22nd week of 2011 patent applcation highlights part 54 |
Patent application number | Title | Published |
20110131643 | Token Mediation Service in a Data Management System - A method and system for mediating security tokens to authorization data transactions in a data management system. The methods and systems intercept a data request between two applications or services, and validate and translate a security token sent with the data request from a format compatible with the first application or service to a format compatible with the second application or service. | 2011-06-02 |
20110131644 | NETWORK SECURITY SYSTEM HAVING A DEVICE PROFILER COMMUNICATIVELY COUPLED TO A TRAFFIC MONITOR - A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities. | 2011-06-02 |
20110131645 | LOAD BALANCING AND FAILOVER OF GATEWAY DEVICES - Methods and systems for load balancing and failover among gateway devices are disclosed. One method provides for assigning communication transaction handling to a gateway. The method includes receiving a request for a license from a computing device at a control gateway within a group of gateway devices including a plurality of gateway devices configured to support communication of cryptographically split data. The method also includes assigning communications from the computing device to one of the plurality of gateway devices based on a load balancing algorithm, and routing the communication request to the assigned gateway device. | 2011-06-02 |
20110131646 | APPARATUS AND METHOD FOR PREVENTING NETWORK ATTACKS, AND PACKET TRANSMISSION AND RECEPTION PROCESSING APPARATUS AND METHOD USING THE SAME - An apparatus for preventing network attacks includes: a packet buffer for storing received packets from a network; a filtering unit for filtering harmful packets based on a result of comparison between information of the received packets and preset filtering information to select a first filtering target packet; an SYN cookie handler for selecting a second filtering target packet using an SYN cookie if it is determined that there is a TCP SYN flooding attack based on the information of the received packets after said filtering; and a session manager for selecting a third filtering target packet through session management if there is a TCP flag flooding attack based on the information of the received packets after said filtering. The apparatus further includes a packet transmission and receipt processing method and apparatus using above. | 2011-06-02 |
20110131647 | Virtual Endpoint Solution - A virtual endpoint solution to provides secure connectivity between a service provider network and the client network over the public Internet. This virtual private network (VPN) connection is fully routable from the service provider network to the client network and masqueraded on the client network to prevent any IP conflicts or routing issues. The virtualized endpoint allows for the VPN connection to be created without dedicated hardware or systems and able to run in almost any environment. | 2011-06-02 |
20110131648 | Method and System for Digital Communication Security Using Computer Systems - Methods and systems are provided for network security. In one embodiment, the method may involve receiving a data packet (e.g. from a firewall). The method may involve running an inspection of the received data packet within a virtual network, the virtual network duplicating at least a portion (e.g., servers(s) and/or application(s)) of a protected network. The method may involve sending the inspected data packet, or portion and/or modified version thereof, to the protected network, in response to the data packet passing the inspection within the virtual network. The method may also involve blocking passage of the data packet to the protected network, in response to the data packet failing the inspection. | 2011-06-02 |
20110131649 | Method and apparatus of securing data in a portable flash memory - A method and apparatus of securing data stored in a memory of a portable memory storage device are disclosed. One example may include activating an authentication detection component of the portable memory storage device, and verifying an authentication key via the authentication detection component of the portable memory storage device. Once the authentication is complete, additional operations may include interfacing the portable memory storage device with a computing device and accessing data stored in the memory device. Upon ending the access operation, the discontinuing of the interfacing of the memory storage device with the computing device will automatically lock the memory storage device after a predetermined time has passed. | 2011-06-02 |
20110131650 | METHODS, DEVICES, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR EDGE DRIVEN COMMUNICATIONS NETWORK SECURITY MONITORING - An edge monitoring approach can be utilized to detect an attack which includes a plurality of relatively low bandwidth attacks, which are aggregated at a victim sub-network. The aggregated low bandwidth attacks can generate a relatively high bandwidth attack including un-solicited data traffic directed to the victim' so that the aggregated attack becomes more detectable at an edge monitor circuit located proximate to the victim. Related systems, devices, and computer program products are also disclosed. | 2011-06-02 |
20110131651 | METHOD AND DEVICE FOR DETECTING A SPOOFING ATTACK IN A WIRELESS COMMUNICATION NETWORK - A method and device enables detecting a spoofing attack in a wireless communication network ( | 2011-06-02 |
20110131652 | TRAINED PREDICTIVE SERVICES TO INTERDICT UNDESIRED WEBSITE ACCESSES - Webcrawlers and scraper bots are detrimental because they place a significant processing burden on web servers, corrupt traffic metrics, use excessive bandwidth, excessively load web servers, create spam, cause ad click fraud, encourage unauthorized linking, deprive the original collector/poster of the information of exclusive rights to analysis and summarize information posted on their own site, and enable anyone to create low-cost Internet advertising network products for ultimate sellers. A scaleable predictive service distributed in the cloud can be used to detect scraper activity in real time and take appropriate interdictive access up to and including denial of service based on the likelihood that non-human agents are responsible for accesses. Information gathered from a number of servers can be aggregated to provide real time interdiction protecting a number of disparate servers in a network. | 2011-06-02 |
20110131653 | SYSTEMS AND METHODS FOR MANAGING MESSAGES IN AN ENTERPRISE NETWORK - A protocol management system is capable of detecting certain message protocols and applying policy rules to the detected message protocols that prevent intrusion, or abuse, of a network's resources. In one aspect, a protocol message gateway is configured to apply policy rules to high level message protocols, such as those that reside at layer 7 of the ISO protocol stack. | 2011-06-02 |
20110131654 | SYSTEMS AND METHODS FOR AGGRESSIVE WINDOW PROBING - The present application is directed towards systems and methods for aggressively probing a client side connection to determine and counteract a malicious window size attack or similar behavior from a malfunctioning client. The solution described herein detects when a connection may be under malicious attach via improper or unusual window size settings. Responsive to the detection, the solution described herein will setup probes that determine whether or not the client is malicious and does so within an aggressive time period to avoid the tying up of processing cycles, transport layer sockets and buffers, and other resources of the sender. | 2011-06-02 |
20110131655 | DETECTION OF FREQUENT AND DISPERSED INVARIANTS - A scalable method and apparatus that detects frequent and dispersed invariants is disclosed. More particularly, the application discloses a system that can simultaneously track frequency rates and dispersion criteria of unknown invariants. In other words, the application discloses an invariant detection system implemented in hardware (and/or software) that allows detection of invariants (e.g., byte sequences) that are highly prevalent (e.g., repeating with a high frequency) and dispersed (e.g., originating from many sources and destined to many destinations). | 2011-06-02 |
20110131656 | IDENTIFYING SECURITY VULNERABILITY IN COMPUTER SOFTWARE - Identifying a security vulnerability in a computer software application by identifying at least one source in a computer software application, identifying at least one sink in the computer software application, identifying at least one input to any of the sinks, determining whether the input derives its value directly or indirectly from any of the sources, determining a set of possible values for the input, and identifying a security vulnerability where the set of possible values for the input does not match a predefined specification of legal values associated with the sink input. | 2011-06-02 |
20110131657 | HOOKING NONEXPORTED FUNCTIONS BY THE OFFSET OF THE FUNCTION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for obfuscated malware. In one aspect, a method includes accessing offset data associated with a binary executable, the offset data including an offset of a nonexported function; and modifying instructions at the offset. In another aspect, a method includes analyzing a reference generated for a binary executable, identifying a unique identifier for the binary executable, determining an offset of a nonexported function in the binary executable, and generating offset data that includes the offset and the unique identifier. | 2011-06-02 |
20110131658 | DYNAMIC RISK MANAGEMENT - A dynamic risk management system for operating systems that provides monitoring, detection, assessment, and follow-up action to reduce the risk whenever it rises. The system enables an operating system to protect itself automatically in dynamic environments. The risk management system monitors a diverse set of attributes of the system which determines the security state of the system and is indicative of the risk the system is under. Based on a specification of risk levels for the various attributes and for their combinations, the risk management system determines whether one or more actions are required to alleviate the overall risk to the system. | 2011-06-02 |
20110131659 | EXTENSIBLE FRAMEWORK FOR SYSTEM SECURITY STATE REPORTING AND REMEDIATION - A security health reporting system provides an application program interface (API) for use by independent software vendors (ISVs) to extend the security health reporting capabilities of the security health reporting system. An ISV security solution can register with the security health reporting system, create a schema that describes a new security class, and use the API to publish an instance of the schema for the new security class with the security health reporting system. When an instance of a schema for a new security class is published, the security health reporting system creates the new security class, and recognizes the definition for the security class within the security health reporting system. Registered ISV security solutions can then use the published schema to report their health statuses for the new security class. | 2011-06-02 |
20110131660 | Methods and Apparatus for Transfer of Content to a Self Contained Wireless Media Device - Systems and techniques for transferring data to a storage device. A storage device includes storage, a processor, and a wireless transceiver, as well as a connector allowing the storage device to operate according to an appropriate standard when connected to a playback or data device. The storage device can communicate with a data transfer station to wirelessly receive data from the station. A user may select data to be transferred to a removable media device, and the station transfers the data over a wireless connection. The removable media device stores the data in memory as it is received. Once the data has been received, the data can be played or otherwise used in any playback or data device to which the storage device may be connected for use as a memory device. | 2011-06-02 |
20110131661 | METHOD AND SYSTEM FOR PROTECTION OFUSER INFORMATION REGISTRATIONS APPLICABLE IN ELECTORAL PROCESSES - The present invention describes a method and system for protecting the integrity and authorship of a piece of registration information of the user, applicable in voter information registration, by means of biometric techniques. To that end, after a first stage of entering a piece of registration information, a second stage of protecting the integrity of the registration information is implemented. In this second stage, an item of integrity proof of said information is generated and said item of integrity proof is displayed to the user who wishes to protect it. In a third stage of generating an item of non-repudiation proof of the registration information, an item of biometric proof of the user which contains the item of integrity proof displayed is obtained, an item of non-repudiation proof is constructed from said item of biometric proof, and finally the item of non-repudiation proof is stored. | 2011-06-02 |
20110131662 | INFORMATION PROCESSOR AND LOCK SETTING METHOD - According to one embodiment, an information processor includes a checker and a lock enabling module. The checker checks whether each of different types of lock mechanisms is enabled. When the lock mechanisms include an enabled lock mechanism, the lock enabling module enables a lock mechanism other than the enabled lock mechanism. | 2011-06-02 |
20110131663 | METHOD AND APPARATUS FOR PROVIDING ACCESS TO SOCIAL CONTENT - An apparatus for providing access to social content may include at least one processor and at least one memory including computer program code. The at least one memory and the computer program code may be configured to, with the at least one processor, cause the apparatus to perform at least receiving information providing corresponding identities of a plurality of members of a group, receiving an indication of group content including at least one content item stored in association with the group, and enabling access to the group content by the members based on presence information related to the members indicating that a presence threshold associated with the group content is met. A corresponding method and computer program product are also provided. | 2011-06-02 |
20110131664 | CONTENT AGING - A device includes a memory to store instructions; and a processor to execute the instructions to determine that access rights, associated with a particular user in relation to particular content, have expired; degrade an appearance of the particular content or a representation of the particular content, where the degradation is amplified over a grace period that commences upon the expiration of the access rights, in response to determining that the access rights have expired; determine that the grace period associated with the expired access rights has ended; and end access to the particular content, in response to determining that the grace period has ended. | 2011-06-02 |
20110131665 | INFORMATION PROCESSING APPARATUS, DATA PROCESSING METHOD AND PROGRAM - A configuration is achieved in which content copying between media and content downloading are performed effectively and under strict management. In content copying between media, the identification information (medium ID) of a copying destination medium is obtained using an API for providing a predefined processing, then the obtained medium ID is transmitted to a server to obtain copying permission information from the server, and then content copying is performed under the management of the server. This configuration allows a copying destination medium to be managed, which can eliminate the unauthorized use of the content. Also, the configuration in which content downloading from the server is performed according to, for example, a Java® program allows a ROM disc on which the content is recorded to store the program and to be provided to a user. | 2011-06-02 |
20110131666 | VEHICLE DATA STORAGE SYSTEM, VEHICLE DATA STORAGE APPARATUS, VEHICLE DATA STORAGE SERVER, AND VEHICLE DATA STORAGE METHOD - A vehicle data storage system, in which vehicle data obtained from a vehicle-mounted device is stored, includes a vehicle data storage portion in which the vehicle data is stored; a country determination portion that determines a country in which a vehicle exists, based on position data of the vehicle; a selection table storage portion in which a type of the vehicle data that should be stored in the vehicle data storage portion is stored in association with country data; a data determination portion that determines the type of the vehicle data that should be stored in the vehicle data storage portion, based on the country determined by the country determination portion, by referring to the selection table storage portion; and a data processing portion that stores, in the vehicle data storage portion, the vehicle data determined by the data determination portion. | 2011-06-02 |
20110131667 | Tumor Model System Useful to Study Multistage Cancer - The present invention relates to a method of developing a Tumor Model System. The invention deals with a tumor model system with adhesion deprived cells. This observation provides a new method for primary detection of transformation of adhesion-deprived cells and tumorigenicity. The adhesion-deprived cells are capable of metastasizing at distant sites and the model system includes both the tumor formation and metastasis. | 2011-06-02 |
20110131668 | IMPROVED GENE SILENCING METHODS - Provided are methods and means to obtain improved gene silencing of target nucleic acids whereby at least two inhibitory RNA molecules are provided which are targeted to the same nucleic acid, but which are processed into short interfering RNA molecules through different processing pathways. Also provided are methods and means to obtain improved gene silencing of target nucleic acids whereby at least two inhibitory RNA molecules are provided which are targeted to different nucleic acids, but which are processed into short interfering RNA molecules through different processing pathways. | 2011-06-02 |
20110131669 | GANGLIOSIDE EPITOPES FOR TREATING GUILLAIN-BARRE SYNDROME - Disclosed are compositions and methods for treating Guillain-Barré syndrome (GBS) in a subject that involves neutralizing specific pathogenic anti-glycolipid antibodies in the circulation of the subject. This can involve administering to the subject a molecular mimic of a ganglioside that serves as a specific competitive inhibitor for anti-ganglioside antibodies in the circulation. Also disclosed is an animal model of GBS having anti-ganglioside antibodies in the circulation. | 2011-06-02 |
20110131670 | Non-Aggregating Fluorescent Proteins and Methods for Using the Same - Nucleic acid compositions encoding non-aggregating chromo/fluoroproteins and mutants thereof, as well as the proteins encoded by the same, are provided. The proteins of interest are polypeptides that are non-aggregating colored and/or fluorescent proteins, where the non-aggregating feature arises from the modulation of residues in the N-terminus of the protein and the chromo and/or fluorescent feature arises from the interaction of two or more residues of the protein. Also provided are fragments of the subject nucleic acids and the peptides encoded thereby, as well as antibodies to the subject proteins and transgenic cells and organisms. The subject protein and nucleic acid compositions find use in a variety of different applications. Finally, kits for use in such applications, e.g., that include the subject nucleic acid compositions, are provided. | 2011-06-02 |
20110131671 | POLYMORPHISMS IN THE HUMAN GENE FOR CYTOCHROME P450 POLYPEPTIDE 2C8 AND THEIR USE IN DIAGNOSTIC AND THERAPEUTIC APPLICATIONS - The present invention relates to a polymorphic CYP2C8-polynucleotide. Moreover, the invention relates to genes or vectors comprising the polynucleotides of the invention and to a host cell genetically engineered with the polynucleotide or gene of the invention. Further, the invention relates to methods for producing molecular variant polypeptides or fragments thereof, methods for producing cells capable of expressing a molecular variant polypeptide and to a polypeptide or fragment thereof encoded by the polynucleotide or the gene of the invention or which is obtainable by the method or from the cells produced by the method of the invention. Furthermore, the invention relates to an antibody which binds specifically the polypeptide of the invention. Moreover, the invention relates to a transgenic non-human animal. The invention also relates to a solid support comprising one or a plurality of the above mentioned polynucleotides, genes, vectors, polypeptides, antibodies or host cells. Furthermore, methods of identifying a polymorphism, identifying and obtaining a prodrug or drug or an inhibitor are also encompassed by the present invention. In addition, the invention relates to methods for producing of a pharmaceutical composition and to methods of diagnosing a disease. Further, the invention relates to a method of detection of the polynucleotide of the invention. Furthermore, comprised by the present invention are a diagnostic and a pharmaceutical composition. Even more, the invention relates to uses of the polynucleotides, genes, vectors, polypeptides or antibodies of the invention. Finally, the invention relates to a diagnostic kit. | 2011-06-02 |
20110131672 | STRESS RESISTANT PLANTS - Stress tolerance in plants and plant cells is achieved by using nucleotide sequences encoding enzymes involved in the NAD salvage synthesis pathway and/or the NAD de novo synthesis pathway e.g. for overexpression in plants. | 2011-06-02 |
20110131673 | Soybean Cultivar S080195 - A soybean cultivar designated S080195 is disclosed. The invention relates to the seeds of soybean cultivar S080195, to the plants of soybean S080195, to plant parts of soybean cultivar S080195, and to methods for producing a soybean plant produced by crossing soybean cultivar S080195 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S080195, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S080195, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S080195 with another soybean cultivar. | 2011-06-02 |
20110131674 | Soybean Cultivar S080102 - A soybean cultivar designated S080102 is disclosed. The invention relates to the seeds of soybean cultivar S080102, to the plants of soybean S080102, to plant parts of soybean cultivar S080102, and to methods for producing a soybean plant produced by crossing soybean cultivar S080102 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S080102, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S080102, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S080102 with another soybean cultivar. | 2011-06-02 |
20110131675 | Soybean Cultivar S080103 - A soybean cultivar designated S080103 is disclosed. The invention relates to the seeds of soybean cultivar S080103, to the plants of soybean S080103, to plant parts of soybean cultivar S080103, and to methods for producing a soybean plant produced by crossing soybean cultivar S080103 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S080103, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S080103, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S080103 with another soybean cultivar. | 2011-06-02 |
20110131676 | Soybean Cultivar S080104 - A soybean cultivar designated S080104 is disclosed. The invention relates to the seeds of soybean cultivar S080104, to the plants of soybean S080104, to plant parts of soybean cultivar S080104, and to methods for producing a soybean plant produced by crossing soybean cultivar S080104 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S080104, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S080104, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S080104 with another soybean cultivar. | 2011-06-02 |
20110131677 | GENETIC LOCI ASSOCIATED WITH FUSARIUM SOLANI TOLERANCE IN SOYBEAN - The invention relates to methods and compositions for identifying soybean plants that are tolerant, have improved tolerance or are susceptible to | 2011-06-02 |
20110131678 | COMPOSITIONS AND METHODS FOR DIFFERENTIAL REGULATION OF FATTY ACID UNSATURATION IN MEMBRANE LIPIDS AND SEED OIL - Aspects of the invention provide methods for differential regulation of fatty acid unsaturation in seed oil and membrane lipids of plants based on modulation of a previously unknown biosynthetic pathway involving a novel phosphatidylcholine: diacylglycerol cholinephosphotransferase (PDCT) that regulates phosphatidylcholine biosynthesis in developing oil seed plants. Specific aspects relate to inventive PDCT polypeptides including, for example, variants, deletions, muteins, fusion proteins, and orthologs thereof (collectively PDCT proteins), to nucleic acids encoding same, to plants comprising such PDCT sequences or proteins or devoid or depleted of such PDCT proteins or sequences, and to methods for generating plants having altered or no PDCT expression and/or activity, including but not limited to methods comprising mutagenesis, recombinant DNA, transgenics, etc. | 2011-06-02 |
20110131679 | Rice Nucleic Acid Molecules and Other Molecules Associated with Plants and Uses Thereof for Plant Improvement - Polynucleotides useful for improvement of plants are provided. In particular, polynucleotide sequences are provided from plant sources. Polypeptides encoded by the polynucleotide sequences are also provided. The disclosed polynucleotides and polypeptides find use in production of transgenic plants to produce plants having improved properties. | 2011-06-02 |
20110131680 | METHOD OF ENHANCING GENE EXPRESSION IN PLANTS - A method of enhancing the expression of a gene in a legume plant is provided comprising introducing into the cells of said plant a construct comprising at least a portion of a 5′-untranslated region of a heat shock transcription factor gene from | 2011-06-02 |
20110131681 | Increased Stress Tolerance, Yield, and Quality via Glutaredoxin Overexpression - Oxygenic photosynthesis is the major site of production of reactive oxygen species (ROS). Under high temperature stress, increased ROS damage the photosynthetic machinery, membranes and proteins of plants. The present invention is directed to methods for increasing the stress tolerance of plants by expressing PvGrx5 in the plants. | 2011-06-02 |
20110131682 | Means and Methods for Controlling Flowering in Plants - Described are means and methods for controlling flowering in plants. In particular, described are nucleic acid molecules which, when expressed in sense orientation or in antisense orientation, respectively, in plants lead to a prevention of flowering Moreover; a method for controlling flowering in plants is provided which comprises the inducible restoration of flowering in plants in which flowering is prevented. | 2011-06-02 |
20110131683 | Polypeptide Inducing Dwarfism of Plants, Polynucleotide Coding the Polypeptide, and Those Use - Provided are polypeptides capable of inducing dwarfism in plants, polynucleotides encoding the same, and uses thereof. | 2011-06-02 |
20110131684 | Plants Having Enhanced Yield-Related Traits and a Method for Making the Same - The present invention relates generally to the field of molecular biology and concerns a method for enhancing yield-related traits by modulating expression in a plant of a nucleic acid encoding an MSR (Methionine_Sulfoxide_Reductase). The present invention also concerns plants having modulated expression of a nucleic acid encoding a MSR, which plants have enhanced yield-related relative to corresponding wild type plants or other control plants. The invention also provides constructs useful in the methods of the invention. Furthermore, the present invention relates generally to the field of molecular biology and concerns a method for enhancing yield-related traits by modulating expression in a plant of a nucleic acid encoding an Enolase. The present invention also concerns plants having modulated expression of a nucleic acid encoding an Enolase, which plants have enhanced yield-related traits relative to corresponding wild type plants or other control plants. The invention also provides constructs useful in the methods of the invention. Even furthermore, the present invention relates generally to the field of molecular biology and concerns a method for enhancing various yield-related traits in plants by modulating expression in a plant of a nucleic acid encoding a ZAT-like zinc transporter. The present invention also concerns plants having modulated expression of a nucleic acid encoding a ZAT-like zinc transporter, which plants have enhanced yield-related traits relative to corresponding wild type plants or other control plants. The invention also provides constructs useful in the methods of the invention. Yet furthermore, the present invention relates generally to the field of molecular biology and concerns a method for improving various plant growth characteristics by modulating expression in a plant of a nucleic acid encoding 6-PGDH (6-phosphogluconate dehydrogenase or 6-phosphogluconate dehydrogenase) polypeptide. The present invention also concerns plants having modulated expression of a nucleic acid encoding a 6-PGDH polypeptide, which plants have improved growth characteristics relative to corresponding wild type plants or other control plants. The invention also provides constructs useful in the methods of the invention. | 2011-06-02 |
20110131685 | Method for Improving Transformation Efficiency Using Powder - The present invention provides a method for | 2011-06-02 |
20110131686 | Polypeptides having beta-glucosidase activity and polynucleotides encoding same - The present invention relates to isolated polypeptides having beta-glucosidase activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides. | 2011-06-02 |
20110131687 | Polypeptides having arabinofuranosidase activity and polynucleotides encoding same - The present invention relates to isolated polypeptides having alpha-L-arabinofuranosidase activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides. | 2011-06-02 |
20110131688 | REGULATING THE ETHYLENE RESPONSE OF A PLANT BY MODULATION OF F-BOX PROTEINS - The relationship between F-box proteins and proteins involved in the ethylene response in plants is described. In particular, F-box proteins may bind to proteins involved in the ethylene response and target them for degradation by the ubiquitin/proteasome pathway. The transcription factor EIN3 is a key transcription factor mediating ethylene-regulated gene expression and morphological responses. EIN3 is degraded through a ubiquitin/proteasome pathway mediated by F-box proteins EBF1 and EBF2. The link between F-box proteins and the ethylene response is a key step in modulating or regulating the response of a plant to ethylene. Described herein are transgenic plants having an altered sensitivity to ethylene, and methods for making transgenic plant having an altered sensitivity to ethylene by modulating the level of activity of F-box proteins. Methods of altering the ethylene response in a plant by modulating the activity or expression of an F-box protein are described. Also described are methods of identifying compounds that modulate the ethylene response in plants by modulating the level of F-box protein expression or activity. | 2011-06-02 |
20110131689 | LOW SATURATED-FAT SUNFLOWER AND ASSOCIATED METHODS - Provided are sunflowers, parts thereof, cultures of, and seeds that are capable of producing sunflower oil that is low in saturated fat and, optionally, high in linoleic acid as well as associated methods. | 2011-06-02 |
20110131690 | Scanning Ion Conductance Microscopy - The subject invention concerns methods for interrogating a surface using scanning ion conductance microscopy (SICM). In one embodiment, a method of the invention comprises the steps of:
| 2011-06-02 |
20110131691 | Guzmania plant named 'Duranas' - A new and distinct | 2011-06-02 |
20110131692 | Grape named prophecy - The invention is a new and distinct variety of grape plant designated #194-95, “Prophecy”, which produces small, round, blue-black colored fruit suitable for red wine production. It combines late bud-break and ripening, excellent disease resistance, extremely high vigor, moderate productivity, and good mechanical harvestability with high wine quality chemistry and excellent flavors. | 2011-06-02 |
20110131693 | Phalaenopsis plant named 'TAIDA LITTLE ZEBRA' - A new and distinct | 2011-06-02 |