25th week of 2011 patent applcation highlights part 86 |
Patent application number | Title | Published |
20110154486 | METHODS AND APPARATUS FOR MANAGING USER ACCESS TO A COMPUTING ENVIRONMENT - Methods and apparatus for controlling user access to a computing environment are provided. In one embodiment, a method performed by a user is provided for gaining access to at least one computing device. The method comprises gaining access to the at least one computing device at a first time by providing credential information to the at least one computing device to authenticate the user's identity to the at least one computing device; presenting to the at least one computing device a physical device comprising identifying information to associate the physical device with the user authenticated by the credential information; and gaining access to the at least one computing device at a subsequent time by presenting the physical device to the at least one computing device without providing the credential information. | 2011-06-23 |
20110154487 | SOFTWARE BEHAVIOR MODELING DEVICE, SOFTWARE BEHAVIOR MODELING METHOD, SOFTWARE BEHAVIOR VERIFICATION DEVICE, AND SOFTWARE BEHAVIOR VERIFICATION METHOD - A software behavior modeling device which forms a model of a behavior of software includes; an event information acquisition unit configured to acquire event information indicating a specific event which occurs during execution of the software; a stack information acquisition unit configured to acquire stack information stored in a call stack at a time of occurrence of the specific event; a score setting unit configured to set a score in accordance with a storage location in which each element included in the stack information is stored in the call stack; and a model generating unit configured to form a model of a relationship between the specific event and the element by using the score, and to generate a behavior model of the software. | 2011-06-23 |
20110154488 | SYSTEMS AND METHODS FOR GENERATING AND MANAGING COOKIE SIGNATURES FOR PREVENTION OF HTTP DENIAL OF SERVICE IN MULTI-CORE SYSTEM - The present application is directed towards systems and methods for generating and maintaining cookie consistency for security protection across a plurality of cores in a multi-core system. A packet processing engine executing on one core designated as a primary packet processing engine generates and maintains a global random seed. The global random seed may be used as an initial seed for creation of cookie signatures by each of a plurality of packet processing engines executing on a plurality of cores of the multi-core system using a deterministic pseudo-random number generation function such that each core creates an identical set of cookie signatures. | 2011-06-23 |
20110154489 | SYSTEM FOR ANALYZING MALICIOUS BOTNET ACTIVITY IN REAL TIME - A system for analyzing malicious botnet activity in real time is disclosed. This system may include: a control server configured to generate botnet activity information relating to a type of malicious botnet activity, and transmit the botnet activity information to the outside, after receiving bot occurrence information from the outside; | 2011-06-23 |
20110154490 | Malicious Software Prevention Using Shared Information - A method and apparatus for managing executable files. Responsive to detecting a request to run an executable file on a computer, a processor unit determines whether the executable file was downloaded to the computer within a period of time associated with a recent download. Responsive to a determination that the executable file was downloaded to the computer within the period of time, the processor unit determines whether feedback for the executable file from a number of users of the executable file is present in a repository. The feedback identified for the executable file in the repository is presented using a presentation system. User input as to whether the executable file should be run is prompted for by the processor unit after presenting the feedback. | 2011-06-23 |
20110154491 | REMOVING AN ACTIVE APPLICATION FROM A REMOTE DEVICE - A system and a method are disclosed for managing applications on a mobile computing device. A command message is received at the mobile computing device specifying a command and a target application. The command message may have been sent by a application provider server. The command may be a removal command, an enable command, or a disable command. A removal or disable command may be used to remove or disable a problematic target application. The specified command is performed on the target application. | 2011-06-23 |
20110154492 | MALICIOUS TRAFFIC ISOLATION SYSTEM AND METHOD USING BOTNET INFORMATION - The present invention relates to a malicious traffic isolation system and method using botnet information, and more particularly, to a malicious traffic isolation system and method using botnet information, in which traffics for a set of clients having the same destination are routed to the isolation system based on a destination IP/Port, and botnet traffics are isolated using botnet information based on similarity among groups of the routed and flowed in traffics. The present invention may provide a malicious traffic isolation method using botnet information, which can accommodate traffics received from a PC or a C&C server infected with a bot into a quarantine area, isolate traffics generated by normal users from traffics transmitted from malicious bots, and block the malicious traffics. In addition, the present invention may provide a malicious traffic isolation method using botnet information, which can provide a function of mitigating DDoS attacks of a botnet. | 2011-06-23 |
20110154493 | METHODS FOR INSPECTING DATA AND DEVICES THEREOF - A method, computer readable medium, and apparatus that inspects data includes isolating retrieved target data within a protected construct with the data inspection processing apparatus. The security software is isolated such that the security software is able to access the target data within the protected construct with the data inspection processing apparatus. The data inspection processing apparatus scans the isolated target data with the isolated security software. The data inspection processing apparatus reports whether one or more security threats have been identified from the scan of the isolated retrieved target data. | 2011-06-23 |
20110154494 | Methods and Systems for Network Attack Detection and Prevention Through Redirection - Methods and systems for detection and/or prevention of network attacks can include the use of multiple and/or time-dependent addresses coupled with filtering by the directory or naming service. The directory service can respond to requests for the address of a resource by returning an address that can be relocated over time by coordinating the directory service entry with the host and network address configuration data and/or by returning an address specific to the requestor. Thus, the directory service can track and build profiles of matches between requestors and accesses. The methods and systems can use the time dependent addresses and profiles to distinguish legitimate accesses from unauthorized or malicious ones. Requests for non-valid addresses can be misdirected to “empty” addresses or to detection devices. | 2011-06-23 |
20110154495 | MALWARE IDENTIFICATION AND SCANNING - A method for automatically generating a genetic signature for a set of malware, comprising parsing (step S | 2011-06-23 |
20110154496 | Removable Apparatus and Method for Verifying an Executable File in a Computing Apparatus and Computer-Readable Medium Thereof - Apparatus and method for verifying an executable file in a computing apparatus by a removable apparatus and computer-readable medium thereof are provided. The removable apparatus boots up the computing apparatus and retrieves the executable file from the computing apparatus. After retrieving the executable file, a vendor-verify module and a digest-check module perform a vendor verification and a digest verification on the executable file, respectively. If the executable file fails in both the vendor verification and the digest verification, a file-link-detect module and an auto-run determination module check the behaviors of the executable file for deciding whether the executable file is suspicious. | 2011-06-23 |
20110154497 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR COLLECTING AND REPORTING SENSOR DATA IN A COMMUNICATION NETWORK - A system for collecting and reporting sensor data in a communication network includes a microprocessor coupled to a memory and an electronic storage device. The microprocessor receives sensor data from sensors, and stores the sensor data for each sensor in the electronic storage device. The microprocessor also receives, via the communication network, a data reporting instruction defining a data reporting technique corresponding to the sensor data associated with one or more of the sensors. The data reporting instruction is stored in the electronic storage device, and the microprocessor transmits, to a trust mediator over the communication network, at least a portion of the sensor data based on the data reporting instruction. The trust mediator maintains an acceptable level of security for data throughout the communication network by adjusting security safeguards based on the sensor data. | 2011-06-23 |
20110154498 | APPARATUSES, METHODS AND SYSTEMS OF AN APPLICATION SECURITY MANAGEMENT PLATFORM - This disclosure details the implementation of apparatuses, methods and systems of an application security management platform (hereinafter, “ASMP”). ASMP systems may, in one embodiment, implement a live platform on a computerized system, whereby the platform may receive security data associated with a running application from multiple security tacking systems, evaluate the security performance of the application, generate an application security summary report for review and manage review processes for security professionals. | 2011-06-23 |
20110154499 | Methods and Apparatus for Selecting and Delivering Content - Systems and techniques for selecting and delivering entertainment content. User preference information for entertainment content to accompany user activities is collected and associated with a user. Upon indication by a user of a desire to receive content and designation of an activity to be accompanied by the content, content items are selected and assembled into a package so that the content items may be played in sequence using a user device. The content items comprising the package are delivered to the user device. | 2011-06-23 |
20110154500 | Executing Trusted Applications with Reduced Trusted Computing Base - A system for executing trusted applications with a reduced trusted computing base. In one embodiment, the system includes a processor to dynamically instantiate an application protection module in response to a request by a program to be executed under a trusted mode. The system further includes memory to store the program which is capable of interacting with a remote service for security verification. In one embodiment, the application protection module includes a processor-measured application protection service (P-MAPS) operable to measure and to provide protection to the application. | 2011-06-23 |
20110154501 | HARDWARE ATTESTATION TECHNIQUES - Hardware attestation techniques are described. An apparatus may comprise a platform comprising a processor capable of operating in an isolated execution mode and persistent storage having entity information associated with an entity having control of a software application. The platform may include a security controller communicatively coupled to the platform, the security controller having a signature generator operative to generate a platform signature for the software application executing on the platform, the platform signature comprising a cryptographic hash of entity information, and an attest module operative to provide the platform signature to the software application with the platform signature to attest that that the platform is associated with the software application. Other embodiments are described and claimed. | 2011-06-23 |
20110154502 | Data Protection - A method to manage data access in an electronic device comprising a housing having a lid comprises receiving, from a remote server, a data protection policy, storing the data protection policy in a memory location on the electronic device, detecting a transition from a lid open status to a lid closed status, and in response to the transition, implementing the data protection policy on the electronic device. Other embodiments may be described. | 2011-06-23 |
20110154503 | METHOD OF PROTECTING COMPUTER PROGRAM CODE - Program code is modified to execute correctly only when code and data memory accesses/fetches are synchronised, i.e. data and code accesses/fetches are routed to identical physical addresses in computer memory. This indirectly defeats the MMU attack, in which code and data memory accesses/fetches to the same logical address are routed to different physical addresses. The program code is modified such that one or more sections of the code (“repair targets”) are deliberately broken so that the program code will not execute correctly, the repair targets being replaced at run time with correct code before the repair targets are executed. | 2011-06-23 |
20110154504 | MANAGEMENT SERVER DEVICE, CONTENT REPRODUCTION DEVICE, AND RECORDING MEDIUM - When a technique for specifying an unauthorized terminal based on a combination of watermarks embedded in content distributed without authorization is applied to content distributed on recording media, recording capacity limits of the recording media lead to a limit on the number of combinations of watermarks that can be embedded in the content, and only a limited number of terminals can be specified. In the present invention, all terminals are sorted into the same number of groups as there are combinations of watermarks, and a group that includes an unauthorized terminal can be specified based on the combination of watermarks embedded in the content. When the group including the unauthorized terminal is specified, this group is divided into groups, and a plurality of groups that do not include the unauthorized terminal are integrated. This enables the unauthorized terminal to be specified while keeping within the capacity of the recording medium. | 2011-06-23 |
20110154505 | UNOBTRUSIVE ASSURANCE OF AUTHENTIC USER INTENT - Computer-executable instructions that are directed to the performance of consequential actions and automatically elevate to execute at a higher privilege level to do so can perform such consequential actions only after user notification. Doing so can enable monitoring processes to avoid presenting duplicative user notification upon detection of such auto-elevation. In addition, prior to presenting user notification, input from the execution environment can be ignored and access to DLLs for performing consequential actions can be avoided. A static analyzer can identify non-conforming computer-executable instructions. A wrapper can be utilized to provide compliance by otherwise unknown or non-conforming computer-executable instructions. | 2011-06-23 |
20110154506 | Federation of email - A method of federating electronic mail (e-mail). A request can be received from a first user to view at least one e-mail of a second user, the request including at least one identifier corresponding to the second user and a criteria indicating a subject matter of the e-mail. The method further can include verifying whether the first user is authorized to access the e-mail of the second user that satisfies the criteria. Responsive to determining that the first user is authorized to view the e-mail of the second user that satisfies the criteria, the first user can be provided access to view the at least one e-mail that satisfies the criteria. | 2011-06-23 |
20110154507 | ESTABLISHING AN INTERACTIVE ENVIRONMENT FOR RENDERED DOCUMENTS - A system for identifying an electronic counterpart for a rendered document is described. The system receives an indication of a text capture operation performed from a rendered document. The indication identifies a text sequence captured as part of the text capture operation, the identified text sequence comprising fewer than nine words. In response to receiving the indication, the system uniquely identifies an electronic document from which the rendered document was rendered. | 2011-06-23 |
20110154508 | METHOD AND SYSTEM FOR PROVIDING ONLINE RECORDS - A method for providing a user with the ability to access and collect records associated with the user in a secure and private manner includes associating access information with the user for the user to use to access a server storing files comprising records associated with the user in a computer readable storage medium, providing the user with a user interface on a computing device to remotely access the records stored on the server, receiving at the server the files comprising records associated with the user from a service provider associated with the user, receiving at the server a request from the user made through the user interface of the computing device for access to the files, wherein the access information is associated with the request, and sending the user a file containing the records associated with user from the server to the computing device in response to the request. | 2011-06-23 |
20110154509 | METHOD AND DEVICE FOR PROVIDING A SECURITY BREACH INDICATIVE AUDIO ALERT - A device for providing a security breach indicative audio alert. The device includes: a security monitor adapted to detect a security breach in device and a loudspeaker, the device wherein including a secure audio alert generating hardware, adapted to participate, in response to the detection of the security breach, in a generation of a security breach indicative audio alert. The secure audio alert generating hardware is connected to an audio mixer that is adapted to mix the security breach indicative audio alert signal with audio signals generated by a software controlled audio source to provide a mixed signal. The audio mixer is further adapted to provide the mixed signal to the loudspeaker that reproduces the mixed signal as sound. | 2011-06-23 |
20110154510 | AUTOMATED HIGH-CONTENT LIVE ANIMAL DRUG SCREENING USING C. ELEGANS - The present invention relates to methods and compositions for high content drug screening in | 2011-06-23 |
20110154511 | HEPARANASE DEFICIENT NON-HUMAN MAMMALS - The invention relates to cells and transgenic non-human mammals having at least one disrupted heparanase allele. The invention further relates to methods of screening therapeutic drug candidates utilizing the heparanase deficient non-human mammals and cells. | 2011-06-23 |
20110154512 | Humanized Fc gamma R Mice - Genetically modified non-human animals and methods and compositions for making and using them are provided, wherein the genetic modification comprises a deletion of the endogenous low affinity FcγR locus, and wherein the mouse is capable of expressing a functional FcRγ-chain. Genetically modified mice are described, including mice that express low affinity human FcγR genes from the endogenous FcγR locus, and wherein the mice comprise a functional FcRγ-chain. Genetically modified mice that express up to five low affinity human FcγR genes on accessory cells of the host immune system are provided. | 2011-06-23 |
20110154513 | PROBE FOR VISUALIZING NEURAL ACTIVITY - An object of the present invention is to develop a probe for measuring in real time the kinetics of CREB or actin closely related to brain functions such as memory formation in live animals. The probe used in the present invention is a probe comprising luciferase split into N-terminal and C-terminal fragments, wherein the probe is selected from any one or more of: (1) a probe comprising the KID domain of cyclic AMP response element-binding protein (CREB), the KIX domain of CREB-binding protein (CBP), the N-terminal fragment of luciferase (LucN), and the C-terminal fragment of luciferase (LucC) in one molecule; (2) (a) a probe consisting of two molecules, one of which comprises LucN and the KID domain and the other of which comprises LucC and the KIX domain, or (b) a probe consisting of two molecules, one of which comprises LucN and the KIX domain and the other of which comprises LucC and the KID domain; and (3) a probe consisting of two molecules, one of which comprises actin and LucN and the other of which comprises actin and LucC. | 2011-06-23 |
20110154514 | Polynucleotide used for releasing recombinant protein to the outside of eukaryotic cell - This invention provides a method for efficiently producing a recombinant protein by allowing the recombinant protein to express in a eukaryotic cell and releasing the expressed recombinant protein to the outside of the cell. The invention provides a polynucleotide used for producing a recombinant protein in a host cell comprising a polynucleotide encoding a glycosylation sequence comprising a transitional endoplasmic reticulum signal sequence and the sequence represented by: Asn-X-(Thr/Ser) (wherein X is an amino acid other than proline) and a polynucleotide encoding a target protein, which would not be efficiently released to the outside of the cell even when a transitional endoplasmic reticulum signal sequence is fused. The polynucleotide releases the target protein to the outside of the host cell via sugar chain modification. | 2011-06-23 |
20110154515 | GENETICALLY ENCODED CALCIUM SENSORS COMPRISING THE C-TERMINAL LOBE OF TROPONIN C AND A FLUORESCENCE TAG - The present invention relates to genetically encoded calcium sensors comprising fluorescent proteins and troponin C as calcium-binding moiety. More specifically, the invention provides a polypeptide comprising a donor moiety for fluorescence resonance energy transfer (FRET), at least two calcium binding moieties derived from the C-terminal domain of troponin C, and an acceptor moiety for FRET. Also, the invention provides nucleic acid molecules, expression vectors, host cells, and transgenic animals. In addition, methods for detecting a change in Ca | 2011-06-23 |
20110154516 | HUMAN FACTOR IX VARIANTS WITH AN EXTENDED HALF LIFE - Factor IX variants are described with an increase in the number of glycosylation sites. The Factor IX variants have an increased half life and/or recovery. | 2011-06-23 |
20110154517 | DISORDERS OF VASOREGULATION AND METHODS OF DIAGNOSING THEM - The present invention relates to various in vitro methods of diagnosing a vasoregulation disorder or a predisposition thereto in a subject being suspected of having developed or of having a predisposition to develop a vasoregulation disorder or in a subject being suspected of being a carrier for a vasoregulation disorder, wherein the vasoregulation disorder is selected from hypertension, migraine, pre-eclampsia and recurrent pregnancy loss. Moreover, the present invention also relates to methods for identifying compounds capable of modulating coagulation factor XII activity, suitable as medicaments or as lead compound for a medicament for the treatment and/or prevention of a vasoregulation disorder. Furthermore, the present invention relates to gene therapy methods and to a kit for diagnosing a vasoregulation disorder. | 2011-06-23 |
20110154518 | GENERATION OF INDUCED PLURIPOTENT STEM (iPS) CELLS - The present invention relates to a method of generating an induced pluripotent stem (iPS) cell comprising the step of introducing into a target cell one or two coding sequences each giving rise upon transcription to a factor that contributes to the reprogramming of said target cell into an induced pluripotent stem cell and selected from Oct3/4 or a factor belonging to the Myc, Klf and Sox families of factors, wherein the target cell endogenously expresses at least the factors that are not encoded by the coding sequences to be introduced and selected from Oct3/4 or factors belonging to the Myc, Klf and Sox families of factors, and wherein the cell resulting from the introduction of the one or two coding sequences expresses the combination of factor Oct3/4 and at least one factor of each family of factors selected from the group of Myc, Klf and Sox. Furthermore, the present invention relates to an induced pluripotent stem cell generated by the method of the invention and a method of identifying a compound that contributes to the reprogramming of a target cell into an induced pluripotent stem cell. Also, a method of generating a transgenic non-human animal and a composition comprising an iPS cell generated by the method of the present invention for gene therapy, regenerative medicine, cell therapy or drug screening are envisaged. | 2011-06-23 |
20110154519 | HAFNIA PHYTASE - The present invention relates to isolated polypeptides having phytase activity and isolated polynucleotides encoding the polypeptides. The polypeptides are related to a phytase derived from Hafnia alvei, the amino acid sequence of which is shown in the appended sequence listing as SEQ ID NO: 10. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods for producing and using the polypeptides, in particular within animal feed. | 2011-06-23 |
20110154520 | Vitamin K Epoxide Recycling Polypeptide VKORC1, a Therapeutic Target of Coumarin and Their Derivatives - The invention relates to a novel polypeptide vitamin K epoxide recycling polypeptide (VKORC1) as a target for coumarin and its derivatives. The invention further provides methods for identifying coumarin derivatives, and also claims VKORC1 polypeptides and VKORC1 nucleic acids containing a sequence abnormality associated with a VKORC1 associated deficiency such as warfarin resistance, wherein the VKORC1 polypeptides and VKORC1 nucleic acids can be used for diagnosing these deficiencies. Moreover, the invention relates to methods for identifying coumarin derivatives usable in pest control of rodents. | 2011-06-23 |
20110154521 | TRANSGENIC ANIMALS EXPRESSING ANTIBODIES SPECIFIC FOR GENES OF INTEREST AND USES THEREOF - The invention provides compositions and methods for the generation of novel non-human transgenic animals which contain an alteration in a gene of interest. These transgenic animals are capable of generating antibodies, e.g., human monoclonal antibodies, specific for the product of a gene of interest that has been functionally disrupted in the transgenic animal. Furthermore, the methods and compositions of the invention are suitable for use in the treatment, diagnosis, and imaging of disease. | 2011-06-23 |
20110154522 | BH3 Peptides And Method Of Use Thereof - The invention provides peptides and the nucleic acid sequences that encode them. The invention further provides therapeutic, diagnostic and research methods for diagnosis, treatment, and prevention of apoptosis associated disorders. | 2011-06-23 |
20110154523 | Maize event DP-004114-3 and methods for detection thereof - The invention provides DNA compositions that relate to transgenic insect resistant maize plants. Also provided are assays for detecting the presence of the maize DP-004114-3 event based on the DNA sequence of the recombinant construct inserted into the maize genome and the DNA sequences flanking the insertion site. Kits and conditions useful in conducting the assays are provided. | 2011-06-23 |
20110154524 | Maize event DP-032316-8 and methods for detection thereof - The invention provides DNA compositions that relate to transgenic insect resistant maize plants. Also provided are assays for detecting the presence of the maize DP-032316-8 event based on the DNA sequence of the recombinant construct inserted into the maize genome and the DNA sequences flanking the insertion site. Kits and conditions useful in conducting the assays are provided. | 2011-06-23 |
20110154525 | Maize event DP-040416-8 and methods for detection thereof - The invention provides DNA compositions that relate to transgenic insect resistant maize plants. Also provided are assays for detecting the presence of the maize DP-040416-8 event based on the DNA sequence of the recombinant construct inserted into the maize genome and the DNA sequences flanking the insertion site. Kits and conditions useful in conducting the assays are provided. | 2011-06-23 |
20110154526 | Maize event DP-043A47-3 and methods for detection thereof - The invention provides DNA compositions that relate to transgenic insect resistant maize plants. Also provided are assays for detecting the presence of the maize DP-043A47-3 event based on the DNA sequence of the recombinant construct inserted into the maize genome and the DNA sequences flanking the insertion site. Kits and conditions useful in conducting the assays are provided. | 2011-06-23 |
20110154527 | Soybean Gene for Resistance to Aphis Glycines | 2011-06-23 |
20110154528 | MAIZE PLANTS CHARACTERIZED BY QUANTITATIVE TRAIT LOCI (QTL) - The present invention relates to maize plants with a genome comprising a unique allele profile associated with the corresponding QTLs contributing to the expression of a variety of phenotypic traits of economic interest selected from the group of grain yield, grain moisture at harvest, early and late root lodging, stalk lodging, common smut incidence, fusarium ear rot incidence, sulcotrione resistance, and tassei architecture. The invention further relates to method for obtaining such a plant as well as assays and screening methods for identifying plants with the desired profile. | 2011-06-23 |
20110154529 | INDUCED CHROMOSOME DOUBLING IN PLANTS - Methods to generate doubled haploid plants and plant components using low mammalian toxicity chromosome doubling agents are disclosed. Chromosome doubling agents provide low mortality rates and higher chromosome doubling rate in plants. | 2011-06-23 |
20110154530 | Plants with Increased Yield by Increasing or Generating One or More Activities in a Plant or a Part Thereof - This invention relates generally to a plant cell with increased yield, preferably under condition of transient and repetitive abiotic stress as compared to a corresponding non-transformed wild type plant cell by increasing or generating one or more activities of Yield-Related Proteins (YRP) and/or Yield and Stress-Related Proteins (YSRP) in plants. | 2011-06-23 |
20110154531 | Yield Increase in Plants Overexpressing the MTP Genes - A transgenic crop plant transformed by a Membrane Transporter-like Polypeptide (MTP) coding nucleic acid, wherein expression of the nucleic acid sequence in the crop plant results in the plant's increased root growth, and/or increased yield, and/or increased tolerance to environmental stress as compared to a wild type variety of the plant. Also provided are agricultural products, including seeds, produced by the transgenic crop plants. | 2011-06-23 |
20110154532 | COMPOSITIONS AND METHODS RELATED TO SILICON TRANSPORT - Based on our identification of silicon influx and efflux transporter genes in plants known to take up silicon efficiently including wheat, horsetail, oat, sorghum, and barley, the present invention features polynucleotides encoding silicon transporters; vectors, cells, and plants including such polynucleotides, and methods for making such plants. The invention also features silicon transporter polypeptides and fragments thereof. Plants expressing heterologous silicon transporters may exhibit both increased silicon uptake and increased resistance to biotic and abiotic stresses. In particular, plants such as soybean expressing silicon transporters may exhibit increased resistance to pathogens such as rust. | 2011-06-23 |
20110154533 | Cloning and Sequencing of the Ferulate Esterase Gene From Lactobacillus Buchneri LN4017 - Embodiments of the present invention include polypeptides having ferulate esterase activity and the nucleic acid sequences that encode them. Methods of the embodiments utilize these ferulate esterase polypeptides and nucleic acid sequences to enhance the digestibility of plant cell walls and the accessibility of carbohydrates in plants. The invention provides for transgenic plants and bacteria transformed with expression vectors containing a DNA sequence encoding ferulate esterase from | 2011-06-23 |
20110154534 | Wheat plants with immunity to wheat streak mosaic virus (WSMV) - The present invention provides a transgenic wheat cell or wheat plant, the wheat cell or wheat plant comprising a chimeric DNA molecule which encodes a dsRNA molecule which is capable of inhibiting wheat streak mosaic virus (WSMV) replication, wherein the wheat cell or plant is immune to WSMV. The present invention also provides a chimeric DNA, the chimeric DNA comprising (i) a wheat expressible promoter; (ii) a region which encodes a dsRNA which is capable of inhibiting WSMV replication; and (iii) a transcription termination and polyadenylation signal. Finally, the present invention provides a process for producing the aforementioned transgenic wheat cell or plant, comprising (i) introducing a chimeric DNA molecule comprising (a) a wheat expressible promoter; (b) a region which encodes a dsRNA which is capable of inhibiting WSMV replication; and (c) a transcription termination and polyadenylation signal into a parental wheat cell; and optionally (ii) regenerating a wheat plant from the wheat cell comprising the chimeric DNA molecule; and (iii) identifying and/or selecting a plant which is immune to WSMV. | 2011-06-23 |
20110154535 | Novel Bacillus thuringiensis Gene with Coleopteran Activity - The invention provides nucleic acids, and variants and fragments thereof, obtained from strains of | 2011-06-23 |
20110154536 | Novel Bacillus thuringiensis Gene with Lepidopteran Activity - The invention provides nucleic acids, and variants and fragments thereof, obtained from strains of | 2011-06-23 |
20110154537 | Novel Bacillus thuringiensis Gene with Coleopteran Activity - The invention provides nucleic acids, and variants and fragments thereof, obtained from strains of | 2011-06-23 |
20110154538 | Infectious Plant Viral Vector and An Artificial Bipartite Plant Viral Vector An Infectious Plant Viral Vector and An Artificial Bipartite Plant Viral Vector - We have developed a versatile plant viral vector system based on Alternanthera mosaic virus (AltMV), suitable for infection by agroinfiltration or in vivo T7 transcripts from the same clone; agroinfection is enhanced by coinfiltration of a T7 RNA polymerase construct. Variants adapted for efficient protein expression, or for virus-induced gene silencing (VIGS), are based on a specific amino acid substitution (L88P) in the triple gene block 1 (TGB1) protein affecting RNA silencing suppression. A bipartite delivery system developed for AltMV delivers replicase (RdRp) functions separately from movement and encapsidation (TGB and coat protein, CP) functions by agroinfiltration, resulting in precise recombination of RdRp and TGB-CP constructs in planta. The bipartite delivery system has potential for high throughput protein expression or VIGS with the appropriate TGB1 variant, for hosts including | 2011-06-23 |
20110154539 | CONTROL OF FRUIT DEHISCENCE IN PLANTS BY INDEHISCENT1 GENES - The present application provides methods and compositions that modulate fruit dehiscence in plants. | 2011-06-23 |
20110154540 | RECOMBINANT VECTORS CARRYING ZEARALENONE-INDUCIBLE PROMOTER AND METHODS FOR PRODUCING PROTEINS AND DETECTING ZEARALENONE USING THEM - The present invention relates to a zearalenone-inducible promoter originated from | 2011-06-23 |
20110154541 | BIO-ENGINEERED PHOTOSYSTEMS - The present invention relates to bio-engineered photosystems, specifically photosystem II (PSII) having an alternative electron transfer pathway that enables electron flow from PSII to a water-soluble protein electron carrier. The present invention further relates to methods and systems for electron transfer using the bio-engineered photosystems. Such photosystems may be utilized for electrical energy production, hydrogen production and/or reduction of carbon-based gases (for example, CO | 2011-06-23 |
20110154542 | METHOD OF CULTIVATING GRAFTED CACTUS (GYMNOCALYCIUM MIHANOVICHII) CULTIVAR "RED TOP" AND THE GRAFTED CACTUS CULTIVATED THEREBY - The present subject matter relates to a method for cultivating a new grafted cactus ( | 2011-06-23 |
20110154543 | METHOD OF CULTIVATING GRAFTED CACTUS (GYMNOCALYCIUM MIHANOVICHII) CULTIVAR "YELLOW TOP" AND THE GRAFTED CACTUS CULTIVATED THEREBY - Provided herein is a method of cultivating a grafted cactus ( | 2011-06-23 |
20110154544 | Genetically Modified Seed Combined with Spore Forming Bacterium and Optional Insect Control Agents and Methods for Treating Plants - Products are provided that improve overall plant vigor and yield by combining agriculturally effective amounts of at least one spore-forming bacterium and at least one optional insect control agent to a genetically modified plant, plant part, or seed. This product is particularly effective in the presence of plant parasitic nematode and fungal species. Use of the product leads to an overall reduction in crop losses caused by either plant parasitic nematodes or fungi and this reduction is much greater than using genetically modified seed with just an insect control agent. According to some embodiments, the use of the product results in about a 2%-10% increase in soybean bushel yield, 3%-6.5% increase in cotton yield, and 3%-8% in corn bushel yield. Methods for utilizing and manufacturing the combination are also provided. | 2011-06-23 |
20110154545 | NUCLEIC ACID SEQUENCES FROM DIABROTICA VIRGIFERA VIRGIFERA LECONTE AND USES THEREOF - Expressed Sequence Tags (ESTs) isolated from the Western Corn Rootworm, | 2011-06-23 |
20110154546 | Thermal measurements using multiple frequency atomic force microscopy - Apparatus and techniques for extracting information carried in higher eigenmodes or harmonics of an oscillating cantilever or other oscillating sensors in atomic force microscopy and related MEMs work are described. Similar apparatus and techniques for extracting information from piezoelectric, polymer and other materials using contact resonance with multiple excitation signals are also described. | 2011-06-23 |
20110154547 | Peach rootstock named 'HBOK 50' - A new and distinct variety of peach rootstock denominated ‘HBOK 50’ is described. The ‘HBOK 50’ peach rootstock offers size control ability, root knot nematode resistance, less wood from dormant and summer pruning, and production of fewer root suckers. ‘HBOK 50’ has contributed to size reduction of compound trees when it is used as a clonally-produced rootstock with the fresh market peach “O'Henry”. No evidence of graft incompatibility or other abnormalities have been noted in such circumstances. Fruit on compound trees with ‘HBOK 50’ rootstocks is either similar in size or smaller than ‘Nemaguard’. The ‘HBOK 50’ rootstock displays root knot nematode resistance levels similar to ‘Nemaguard’ and more resistant than ‘Lovell’. | 2011-06-23 |
20110154548 | Peach Tree Rootstock Named 'HBOK 10' - The new ‘HBOK 10’ rootstock, a hybrid between two peach parents, is useful as a commercial under-stock for peach and nectarine cultivars. The stock has been successfully propagated clonally by leafy cuttings and tissue culture. This rootstock imparts significant vigor control to the scion cultivar that is propagated on top of it. This rootstock produces very few root suckers, its anchorage is good and it is resistant to root-knot nematode. Utilization of adapted growth controlling rootstocks in commercial orchard situations reduces the height of the tree and the amount of wood pruned in the winter and summer, without compromising the quality of the fruit. This in turn increases the efficiency of various cultural operations such as pruning, thinning and harvesting by reducing the need for workers in the field to use tall ladders when carrying out these operations. | 2011-06-23 |
20110154549 | VARIETY OF VERBENA PLANT NAMED 'SUMVERB 0901' - A new and distinct | 2011-06-23 |
20110154550 | Aloyzia grass - A new and distinct variety of | 2011-06-23 |