36th week of 2011 patent applcation highlights part 53 |
Patent application number | Title | Published |
20110219421 | ENHANCED VIDEO PROGRAMMING SYSTEM AND METHOD UTILIZING USER-PROFILE INFORMATION - Maintaining a file specifying a “donut” of dynamic, hierarchical, shared user-profile information. The donut contains a user profile or acts as a key to a data repository containing it, and it specifies user-profile information such as user characteristics, viewing preferences, hobbies, and spending habits. The donut is accessed by browser programs, associated web server programs, and other applications for use in routing content to the user associated with the donut. | 2011-09-08 |
20110219422 | SYSTEM AND METHOD FOR DISPLAYING A DENSITY OF OBJECTS IN A SOCIAL NETWORK APPLICATION - A social network application system stores profile information of one or more types of objects, such as users, places, events, things, organizations and other types of objects. The system maintains current information for the various types of objects. The current information is updated periodically. The system generates a dataset for generating density reports for one or more types of objects based on search criteria. The dataset includes current information for one or more types of objects. The dataset is transmitted to a user device. The user device displays a graphical representation of density of objects in a geographical area. | 2011-09-08 |
20110219423 | METHOD AND APPARATUS FOR TRIGGERING USER COMMUNICATIONS BASED ON PRIVACY INFORMATION - An approach is provided for protecting a user identity in communication based on privacy information. The privacy engine selects one or more parameters associated with a privacy metric. Next, the privacy engine determines the parameters in a communication environment, the communication environment including a user device and a plurality of other devices. Next, the privacy engine computes a privacy level based, at least in part, on the parameters and the privacy metric. Next, the privacy engine compares the computed privacy level against a predetermined privacy level. Then, the privacy engine triggers a communication to one or more of the other devices in the communication environment based, at least in part, on the comparison. | 2011-09-08 |
20110219424 | INFORMATION PROTECTION USING ZONES - Some embodiments are directed to an information protection scheme in which devices, users, and domains in an information space may be grouped into zones. When information is transferred across a zone boundary, information protection rules may be applied to determine whether the transfer should be permitted or blocked, and/or whether any other policy actions should be taken (e.g., requiring encryption, prompting the user for confirmation of the intended transfer, or some other action). | 2011-09-08 |
20110219425 | ACCESS CONTROL USING ROLES AND MULTI-DIMENSIONAL CONSTRAINTS - Methods, systems, and computer-readable media of access control using roles and multi-dimensional constraints are disclosed are disclosed. A particular method includes assigning a user a particular role of a plurality of roles and associating the user with one or more multi-dimensional constraints. A request from the user to perform an operation permitted by the particular role may be received. The method includes determining whether any of the multi-dimensional constraints allows the user to perform the operation. The request is granted when at least one of the multi-dimensional constraints allows the user to perform the operation. The request is denied when none of the multi-dimensional constraints allows the user to perform the operation. | 2011-09-08 |
20110219426 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR ENHANCED SERVICE DETECTION AND POLICY RULE DETERMINATION - Methods, systems, and computer readable media for enhanced service detection and policy rule determination are disclosed. According to one method, a policy charging and rules function (PCRF) node requests, from a deep packet inspection (DPI) node notification of detection of traffic relating to a service. The DPI node identifies at least one traffic classifier usable to detect traffic corresponding to the service, uses the traffic classifier to detect traffic corresponding to the service, and notifies the PCRF of the detection and of the traffic classifier. The PCRF node receives the at least one traffic classifier, determines a policy rule based on the at least one traffic classifier, and communicates the policy rule to a policy enforcement node. | 2011-09-08 |
20110219427 | Smart Device User Authentication - Techniques for simplifying an authentication process from the viewpoint of a user while providing improved security to the many users currently employing no or weak security techniques. In logging into a web site hosted by a web server, a session begins by a user connecting and logging in with a device, such as a personal computer. Rather than a user name and password approach which is presently typical, the personal computer communicates with another user device, such as a smart phone. In one approach, an encoded acoustic signal is employed for this communication. The smart phone securely communicates with an authentication server which informs the web server whether the user has been authenticated or not. | 2011-09-08 |
20110219428 | ELECTRONIC APPARATUS AND TERMINAL - According to one embodiment, an electronic device connected to an authentication device through a first communication network, and further connected to another electronic device through a second communication network, wherein the electronic device executes authentication of the electronic device and another electronic device by data delivery/receipt conforming to a predetermined procedure between the electronic device and the authentication device through the first communication network, and data delivery/receipt between the electronic device and another electronic device through the second communication network. | 2011-09-08 |
20110219429 | ONLINE SERVICE PROVIDING SYSTEM, METHOD, SERVER AND MOBILE DEVICE THEREOF, AND COMPUTER PROGRAM PRODUCT - An online service providing system, a method, a server, and a mobile device thereof, and a computer program product are provided. The method includes sending a verification link corresponding to a user account that is not verified; after receiving a verification request corresponding to the verification link, determining whether a device identification sent by the mobile device that has logged in the user account is received; when receiving the device identification, confirming whether the user account is verified according to the device identification; after confirming that the user account is verified, when receiving a service request sent by a terminal device logging the user account into a service website, determining a homepage of the service website according to the device identification, and providing the online service corresponding to the mobile device to the terminal device through the service web site. | 2011-09-08 |
20110219430 | SECURE NETWORKED SYSTEM FOR CONTROLLING MOBILE ACCESS TO ENCRYPTED DATA SERVICES - A networked system for controlling the mobile access to a data service, which may provide encrypted data, is presented. The system may include a mobile device and a mobile access control server, which controls the mobile device's access to the data service by controlling the access information required to access the data service. The system may also include a content server that provides the data service, a certification authority, and a network for enabling communication among the components of the system. To access encrypted data services, the mobile device communicates an access request to the mobile access control server, which determines whether access should be granted, and provides access information to the mobile device, enabling the mobile device to establish encrypted communication with the content server and/or to decrypt the encrypted data provided by the data service via the content server. | 2011-09-08 |
20110219431 | SYSTEM AND METHOD OF QUALITY OF SERVICE ENABLEMENT FOR OVER THE TOP APPLICATIONS IN A TELECOMMUNICATIONS SYSTEM - A system, method, and node providing a predefined Quality of Service (QoS) level to an Over The Top (OTT) service provider in a telecommunications network. A User Equipment (UE) initiates an IP-based application session (e.g., Hyper Text Transfer Protocol (HTTP) session) with the OTT service provider by sending an application-dependent message toward an OTT application server. The method begins with a proxy node in the telecommunications network intercepting the application-dependent message. The proxy node then modifies the application-dependent message by adding a subscriber identification to the header of the application-dependent message. The proxy node forwards the modified application-dependent message to the OTT application server. The OTT application server then sends a request having the subscriber identification to the telecommunications network with a QoS requirement for the HTTP session. Next, a network policy node determines an appropriate QoS level for the subscriber. A network gateway then enforces the determined QoS level for the HTTP session with the OTT service provider. | 2011-09-08 |
20110219432 | System and Method for Controlling Access to an Electronic Message Recipient - A system and method for selectively allowing or denying access to a user coupled to an electronic communications network includes a receiver that receives an inbound message over the electronic communications network from a sender. The inbound message includes an identifier that is associated with a sender and an identifier that is associated with a recipient. The system also includes a processor that determines if the identifier associated with the recipient was previously generated by the user and is absent from a plurality of proxy identifiers associated with the recipient. The processor is further determines one of at least three security states associated with the inbound message. A first security state is indicative of allowing delivery of the inbound message to the user. A second security state is indicative of denying delivery of the inbound message to the user. A third security state is indicative of conditionally allowing delivery of the message to the user. Each of the three security states are associated with the sender identifier and the recipient identifier included in the inbound message. | 2011-09-08 |
20110219433 | TASK-BASED ACCESS CONTROL IN A VIRTUALIZATION ENVIRONMENT - Methods, systems, and techniques for task-based access control are provided. Example embodiments provide a task-based access control system “TBACS,” which provides task-based permissions management using proxy task objects. In one example embodiment, the proxy task objects encapsulate activities, comprising one or more privileges, each associated with an object upon which the privilege can act. In some examples, proxy task objects may be used with a virtualization infrastructure to delegate permissions to delegate users, real or automated. Proxy task objects may also be associated with their own user interfaces for performance of the corresponding activities. | 2011-09-08 |
20110219434 | PROVIDING SECURITY SERVICES WITHIN A CLOUD COMPUTING ENVIRONMENT - Embodiments of the present invention allow for the provisioning of security services within a Cloud computing environment by third parties. Specifically, under the present invention, a Cloud provider will publish a set of potential security attributes (e.g., a list), which can be monitored, to the Cloud customer. The Cloud customer will designate/select one or more of those attributes that the Cloud customer wishes to have monitored for one or more Cloud resources that it is using. The Cloud provider will then provide to the Cloud customer a set of third party security service providers capable of monitoring the attributes the Cloud customer designated. The Cloud customer will then select one or more third party providers from the provided set, and the Cloud provider will associate the given Cloud resources with the respective third party providers. Once third party providers have been associated with Cloud resources, a secure relationship between the third party provider(s) and the Cloud providers will be established. | 2011-09-08 |
20110219435 | CONTENT PROCESSING SYSTEM, CONTENT PROCESSING METHOD, COMPUTER PROGRAM, RECORDING MEDIUM, AND PORTABLE TERMINAL - A content processing system includes a content management device storing contents and information associated with the contents, and a plurality of portable terminals capable of accessing the content management device through a network, and performs a process on the contents according to a workflow using the plurality of portable terminals. The content processing system may include a first executing unit that let at least a part of the contents and the associated information be stored in a portable terminal among the plurality of portable terminals to perform a second process when the process to be currently performed in the workflow is moved from a first process to the second process. | 2011-09-08 |
20110219436 | COMMUNICATION APPARATUS, ELECTRONIC MAIL TRANSMITTING METHOD, AND ELECTRONIC MAIL TRANSMITTING PROGRAM - A communication apparatus enhances security in transmitting electronic mail to a destination mail address without degrading operability. An MFP is connected to an authentication server and a mail server via a network. A user name and a password are entered in a user name entry screen. The MFP requests the authentication server to authenticate the entered user name and password. When the user name and the password are authenticated, the MFP is operable to acquire an e-mail address, a SMTP authentication user name, and a SMTP authentication password according to SMTP associated with the authenticated user name and password from the authentication server. The MFP requests the mail server to authenticate the acquired SMTP authentication user name and SMTP authentication password according to SMTP. When the SMTP authentication user name and the SMTP authentication password are authenticated, the MFP is operable to transmit an e-mail to the mail server. | 2011-09-08 |
20110219437 | AUTHENTICATION INFORMATION CHANGE FACILITY - A system, method, and computer program product are provided to facilitate changing authentication information in an environment having two or more configuration items. Establishing a connection between the configuration items may require matching authentication information corresponding to the first configuration item with authentication information transmitted from the second configuration item. The system may include a repository storing at least one predetermined attribute corresponding to a configuration item, and a relation between the configuration item and another configuration item. The attribute and/or the relation may be updated by discovery that detects information regarding configuration items. In response to a request to change authentication information corresponding to the first configuration item, and based on the relation, an identification unit may identify a second configuration item influenced by the change. An instruction unit may initiate a change of authentication information transmitted from the second configuration item. | 2011-09-08 |
20110219438 | METHODS AND APPARATUS FOR SECURITY OVER FIBRE CHANNEL - Methods and apparatus are provided for improving both node-based and message-based security in a fibre channel network. Entity to entity authentication and key exchange services can be included in existing initialization messages used for introducing fibre channel network entities into a fibre channel fabric, or with specific messages exchanged over an already initialized communication channel. Both per-message authentication and encryption mechanisms can be activated using the authentication and key exchange services. Messages passed between fibre channel network entities can be encrypted and authenticated using information provided during the authentication sequence. Security services such as per-message authentication, confidentiality, integrity protection, and anti-replay protection can be implemented. | 2011-09-08 |
20110219439 | PROVIDING SUPPORT FOR MULTIPLE AUTHENTICATION CHAINS - A method and system to support multiple chains of authentication modules. The method may include receiving a user login request, and identifying multiple chains of authentication modules to be performed prior to allowing a user to login, where each chain of authentication modules is associated with a chain manager. The method further includes determining dependencies between chain managers, invoking the chain managers in the order defined by the dependencies, and | 2011-09-08 |
20110219440 | APPLICATION-LEVEL DENIAL-OF-SERVICE ATTACK PROTECTION - The gate guard filtering of incoming application-level requests on behalf of an application. Upon receiving an application request, a token found in the application request may be evaluated by the gate guard. This token may have been previously provided by the application, with instructions that future application requests by the client are to include the token. The gate guard classifies the incoming request as being a member of a subset of one or more application request classes. These identified request classes may be used to determine an admission policy to apply based on the particular subset of one or more request classes corresponding to the application request. The admission policy is then applied to the incoming application request to determine if the application request should be rejected or accepted. As another option, the application request may perhaps even be deferred for future determination of rejection or acceptance. | 2011-09-08 |
20110219441 | Contextual Query Revision - Apparatus, systems and methods for contextual query revision are disclosed. A current search query is received during a search session. The current search query includes one or more current search tokens. Potentially inaccurate search tokens are identified from the one or more current search tokens. A possible replacement token is identified based upon the potentially inaccurate search token. A group of related tokens is identified from query logs, and a modified search query is generated if the replacement token is not included in the related tokens. | 2011-09-08 |
20110219442 | Policy-Based Security Certificate Filtering - Policy filtering services are built into security processing of an execution environment for resolving how to handle a digital security certificate of a communicating entity without requiring a local copy of a root certificate that is associated with the entity through a certificate authority (“CA”) chain. Policy may be specified using a set of rules (or other policy format) indicating conditions for certificate filtering. This filtering is preferably invoked during handshaking, upon determining that a needed root CA certificate is not available. In one approach, the policy uses rules specifying conditions under which a certificate is permitted (i.e., treated as if it is validated) and other rules specifying conditions under which a certificate is blocked (i.e., treated as if it is invalid). Preferably, policy rules are evaluated and enforced in order of most-specific to least-specific. | 2011-09-08 |
20110219443 | SECURE CONNECTION INITIATION WITH HOSTS BEHIND FIREWALLS - The invention is directed to an inter-host signaling protocol, referred to herein as Knock-On Protocol (KOP), for establishing in a secure manner a connection with a host behind firewall. Some embodiments of the invention are directed to a Knock-On Feature (KOF) used in intermediate firewalls or network address translators to enable connection establishment through the FW or NAT to hosts behind the FW or NAT. Advantageously the KOF may include a prefix-based protection feature to protect against address spoofing used in a message flood attack. | 2011-09-08 |
20110219444 | DYNAMICALLY ADAPTIVE NETWORK FIREWALLS AND METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT IMPLEMENTING SAME - A system, method, and computer program product for controlling data through a firewall which may be dynamically configurable. The method may comprise defining at least one node, wherein the at least one node is associated with two or more network interfaces; associating a set of firewall rules with the at least one node; receiving a packet at a first node of the at least one node; and accepting or denying the packet based on the set of firewall rules. The firewall rules include dynamic chains of rules having defined places where firewall rules may be dynamically inserted into or deleted from the firewall while the firewall is operating on one or more machines connected to network segments where the nodes reside. | 2011-09-08 |
20110219445 | Methods, Systems and Computer Program Products for Identifying Traffic on the Internet Using Communities of Interest - Methods for identifying wanted traffic on the Internet are provided. The methods include determining a traffic history for a user of the Internet; identifying wanted traffic in a stream of Internet traffic based on the determined traffic history; and prioritizing the identified wanted traffic such that unwanted traffic is assigned a lower priority than the wanted traffic. Related systems and computer program products are also provided. | 2011-09-08 |
20110219446 | INPUT PARAMETER FILTERING FOR WEB APPLICATION SECURITY - Techniques are disclosed for enhancing the security of a web application by using input filtering. An input filter may be configured to process untrusted input data, character by character, and to replace certain characters in text-based input with visually similar characters. This approach may be used to block a specified list of “triggering” characters as they come in and replace them with characters similar in appearance but without the syntactic meaning that triggers an attack or otherwise exploits a vulnerability in a web-application. | 2011-09-08 |
20110219447 | Identification of Unauthorized Code Running in an Operating System's Kernel - Computer implemented methods, system and apparatus for managing execution of a running-page in a virtual machine include associating an execution trace code with the running page by a security virtual machine. The execution trace code generates a notification upon initiation of the execution of the running page by the virtual machine. The notification is received by the security virtual machine running independent of the virtual machine executing the running-page. The running page associated with the execution trace code is validated by the security virtual machine as authorized for execution. An exception is generated if the running-page is not authorized for execution. The generated exception is to prevent the execution of the running page in the virtual machine. | 2011-09-08 |
20110219448 | SYSTEMS AND METHODS FOR RISK RATING AND PRO-ACTIVELY DETECTING MALICIOUS ONLINE ADS - Methods and systems for risk rating and pro-actively detecting malicious online ads are described. In one example embodiment, a system for risk rating and pro-actively detecting malicious online ads includes an extraction module, an analysis engine, and a filter module. The extraction module is configured to extract a SWF file from a web page downloaded by the system. The analysis engine is communicatively coupled to the extraction module. The analysis engine is configured to determine a risk rating for the SWF file and send the risk rating to a web application for display. In an example, determining the risk rating includes locating an embedded redirection URL and determining a risk rating for the embedded redirection URL. The filter module is configured to determine, based on the risk rating, whether to block the SWF file and send a warning to the web application for display. | 2011-09-08 |
20110219449 | MALWARE DETECTION METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT - A method, electronic device and computer program product for real-time detection of malicious software (“malware”) are provided. In particular, execution of a suspicious software application attempting to execute on a user's device may be emulated in a virtual operating system environment in order to observe the behavior characteristics of the suspicious application. If after observing the behavior of the suspicious application in the virtual environment, it is determined that the application is malicious, the application may not be permitted to execute on the user's actual device. The suspicious application may be identified as malicious if an isolated data string of the application matches a “blacklisted” data string, a certain behavior of the application matches a behavior that is known to be malicious, and/or the overall behavior of the application is substantially the same or similar to a known family of malware. | 2011-09-08 |
20110219450 | System And Method For Malware Detection - According to one embodiment, a computer-implemented method for execution on one or more processors includes receiving a first file and determining a file type of the first file. The method also includes determining, according to a first policy, a plurality of malware detection schemes to apply to the first file based on the determined file type of the first file. In addition, the method includes scheduling the application of the determined plurality of malware detection schemes to the first file amongst a plurality of detection nodes according to a second policy. Further, the method includes determining, in response to determining the results of applying the plurality of malware detection schemes, that the first file is malware or determining that the first file is suspected malware according to a third policy. | 2011-09-08 |
20110219451 | System And Method For Host-Level Malware Detection - According to one embodiment, a computer-implemented method includes: accessing a set of configuration parameters, accessing a set of identifiers of files known not to be malware, and accessing a set of identifiers of files known to be malware. Further, the method includes: comparing a first file to the set of configuration parameters, determining that a first hash of the first file is not in the set of identifiers of files known not to be malware and that the first hash is not in the set of identifiers of files known to be malware, and sending the at least one file and information related to the at least one file to be analyzed for malware. The method includes deleting the set of configuration parameters, the set of identifiers of files known not to be malware, and the set of identifiers of files known to be malware after sending the first file. | 2011-09-08 |
20110219452 | Method and Apparatus for Network Intrusion Detection - The current invention discloses a method and apparatus to detect and mitigate network intrusion by collecting a first log of wireless network traffic in the vicinity of an area and a second log of network traffic from a switch port connected to the area; pre-processing the logs; and then detecting the presence of unauthorized access points (APs) by attempting to identify matching patterns in the pre-processed first and second logs. | 2011-09-08 |
20110219453 | Security method and apparatus directed at removeable storage devices - A method of protecting a computer against malware infection. The method includes during operation of the computer, reading master boot record code from a removable storage device into the computer and inspecting said code to identify any instructions associated with suspicious behaviour. In the event that suspicious instructions are identified, the master boot record code on the removable storage device is modified and/or the behaviour of the computer adapted in order to prevent said master boot record code installing malware into the computer. Examples of suspicious behaviour include hard disk read or write operations. | 2011-09-08 |
20110219454 | METHODS OF IDENTIFYING ACTIVEX CONTROL DISTRIBUTION SITE, DETECTING SECURITY VULNERABILITY IN ACTIVEX CONTROL AND IMMUNIZING THE SAME - Provided is a method of identifying an ActiveX control distribution site, detecting a security vulnerability in an ActiveX control and immunizing the same. A security vulnerability existing in an ActiveX control may be automatically detected, effects brought on by the corresponding security vulnerability may be measured, and abuse of the detected security vulnerability in a user PC to be protected may be immediately prevented. Therefore, since the user PC may be protected regardless of a security patch, it is anticipated that security problems in the Internet environment caused by imprudent use of the ActiveX control may be significantly enhanced. | 2011-09-08 |
20110219455 | RANDOM INJECTION-BASED DEACTIVATION OF WEB-SCRAPERS - A computer-implemented method and system for disabling scraping of electronic data. The method includes receiving an encoding of electronic data to be protected from scraping and adding random redundant code around the encoding of the electronic data upon each request for the electronic data. The electronic data having the redundant code added around the encoding thereof being rendered the same on a display as the encoding without the redundant code added. | 2011-09-08 |
20110219456 | WEBLOG FOR SUPPLY CHAIN MANAGEMENT - Disclosed are methods and systems for accessing a supply chain process through a weblog. The methods and systems involves receiving data from a one or more machines associated with a supply chain process, the supply chain process comprising a plurality of data publishing stages, updating the weblog with the data received from each of the data publishing stage of the one or more machines, retrieving access rights for accessing the data updated to the weblog and displaying the data in the weblog based on the access rights. | 2011-09-08 |
20110219457 | SYSTEM AND METHOD FOR INCAPACITATING A HARDWARE KEYLOGGER - A system, device and method for incapacitating a keylogger. An inactivity of an input device may be detected. A flow of information from an input device to a computing device may be manipulated. A keylogger may be caused to store redundant information by causing the input device to produce redundant input. Other embodiments are described and claimed. | 2011-09-08 |
20110219458 | SECURE AVIONICS EQUIPMENT AND ASSOCIATED METHOD OF MAKING SECURE - The invention relates, according to a first aspect, to electronic equipment comprising a processor ( | 2011-09-08 |
20110219459 | SYSTEM AND METHOD FOR SECURING INPUT SIGNALS WHEN USING TOUCH-SCREENS AND OTHER INPUT INTERFACES - A system and method for securing input signals when using input interfaces such as touch-screens and other input interfaces that are suitable for handheld, mobile, computing and other devices, by generating fake signals. In accordance with an embodiment, the technique can be used to protect input signals from, e.g. a touch-screen keyboard, and make it more difficult for malicious software applications to intercept and understand such input signals. The technique can also be implemented without requiring significant changes to the underlying operating system (OS) or graphical user interface (GUI). In accordance with an embodiment, a security enhancer or security enhancing application injects fake signals into the OS/GUI input signals queue. The security enhancer or security enhancing application is also associated with a communication channel that allows it to establish a cryptographic signature or key with authorized or sensitive application receivers that are authorized to receive the input signals. The fake signals can later be removed from the input signal stream only by the authorized receivers of the input signals. Unauthorized application listeners may be able to intercept a signal, but are unable to determine the original input. | 2011-09-08 |
20110219460 | NETWORK BASED DIGITAL RIGHTS MANAGEMENT SYSTEM - A network-based DRM system manages digital media assets stored in the network. The system provides consumers with access to the digital media from any device connected to an electronic network such as the internet, while enforcing the intended uses by the copyright owners. | 2011-09-08 |
20110219461 | NETWORK BASED DIGITAL RIGHTS MANAGEMENT SYSTEM - A network-based DRM system manages digital media assets stored in the network. The system provides consumers with access to the digital media from any device connected to an electronic network such as the internet, while enforcing the intended uses by the copyright owners. | 2011-09-08 |
20110219462 | G-Protein Coupled Receptor 30 (GPR30) transgenic animals as a model for cardiovascular diseases - The present invention relates to use of the GPR30 gene for diagnosis and treatment of cardiovascular disorders, especially cardiomyopathy. The present invention also relates to a GPR30 deficient animal model, more specifically to a mouse in which the GPR30 gene is disrupted and which exhibits a cardiomyopathy, a tissue and a cell of the mouse and a process of producing the same. The present invention further relates to use of said knockout mouse as a model of cardiovascular diseases, especially cardiomyopathy, and a method of screening a compound useful for the prevention and/or treatment of cardiovascular diseases, especially cardiomyopathy, using the knockout mouse. | 2011-09-08 |
20110219463 | METHODS OF SCREENING AGENTS FOR ACTIVITY USING TELEOSTS - The present invention provides methods of screening an agent for activity using teleosts. Methods of screening an agent for angiogenesis activity, toxic activity and an effect cell death activity in teleosts are provided. Methods of screening an agent for an activity in the brain or central nervous system in zebrafish are provided. The invention further provides high throughput methods of screening agents in multi-well plates. | 2011-09-08 |
20110219464 | LUNG DISEASE TARGETS AND USES THEREOF - The present invention provides a method for diagnosing and detecting diseases associated with lung. The present invention provides one or more proteins or fragments thereof, peptides or nucleic acid molecules differentially expressed in lung cancer (LCAT) and antibodies binds to LCATs. The present invention provides that LCATs are used as targets for screening agents that modulates the LCAT activities. Further the present invention provides methods for treating diseases associated with lung. | 2011-09-08 |
20110219465 | Suppression of B-Cell Apoptosis in Transgenic Animals Expressing Humanized Immunoglobulin - The invention provides a novel approach to increase immunoglobulin expression in non-human transgenic animals. For instance, the invention provides a method to increase humanized immunoglobulin production in animals genetically engineered to express one or several human or humanized immunoglobulin transloci. This can be done by overexpressing the apoptosis inhibitor, i.e. a rabbit bcl-2, whose expression is driven by a B-cell specific promoter specifically in the B-cell of the animal, thereby enhancing the survival of B-cells. This invention further relates to a method for selectively enhancing the survival of exogenous B-cells, that is B-cells expressing any immunoglobulin transgene locus, over the survival of endogenous B-cells that do not express the transgene locus. Selectivity is achieved by expressing the apoptosis-inhibitor only within exogenous B-cells, that is, by coupling exogenous immunoglobulin expression with apoptosis inhibitor expression. This latter method allows for increased expression and production of the transgene encoded product(s) over the endogenously produced immunoglobulin of the transgenic animal. The invention also provides a novel apoptosis-inhibitor, rabbit bcl-2. | 2011-09-08 |
20110219466 | SEQUENCE-CHARACTERIZED AMPLIFIED REGION (SCAR) MARKERS FOR PLANT RESISTANCE AGAINST FUNGAL PATHOGENS - An isolated nucleic acid molecule comprising one of a nucleotide sequence set forth in SEQ ID NO: 1 and a nucleotide sequence set forth in SEQ ID NO: 2, the nucleotide sequence complementary to a Rpg3Dun gene sequence. A method for screening a plurality of plant cultivars to identify individual cultivars containing Rpg3Dun gene sequences, comprising the steps of: (a) collecting a biomass sample from individual cultivars; (b) preparing a nucleic acid preparation from each biomass sample; (c) contacting each nucleic acid preparation with at least one of the nucleic acid molecules set forth in SEQ ID NO: 1 and SEQ ID NO: 2, (d) performing a PCR amplification reaction therein; and (e) assessing each amplified sample to detect hybridization with one of the nucleic acid molecules set forth in SEQ ID NO: 1 and SEQ ID NO: 2. A hybridization reaction indicates the cultivar contains therein Rpg3Dun gene sequences. | 2011-09-08 |
20110219467 | GARDEN BEAN CULTIVAR H28105 - A novel garden bean cultivar, designated H28105, is disclosed. The invention relates to the seeds of garden bean cultivar H28105, to the plants of garden bean line H28105 and to methods for producing a bean plant by crossing the cultivar H28105 with itself or another bean line. The invention further relates to methods for producing a bean plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other garden bean lines derived from the cultivar H28105. | 2011-09-08 |
20110219468 | GARDEN BEAN CULTIVAR H28120 - A novel garden bean cultivar, designated H28120, is disclosed. The invention relates to the seeds of garden bean cultivar H28120, to the plants of garden bean line H28120 and to methods for producing a bean plant by crossing the cultivar H28120 with itself or another bean line. The invention further relates to methods for producing a bean plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other garden bean lines derived from the cultivar H28120. | 2011-09-08 |
20110219469 | GARDEN BEAN CULTIVAR H37118 - A novel garden bean cultivar, designated H37118, is disclosed. The invention relates to the seeds of garden bean cultivar H37118, to the plants of garden bean line H37118 and to methods for producing a bean plant by crossing the cultivar H37118 with itself or another bean line. The invention further relates to methods for producing a bean plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other garden bean lines derived from the cultivar H37118. | 2011-09-08 |
20110219470 | GARDEN BEAN CULTIVAR H28122 - A novel garden bean cultivar, designated H28122, is disclosed. The invention relates to the seeds of garden bean cultivar H28122, to the plants of garden bean line H28122 and to methods for producing a bean plant by crossing the cultivar H28122 with itself or another bean line. The invention further relates to methods for producing a bean plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other garden bean lines derived from the cultivar H28122. | 2011-09-08 |
20110219471 | GARDEN BEAN CULTIVAR H37113 - A novel garden bean cultivar, designated H37113, is disclosed. The invention relates to the seeds of garden bean cultivar H37113, to the plants of garden bean line H37113 and to methods for producing a bean plant by crossing the cultivar H37113 with itself or another bean line. The invention further relates to methods for producing a bean plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other garden bean lines derived from the cultivar H37113. | 2011-09-08 |
20110219472 | TOMATO HYBRID PS 01565172 - The invention provides seed and plants of tomato hybrid PS 01565172 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid PS 01565172 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2011-09-08 |
20110219473 | PEDICEL SPECIFIC PROMOTER - The present invention relates to controlling the expression of genes into the pedicel, more specifically in the placentochalaza cells. | 2011-09-08 |
20110219474 | PLANT SEEDS WITH ALTERED STORAGE COMPOUND LEVELS, RELATED CONSTRUCTS AND METHODS INVOLVING GENES ENCODING OXIDOREDUCTASE MOTIF POLYPEPTIDES - This invention is in the field of plant molecular biology. More specifically, this invention pertains to isolated nucleic acid fragments encoding ORM proteins in plants and seeds and the use of such fragments to modulate expression of a gene encoding ORM protein activity in a transformed host cell. | 2011-09-08 |
20110219475 | Manipulation of Organic Acid Biosynthesis and Secretion - The present invention relates to nucleic acid fragments encoding amino acid sequences for organic acid biosynthetic enzymes in plants, and the use thereof for the modification of, for example, organic acid biosynthesis and secretion in plants. In particularly preferred embodiments, the invention relates to the combinatorial expression of citrate synthase (CS) and/or malate dehydrogenase (MDH) and/or phosphoenolpyruvate carboxylase (PEPC) in plants to modify, for example, organic acid synthesis and secretion. | 2011-09-08 |
20110219476 | GLUCURONYL TRANSFERASE AND POLYNUCLEOTIDE ENCODING THE SAME - The present invention provides a novel glucuronosyltransferase, a polynucleotide encoding the same (e.g., a polynucleotide comprising a polynucleotide consisting of the nucleotide sequence at positions 1 to 1362 in the nucleotide sequence represented by SEQ ID NO: 7, or a polynucleotide comprising a polynucleotide encoding a protein having the amino acid sequence represented by SEQ ID NO: 8); and so on. A novel glucuronosyltransferase having a broad substrate specificity and others can thus be provided. | 2011-09-08 |
20110219477 | CINERARIUM-DERIVED CHROMOSOMAL DNA INVOLVED IN SYNTHESIS OF FLAVONOID, AND USE THEREOF - Disclosed are: a novel | 2011-09-08 |
20110219478 | RECOMBINANT ANTIBODIES TO SCLEROTINIA ANTIGENS - The invention is directed to recombinant antibodies which bind to | 2011-09-08 |
20110219479 | Variable Density Scanning - Systems and techniques for varying a scan rate in a measurement instrument. The techniques may be used in scanning probe instruments, including atomic force microscopes (AFMs) and other scanning probe microscopes, as well as profilometers and confocal optical microscopes. This allows the selective imaging of particular regions of a sample surface for accurate measurement of critical dimensions within a relatively small data acquisition time. | 2011-09-08 |
20110219480 | Sweet cherry tree named 'Rubilam' - A new and distinct variety of sweet cherry tree. The following features of the tree and its fruit are characterized with the heavy and regular production of large size fruit, with very good flavor and eating quality, with an attractive pink red skin color and with good handling and storage quality. | 2011-09-08 |
20110219481 | Sweet cherry tree named 'Rosilam' - A new and distinct variety of sweet cherry tree. The following features of the tree and its fruit are characterized with the heavy and regular production of large size fruit, with very good flavor and eating quality, with an attractive pink red skin color and with good handling and storage quality. | 2011-09-08 |
20110219482 | Nectarine tree named 'Nectarbondant' - A new and distinct variety of white nectarine tree, denominated ‘NECTARBONDANT’, has a large fruit of very long shelf life without alteration after harvesting, a semi-sweet white flesh of high eating quality and an attractive homogenous bright red skin color. The tree is of large size and is vigorous. Fruit can be consumed crunchy or at maturity. | 2011-09-08 |
20110219483 | Nectarine tree named 'Nectartic' - A new and distinct variety of white nectarine tree, denominated ‘NECTARTIC’, has fruit of very long shelf life without alteration after harvesting, a semi-sweet white flesh of high eating quality and an attractive bright purple red skin color. The tree is of medium size and is vigorous. Fruit can be consumed crunchy or at maturity. | 2011-09-08 |
20110219484 | Nectarine tree named 'Cakeredal' - A new and distinct variety of white flat nectarine tree, denominated ‘CAKEREDAL’, has a large flat fruit of very long shelf life without alteration after harvesting, a semi-sweet white flesh of high eating quality and an attractive homogenous purple red skin color. The tree is of large size and is vigorous. Fruit can be consumed crunchy or at maturity. | 2011-09-08 |
20110219485 | Nectarine tree named 'NECTARRUBY' - A new and distinct variety of white nectarine tree, denominated ‘NECTARRUBY’, has fruit of very long shelf life without alteration after harvesting, a semi-sweet white flesh of high eating quality and an attractive bright purple red skin color. The tree is of large size and is vigorous. Fruit can be consumed crunchy or at maturity. | 2011-09-08 |
20110219486 | Nectarine tree named 'NECTARBOOM' - A new and distinct variety of white nectarine tree, denominated ‘NECTARBOOM’, has a large fruit of very long shelf life without alteration after harvesting, a semi-sweet white flesh of high eating quality and an attractive homogenous purple red skin color. The tree is of large size and is vigorous. Fruit can be consumed crunchy or at maturity. | 2011-09-08 |
20110219487 | Nectarine tree named 'NECTARDREAM' - A new and distinct variety of white nectarine tree, denominated ‘NECTARDREAM’, has a very large fruit of very long shelf life without alteration after harvesting, a semi-sweet white flesh of high eating quality and an attractive bright purple red skin color. The tree is of large size and is vigorous. Fruit can be consumed crunchy or at maturity. | 2011-09-08 |
20110219488 | Nectarine tree named 'NECTARLOVE' - A new and distinct variety of white nectarine tree, denominated ‘NECTARLOVE’, has a large fruit of very long shelf life without alteration after harvesting, a semi-sweet white flesh of high eating quality and an attractive bright purple red skin color. The tree is of large size and is vigorous. Fruit can be consumed crunchy or at maturity. | 2011-09-08 |
20110219489 | Nectarine tree named 'NECTARPERF' - A new and distinct variety of white nectarine tree, denominated ‘NECTARPERF’, has a large fruit of very long shelf life without alteration after harvesting, a semi-sweet white flesh of high eating quality and an attractive bright purple red skin color. The tree is of large size and is vigorous. Fruit can be consumed crunchy or at maturity. | 2011-09-08 |
20110219490 | Nectarine tree named 'Nectatinto' - A new and distinct variety of yellow nectarine tree, denominated ‘NECTATINTO’, has a large fruit of very long shelf life without alteration after harvesting, a semi-sweet yellow flesh of high eating quality and an attractive homogenous purple red skin color. The tree is of large size and is vigorous. Fruit can be consumed crunchy or at maturity. | 2011-09-08 |
20110219491 | Peach tree named 'Flatbella' - A new and distinct variety of flat white peach tree, denominated ‘FLATBELLA’, has a large flat fruit of very long shelf life without alteration after harvesting, a semi-sweet white flesh of high eating quality and an attractive bright red skin color on an orange red ground. The tree is of large size and is vigorous. Fruit can be consumed crunchy or at maturity. | 2011-09-08 |
20110219492 | Peach tree named 'Sweetregal' - A new and distinct variety of white peach tree, denominated ‘SWEETREGAL’, has a large fruit of very long shelf life without alteration after harvesting, a semi-sweet white flesh of high eating quality and an attractive bright purple red skin color on a washed-pink red ground. The tree is of large size and is vigorous. Fruit can be consumed crunchy or at maturity. | 2011-09-08 |
20110219493 | Peach tree named 'FLATBEAUTI' - A new and distinct variety of flat white peach tree, denominated ‘FLATBEAUTI’, has a large flat fruit of very long shelf life without alteration after harvesting, a semi-sweet white flesh of high eating quality and an attractive bright red skin color on an orange red ground. The tree is of large size and is vigorous. Fruit can be consumed crunchy or at maturity. | 2011-09-08 |
20110219494 | Peach tree named 'SWEETREINE' - A new and distinct variety of white peach tree, denominated ‘SWEETREINE’, has a large fruit of very long shelf life without alteration after harvesting, a semi-sweet white flesh of high eating quality and an attractive bright purple red skin color on a washed-pink red ground. The tree is of large size and is vigorous. Fruit can be consumed crunchy or at maturity. | 2011-09-08 |
20110219495 | Peach tree named 'Crispbella' - A new and distinct variety of yellow peach tree, denominated ‘CRISPBELLA’, has a large fruit of very long shelf life without alteration after harvesting, a semi-sweet yellow flesh of high eating quality and an attractive bright red skin color. The tree is of large size and is vigorous. Fruit can be consumed crunchy or at maturity. | 2011-09-08 |
20110219496 | Blackberry plant named 'HJ-6' - This invention relates to a new and distinct variety of blackberry plant named ‘HJ-6’. The new variety resulted from seed produced by a hand-pollinated cross of two non-patented varieties: “Obsidian” as the female, and “Eaton” as the male. The new, trailing cultivar can be distinguished by its consistent, large fruit size and appearance during the late spring and summer period for the fresh market. The fruit of this cultivar is produced on dark red, strong, thorny canes. When plants are grown and pruned correctly, yield in central California, USA can be up to 9,000 crates/acres, and the fruit ships well. | 2011-09-08 |
20110219497 | Grape plant named 'Arrathirteen' - A new distinct variety of grapevine named ‘ARRATHIRTEEN’ abundantly forms attractive large seedless berries having a fire red skin coloration in medium-to-large clusters. The fruit displays a sweet crisp flavor and is firm in texture. The fruit commonly is ready for harvesting during the end of June in San Joaquin Valley of Central California, U.S.A., and displays good eating qualities as a table grape. The fruit firmness renders the fruit well amenable for handling, shipping, and storage. | 2011-09-08 |
20110219498 | Grape plant named 'Arraten' - A new distinct variety of grapevine named ARRATEN abundantly forms attractive medium-to-large seedless berries having a 90% fire red skin coloration with 10% creamy yellow, in medium-to-large clusters. The fruit displays a sweet crisp flavor and is film in texture. The fruit commonly is ready for harvesting during the end of June in San Joaquin Valley of Central California, U.S.A., and displays good eating qualities as a table grape. The fruit firmness renders the fruit well amenable for handling, shipping, and storage. | 2011-09-08 |
20110219499 | Grape plant named 'ARRATWO' - A new distinct variety of grapevine named ‘ARRATWO’ abundantly forms attractive large seedless berries having deep purple/red skin coloration in large clusters. The fruit displays a natural flavor and is meaty in texture. The fruit commonly is ready for harvesting during August in San Joaquin Valley of Central California, U.S.A., and displays good eating qualities as a table grape. The fruit firmness renders the fruit well amenable for handling, shipping, and storage. | 2011-09-08 |
20110219500 | Grape plant named 'ARRAFOURTEENONE' - A new distinct variety of grapevine named ARRAFOURTEENONE abundantly forms attractive large seedless berries having a purple red skin coloration in large clusters. The fruit displays a natural flavor and is firm in texture. The fruit commonly is ready for harvesting during the end of July in San Joaquin Valley of Central California, U.S.A., and displays good eating qualities as a table grape. The fruit firmness renders the fruit well amenable for handling, shipping, and storage. | 2011-09-08 |
20110219501 | Grape plant named 'ARRASIX' - A new distinct variety of grapevine named ARRASIX abundantly forms attractive medium-to-large seedless berries (with seed traces) having a Greenish/Creamy skin coloration in medium-to-large clusters. The fruit displays a sweet aromatic flavor and is firm in texture. The fruit commonly is ready for harvesting during July in San Joaquin Valley of Central California, U.S.A., and displays good eating qualities as a table grape. The fruit firmness renders the fruit well amenable for handling, shipping, and storage. | 2011-09-08 |
20110219502 | Grape plant named 'Arrafifteen' - A new distinct variety of grapevine named ARRAFIFTEEN abundantly forms attractive large seedless berries having a bright green skin coloration in medium-to-large clusters. The fruit displays a sweet crisp flavor and is firm in texture. The fruit commonly is ready for harvesting during August in San Joaquin Valley of Central California, U.S.A, and displays good eating qualities as a table grape. The fruit firmness renders the fruit well amenable for handling, shipping, and storage. | 2011-09-08 |
20110219503 | Grape plant named 'Arraeleven' - A new distinct variety of grapevine named ARRAELEVEN abundantly forms attractive medium-to-large seedless berries having green/creamy yellow skin coloration in medium-to-large clusters. The fruit displays a sweet Muscat flavor and is firm in texture. The fruit commonly is ready for harvesting during the end of July in San Joaquin Valley of Central California, U.S.A., and displays good eating qualities as a table grape. The fruit firmness renders the fruit well amenable for handling, shipping, and storage. | 2011-09-08 |
20110219504 | Grape plant named 'Arrasixteen' - A new distinct variety of grapevine named ‘ARRASIXTEEN’ abundantly forms attractive medium-to-large seedless berries having a Greenish/Creamy skin coloration in medium-to-large clusters. The fruit displays a sweet crisp flavor and is firm in texture. The fruit commonly is ready for harvesting during July in San Joaquin Valley of Central California, U.S.A., and displays good eating qualities as a table grape. The fruit thinness renders the fruit well amenable for handling, shipping, and storage. | 2011-09-08 |
20110219505 | SCHLUMBERGERA PLANT NAMED 'PKMSC02' - A new and distinct | 2011-09-08 |