33rd week of 2013 patent applcation highlights part 73 |
Patent application number | Title | Published |
20130212678 | Altering Sampling Rate to Thwart Attacks that involve Analyzing Hardware Sensor Output - A hardware sensor and a hardware user-input component are integrated in a portable electronic device. The hardware sensor is operable to produce hardware sensor output indicative of orientation or motion or both of the device within its environment. The hardware user-input component has multiple elements operable to accept user input through touch. A user-input driver and the device's operating system are jointly operable to detect touch events involving the elements. A software application stored in the device's memory is executable by the device's processor as a process. A sensor driver or the operating system or both are configured to control what hardware sensor output, if any, is receivable by the process. This control may thwart an attack based on analysis of the hardware sensor output, the attack designed to deduce what user input has been made via multiple elements of the hardware user-input component. | 2013-08-15 |
20130212679 | PROACTIVE TEST-BASED DIFFERENTIATION METHOD AND SYSTEM TO MITIGATE LOW RATE DoS ATTACKS - A low rate DoS attack detection algorithm is used, which relies on a characteristic of the low rate DoS attack in introducing high rate traffic for short periods, and then uses a proactive test based differentiation technique to filter the attack packets. The proactive test defends against DDoS attacks and low rate DoS attacks which tend to ignore the normal operation of network protocols, but it also differentiates legitimate traffic from low rate DoS attack traffic instigated by botnets. It leverages on the conformity of legitimate flows, which obey the network protocols. It also differentiates legitimate connections by checking their responses to the proactive tests which include puzzles for distinguishing botnets from human users. | 2013-08-15 |
20130212680 | METHODS AND SYSTEMS FOR PROTECTING NETWORK DEVICES FROM INTRUSION - Methods and systems for protecting a computing device to ensure network security are provided. In particular, one or more blacklists may be maintained by an Intrusion Protection System (IPS) for a computing device. Such blacklists may include information such as network addresses of suspected or confirmed rogue entities that pose threat to the security of the computing device. In an embodiment, the blacklists are dynamically updated (e.g., purged) when a network-related change is detected indicating, for example, that the computing device is moving from one network location to another. In some embodiments, one or more blacklists may each correspond to a communication channel, application, process or the like. In some embodiments, only selected blacklists are updated, such as those that are rendered stale or inapplicable by the detected network changes. | 2013-08-15 |
20130212681 | Security Monitoring System and Security Monitoring Method - The objective of the present invention is to provide a security monitoring system and a security monitoring method which is capable of a quick operation when an unauthorized access, a malicious program, and the like are detected, while the normal operation of the control system is not interrupted by an erroneous detection. The security monitoring system | 2013-08-15 |
20130212682 | AUTOMATIC DISCOVERY OF SYSTEM INTEGRITY EXPOSURES IN SYSTEM CODE - A technique is provided for detecting vulnerabilities in system code on a computer. Supervisor call routines and program call routines of the system code are analyzed to determine which are available to a caller program that is an unauthorized program and has a PSW key | 2013-08-15 |
20130212683 | Systems and Methods for Managing Data Incidents - Systems and methods for managing a data incident are provided herein. Exemplary methods may include receiving data breach data that comprises information corresponding to the data breach, automatically generating a risk assessment from a comparison of data breach data to privacy rules, the privacy rules comprising at least one federal rule and at least one state rule, each of the rules defining requirements associated with data breach notification laws, and providing the risk assessment to a display device that selectively couples with the risk assessment server. | 2013-08-15 |
20130212684 | Detecting Application Harmful Behavior and Grading Application Risks for Mobile Devices - In one embodiment, a method determines a permission list from an application and generates a set of potential behaviors. The potential behaviors are associated with actions that the application allows when executing on a mobile device where the potential behaviors are determined without execution of the application. The method then determines functional category information regarding a functional category from a set of application marketplaces that contain the application and determines application description information for the application. A required behavior list is generated including a set of required behaviors from the functional category information and the application description information. The method compares the required behaviors to the potential behaviors to determine a set of security related behaviors. The security related behaviors are behaviors found in the potential behaviors, but not in the required behaviors. A security rating is determined based on the set of security related behaviors. | 2013-08-15 |
20130212685 | NETWORk THREAT RISK ASSESSMENT TOOL - A method, system and computer program product is disclosed that provides timely, accurate and summarized information about possible threats to information technology environments. It is a tool that looks at multiple aspects of an IT threat, including both specific (traditional) IT threats and general (non-traditional) IT threats, and rates each threat's overall potential to do harm. A matrix is created that identifies a “threat score” to allow prioritization and reaction to the threats. The matrix takes both traditional IT threats and non-traditional IT threats and normalizes them on the same scale, giving users of the matrix the ability to understand the risks of both. | 2013-08-15 |
20130212686 | Electronic fulfillment system for distributing digital goods - Methods and apparatus for delivering digital goods using an electronic distribution system. Meta-information is generated for a digital product and stored at a fulfillment server. Upon completion of a transaction between a customer and the supplier of a digital product, a download manager installed at the customer's computer communicates with the fulfillment server using a protocol that ensures secure and reliable delivery of the digital product to the customer. In alternative implementations, the customer can be billed before or after successful delivery of the digital product to the customer. | 2013-08-15 |
20130212687 | BRIDGE FOR COMMUNICATING WITH A DYNAMIC COMPUTER NETWORK - Method for communicating data in a computer network involves dynamically modifying at a first location in the computer network a plurality of true values. The true values correctly represent the plurality of identify parameters. These true values are transformed to false values, which incorrectly represent the identity parameters. Subsequently, the identity parameters are modified at a second location to transform the false values back to the true values. The position of the first and/or second locations varies dynamically as part of this process. A bridge transforms identity parameter values when communicating outside the network. Dynamic modification of the identity parameters occurs in accordance with a mission plan that can be modified without interrupting communication of data in the network. | 2013-08-15 |
20130212688 | SYSTEM FOR SHARING A USERS PERSONAL DATA - One example embodiment includes a method for sharing a user's personal data. The method includes obtaining identifying information. The method also includes confirming a user's identify. The method further includes releasing the user's personal data. | 2013-08-15 |
20130212689 | MANAGING NETWORK DATA - A method, system or computer usable program product for masking communication data using context based rules including intercepting a communication between a server and a client by an intermediary, the communication having a recipient, parsing the communication by the intermediary to determine whether a context based alteration rule should be applied, responsive to an affirmative determination, applying the rule to the communication to produce an altered communication with altered data, and sending the altered communication to the recipient so that the altered data in the communication is utilized in a masked manner. | 2013-08-15 |
20130212690 | PRIVATE DECAYED SUM ESTIMATION UNDER CONTINUAL OBSERVATION - Described herein is a method and system for providing privacy guarantees with an improved privacy-accuracy trade-off. Dynamic data can be accessed from a database. A sum model is selected from window sum, exponential decay sum, and polynomial decay sum. An algorithm is initiated that produces polylogarithmic bounded error in the range of a sum function associated with the selected sum model and independent of time steps. The data can be assembled in a dyadic tree structure. A non-linearity component can be added to nodes of the dyadic tree structure. For example, this can be a noise components or a weight applied to the update. This can be done, for example, to different nodes differently. Differential private estimators can be constructed for fixed steps of time. The differential private estimators can be applied to a query means or filtering system to enhance privacy protection from potential adversaries. | 2013-08-15 |
20130212691 | ELECTRONIC SYSTEM FOR THE PROTECTION AND CONTROL OF LICENSE TRANSACTIONS ASSOCIATED WITH THE ALTERATION OF REPLICATED READ ONLY MEDIA AND ITS BOUND LICENSED CONTENT - Distribution of content stored on read only media, and a system and method by which a consumer who purchased content stored on read only media implements a process in the field by which they alter the storage media. A system and tools are used by the consumer to identify, authenticate, disable, and confirm alteration in exchange for compensation, the acquisition of new usage rights to content, or the ability to restore access to or copy content to new media. The process may be conducted by the consumer in the field without assistance and or visual inspection, or be partially conducted in conjunction with an authorized intermediary. Furthermore, the process may restore access to content stored on new media without the need to transfer copies of content. | 2013-08-15 |
20130212692 | Systems and Methods for Managing Data Incidents - Systems and methods for managing a data incident are provided herein. Exemplary methods may include receiving data breach data that comprises information corresponding to the data breach, automatically generating a risk assessment from a comparison of data breach data to privacy rules, the privacy rules comprising at least one federal rule and at least one state rule, each of the rules defining requirements associated with data breach notification laws, and providing the risk assessment to a display device that selectively couples with the risk assessment server. | 2013-08-15 |
20130212693 | ANONYMOUS WHISTLE BLOWER SYSTEM WITH REPUTATION REPORTING OF ANONYMOUS WHISTLE BLOWER - Reputations of anonymous sources of information are managed by associating the reputations with devices from which the information is received rather than from the human individuals using those devices. The devices are recognized using a one-way identifier, such as a digital fingerprint, such that the source device cannot be used to readily identify the source device or its user(s) but all items of information received from the same source device can be readily recognized. Feedback from other devices is accumulated and used to assess trustworthiness of the source device and reputation data representing such trustworthiness is published along with the information received from the source device. | 2013-08-15 |
20130212694 | METHOD AND APPARATUS FOR RF TRANSMITABLE DATA PROTECTION - A method for prevention of unauthorized acquisition and use of privileged information including steps of: generating a spoof signature and associating the signature with the privileged information such that the spoof signature can be acquired during the unauthorized acquisition of the privileged information; establishing an identifying processor arranged to identify the at least one spoof signature, to classify attempts of unauthorized use of the privileged information, and generates at least one authorization for at least one predetermined set of actions organized to prevent the unauthorized use of the privileged information; and communicating authorizations to a party proximal to the at least one unauthorized use of the privileged information in time sufficient for interruption of the unauthorized use of the privileged information. | 2013-08-15 |
20130212695 | SEGMENTED MEDIA CONTENT RIGHTS MANAGEMENT - Segmented media content rights management is described. A media device can receive segments of protected media content from media content streams that each include a different version of the protected media content. A media content file can be generated to include the segments of the protected media content that are sequenced to render the protected media content for viewing. A file header object can be instantiated in a file header of the media content file, where the file header object includes DRM-associated features, such as one or more DRM licenses, properties, and/or attributes that correspond to the media content file to provision all of the segments of the protected media content together. | 2013-08-15 |
20130212696 | APPARATUSES, SYSTEMS, AND METHODS FOR RENEWABILITY WITH DIGITAL CONTENT PROTECTION SYSTEMS - In one embodiment of the invention, a format for renewability content (e.g., a System Renewability Message (SRM)) corresponding to a content protection protocol (e.g., High-Bandwidth Digital Content Protection (HDCP)) may be interoperable with devices that are compliant with different versions of the standard (e.g., HDCP1.x and 2.x devices) and that include different amounts of storage for the renewability content (e.g., first and second generation devices). | 2013-08-15 |
20130212697 | SECURE DATA EXCHANGE TECHNIQUE - Techniques utilizing common encryption approaches for data from multiple parties enable those parties to discover information that is held in common by the parties without disclosing to any party information that is not held in common by the parties. Encrypted information for each party can be compared to determine which encrypted values match, and those encrypted values can be returned to any of the parties such that a party can determine which corresponding data the parties have in common without having access to any other data of any other parties. | 2013-08-15 |
20130212698 | METHOD AND DEVICE FOR THE SECURE TRANSFER OF DATA - A method for the secure transfer of a digital file from a first computerized system to one second computerized system, the method comprising the following steps: writing the digital file on a first file-management module of a secure transfer device, transferring the digital file to an internal verification module of the secure transfer device, verifying one portion of the transferred digital file in the verification module, and transferring the partially verified digital file to a second file-management module of the secure transfer device according to the result of the verification, in order to allow the file to be read by the one second computerized system according to the result of the verification. | 2013-08-15 |
20130212699 | METHODS AND SYSTEMS FOR FACILITATING PERSONAL DATA PROPAGATION - Methods and systems for facilitating the propagation of personal data include a Personal Data Propagation Environment (“PDP environment”), which facilitates the propagation of personal data items between secure personal data stores and various consumers of the personal data items. One PDP environment includes a personal data manager and a personal data subscriber. The personal data manager manages personal data items on a secure data store associated with a user computing device. The personal data manager provides access to personal data items stored on the secure data store in accordance with a personal data subscription associated with the personal data subscriber. | 2013-08-15 |
20130212700 | EXCEPTION HANDLING IN A DATA PROCESSING APPARATUS HAVING A SECURE DOMAIN AND A LESS SECURE DOMAIN - A data processing apparatus and method are provided for handling exceptions, including processing circuitry configured to perform data processing operations in response to program code, said circuitry including exception control circuitry. A plurality of registers are provided including a first and second subsets of registers, and a data store. The data store includes a secure region and a less secure region, wherein the secure region is for storing data accessible by the processing circuitry when operating in a secure domain and not accessible by the processing circuitry when operating in a less secure domain. The exception control circuitry performs state saving of data from the first subset of registers before triggering the processing circuitry to perform an exception handling routine corresponding to the exception. Where background processing was performed by the processing circuitry in the secure domain, the exception control circuitry performs additional state saving of the data. | 2013-08-15 |
20130212701 | METHOD AND SYSTEM FOR CLASSIFYING AND REDACTING SEGMENTS OF ELECTRONIC DOCUMENTS - A method for classifying and redacting electronic documents, for example an email message, is described. The classification and redaction of segments of the email message are based on rules. Using the rules, multiple versions of the email message, each corresponding to recipients with specific clearance levels are generated. A selective redacting of certain segments of the email message concurrently with sending previously redacted segments of the same email message is described. A corresponding system for classifying and redacting electronic documents is also provided. | 2013-08-15 |
20130212702 | Apparatus and Method for Data Security on Mobile Devices - A mobile device includes a lock screen configured to prevent unauthorized or inadvertent access to the mobile device by limiting access to the mobile device while displaying through the lock screen applications available on the mobile device. | 2013-08-15 |
20130212703 | Role-Based Content Rendering - Systems and methods for rendering role-based content are described herein. The system includes a registration module configured to define an application role in a metadata driven framework for providing selective access to the content. The content may include data and content objects. The registration module may also be configured to associate content objects with the application role. The system may also include an authentication module configured to authenticate a user from a plurality of users. The user may be authenticated based on log-in credentials of the user. The authentication module may also determine the application role of the user. Additionally, the authentication module may identify one or more content objects based on the determined application role of the user. The content objects may be identified based on the application role of the user. | 2013-08-15 |
20130212704 | SECURE DIGITAL STORAGE - Systems and methods for activating a token to enable a user to enter a transaction based on information received from a recovery key and a passcode are described herein. | 2013-08-15 |
20130212705 | SYSTEM AND METHOD OF GENERATING A PER SALE WATERMARKING ON DIGITAL FILES - A system, method and computer readable media provided for watermarking a digital file. The method comprises altering samples of the digital file available for distribution upon request by adding a number such as +or a −1 to each sample of the digital file according to a probability value and compressing the digital file with the altered samples. Altering the sample of the digital file may be done on a per distribution or per sale basis. | 2013-08-15 |
20130212706 | BROADCASTING OF ELECTRONIC DOCUMENTS PRESERVING COPYRIGHT AND PERMITTING PRIVATE COPYING - A method of broadcasting electronic documents allowing the protection of copyright and private copying includes a network accessible control server taking customer orders, network accessible delivery and control servers, and equipment supporting a display for consulting the document. Each document copy is generated by the delivery server based on the document model ordered. A controller verifies digital rights in force at consultation time, and contains other digital rights acquired by the customer. Copy generation is triggered by the customer activating a URL link to the delivery server. This link was previously sent to the customer via electronic messaging by the order server, containing at least the unique identifier of the copy ordered. The copy is loaded onto the customer's equipment on completion of generation and can be consulted only after issuing a request to the control server containing the unique identifier, and the receipt of the response permitting consultation. | 2013-08-15 |
20130212707 | Document control system - Systems and techniques to provide a document control system. In general, in one implementation, the technique includes: receiving, at a permissions-broker server, a request from a client to take an action with respect to an electronic document, identifying, at the permissions-broker server and in response to the request, first document-permissions information associated with the electronic document, the first document-permissions information being in a first permissions-definition format, translating, at the permissions-broker server, the identified first document-permissions information into second document-permissions information in a second permissions-definition format, and sending the second document-permissions information to the client to govern the action with respect to the electronic document at the client. The first permissions-definition format can include at least one type of permission information that cannot be fully defined in the second permissions-definition format, and translating the first information into the second information can involve translating based upon additional information associated with the request. | 2013-08-15 |
20130212708 | SYSTEM AND METHODS THEREOF FOR DETECTION OF CONTENT SERVERS, CACHING POPULAR CONTENT THEREIN, AND PROVIDING SUPPORT FOR PROPER AUTHENTICATION - An apparatus and methods thereof provide for efficient usage of network bandwidth and ability to identify whether a client is authorized to receive such bandwidth. Content provided by a content source for a first content consumer is stored in the apparatus located in between the content source and the content consumer allowing delivery of such content to another content consumer from the apparatus thereby reducing the overall network load. For protected content, the apparatus identifies the need for authorization and provides a random identification to the target content consumer and storing that random identification as well as at least another parameter associated thereto such that when revalidation is necessary the content consumer can be validated by the apparatus. | 2013-08-15 |
20130212709 | System and Method for Securing Virtual Computing Environments - A computer implemented method includes introducing unpredictable temporal disruptions to the operating states of an authorized process and an unauthorized process. The authorized process is migrated to a virtual machine to avoid the unpredictable temporal disruptions while the unauthorized process is subject to the unpredictable temporal disruptions and thereby experiences an unstable environment that induces operating faults. | 2013-08-15 |
20130212710 | Data Leakage Prevention for Cloud and Enterprise Networks - Apparatuses, methods and articles of manufacture for performing data leakage prevention are provided. Data leakage prevention may be performed by determining a signature of a transmitted document, the transmitted document being in transit to a location beyond a network boundary. The signature of the transmitted document is compared with one or more signatures of documents authorized to be transmitted beyond the network boundary. The transmitted document is prevented from being transmitted beyond the network boundary if the signature of the document does not correspond to a signature of a document authorized to be transmitted beyond the network boundary. | 2013-08-15 |
20130212711 | Solution for Continuous Control and Protection of Enterprise Data Based on Authorization Projection - Extracting data from a source system includes generating an authorization model of the data protection controls applied to the extracted data by the source system. The authorization model is used to map the data protection control applied to the extracted data to generate corresponding data protection controls provided in target system. The extracted data is imported to the target system including implementing the corresponding data protection controls. | 2013-08-15 |
20130212712 | SYSTEM AND METHOD FOR CREATING BOUNDED PACKETS OF PERSONALLY-IDENTIFIABLE INFORMATION (PII) - A system and method is disclosed, which allows registered visitors the opportunity to create bounded packets (QYouBs) containing a range of personally-identifiable information (PII) selected by the subscriber to meet a specific need, which can then be quickly transferred to a receiving party. | 2013-08-15 |
20130212713 | METHOD AND APPARATUS FOR PROVIDING BACKEND SUPPORT FOR DEVICE CONTROL IN RISK CONDITIONS - An approach is provided for providing backend support for device control in risk conditions. A device control support platform determines one or more computational chains consisting of one or more computation closures for managing one or more risk conditions associated with at least one device. The device control support platform further causes a projection, a distribution, or a combination thereof of the one or more computational chains, the one or more computation closures, or a combination thereof to one or more other devices. The device control support platform also causes an execution of at least a portion of the one or more computational chains, the one or more computational closures, or a combination thereof to cause an initiation of at least one computational broker at the at least one device for managing the one or more risk condition. | 2013-08-15 |
20130212714 | Information Management System And Device - The present invention relates to an information management system, and in particular to a portable information management device. The device includes a housing having a first surface and a second surface, said first and second surfaces securely enclosing electronic componentry of the device, wherein the electronic componentry includes: a data storage device for storing information about a person or asset; and a processor for transferring the information from the data storage device to an external device via a communication means, wherein the communication means includes: an antenna to allow contactless transfer of the information; and an input/output interface to allow transfer of the information via physical means. | 2013-08-15 |
20130212715 | Biomarkers for Hematologic Malignacies - It has been discovered that STAT5 phosphorylation and CD150 are effective biomarkers for detecting, diagnosing, and monitoring hematological malignancies, including for example lymphomas. Compositions and methods for identifying therapeutic agents for the treatment of hematologic malignancies using p-STAT5, CD150 or both as biomarkers are described. | 2013-08-15 |
20130212716 | PFKs as Modifiers of the IGFR Pathway and Methods of Use - Human PFK genes are identified as modulators of the IGFR pathway, and thus are therapeutic targets for disorders associated with defective IGFR function. Methods for identifying modulators of IGFR, comprising screening for agents that modulate the activity of PFK are provided. | 2013-08-15 |
20130212717 | METHOD FOR PRODUCING PENTAMERIC CRP, PENTAMERIC CRP-PRODUCING TRANSGENIC SILKWORM AND METHOD FOR CONSTRUCTING SAME, DNA ENCODING CANINE MONOMERIC CRP AND EXPRESSION VECTOR CONTAINING THE DNA - Pentameric CRP is produced at a high efficiency by transferring DNA, which encodes monomeric CRP, into a silkworm to thereby construct a transgenic silkworm and then collecting and purifying pentameric CRP that is produced by the transgenic silkworm constructed above. | 2013-08-15 |
20130212718 | CHIMERIC SPIDER SILK AND USES THEREOF - Transgenic silkworms comprising at least one nucleic acid encoding a chimeric silk polypeptide comprising one or more spider silk elasticity and strength motifs are disclosed. Expression cassettes comprising nucleic acids encoding a variety of chimeric spider silk polypeptides (Spider 2, Spider 4, Spider 6, Spider 8) are also disclosed. A piggyBac vector system is used to incorporate nucleic acids encoding chimeric spider silk polypeptides into the mutant silkworms to generate stable transgenic silkworms. Chimeric silk fibers having improved tensile strength and elasticity characteristics compared to native silkworm silk fibers are also provided. The transgenic silkworms greatly facilitate the commercial production of chimeric silk fibers suitable for use in a wide variety of medical and industrial applications. | 2013-08-15 |
20130212719 | Humanized Rodents that Express Heavy Chain Containing VL Domains - Non-human animals, tissues, cells, and genetic material are provided that comprise a modification of an endogenous non-human heavy chain immunoglobulin sequence and that comprise an ADAM6 activity functional in a rodent (e.g., a mouse), wherein the non-human animals rearrange human immunoglobulin light chain gene segments in the context of heavy chain constant regions and express immunoglobulin-like molecules comprising human immunoglobulin light chain variable domains fused to heavy chain constant domains that are cognate with human immunoglobulin light chain variable domains fused to light chain constant domains. | 2013-08-15 |
20130212720 | BIOMARKERS ASSOCIATED WITH AUTOIMMUNE DISEASES OF THE LUNG - The present disclosure is generally related to pulmonary autoantigens. The disclosure provides methods and kits for assessing whether a subject has or is predisposed to interstitial lung disease. Additionally the present disclosure provides methods of treatment and animal models of interstitial lung disease. | 2013-08-15 |
20130212721 | REAGENT FOR TUMOR TESTING AND PHARMACEUTICAL COMPOSITION FOR TUMOR PREVENTION - The present invention aims to provide a novel reagent for tumor testing and a novel pharmaceutical composition for tumor prevention. | 2013-08-15 |
20130212722 | TRANSGENIC ANIMALS WITH CUSTOMIZABLE TRAITS - Disclosed are materials and methods for creating customizable traits in animals. In the demonstration of the principle of the subject invention, a keratin-14 specific promoter is used with, red fluorescent protein in the loxp cassette, dominant black (ΔG23) beta defensin 103 in the pigment cassette, and an SV40 (with intron) polyadenylation sequence. When Cre recombinase (or HTNCre) is applied to the animal's skin in a carrier base (e.g., lipid bilayers), fur is permanently genetically modified to turn black in the shape in which it was applied. | 2013-08-15 |
20130212723 | TRANSGENIC ANIMALS WITH CUSTOMIZABLE TRAITS - Disclosed are materials and methods for creating customizable traits in animals. In the demonstration of the principle of the subject invention, a keratin-14 specific promoter is used with red fluorescent protein in the loxp cassette, dominant black (ΔG23) beta defensin 103 in the pigment cassette, and an SV40 (with intron) polyadenylation sequence. When Cre recombinase (or HTNCre) is applied to the animal's skin in a carrier base (e.g., lipid bilayers), fur is permanently genetically modified to turn black in the shape in which the HTNCre was applied. | 2013-08-15 |
20130212724 | Composition for Regenerating Hair Follicles Comprising CD36-Expressing Dermal Sheath Cells - Provided is a composition for regenerating hair follicles comprising CD36-expressing dermal sheath cells (DSc). | 2013-08-15 |
20130212725 | FUSION PROTEINS COMPRISING A DNA-BINDING DOMAIN OF A TAL EFFECTOR PROTEIN AND A NON-SPECIFIC CLEAVAGE DOMAIN OF A RESTRICTION NUCLEASE AND THEIR USE - The present invention relates to a method of modifying a target sequence in the genome of a eukaryotic cell, the method comprising the step: (a) introducing into the cell a fusion protein comprising a DNA-binding domain of a Tal effector protein and a non-specific cleavage domain of a restriction nuclease or a nucleic acid molecule encoding the fusion protein in expressible form, wherein the fusion protein specifically binds within the target sequence and introduces a double strand break within the target sequence. The present invention further relates to the method of the invention, wherein the modification of the target sequence is by homologous recombination with a donor nucleic acid sequence further comprising the step: (b) introducing a nucleic acid molecule into the cell, wherein the nucleic acid molecule comprises the donor nucleic acid sequence and regions homologous to the target sequence. The present invention also relates to a method of producing a non-human mammal or vertebrate carrying a modified target sequence in its genome. Furthermore, the present invention relates to a fusion protein comprising a DNA-binding domain of a Tal effector protein and a non-specific cleavage domain of a restriction nuclease. | 2013-08-15 |
20130212726 | SPINACH HYBRID RX 06692157 - The invention provides seed and plants of spinach hybrid RX 06692157 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of spinach hybrid RX 06692157 and the parent lines thereof, and to methods for producing a spinach plant produced by crossing such plants with themselves or with another spinach plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the leaf and gametes of such plants. | 2013-08-15 |
20130212727 | HYBRID CANOLA QUALITY BRASSICA JUNCEA - A seed from a first | 2013-08-15 |
20130212728 | PLANTS AND SEEDS OF COMMON WHEAT CULTIVAR BZ6W07-427 - A wheat cultivar, designated BZ6W07-427, is disclosed. The invention relates to the seeds, plants, and hybrids of wheat cultivar BZ6W07-427, and to methods for producing a wheat plant produced by crossing plants from wheat cultivar BZ6W07-427 with themselves or with plants from another wheat variety. The invention also relates to methods for producing a wheat plant containing in its genetic material one or more transgenes and to the transgenic wheat plants and plant parts produced by those methods. The invention also relates to wheat varieties or breeding varieties and plant parts derived from wheat cultivar BZ6W07-427, to methods for producing other wheat varieties, lines or plant parts derived from wheat cultivar BZ6W07-427, and to the wheat plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid wheat seeds and plants produced by crossing wheat cultivar BZ6W07-427 with another wheat cultivar. | 2013-08-15 |
20130212729 | PLANTS AND SEEDS OF COMMON WHEAT CULTIVAR BZ6W07-458 - A wheat cultivar, designated BZ6W07-458, is disclosed. The invention relates to the seeds, plants, and hybrids of wheat cultivar BZ6W07-458, and to methods for producing a wheat plant produced by crossing plants from wheat cultivar BZ6W07-458 with themselves or with plants from another wheat variety. The invention also relates to methods for producing a wheat plant containing in its genetic material one or more transgenes and to the transgenic wheat plants and plant parts produced by those methods. The invention also relates to wheat varieties or breeding varieties and plant parts derived from wheat cultivar BZ6W07-458, to methods for producing other wheat varieties, lines or plant parts derived from wheat cultivar BZ6W07-458, and to the wheat plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid wheat seeds and plants produced by crossing wheat cultivar BZ6W07-458 with another wheat cultivar. | 2013-08-15 |
20130212730 | SOYBEAN VARIETY DLL1290 - The soybean variety DLL1290 is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and soybean lint as well as to hybrid soybean plants and seeds obtained by repeatedly crossing plants of variety DLL1290 with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of DLL1290 and to plants of DLL1290 reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from DLL1290. | 2013-08-15 |
20130212731 | SOYBEAN VARIETY DLL1141 - The soybean variety DLL1141 is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and soybean lint as well as to hybrid soybean plants and seeds obtained by repeatedly crossing plants of variety DLL1141 with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of DLL1141 and to plants of DLL1141 reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from DLL1141. | 2013-08-15 |
20130212732 | SOYBEAN VARIETY DLL1143 - The soybean variety DLL1143 is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and soybean lint as well as to hybrid soybean plants and seeds obtained by repeatedly crossing plants of variety DLL1143 with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of DLL1143 and to plants of DLL1143 reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from DLL1143. | 2013-08-15 |
20130212733 | SOYBEAN VARIETY DLL0838 - The soybean variety DLL0838 is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and soybean lint as well as to hybrid soybean plants and seeds obtained by repeatedly crossing plants of variety DLL0838 with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of DLL0838 and to plants of DLL0838 reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from DLL0838. | 2013-08-15 |
20130212734 | GENETIC LOCI ASSOCIATED WITH RESISTANCE OF CORN TO FIJIVIRUS - The invention relates to methods and compositions for identifying and/or selecting maize plants that have newly conferred resistance or enhanced resistance to, or are susceptible to, a Fijivirus, particularly Mal de Rio Cuarto Virus (MRCV) and/or Maize Rough Dwarf Virus (MRDV). The methods use molecular genetic markers to identify, select, and/or construct resistant plants or to identify and counter-select susceptible plants. Maize plants that display newly conferred resistance or enhanced resistance to a Fijivirus (or an infection or disease caused by the virus) that are generated by the methods of the invention are also a feature of the invention. | 2013-08-15 |
20130212735 | MODULATING THE LEVEL OF COMPONENTS WITHIN PLANTS - Materials and Methods for identifying lignin regulatory region-regulatory protein associations are disclosed. Materials and methods for modulating lignin accumulation are also disclosed. In addition, methods and materials for modulating (e.g., increasing or decreasing) the level of a component (e.g., protein, oil, lignin, carbon, a carotenoid, or a triterpenoid) in plants are disclosed. | 2013-08-15 |
20130212736 | ENZYME DIRECTED OIL BIOSYNTHESIS IN MICROALGAE - The present invention is related to biosynthetic oil compositions and methods of making thereof. In some embodiments, the invention relates to the use of endogenous enzymes in plants capable of synthesizing oil. In preferred embodiments, said plants are algae. In further embodiments, said algae are from the family | 2013-08-15 |
20130212737 | GLYPHOSATE RESISTANT PLANTS AND ASSOCIATED METHODS - Provided are plants, plant parts, plant organs, plant seeds, and/or plant cells having glyphosate resistance comprising a nucleic acid encoding a polypeptide having at least 90% identity with SEQ ID NO: 1, and associated methods. | 2013-08-15 |
20130212738 | COMPOSITION FOR PHYTOCHELATIN TRANSPORT - A composition for transportation of phytochelatin including two DNA molecule encoding two members of ABCC (multidrug resistance-associated protein (MRP)) subfamily of ATP-binding cassette (ABC) transporter protein in a plant is provided. The composition for transportation of phytochelatin can be useful in accumulating and sequestering phytochelatin alone or in combination with a harmful substance by transporting the phytochelatin and/or harmful substance into the vacuole of a cell, thereby reducing a content of the toxic substance from cytosol, and also reducing it from translocation from the root to the shoot of a plant. Therefore, the DNA molecule can be useful to develop a crop in which the toxic substance present in edible parts, such as leaves, stems and fruits, of the plant is reduced in content. Furthermore, the DNA molecule can be useful to develop inedible plants for phytoremediation or phytoextraction due to an increase in accumulated amount of and resistance against arsenic, an arsenic compound and cadmium, thereby making it possible to achieve phytoremediation or phytoextraction in an environmentally friendly and economic manner. | 2013-08-15 |
20130212739 | PROCESS FOR TRANSFECTING PLANTS - A process of transfecting a plant, comprising spraying parts of said plant with an aqueous suspension containing cells of an | 2013-08-15 |
20130212740 | FUCOSYL TRANSFERASE GENE - A DNA molecule is provided which comprises a sequence according to SEQ ID NO: 1 having an open reading frame from base pair 211 to base pair 1740 or having at least 50% homology to the above-indicated sequence, or hybridizing with the above-indicated sequence under stringent conditions, or comprising a sequence which has degenerated to the above-indicated DNA sequence because of the genetic code, the sequence coding for a plant protein having fucosyltransferase activity or being complementary thereto. | 2013-08-15 |
20130212741 | MOLECULAR CLONING OF BROWN-MIDRIB2 (bm2) GENE - The present invention relates to methods for altering the concentration or composition of lignin in a plant; a method of making a mutant plant having an altered level of MTHFR protein compared to that of a nonmutant plant; plants, mutant plants, and mutant plant seeds produced by these methods; a method of identifying a candidate plant suitable for breeding that displays an altered lignin concentration or composition phenotype; a transgenic plant having an altered level of MTHFR protein capable of determining the lignin concentration or composition in a plant compared to that of a nontransgenic plant; and seed produced from a transgenic plant. | 2013-08-15 |
20130212742 | LATICIFEROUS TISSUE-SPECIFIC SRPP PROMOTER FROM HEVEA BRASILIENSIS AND USES THEREOF - A laticiferous tissue-specific SRPP (small rubber particle-associated protein) promoter derived from | 2013-08-15 |
20130212743 | METHOD FOR INCREASING PLANT BIOMASS BY CONTROLLING ACTIVE CYTOKININ EXPRESSION LEVEL - An object of the present invention is to provide a means for conferring a useful phenotype to a plant by efficiently controlling the quantitative productivity of iP-type and tZ-type active cytokinins in plant aerial organs. According to the present invention, a method for increasing plant biomass by causing the overexpression of an active cytokinin synthase gene and a cytokinin hydroxylase gene in a plant body is provided. | 2013-08-15 |
20130212744 | METHOD OF REDUCING INSECT-VECTORED VIRAL INFECTIONS - The present invention is directed to methods of reducing insect-vectored viral infection and transmission in plants, methods of reducing damage to plants caused by viral infection, and methods of crop enhancement including methods for improving plant growth, vigour and yield, by application of a combination of an anthranilic bis-amide or an aminothiadiazole (ryanodine receptor modulator) insecticide and a plant activator, to compositions comprising the combinations and to plant propagation material treated therewith. | 2013-08-15 |
20130212745 | Polypeptides Having Endoglucanase Activity And Polynucleotides Encoding Same - The present invention relates to isolated polypeptides having endoglucanase activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides. | 2013-08-15 |
20130212746 | Polypeptides Having Hemicellulolytic Activity And Polynucleotides Encoding Same - The present invention relates to isolated polypeptides having hemicellulolytic activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides. | 2013-08-15 |
20130212747 | HERBICIDE TOLERANT COTTON EVENT pDAB4468.19.10.3 - Cotton event pDAB4468.19.10.3 comprises genes encoding AAD-12 and PAT, affording herbicide tolerance to cotton crops containing the event, and enabling methods for crop protection. | 2013-08-15 |
20130212748 | Secreted Insecticidal Protein and Gene Compositions From Bacillus Thuringiensis and Uses Therefor - The present invention relates to the isolation and characterization of nucleotide sequences encoding novel insecticidal proteins secreted into the extracellular space from | 2013-08-15 |
20130212749 | Scanning Probe Microscope and Surface Shape Measuring Method Using Same - It has been difficult to highly accurately measure the profiles of samples using scanning probe microscopes at the time when scanning is performed due to scanning mechanism fluctuations in the non drive direction, i.e., vertical direction. The present invention is provided with, on the rear side of a sample stage, a high-accuracy displacement gauge for measuring fluctuation in the non drive direction, i.e., vertical direction, at the time when the sample stage is being scanned in the horizontal directions, and as a result, highly accurate planarity evaluation with accuracy of sample nm-order or less is made possible by correcting sample surface shape measurement results obtained using a probe. | 2013-08-15 |
20130212750 | ZERO THERMAL EXPANSION, LOW HEAT TRANSFER, VARIABLE TEMPERATURE SAMPLE ASSEMBLY FOR PROBE MICROSCOPY - A variable temperature assembly for scanning probe microscopy (SPM) is described which minimizes or eliminates motion of the sample caused by the thermal expansion or contraction of the sample holder assembly and platform/scanning stage on which the assembly is mounted, and minimizes heating or cooling of the platform/stage. In heater form, the variable temperature assembly includes a thin boron nitride puck with one or more high-resistivity wires embedded along an underside of the puck. The puck is suspended from its polished top surface by posts that are secured to the microscope stage. All thermal expansion of the puck occurs in the downward direction, away from the SPM probe-sample interface, thus eliminating relative motion between the probe tip and sample surface. The top surface of the puck remains stationary as a result of the unique geometry of the posts and the puck-post attachment configuration described herein. | 2013-08-15 |
20130212751 | GENERATION OF A FREQUENCY COMB AND APPLICATIONS THEREOF - Apparatus for generating a microwave frequency comb (MFC) in the DC tunneling current of a scanning tunneling microscope (STM) by fast optical rectification, caused by nonlinearity of the DC current vs. voltage curve for the tunneling junction, of regularly-spaced, short pulses of optical radiation from a focused mode-locked, ultrafast laser, directed onto the tunneling junction, is described. Application of the MFC to high resolution dopant profiling in semiconductors is simulated. Application of the MFC to other measurements is described. | 2013-08-15 |
20130212752 | Hybrid tea rose plant named 'PC1251' - A new variety of Hybrid Tea Rose named ‘PC1251’, particularly characterized by large, bicolor flowers with delicate fragrance, large dark red nearly thornless stems, and bright green foliage is disclosed. | 2013-08-15 |
20130212753 | Interspecific tree named 'Sunset Delight' - A new and distinct variety of interspecific tree. The following features of the tree and its fruit are characterized with the tree budded on ‘Nemaguard’ Rootstock (non-patented), grown on Handford sandy loam soil with Storie Index rating 95, in USDA Hardiness Zone 9, near Modesto, Calif., with standard commercial fruit growing practices, such as pruning, thinning, spraying, irrigation and fertilization. Its novelty consist of the following combination of desirable features: | 2013-08-15 |
20130212754 | Blackberry plant named 'HJ-7' - Description and specifications of a new and distinct blackberry which originates from seed produced by a hand pollinated cross of two, non-patented varieties; “Obsidian” as the female and “Eaton” as the male. This new, trailing cultivar can be distinguished by it's consistant, large fruit size and appearance during the early spring and summer period for the fresh market. The fruit of this cultivar is produced on red, strong, thorny canes. When plants are grown and pruned correctly, yield in Central California, USA can be up to 4,500 crates/ac if the fruit is handled and shipped correctly. | 2013-08-15 |
20130212755 | Raspberry plant named 'Diamond Jubilee' - The present invention is a new and distinct double cropping red raspberry cultivar named ‘Diamond Jubilee’, which is capable of producing high yields of large, bright colored, sweet and exceptionally firm fruit that has positive consumer appeal characteristics. The cultivar is characterized by its high cane vigor, large leaves, its low acidity, sweetness and firmness and its fruit morphology, specifically its broad conical shape. ‘Diamond Jubilee’ plants are also outstanding in that they produce commercial quantities of large, firm and flavorful fruit with long postharvest life in both the overwintering floricanes and late summer primocanes. | 2013-08-15 |
20130212756 | Buddleia plant named 'Hinebud2' | 2013-08-15 |
20130212757 | Artichoke plant named 'PS-MSG0619' - A new and distinct | 2013-08-15 |
20130212758 | Chrysanthemum plant named 'Zanmuaval Purple' | 2013-08-15 |
20130212759 | Chrysanthemum plant named 'Zanmuaval Golden' | 2013-08-15 |
20130212760 | Chrysanthemum plant named 'Zanmuaval Orange' | 2013-08-15 |
20130212761 | Chrysanthemum plant named 'Zanmuaval Red' | 2013-08-15 |