAL - An apparatus and method for determining a function that causes a charging problem and a personal information leakage problem when executing an application are provided. The apparatus includes an application configuration unit for determining and storing function information of the application that performs a network connection, and for providing a network connection function item of the application selected by a user based on the pre-stored function information. | 2011-05-19 |
20110119737 | METHOD AND DEVICE FOR DISTRIBUTED SECURITY CONTROL IN COMMUNICATION NETWORK SYSTEM - With migration of network technology and more and more requirements of user equipment for accessing to Internet, the network security faces more and more severe situation. There is provided a method for distributed security control in communication network system and the device thereof in order to improve security and operatability of network operator. In the method, firstly the network controller establishes a network security control mechanism, which is used for a second network device to check the validity of the data package from the user equipment; secondly, the network controller sends the network security control mechanism to the second network devices; lastly, the second network device checks the validity of the data package from the user equipment according to the network security control mechanism, and discards the data package if the data package is invalid. With the present invention, security and operatability of the communication network maybe improved greatly, particularly, the functionality of address anti-spoofing can be implemented in the network with a WLAN architecture in centralized control. (FIG. | 2011-05-19 |
20110119738 | IDENTITY MANAGEMENT FOR TRANSACTIONAL CONTENT - A method and system for managing access to transactional multimedia content based on hardware identification codes can include determining whether a user is entitled to a first service level or to a second service level and directing requests for transactional multimedia content to an appropriate server. The user of a client device can be authenticated by a certificate sent by the client device and received by a service provider. The certificate includes an indication of a unique hardware identifier for the client device. Access to the transactional content may occur over a public Internet protocol network if the client device is not directly connected to the service provider's private network and if the hardware identifier indicates the client device is authorized. | 2011-05-19 |
20110119739 | SECURE CONSUMER PROGRAMMING DEVICE - A method is provided for operating a consumer programming device that provisions consumer electronic devices. The method includes receiving over a communication link a first enable message that authorizes the consumer programming device to make available one or more resources which enable it to provide services to consumer electronic devices. Services are provided to consumer electronic devices up until all the resources have been exhausted. Additional consumer electronic devices are provided with services only if a second enable message is received over the communication link. | 2011-05-19 |
20110119740 | SYSTEM AND METHOD FOR PROVIDING ENTERPRISE INTEGRATION IN A NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes receiving a request to authenticate an end user in a service provider network, and evaluating the request to identify the end user as belonging to an enterprise network. A tag is generated for a packet associated with a flow for the end user in the enterprise network. Routing occurs for subsequent packets associated with the flow between the enterprise network and the end user. The subsequent packets associated with the flow are not routed through the service provider network. In more particular embodiments, the end user is authenticated in the enterprise network after being authenticated in the service provider network. In addition, traffic for the end user can be separated based on one or more tags identified within the flow. A plurality of flows can be classified based on a customer identification (CID). The tag can be a virtual local area network (VLAN) tag generated at a base station. | 2011-05-19 |
20110119741 | Method for Conditionally Obtaining Files From a Local Appliance - The invention is directed to a method for allowing a user at a client device to conditionally obtain files from either a server device located at, for example, a data center, or an appliance such as a local cache. Should the local appliance be accessible by the client at the time of the user's download request, the server may redirect the download request to the appliance. Otherwise, the file may be downloaded directly from the server. For example, a method configured according to the invention may receive, at a server device, login data from a client device, the login data being input by a user. An affiliated entity of the user based on the login data may be determined, after which an appliance status of the affiliated entity may be determined. A download process according to the appliance status may then be initiated. | 2011-05-19 |
20110119742 | COMPUTER NETWORK SECURITY PLATFORM - A computer system for managing security information for an organization includes a scanner execution module configured to automatically execute at least two scanners in a predetermined interval to analyze potential vulnerabilities of a computer environment. A vulnerability is acquired from the at least two scanners and stored in a data store. A user associated with the analyzed computer environment is determined based on the vulnerability stored in the data store, the user is notified of the vulnerability. | 2011-05-19 |
20110119743 | COMMUNICATION OF CONTENT TO EVENT ATTENDEES - A method is provided for enrolling and authenticating an attendee of an event or activity so that content can be delivered to a mobile device associated with the attendee. The method includes receiving an identifier of a mobile communication device associated with an authorized attendee while the attendee and the mobile communication device are in a venue at which the event or activity takes place. The mobile communication device is registered by storing the identifier in a database of authorized attendees who have entered the venue. Entitlement credentials are communicated to the mobile device that are to be further communicated from the mobile device to a content server when requesting event or activity related content therefrom. | 2011-05-19 |
20110119744 | PSEUDONYMOUS IDENTIFICATION MANAGEMENT APPARATUS, PSEUDONYMOUS IDENTIFICATION MANAGEMENT METHOD, PSEUDONYMOUS IDENTIFICATION MANAGEMENT SYSTEM AND SERVICE ADMISSION METHOD USING SAME SYSTEM - A pseudonymous ID (identification) management apparatus includes a token processing unit for validating an authentication token; a pseudonymous ID generation unit for issuing a pseudonymous ID corresponding to the authentication token; a temporary ID generation unit for issuing a temporary ID for use in an offline subscription; and an ID validation unit for validating a pseudonymous ID received from a web service apparatus along with a pseudonymous ID validation request and transmitting pseudonymous ID validation result to the web service apparatus, and validating a temporary ID received from the web service apparatus along with a pseudonymous ID exchange request and transmitting a pseudonymous ID corresponding to the temporary ID to the web service apparatus. The web service apparatus provides a service to which a user desires to subscribe. | 2011-05-19 |
20110119745 | NETWORK AUTHENTICATION - There is provided a Security Manager Device for allowing the secure establishment of network connections between devices, the Security Manager Device comprising a memory for storing network authentication information for a network and a transmitter for wirelessly transmitting the stored network authentication information to a device to be connected to a second device. | 2011-05-19 |
20110119746 | Identity Verification Method and Network Device for Implementing the Same - An identity verification method includes the steps of: i) in response to a login request from a user end, generating and providing a query to the user end; and ii) in response to an answer from the user end, verifying identity of the user end. The query includes indices of a verification table corresponding to the user end that are arranged in a random order in a ring formation, and requires the user end to provide an answer containing code contents of the table corresponding to a user-end selected set of adjacent ones of the indices in the ring formation. Identity of the user end is verified by determining whether the code contents in the answer are found in the table and whether the indices corresponding to the code contents in the answer are adjacent to each other with reference to the ring formation in the query. | 2011-05-19 |
20110119747 | SINGLE SIGN ON WITH MULTIPLE AUTHENTICATION FACTORS - The authentication of a client to multiple server resources with a single sign-on procedure using multiple factors is disclosed. One contemplated embodiment is a method in which a login session is initiated with the authentication system of a primary one of the multiple server resources. A first set of login credentials is transmitted thereto, and validated. A token is stored on the client indicating that the initial authentication was successful, which is then used to transition to a secondary one of the multiple resources. A second set of login credentials is also transmitted, and access to the secondary one of the multiple resources is granted on the basis of a validated token and second set of login credentials. | 2011-05-19 |
20110119748 | VIRTUAL COMPUTING INFRASTRUCTURE - A system has a virtual overlay infrastructure mapped onto physical resources for processing, storage and network communications, the virtual infrastructure having virtual entities for processing, storage and network communications. Virtual infrastructures of different users share physical resources but are isolated and have their own management entities. An interface between infrastructures allows controlled relaxation of the isolation, using a gateway between virtual nets, or shared virtual storage devices. This can allow businesses to share data or applications, while maintaining control of security. | 2011-05-19 |
20110119749 | SYSTEM AND METHOD FOR FILTERING SIP-BASED SPAM - A system for filtering SIP (Session Initiation Protocol)-based spam includes a spam detection unit for receiving a SIP message where labeling is performed from a sending user agent and detecting the spam using a label in the SIP message. Further, the system includes a spam checking unit for checking a call recipient from the SIP message and confirming a spam policy previously set by the call recipient through a spam management server; and a spam filtering unit for filtering the spam based on the confirmed spam policy. | 2011-05-19 |
20110119750 | METHOD FOR IMPROVING NETWORK APPLICATION SECURITY AND THE SYSTEM THEREOF - A method for improving network application security and the system thereof are disclosed in the invention, relating to the field of information security. The method includes: a proxy server in a customer terminal host receives a protocol message, generated and sent by the customer terminal software according to the information input by a user, and obtains the protocol content after parsing the protocol message, and determines whether critical information is included in the protocol content, if it is, the server sends the protocol content to the smart key device; and the smart key device obtains the critical information by parsing it and sends it to the user, and after a confirmation information is gotten from the user, the smart key device signs the protocol content and sends the signature result to the server; and then the server generates a new protocol message to an application server according to the signature result and the protocol content; after an error confirmation or no confirmation is received within a predetermined time period by the user, the smart key device performs the exception handling. The system includes a smart key device and a proxy server in the customer terminal host. The invention improves network application security on the premise of no change to the customer terminal, and it is usable and compatible. | 2011-05-19 |
20110119751 | SYSTEM AND METHOD FOR REGULATING COMMUNICATIONS TO OR FROM AN APPLICATION - The flow of information to or from an application on a host machine is regulated by a trusted agent operating in conjunction with at least one security element, such as a firewall or a policy server. When a communication to or from the application is detected by the trusted agent, the trusted agent gathers information about the attempted communication, and formulates and sends a message based upon the gathered information to at least one security element. The security element makes a decision to permit or block at least part of the attempted communication based upon the message received from the trusted agent. | 2011-05-19 |
20110119752 | METHOD AND SYSTEM FOR INCLUDING SECURITY INFORMATION WITH A PACKET - A method and system for including security information with a packet is disclosed. A packet is detected as it exits a first network and enters a second network. The first network is configured to support a network security technique, and the second network is not configured to support the network security technique. Network security information associated with the network security technique is included with the packet. A network device is configured to include network security information in overhead of a packet. A method for identifying a first network device in a network is also disclosed. Identification information of the first network is communicated to a second network device. | 2011-05-19 |
20110119753 | METHOD AND APPARATUS FOR BEST EFFORT PROPAGATION OF SECURITY GROUP INFORMATION - A method and system for best effort propagation of security group information is disclosed. The method includes determining if a reserved group identifier is associated with a destination and, if the reserved group identifier is associated with the destination, indicating that a packet received at a network node can be sent to another network node. The packet includes destination information that identifies the destination as a destination of the packet. | 2011-05-19 |
20110119754 | GAMING DEVICE HAVING HARD DRIVE BASED MEDIA AND RELATED METHODS - Various embodiments are directed to a gaming device that uses an internal hard drive for primary media storage. The software is installed on the hard drive without requiring physical access to the hard drive including, but not limited to, removal or replacement of the hard drive. According to one method, an install flash program is used to format and/or reformat an internal hard drive. Additionally, the install flash program is used to install media stored on a removable storage device onto the internal hard drive. | 2011-05-19 |
20110119755 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, INFORMATION PROCESSING PROGRAM AND COMPUTER READABLE RECORDING MEDIUM - In an information processing apparatus having a service mode for a service person to carry out maintenance of the apparatus enters for carrying out the maintenance, a registration page is provided for registering the service person as a service person in charge of the maintenance of the apparatus, and an input page is provided for inputting authentication information required for the service person that is registered in the registration page as a person in charge of the maintenance of the apparatus to enter the service mode. | 2011-05-19 |
20110119756 | Method Of Managing Usage Of A Workstation And Desktop Management System Therefor - Embodiments can disclose a method of managing usage of a workstation. The method can include: performing a desktop management sequence; performing a start-up sequence; displaying a login graphic on a screen of a monitor of the workstation; receiving first login information from a user; validating the first login information to check if the user is authorized to use the workstation; if the user is authorized to use the workstation, performing an autolaunch sequence, where performing the autolaunch sequence can include starting one or more pervasive computer applications; checking to see if the one or more pervasive computer application is active; if at least one first application of the one or more pervasive computer applications is not active, restarting the at least one first application of the one or more pervasive computer applications; receiving one or more instructions to logout from the user; and closing the one or more pervasive computer applications. Other embodiments are disclosed herein. | 2011-05-19 |
20110119757 | Method and apparatus for performing login by mobile station in wireless communication system - There are provided a method and apparatus for performing a login by a Mobile Station (MS) in a wireless communication system. In an Internet Protocol Multimedia Subsystem (IMS) network in a wireless communication system, an MS transmits a temporary login request to an IMS server by using a subscriber identity (ID) as a virtual Private Identity (PRID) and receives information about registered PRIDs that are associated with the subscriber ID. The MS determines whether at least one of PRIDs managed by the MS is unregistered in the IMS server. If at least one of the managed PRIDs is unregistered in the IMS server, the MS performs login to the IMS server using one of the managed PRIDs that is unregistered in the IMS server. If none of the managed PRIDs are unregistered in the IMS server, the MS performs login to the IMS server using one of the managed PRIDs that is registered. | 2011-05-19 |
20110119758 | APPARATUS FOR MOBILE DATA PROCESSING - A mobile data processing device includes a permanent memory configured to store an operating system bootable from the permanent memory. The device includes a connection configured to connect the device and a personal computer. The connection is configured so that the personal computer loads the operating system from the permanent memory during booting. The device includes at least one integrated network adapter. The device includes a hardware system. The hardware system is configured to at least one of encrypt and decrypt content stored in the permanent memory. The device includes a housing configured to be portable. | 2011-05-19 |
20110119759 | SYSTEM AND METHOD FOR CONTROLLING USER ACCESS TO AN ELECTRONIC DEVICE - A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker. | 2011-05-19 |
20110119760 | CLASSIFICATION OF SOFTWARE ON NETWORKED SYSTEMS - A method and system for the classification of software in networked systems, includes: determining a software received by a sensor is attempting to execute on a computer system of the sensor; classifying the software as authorized or unauthorized to execute, and gathering information on the software by the sensor if the software is classified as unauthorized to execute. The sensor sends the information on the software to one or more actuators, which determine whether or not to act on one or more targets based on the information. If so, then the actuator sends a directive to the target(s). The target(s) updates its responses according to the directive. The classification of the software is definitive and is not based on heuristics or rules or policies and without any need to rely on any a priori information about the software. | 2011-05-19 |
20110119761 | Mitigating Low-Rate Denial-of-Service Attacks in Packet-Switched Networks - A method includes determining, at a network routing device, an average packet drop rate for a plurality of aggregations of packet flows. The method also determines a threshold packet drop rate based on the average packet drop rate, a current packet drop rate for a select aggregation of the plurality of aggregations, and whether at least one packet flow of the select aggregation is potentially subject to a denial-of-service attack based on a comparison of the current packet drop rate to the threshold packet drop rate. | 2011-05-19 |
20110119762 | METHOD AND APPARATUS FOR DETECTION OF A FAULT ATTACK - The invention concerns a method of detecting a fault attack including providing a plurality of blinding values; generating a first set of data elements including a first group of data elements and at least one additional data element generated by performing the exclusive OR between at least one data element in the first group and at least one of the blinding values; generating a second set of data elements corresponding to the exclusive OR between each data element of the first set and a selected one of the plurality of blinding values; generating a first signature by performing a commutative operation between each of the data elements of the first set; generating a second signature by performing the commutative operation between each of the data elements of the second set; and comparing the first and second signatures to detect a fault attack. | 2011-05-19 |
20110119763 | DATA IDENTIFICATION SYSTEM - Disclosed is a method of operating a data storage system. The method comprises identifying changed segments of a primary storage volume, receiving a data request for a plurality of data items in a secondary storage volume, identifying changed data items of the plurality of data items in the secondary storage volume based on a correspondence between the plurality of data items in the secondary storage volume and the changed segments of the primary storage volume, and transferring the changed data items in response to the data request. | 2011-05-19 |
20110119764 | FINGERPRINT ANALYSIS FOR ANTI-VIRUS SCAN - Disclosed is a method of operating a data identification system. The method comprises identifying a first plurality of changed blocks in a first primary storage volume, processing the first plurality of changed blocks to generate a first plurality of fingerprints, scanning a first plurality of data items stored in a first secondary storage volume within the first primary storage volume corresponding to the first plurality of changed blocks to identify a first infected data item of the first plurality of data items, identifying a first reference fingerprint from the first plurality of fingerprints corresponding to the first infected data item, identifying a second plurality of changed blocks in a second primary storage volume corresponding to a second plurality of data items stored in a second secondary storage volume within the second primary storage volume, processing the second plurality of changed blocks to generate a second plurality of fingerprints, and identifying a first target fingerprint from the second plurality of fingerprints that corresponds to the first reference fingerprint. | 2011-05-19 |
20110119765 | SYSTEM AND METHOD FOR IDENTIFYING AND ASSESSING VULNERABILITIES ON A MOBILE COMMUNICATION DEVICE - The invention is a system and method for identifying, assessing, and responding to vulnerabilities on a mobile communication device. Information about the mobile communication device, such as its operating system, firmware version, or software configuration, is transmitted to a server for assessment. The server accesses a data storage storing information about vulnerabilities. Based on the received information, the server may identify those vulnerabilities affecting the mobile communication device, and may transmit a notification to remediate those vulnerabilities. The server may also transmit result information about the vulnerabilities affecting the mobile communication device. The server may also store the received information about the device, so that in the event the server learns of new vulnerabilities, it may continue to assess whether the device is affected, and may accordingly notify or remediate the device. The server may provide an interface for an administrator to manage the system and respond to security issues. | 2011-05-19 |
20110119766 | METHOD, DEVICE AND SYSTEM FOR PROTECTING SOFTWARE - The invention, related to information security field, discloses a method for protecting software, and device and system thereof. The method includes that a security device is connected with a terminal device; the security device receives service instruction, determines whether the clock inside the security device is activated, reads the current time of the clock and determines whether the current time is valid; if so, the security device executes the service instruction and returns the executing result to the terminal device; otherwise, the security device returns false result to the terminal device. The invention provides more secure service to the protected software, meanwhile, extends lifetime of the security device. | 2011-05-19 |
20110119767 | CONTENT BINDING AT FIRST ACCESS - A method and system of binding content at first access is disclosed. A non-volatile storage device may provide a content access script and a content binding script in order to access protected content. An accessing application may attempt to access the protected content by executing a content access script. The accessing application must have permission to access and execute the content access script. If the accessing application cannot access or execute the content access script, the accessing application may access and execute the content binding script. The content binding script contains instructions that enable the accessing application to successfully execute the content access script. The content binding script, when executed, may disable itself from being executed again by moving critical information associated with the access to protected data. Thus, the content binding script may be executed once to enable an accessing application to successfully execute the content access script. | 2011-05-19 |
20110119768 | COMMUNICATION ARRANGEMENT - The present invention relates to a method, node and system for efficient handling of sharing a set of data and in particular where the data set is shared in a volatile manner. Each node with access to the data set sharing group controls the access of data set from the node and each node stores data set received from other nodes in the group in a volatile manner providing removal of data set received from a node that has left the sharing group. | 2011-05-19 |
20110119769 | Rechargeable Media Distribution and Play System with Tracking Cookies - An electronic media distribution/play system includes a service facility that has a communications network interface and maintains a data file catalog. The catalog is sent over the network to requesting users, and the system processes payments from customers in establishing file access authorizations. Encrypted user-selected files and a player program are transmitted to each customer for metered access to received data files as limited by the authorization, and customers can make additional selections and play the encrypted files freely while the authorization remains established. The system can transmit the data files from local storage, and also provide links to encrypted files that are stored at remote vendor facilities. Authorizations can be for selected portions or class levels of the catalog, and for terms measured as calendar time, play time, and collective number of plays. Also disclosed is a method for facilitating the distribution and accessing of electronic files. | 2011-05-19 |
20110119770 | Password protected CD-DVD - Writable compact and digital versatile discs with a password protected option that protects access to the information on the disc. The password protection is optional, and may be used or removed at anytime. The discs can be used in every known application designed for compact and digital versatile discs formats, with no limitations. | 2011-05-19 |
20110119771 | SYSTEMS AND METHODS FOR HANDLING ELECTRONIC MESSAGES - Systems and methods for handling electronic messages are provided. One method includes monitoring a message and recipients of the message, detecting a reference in the monitored message to an entity, obtaining an access control list for the detected entity, the access control list defining permitted access to the entity, identifying a recipient of the message who is not permitted to access the entity, and performing a predefined action in response to the identification of the non-permitted recipient. The predefined action includes one or more specific actions such as identifying an administrator for the access control list, generating a reporting message, and transmitting the reporting message to the administrator. The predefined action additionally or alternatively includes preventing the transmission of the message to the non-permitted recipient and/or providing an alert to the author of the message. One system includes a processor and memory storing code for performing the above method. | 2011-05-19 |
20110119772 | Media Content Transfer and Remote License Acquisition - In one embodiment of a method of providing protected data from a network server, a data file is downloaded from an external source to a computer on a network. The downloaded file is stored in a location accessible to a server on the network. Using a computer on the network connected to the server, a license linked to the server for the data is procured from an external source. The data file is played from the server using the license. | 2011-05-19 |
20110119773 | Data Relay for a Controller - An irrigation system includes an irrigation controller, at least one environmental sensor and a vandal resistant data relay. The irrigation controller includes a two conductor hard wired communications link for accepting an actual value of at least one parameter of interest from an environmental sensor in the form of data encoded on the conductors via current modulation. The environmental sensor is mounted in a location remote from the irrigation controller. A circuit is connected to the environmental sensor for transmitting an RF signal representing an actual value of a parameter of interest detected by the environmental sensor. The vandal resistant data relay is connected to the two conductor hard wired communication link of the irrigation controller. The vandal resistant data relay includes a receiver that receives the RF signal, and circuitry configured to extract the actual value of the parameter of interest and emulate a predetermined set of physical and protocol properties of the two conductor hard wired communication link of the irrigation controller. | 2011-05-19 |
20110119774 | COMPOSITIONS OF AQUATIC ORIGIN FOR PREVENTION OF CELL ADHESION AND METHODS OF USING SAME - A composition comprising an extract from an aquatic organism is disclosed. The composition is capable of preventing adhesion of a cell to a surface and is devoid of cytotoxic or cytostatic activity. Medical devices comprising same and methods for preventing or treating a pathological infection using same are also disclosed. | 2011-05-19 |
20110119775 | HYDRAZIDE-CONTAINING CFTR INHIBITOR COMPOUNDS AND USES THEREOF - The invention provides compositions, pharmaceutical preparations and methods for inhibition of cystic fibrosis transmembrane conductance regulator protein (CFTR) that are useful for the study and treatment of CFTR-mediated diseases and conditions. The compositions and pharmaceutical preparations of the invention may comprise one or more hydrazide-containing compounds, and may additionally comprise one or more pharmaceutically acceptable carriers, excipients and/or adjuvants. The methods of the invention comprise, in certain embodiments, administering to a patient suffering from a CFTR-mediated disease or condition, an efficacious amount of a hydrazide-containing compound. In other embodiments the invention provides methods of inhibiting CFTR that comprise contacting cells in a subject with an effective amount of a hydrazide-containing compound. In addition, the invention features a non-human animal model of CFTR-mediated disease which model is produced by administration of a hydrazide-containing compound to a non-human animal in an amount sufficient to inhibit CFTR. | 2011-05-19 |
20110119776 | METHODS OF DIAGNOSING AND PROGNOSING LUNG CANCER - The present invention provides methods of detecting cancer using biomarkers. | 2011-05-19 |
20110119777 | USE OF AAV REPLICATION MACHINERY FOR IMPROVED PROTEIN PRODUCTION - The present invention provides a method for enhanced production of a gene product of interest in a cell, using the AAV replication machinery. The present invention further relates to a cell for use in the method of the invention and a non-human transgenic animal or a transgenic plant comprising a cell of the invention. | 2011-05-19 |
20110119778 | STEGANOGRAPHIC EMBEDDING OF INFORMATION IN CODING GENES - The invention relates to the storage of information in nucleic acid sequences. The invention also relates to nucleic acid sequences containing desired information and to the design, production or use of sequences of this type. | 2011-05-19 |
20110119779 | METHODS FOR SEQUENTIAL REPLACEMENT OF TARGETED REGION BY HOMOLOGOUS RECOMBINATION - The invention provides methods and compositions for generating non-human transgenic cells and organisms that are transgenic at one or more gene sequences by separately recombining fragments of a complete gene in temporal sequence. According to the methods of the invention, a set of DNA constructs containing a non-endogenous DNA sequence flanked and/or operably linked at its ends by sequences from the non-human organism are generated by recombination in a bacterial cell, for example, in | 2011-05-19 |
20110119780 | SCREENING FOR NON-GENOTOXIC CARCINOGENS - The invention relates to a method for screening for the effects of non-genotoxic carcinogens in an animal model. The invention also relates to animal models that are suitable for use in such a method, and cell lines derived from these animals for in vitro screening purposes. More specifically, the invention relates to a transgenic rodent animal which has been humanised for the nuclear transcription factors CAR, PXR and PPARĪ±, and in which the endogenous equivalent genes have been rendered inoperable. | 2011-05-19 |
20110119781 | Compositions and Methods for Inhibiting Expression of TGF-BETA Receptor Genes - The invention relates to a double-stranded ribonucleic acid (dsRNA) for inhibiting the expression of a TGF-beta receptor type I gene, comprising an antisense strand having a nucleotide sequence which is less than 30 nucleotides in length and which is substantially complementary to at least a part of a TGF-beta receptor type I gene. The invention also relates to a pharmaceutical composition comprising the dsRNA or nucleic acid molecules or vectors encoding the same together with a pharmaceutically acceptable carrier; methods for treating diseases caused by the expression of a TGF-beta receptor type I gene using said pharmaceutical composition; and methods for inhibiting the expression of a TGF-beta receptor type I gene in a cell. | 2011-05-19 |
20110119782 | CONSTRUCT CAPABLE OF RELEASE IN CLOSED CIRCULAR FORM FROM A LARGER NUCLEOTIDE SEQUENCE PERMITTING SITE SPECIFIC EXPRESSION AND/OR DEVELOPMENTALLY REGULATED EXPRESSION OF SELECTED GENETIC SEQUENCES - The present invention relates generally to constructs and in particular genetic constructs comprising polynucleotide sequences capable of release in covalently closed, circular form from a larger nucleotide sequence such as, but not limited to, a genome of a eukaryotic cell. Preferably, once released, a polynucleotide sequence is reconstituted in a form which permits expression of the polynucleotide sequence. In one embodiment, the reconstituted polynucleotide sequence comprises a coding sequence with all or part of an extraneous nucleotide such as, but not limited to, an intronic sequence or other splice signal inserted therein. Expression and in particular transcription of the coding sequence involves splicing out the extraneous sequence. The release and circularization is generally in response to a stimulus such as a protein-mediated stimulus. More particularly, the protein is a viral or prokaryotic or eukaryotic derived protein or developmentally and/or tissue specific regulated protein. | 2011-05-19 |
20110119783 | GLYPHOSATE-TOLERANT WHEAT GENOTYPES - The present invention provides methods for producing glyphosate-tolerant wheat genotypes by mutagenesis, glyphosate wheat plants produced by such methods, and related compositions and methods. | 2011-05-19 |
20110119784 | Cotton Variety FM 1845LLB2 - The cotton variety FM 1845LLB2 is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and cotton lint as well as to hybrid cotton plants and seeds obtained by repeatedly crossing plants of variety FM 1845LLB2 with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of FM 1845LLB2 and to plants of FM 1845LLB2 reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from FM 1845LLB2. | 2011-05-19 |
20110119785 | NUCLEOTIDE SEQUENCES AND CORRESPONDING POLYPEPTIDES CONFERRING MODULATED GROWTH RATE AND BIOMASS IN PLANTS GROWN IN SALINE AND OXIDATIVE CONDITIONS - The present invention relates to isolated nucleic acid molecules and their corresponding encoded polypeptides able confer the trait of improved plant size, vegetative growth, growth rate, seedling vigor and/or biomass in plants challenged with saline and/or oxidative stress conditions. The present invention further relates to the use of these nucleic acid molecules and polypeptides in making transgenic plants, plant cells, plant materials or seeds of a plant having plant size, vegetative growth, growth rate, seedling vigor and/or biomass that are improved in saline and/or oxidative stress conditions with respect to wild-type plants grown under similar conditions. | 2011-05-19 |
20110119786 | INOSITOL POLYPHOSPHATE 2-KINASE GENES AND USES THEREOF - This invention relates to newly identified polynucleotides and polypeptides in the phytic acid biosynthetic pathways, variants and derivatives of the same; methods for making the polynucleotides, polypeptides, variants, derivatives and antagonists. In particular, the invention relates to polynucleotides encoding inositol polyphosphate 2-kinase (IPP2-K) and polypeptides exhibiting such activity to modulate the phytic acid biosynthesis in such a way as to decrease phytic acid and/or increase the non-phytic acid phosphorous, especially in corn or soy animal feedstuffs. | 2011-05-19 |
20110119787 | FRUCTAN BIOSYNTHETIC ENZYMES - This invention relates to isolated nucleic acid fragments encoding fructosyltransferases. More specifically, this invention relates to polynucleotides encoding 1-FFTs, 6-SFTs, or 1-SSTs. The invention also relates to the construction of a recombinant DNA constructs encoding all or a portion of the fructosyltransferases, in sense or antisense orientation, wherein expression of the recombinant DNA construct results in production of altered levels of the fructosyltransferases in a transformed host cell. | 2011-05-19 |
20110119788 | METHOD FOR GENERATING RESISTANCE AGAINST CITRUS DISEASES CAUSED BY INSECTS, FUNGI, OOMYCETES, BACTERIA OR NEMATODES - The invention consists in modifying the levels of accumulation and emission of monoterpenes and sesquiterpenes in citrus as a mechanism to achieve systemic resistance against pathogens or repellency against pests. The alteration of the content of d-limonene and other terpenes is achieved by genetic transformation via the introduction of a gene that encodes an enzyme with d-limonene synthase activity, from a citrus fruit or plant or from another living organism, in antisense or RNAi (RNA interference) configuration. Genetic modification is achieved either by | 2011-05-19 |
20110119789 | TRANSCRIPTION FACTORS FOR INCREASING YIELD - The invention is directed to transgenic plants transformed with nucleic acids that encode a plant transcription factor that increases the transgenic plant's size and yield and/or delays flowering in the plant, and methods of using and producing the transgenic plants. | 2011-05-19 |
20110119790 | Gene Participating in Low Temperature Germinability in Rice and Utilization of the Same - The present invention provides a gene participating in the low temperature germinability in rice and utilization of the same, and the invention relates to a gene for a low temperature germinability which is an isolated qLTG-3-1 gene from the rice line Italica Livorno, has low temperature germinability and has the base sequence of SEQ ID NO: 1; an amino acid sequence encoded by the gene; a transgenic plant transformed with the gene for the low temperature germinability to improve the low temperature germinability; a method of analyzing low temperature germinability, including analyzing the low temperature germinability of a cultivar by comparing the base sequence of the gene for the low temperature germinability with the genotype of the cultivar; a method of improving the low temperature germinability of rice, including transforming the gene for the low temperature germinability into a rice cultivar to improve the low temperature germinability of the cultivar under low temperature conditions; and a method of analyzing the low temperature germinability of a rice cultivar by utilizing the expression of the gene for the low temperature germinability. | 2011-05-19 |
20110119791 | ISOLATED POLYPEPTIDES, POLYNUCLEOTIDES USEFUL FOR MODIFYING WATER USER EFFICIENCY, FERTILIZER USE EFFICIENCY, BIOTIC/ABIOTIC STRESS TOLERANCE, YIELD AND BIOMASS IN PLANTS - Polynucleotides, polypeptides, plant cells expressing same and methods of using same for increasing abiotic stress tolerance water use efficiency (WUE), fertilizer use efficiency (FUE), biomass, vigor and/or yield of a plant. The method is effected by expressing within the plant an exogenous polynucleotide encoding a polypeptide comprising an amino acid sequence at least 80% homologous to the amino acid sequence selected from the group consisting of SEQ ID NOs:33, 34, 30, 27-29, 31, 32, 35-52, 1401-1403, 1405-1435, 1437-1494, 1496-1542, 1544-1553, 1555-1559, 1561-1827, 1829-1866, 1868-2450, 2453-2458, 2460-2463, 2465-2481, 2483, 2485-2746, 2765-2769, 3052-3065 and 3067-3259, thereby increasing the water use efficiency (WUE), the fertilizer use efficiency (FUE), the biomass, the vigor and/or the yield of the plant. | 2011-05-19 |
20110119792 | Genes Controlling Plant Root Growth And Development For Stress Tolerance And Method Of Their Use - Microarrays are employed to analyze soybean transcriptome under water stress conditions in different regions of the root at vegetative stage. Drought responsive genes and transcription factors are identified which may be used for enhancing drought tolerance in soybean or other plants through genetic/metabolic engineering. This disclosure pertains to nucleic acid molecules isolated from soybean and maize that encode polypeptides that may be important for drought tolerance. The disclosure also relates to methods of using these genes from soybean in transgenic plants to confer the desired agronomic traits, and to use such genes or regulatory elements thereof to assist germplasm enhancement by molecular breeding or to identify other factors or chemicals that may enhance a plant's capability to grow under drought conditions. | 2011-05-19 |
20110119793 | Chimeric promoters and their uses thereof in Plants - The present invention provides novel promoters for use in plants. Specifically, the present invention provides novel enhanced plant promoters. The present invention also provides DNA constructs; transgenic cells, plants, and seeds containing these novel promoters; and methods for preparing and using the same. | 2011-05-19 |
20110119795 | ARTIFICIAL PLANT MINICHROMOSOMES - Artificial plant minichromosomes comprising a functional centromere which specifically bind centromeric protein C (CENPC) and methods for making such minichromosomes are described. | 2011-05-19 |
20110119796 | Floribunda rose plant named 'Meipluvia' - A new and distinct Floribunda rose plant is provided which forms attractive blossoms having an intense ocher coloration. The blossoms tend to be substantially uniform in appearance and blossoming is displayed on a substantially continuous basis throughout the season. The plant exhibits strong vegetation, a bushy growth habit, and dark green foliage with a semi-glossy aspect. No particular disease concern has been encountered during observations to date. The attractive dark green foliage contrasts nicely with the intense ocher blossom coloration. The new variety is well suited for growing as attractive ornamentation in parks and gardens. | 2011-05-19 |
20110119797 | Peach tree, 'Burpeachtwentythree' - A new and distinct variety of peach tree ( | 2011-05-19 |
20110119798 | Grapevine plant named 'Sugrathirtysix' - A new and distinct grapevine variety characterized by producing early ripening, round berries with uniform red colored berry skin. The berries have high sugar content and a mild, sweet Muscat flavor. A cluster of fruit has good attachment, but is not as compact as those of other comparable varieties. | 2011-05-19 |
20110119799 | Cactaceae plant named "Rita Scott" - A plant variety of the Cactaceae family, | 2011-05-19 |