27th week of 2009 patent applcation highlights part 77 |
Patent application number | Title | Published |
20090172798 | WIRELESS DEVICE AUTHENTICATION USING DIGITAL CERTIFICATES - A method, information processing system, and wireless device provide authentication information to a network. The method includes determining that at least one authentication context ( | 2009-07-02 |
20090172799 | SECURITY-LEVEL ENFORCEMENT IN VIRTUAL-MACHINE FAIL-OVER - Methods, systems, and articles to receive, by a fail-over computing device, a request to instantiate a virtual-machine in response to a virtual-machine failure on a separate physical device. The request includes a minimum security rating. The fail-over computing device then compares the minimum security rating against an assigned security rating of the fail-over computing device and instantiates the virtual-machine if the assigned security rating meets or exceeds the minimum security rating. | 2009-07-02 |
20090172800 | REORDERING A FIREWALL RULE BASE ACCORDING TO USAGE STATISTICS - A computer implemented method of reducing central processing unit (CPU) usage of a firewall by safe reordering a current firewall's rule-base exhibiting N rules. The method comprising: receiving rule usage statistics exhibiting usage frequency of each rule on the current firewall's rule-base; calculating a rules matched per packet (RMPP) parameter, being a summation of products of each rule identifier and the corresponding usage frequency for all the N rules; determining an alternative order of the rule base by repositioning rules, wherein the repositioned rules perform the same action on the firewall, or wherein the repositioned rules act on disjoint sets of network connections, and wherein the repositioning results in a reduction of the RMPP of the reordered rule base, thereby reducing the CPU usage of the firewall in implementing the alternative order of rules. | 2009-07-02 |
20090172801 | PERFORMANCE ENHANCING PROXY - One embodiment of the present invention may take the form of a method and a system for performance enhancing proxy (PEP). A PEP system may include a configuration of software components and hardware devices to increase the performance of a two-way satellite broadband service. The PEP system may include one or more embodiments to reduce the time necessary for users to transmit and receive data provided through a communication network. | 2009-07-02 |
20090172802 | LOCAL PROXY SYSTEM AND METHOD - A local proxy system includes a storage device having a local proxy and a physical port connection. The local proxy is part of a split proxy configuration having a local proxy and a remote proxy. The physical port connection is operative to receive commands from a host via an internet application protocol; and to transmit commands to the host via a modem control protocol, to thereby function as a gateway for conveying these commands to a remote proxy, via the host. Also provided is a method of optimizing communication over a network; and a local proxy system that includes a storage device having a local proxy. The storage device is in connection with a host via a physical port connection complying with a standard storage device interface. | 2009-07-02 |
20090172803 | METHOD AND APPARATUS FOR INCREMENTALLY DEPLOYING INGRESS FILTERING ON THE INTERNET - Ingress filtering has been adopted by the IETF as a methodology for preventing denial of service congestive attacks that spoof the source address in packets that are addressed to host server victims. Unless universally adopted by all ISPs on the Internet, however, a packet's source address cannot be totally trusted to be its actual source address. To take advantage of benefits of ingress filtering as it is gradually deployed by ISPs around the Internet, differentiated classes of service are used to transport packets whose source address can be trusted and packets whose source address cannot be trusted. A packet received by an access or edge router at an ISP that supports ingress filtering and has a source address that is properly associated with port on which it is received is forwarded in a privileged class of service and are dropped otherwise. A packet received by access or edge router at an ISP that does not support ingress filtering and whose source address cannot therefore be trusted is transported in an unprivileged class of service. At an intermediate exchange router within an intermediate ISP, where ISPs exchange packets, a packet received from an ISP that doesn't support ingress filtering is forwarded using the unprivileged class of service while a packet received from an ISP that does support ingress filtering is forwarded using the same class of service in which it is already marked. | 2009-07-02 |
20090172804 | IDENTITY-BASED-ENCRYPTION MESSAGE MANAGEMENT SYSTEM - Systems and methods for managing email are provided. Some of the email may be encrypted using identity-based-encryption (IBE) techniques. When an incoming IBE-encrypted message for a recipient in an organization is received by a gateway at the organization, the gateway may request an IBE private key from an IBE private key generator. The IBE private key generator may generate the requested IBE private key for the gateway. The gateway may use an IBE decryption engine to decrypt the incoming message. The decrypted message can be scanned for viruses and spam and delivered to the recipient. Outgoing email messages can also be processed. If indicated by message attributes or information provided by a message sender, an outgoing message can be encrypted using an IBE encryption engine and the IBE public key of a desired recipient. | 2009-07-02 |
20090172805 | Wireless Network Security Mechanism Including Reverse Network Address Translation - Methods, apparatuses and systems directed to preventing unauthorized access to internal network addresses transmitted across wireless networks. According to the invention, mobile stations are assigned virtual client network addresses that are used as the outer network addresses in a Virtual Private Network (VPN) infrastructure, as well as unique internal network addresses used as the inner network addresses. In one implementation, the virtual client network addresses have little to no relation to the internal network addressing scheme implemented on the network domain. In one implementation, all clients or mobile stations are assigned the same virtual client network address. A translation layer, in one implementation, intermediates the VPN session between the mobile stations and a VPN server to translate the virtual client network addresses to the internal network addresses based on the medium access control (MAC) address corresponding to the mobile stations. In this manner, the encryption inherent in the VPN infrastructure prevents access to the internal network addresses assigned to the mobile stations. | 2009-07-02 |
20090172806 | SECURITY MANAGEMENT IN MULTI-NODE, MULTI-PROCESSOR PLATFORMS - Multi-node and multi-processor security management is described in this application. Data may be secured in a TPM of any one of a plurality of nodes, each node including one or more processors. The secured data may be protected using hardware hooks to prevent unauthorized access to the secured information. Security hierarchy may be put in place to protect certain memory addresses from access by requiring permission by VMM, OS, ACM or processor hardware. The presence of secured data may be communicated to each of the nodes to ensure that data is protected. Other embodiments are described. | 2009-07-02 |
20090172807 | METHOD AND APPARATUS FOR MANAGING MULTIPLE SECURITY PROTOCOLS AND USERS FOR IMAGING DEVICES - Methods and apparatus contemplate a system for securing imaging devices on a network by allowing a system administrator to apply different security protocols to specific functions of an imaging device. This allows a system administrator to customize the functions of the imaging device by restricting the particular functions to only those users who need them, as opposed to the global security policies currently required. The system uses a computer program product, including executable instructions, which can be stored on the imaging device itself, a network server, and/or some other device attached to the network. The computer program product can be installed directly from the manufacturer, through computer readable media, or by downloading. The product interfaces directly with the imaging device to determine what imaging functions are present and to set what security protocols are required to access those functions. | 2009-07-02 |
20090172808 | ACCESS CONTROL DEVICE - An object of the invention is to provide an access control apparatus for lessening the occasions of invading a place where no entry is permitted without setting any separate access condition for a temporary user of a visitor, etc., in a room entering and leaving management apparatus using personal identification information of an IC card, etc. | 2009-07-02 |
20090172809 | Method And System For Creating And Accessing A Secure Storage Area In A Non-Volatile Memory Card - In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification value is read from a first non-volatile memory device. The memory identification value and the account identification value are transmitted to a second non-volatile memory device, and a calculated credential is received. A command is transmitted to create a secure storage account in the first non-volatile memory device, where the command contains the credential and the account identification value. To access the account, a sequence is transmitted, containing the account identification value and a value based on the credential. A secure storage system contains a first non-volatile memory device that stores a memory identification value and contains a secure partition accessible using a credential, a second non-volatile memory device that can compute the credential, and a host adapted to create and access the secure partition. | 2009-07-02 |
20090172810 | Apparatus and method for inputting graphical password using wheel interface in embedded system - Provided are an apparatus and method for inputting a graphical password that use representative pictures and elemental pictures of a graphic to form a graphical password and that receive the graphic via a wheel interface and a select button for user authentication. The apparatus includes: an input unit having a wheel interface and a select button; a display for displaying a graphic consisting of representative pictures and elemental pictures, and displaying a changed graphic in response to an input from the wheel interface; a memory for storing a graphical password of a user; and a controller for recognizing, when the select button is pressed, the graphic displayed on the display as a user-input graphical password, and determining whether the input graphical password matches the stored graphical password for user authentication. Thus, it is possible to increase the number of cases for a password using a wheel interface for a higher security level of an embedded system that has a low security level due to a limited type and length of letters input as a password. | 2009-07-02 |
20090172811 | IMAGE PROCESSING APPARATUS, PROCESSING FLOW CONTROL METHOD, IMAGE FORMING SYSTEM, AND STORAGE MEDIUM - An image processing apparatus capable of reducing the number of processing flows and also reduce time and effort required by a user in searching a desired processing flow. The image processing apparatus including an authentication unit adapted to execute user authentication, and an execution unit adapted to execute processing on image data with a plurality of processes as a sequential processing flow while cooperating a plurality of different functions with one another. Setting data personalized for a user authenticated by the authentication unit is obtained, and the plurality of processes is registered as a sequential processing flow. The processing flow is executed with a part of the processing flow replaced by processing personalized for the user set in the setting data, upon executing the registered processing flow. | 2009-07-02 |
20090172812 | TWO FACTOR TOKEN IDENTIFICATION - An apparatus, method and program product allow two factor token authentication in the presence of multiple tokens. When multiple tokens are detected, a user desiring access needs merely to provide a unique biometric identifier, referred to as a capture BIR, and that capture BIR is evaluated against a stored BIR associated with at least one of the tokens to determine if access is to be granted. If there is a match, that user is given access. If not, the capture BIR is evaluated against the stored BIR associated with another of the detected tokens. The process may repeat until either a match is found and the user is granted access, or none is found and access is denied. The foregoing occurs without the user having to input any user ID or the like and without the inconvenience or risk of error associated with selecting a user ID from a list of potential user ID's. | 2009-07-02 |
20090172813 | Non-Invasive Monitoring of the Effectiveness of Electronic Security Services - Systems for the non-invasive monitoring of the effectiveness of a customer's electronic security services include a test generation engine for generating and launching a denatured attack towards a customer's network. A monitoring and evaluation agent is operatively coupled to the test generation engine and is adapted to monitor and evaluate the denatured attack. A recording and analysis engine is adapted to record and analyze the results of the denatured attack. Other systems and methods are also provided. | 2009-07-02 |
20090172814 | DYNAMIC GENERATION OF INTEGRITY MANIFEST FOR RUN-TIME VERIFICATION OF SOFTWARE PROGRAM - A measurement engine generates an integrity manifest for a software program and uses it to perform active platform observation. The integrity manifest indicates an integrity check value for a section of the program's code. The measurement engine computes a comparison value on the program's image in memory and determines if the comparison value matches the expected integrity check value. If the values do not match, the program's image is determined to be modified, and appropriate remedial action may be triggered. | 2009-07-02 |
20090172815 | METHOD AND APPARATUS FOR DETECTING MALWARE INFECTION - In one embodiment, the present invention is a method and apparatus for detecting malware infection. One embodiment of a method for detecting a malware infection at a local host in a network, includes monitoring communications between the local host and one or more entities external to the network, generating a dialog warning if the communications include a transaction indicative of a malware infection, declaring a malware infection if, within a predefined period of time, the dialog warnings includes at least one dialog warning indicating a transaction initiated at the local host and at least one dialog warning indicating an additional transaction indicative of a malware infection, and outputting an infection profile for the local host. | 2009-07-02 |
20090172816 | DETECTING ROOTKITS OVER A STORAGE AREA NETWORK - Embodiments of the invention improve the detection of malicious software applications, such as a rootkit, on hosts configured to access storage volumes over a storage area network (SAN). A rootkit detection program running on a switch may be configured to detect rootkits present on the storage volumes of the SAN. Because the switch may mount and access storage volumes independently from the (possibly comprised) hosts, the rootkit is not able to conceal itself from the rootkit detection program running on the switch. | 2009-07-02 |
20090172817 | METHOD, APPARATUS AND SYSTEM FOR CONTAINING AND LOCALIZING MALWARE PROPAGATION - A method, apparatus and system contain and localize malware propagation. In one embodiment, a security scheme may identify worm traffic that attempts to probe an unused network location. The security scheme may then in conjunction with a routing component, reroute the worm traffic to a contained and localized location. In one embodiment, the contained and localized location is a virtual machine (VM) within a virtualized platform. In other embodiments, the contained and localized location is a computer system on a network. | 2009-07-02 |
20090172818 | METHODS AND SYSTEM FOR DETERMINING PERFORMANCE OF FILTERS IN A COMPUTER INTRUSION PREVENTION DETECTION SYSTEM - An intrusion prevention/detection system filter (IPS filter) performance evaluation is provided. The performance evaluation is performed at both the security center and at the customer sites to derive a base confidence score and local confidence scores. Existence of new vulnerability is disclosed and its attributes are used in the generation of new IPS filter or updates. The generated IPS filter is first tested to determine its base confidence score from test confidence attributes prior to deploying it to a customer site. A deep security manager and deep security agent, at the customer site, collect local confidence attributes that are used for determining the local confidence score. The local confidence score and the base confidence score are aggregated to form a global confidence score. The local and global confidence scores are then compared to deployment thresholds to determine whether the IPS filter should be deployed in prevention or detection mode or sent back to the security center for improvement. | 2009-07-02 |
20090172819 | Method and Apparatus for Implementing Logic Security Feature for Disabling Integrated Circuit Test Ports Ability to Scanout Data - A method and apparatus for implementing integrated circuit security features are provided to selectively disable testability features on an integrated circuit chip. A test disable logic circuit receives a test enable signal and responsive to the test enable signal set for a test mode, establishes a test mode and disables ASIC signals. Responsive to the test enable signal not being set, the ASIC signals are enabled for a functional mode and the testability features on the integrated circuit chip are disabled. When the functional mode is enabled, the test disable logic circuit prevents the test mode from being established while the integrated circuit chip is powered up. | 2009-07-02 |
20090172820 | Multi virtual machine architecture for media devices - A software computing based environment for providing secured authentication of media downloaded from a network or loaded from a media player includes two peer-mode operating virtual machines. The low-level virtual machine provides decoding and decryption functions whereas the high-level virtual machine provides application level functions such as user interface, input/output. | 2009-07-02 |
20090172821 | System and method for securing computer stations and/or communication networks - The invention relates to a method for securing computer equipment (client stations) connected by a computer network or communication network and forming at least on information system, said system comprising at least on computer server, characterized in that it comprises two stages wherein digital data relating to the security of the network and/or system(s) is correlated. The invention also relates to a system for securing wireless digital communication networks. | 2009-07-02 |
20090172822 | PRE-BOOT PROTECTED MEMORY CHANNEL - Machine readable media, methods, and computing devices are disclosed which establish a protected memory channel between an operating system loader of a user partition and services of a management partition. One computing device includes protected storage, read only memory, firmware, a storage device and a processor. The storage device is to store the virtual machine monitor and an operating system having an operating system loader. The virtual machine monitor is to establish a protected memory channel between the one or more integrity services of a management partition and the operating system loader of a user partition in response to measuring and verifying the operating system loader based upon the manifest. The processor is to execute the code of the read only memory, the firmware, the virtual machine monitor, the operating system, the operating system loader, the management partition, and the user partition. | 2009-07-02 |
20090172823 | MANAGEMENT ENGINE SECURED INPUT - In some embodiments a controller controls an input device, receives input information from the input device, excludes a host processor from controlling the input device, and secures the input information received from the input device so that the input information is not received by the host processor or by any software running on the host processor. Other embodiments are described and claimed. | 2009-07-02 |
20090172824 | Corruption of swarm downloads in a decentralized network employing advanced intelligent corruption handling - An eMule network employs Advanced Intelligent Corruption Handling (AICH). Agent clients offer copies of a corrupted version of content. When the corrupted copies participate in swarm downloads with uncorrupted copies, the AICH is triggered. The agent clients are sufficient in number to out vote all other clients in a trusted root hash determination performed by the AICH. As a result, one of the agent clients provides a recovery packet used by the AICH to determine good and bad blocks. Since the recovery packet includes block hashes for the corrupted version of the content, blocks uploaded by clients providing uncorrupted versions are determined to be bad blocks and the clients identified as bad sources. The agent clients, on the other hand, either fail to upload a requested block or do so in a manner to discourage a user of the downloading client to wait for completion of the upload. | 2009-07-02 |
20090172825 | METHOD AND APPARATUS FOR UPDATING REVOCATION LIST AND REPRODUCING ENCRYPTED CONTENT - Method of updating revocation list is disclosed. Time information of revocation list indicating registration time of most recently registered revocation entity included in revocation list of first device is extracted, and time information of revocation list indicating registration time of the most recently registered revocation entity included in the revocation list of a second device connected to the first device is also extracted. A revocation entity registered in the first device after the registration time of time information of the revocation list of the second device is copied in the revocation list of the second device, if the registration time of extracted time information of the revocation list of the first device is later than the registration time of the extracted time information of the revocation list of the second device. Thus, the revocation list can be updated by connecting the first and second devices even in an offline state. | 2009-07-02 |
20090172826 | Model System for TCR (ZETA) Chain Downregulation - The present invention refers to an animal model system which mimics the immunosuppressive environment found in cancer, autoimmune and infectious diseases, as well as in chronic inflammation. In said animal model system, which is an object of the present invention, sustained exposure to antigen induces TCR ζ chain downregulation and impaired T cell function. Further objects of the present invention are the method of generating the animal model system, as well as methods of screening for substances that inhibit said ζ chain downregulation. Finally, the present invention provides ζ chain as a marker for the immunological status of a subject in need of immunotherapy. | 2009-07-02 |
20090172827 | Kcnn3 as diagnostic and therapeutic target for neurodegenerative diseases - The present invention discloses a dysregulation of the KCNN3 gene and the protein products thereof in Alzheimer's disease patients and individuals being at risk of developing Alzheimer's disease. Based on this finding, the invention provides methods for diagnosing and prognosticating Alzheimer's disease in a subject, and for determining whether a subject is at increased risk of developing Alzheimer's disease. Furthermore, this invention provides therapeutic and prophylactic methods for treating and preventing Alzheimer's disease and related neurodegenerative disorders using the KCNN3 gene and its corresponding gene products. Screening methods for modulating agents of neurodegenerative diseases are also disclosed. | 2009-07-02 |
20090172828 | BYDV MP IS A VIRAL DETERMINANT RESPONSIBLE FOR PLANT GROWTH RETARDATION - The present invention concerns the barley yellow dwarf virus (BYDV) and compositions and methods related thereto. In particular in the invention, identifies a movement protein (MP) of BYDV as being responsible for at least one symptom produced as a result of BYDV infection. In certain aspects, the invention concerns a target to inhibit BYDV and to inhibit at least one symptom of BYDV infection, for example, at least plant growth retardation. In particular aspects, the invention relates to screening methods for identifying suppressors of BYDV MP. | 2009-07-02 |
20090172829 | Loci Associated Charcoal Rot Drought Complex Tolerance in Soybean - The invention relates to methods and compositions for identifying soybean plants that are tolerant, have improved tolerance or are susceptible to Charcoal Rot Drought Complex. The methods use molecular genetic markers to identify, select and/or construct tolerant plants or identify and counter-select susceptible plants. Soybean plants that display tolerance or improved tolerance to Charcoal Rot Drought Complex that are generated by the methods of the invention are also a feature of the invention. | 2009-07-02 |
20090172830 | Loci Associated Charcoal Rot Drought Complex Tolerance in Soybean - The invention relates to methods and compositions for identifying soybean plants that are tolerant, have improved tolerance or are susceptible to Charcoal Rot Drought Complex. The methods use molecular genetic markers to identify, select and/or construct tolerant plants or identify and counter-select susceptible plants. Soybean plants that display tolerance or improved tolerance to Charcoal Rot Drought Complex that are generated by the methods of the invention are also a feature of the invention. | 2009-07-02 |
20090172831 | Methods for the production of plants resistant to HPPD herbicides - Methods for making transgenic plants that are resistant to HPPD herbicides are presented. Polynucleotides other than those from | 2009-07-02 |
20090172832 | EXPRESSION OF RUBISCO ENZYME FROM A NON-RUBISCO LOCUS - The invention relates to a method for transformation of plant chloroplasts with genetic constructs by insertion of a RUBISCO gene in a non-RUBISCO site of the chloroplast genome to generate transformed plants that produce large amounts of a functional RUBISCO enzyme. | 2009-07-02 |
20090172833 | Nucleic Acid Molecules and Other Molecules Associated with Transcription in Plants - The present invention is in the field of plant biochemistry. More specifically the invention relates to nucleic acid sequences from plant cells, in particular, nucleic acid sequences from maize, soybean and | 2009-07-02 |
20090172834 | Proteins Associated With Abiotic Stress Response And Homologs - This invention relates generally to nucleic acid sequences encoding proteins and homologs that are associated with abiotic stress responses and abiotic stress tolerance in plants. In particular, this invention relates to nucleic acid sequences encoding proteins that confer drought, heat, cold, and/or salt tolerance to plants. | 2009-07-02 |
20090172835 | FLAX (LINUM USITATISSIMUM L.) SEED-SPECIFIC PROMOTORS - The present invention is directed to promoters of flax conlinin and ω-3 desaturase genes. The promoters guide high levels of the expression exclusively in flax developing seeds. This specific expression pattern concomitant with the biosynthesis of storage lipids and proteins make these promoters particularly useful for seed-specific modification of fatty acid and protein compositions in plant seeds. | 2009-07-02 |
20090172836 | Resistance to Powdery Mildew and Absence of Necrosis in Cucumis Sativus - The present invention relates to a powdery mildew-resistant | 2009-07-02 |
20090172837 | PROCESS FOR PRODUCING ARACHIDONIC ACID AND/OR EICOSAPENTAENOIC ACID IN PLANTS - The present invention relates to a process for the production of arachidonic acid (=APA) or eicosapentaenoic acid (=EPA) or arachidonic acid and eicosapentaenoic acid, advantageously in the seed of transgenic plants of the family Brassicaceae with a content of ARA or EPA or ARA and EPA of at least 3% by weight based on the total lipid content of the transgenic plant, by introducing, into the organism, nucleic acids which code polypeptides with Δ6-desaturase, Δ6-elongase and Δ5-desaturase activity, where, as the result of the enzymatic activity of the introduced enzymes, a fatty acid selected from the group consisting of the fatty acids oleic acid [C18:1 | 2009-07-02 |
20090172838 | Compositions and methods for efficient gene silencing in plants - This invention relates to methods for knock-down of a target gene in plants, particularly efficient and specific methods for knock-down of a target gene in plants. This invention also relates to methods for silencing endogenous plant genes or plant pathogen genes. It further relates to nucleic acid constructs (DNA, RNA) which comprise a nucleic acid sequence that corresponds to a target gene or fragment thereof flanked by two complementary sites to an smRNA, e.g., a miRNA (one complementary site is on either side of the nucleic acid sequence), resulting in, for example the configuration: complementary site—nucleic acid sequence that corresponds to a target gene—complementary site. | 2009-07-02 |
20090172839 | Compositions and Methods of Increasing Stress Tolerance in Plants - The present invention provides novel isolated FT polynucleotides and polypeptides encoded by the FT polynucleotides. Also provided are the antibodies that immunospecifically bind to a FT polypeptide or any derivative, variant, mutant or fragment of the FT polypeptide, polynucleotide or antibody. The invention additionally provides methods of constructing transgenic plants that have altered levels of FT polynucleotides and polypeptides. | 2009-07-02 |
20090172840 | NUCLEOTIDE SEQUENCES AND CORRESPONDING POLYPEPTIDES CONFERRING AN ALTERED FLOWERING TIME IN PLANTS - The present invention relates to isolated nucleic acid molecules and their corresponding encoded polypeptides able to confer the trait of altered flowering time in plants. The present invention further relates to using the nucleic acid molecules and polypeptides to make transgenic plants, plant cells, plant materials or seeds of a plant having flowering times that are altered with respect to wild-type plants grown under similar conditions. Altered flowering time includes both plants having an early flowering time and a late flowering time with respect to wild-type plants grown under similar conditions. Flowering time in plants may be altered either with respect to the normal time at which wild-type plants flower within their normal life cycle or altered temporally such that the entire life cycle of the plant is accelerated or prolonged using the nucleic acid molecules and polypeptides of the present invention. | 2009-07-02 |
20090172841 | Isolated Polynucleotide Molecules Corresponding to Mutant and Wild-Type Alleles of the Maize D9 Gene and Methods of Use - The invention provides isolated polynucleotide molecules encoding mutant and wild-type alleles of the maize D9 gene. The invention further provides methods for modifying the growth of plants involving the use of these isolated polynucleotide molecules, isolated polypeptides, and transformed plants, seeds, and cells. | 2009-07-02 |
20090172842 | EXPRESSION OF RECOMBINANT GENES ENCODING RUBISCO PROTEINS IN C3 PLANTS - The invention describes isolation and functional expression of RUBISCO genes derived from C4 plants and red algae in C3 plant hosts. Specifically the RUBISCO genes of | 2009-07-02 |
20090172843 | Specific Promoter Region Expresses in Actively Dividing Young Tissues and the Aging Tissues in Plants as Well as its Application - A promoter capable of activating expression specifically in both of the vigorously divisible young tissues and separate-related aging tissues in plants, characterized in that the promoter is a promoter of Oncidium ethylene receptor gene OgERS1, and has a sequence as shown in SEQ ID No: 3. A gene expression cassette is composed of a promoter having a DNA sequence as shown in SEQ ID No: 3, and a polynucleotide that is linked to the 3′ terminal of the promoter and has an open reading frame, wherein the promoter can activate the transcription of the polynucleotide in a organism having the gene expression cassette therein. A gene expression vector is composed of a promoter having a DNA sequence as shown in SEQ ID No: 3. A plant or parts of organ, tissue or cell of the plant has been transformed to contain the gene expression cassette described above. | 2009-07-02 |
20090172844 | Engineering single-gene-controlled staygreen potential into plants - The enzymes of the ACC synthase family are used in producing ethylene. Nucleotide and polypeptide sequences of ACC synthases are provided along with knockout plant cells having inhibition in expression and/or activity in an ACC synthase and knockout plants displaying a staygreen phenotype, a male sterility phenotype, or an inhibition in ethylene production. Methods for modulating staygreen potential in plants, methods for modulating sterility in plants, and methods for inhibiting ethylene production in plants are also provided. | 2009-07-02 |
20090172845 | GRAY LEAF SPOT TOLERANT MAIZE AND METHODS OF PRODUCTION - The invention relates to methods and compositions for identifying maize plants that have newly conferred tolerance or enhanced tolerance to, or are susceptible to, Gray Leaf Spot (GLS). The methods use molecular genetic markers to identify, select and/or construct tolerant plants or identify and counter-select susceptible plants. Maize plants that display newly conferred tolerance or enhanced tolerance to GLS that are generated by the methods of the invention are also a feature of the invention. | 2009-07-02 |
20090172846 | NANOMETRIC EMITTER/RECEIVER GUIDES - The invention relates to a nanoprobe comprising a silica fibre ( | 2009-07-02 |
20090172847 | APRICOT TREE NAMED 'GOLDENMAY' - The present invention relates to a new and distinct variety of apricot tree, | 2009-07-02 |
20090172848 | Oak tree named 'Adeline' - A new and distinct Hybrid Oak named ‘Adeline’ characterized by its very narrow pyramidal habit of growth, its winter hardiness, and hybrid vigor. Also for its beautiful dark green, mildew-resistant foliage and its ability to withstand wind and ice without breakage. | 2009-07-02 |
20090172849 | Chrysanthemum plant named 'Zanmustarbu' | 2009-07-02 |
20090172850 | Chrysanthemum plant named 'Zanmuspar' | 2009-07-02 |
20090172851 | Chrysanthemum plant named 'Zanmusunbur' | 2009-07-02 |
20090172852 | Chrysanthemum plant named 'Zanmugoldru' | 2009-07-02 |
20090172853 | Chrysanthemum plant named 'Zanmusunset' | 2009-07-02 |
20090172854 | Chrysanthemum named 'Zanmuflamin | 2009-07-02 |
20090172855 | Poinsettia plant named 'NPCW07129' - A new Poinsettia plant particularly distinguished by its red and white bi-colored bracts and compact plant habit is disclosed. | 2009-07-02 |