38th week of 2013 patent applcation highlights part 80 |
Patent application number | Title | Published |
20130247193 | SYSTEM AND METHOD FOR REMOVAL OF MALICIOUS SOFTWARE FROM COMPUTER SYSTEMS AND MANAGEMENT OF TREATMENT SIDE-EFFECTS - Removing malware from a computer system. An inspection module obtains an inspection log representing operational history of the operating system and the application programs of the computer system. The inspection log is analyzed to detect a presence of any malware on the computer system. A treatment scenario is generated that defines a plurality of actions to be executed for removing any malware present on the computer system, as detected in the analyzing. The treatment scenario is generated based on the information contained in the inspection log and on a knowledge base of malware removal rules. The generated treatment scenario is evaluated to assess the actions defined in the generated treatment scenario that are associated with a risk of damaging the operating system or the application programs of the computer system. A modified treatment scenario can be created to reduce the risk in response to an assessment of the risk. | 2013-09-19 |
20130247194 | SECURING MEDICAL DEVICES THROUGH WIRELESS MONITORING AND ANOMALY DETECTION - A medical device monitor (MedMon), method and computer readable medium is disclosed. The MedMon is configured to operate in a system having communications between a first medical device associated with a patient and a second device. The MedMon includes a receiver configured to snoop on communications between the first medical device and second device. An anomaly detector having a set of security polices is configured to detect an anomaly by analyzing the communications between the first medical device and second device for compliance with the security policies. A response generator configured to generate a response on a condition that an anomaly is detected. The response may be a warning message configured to warn the patient. The MedMon may include a transmitter configured to transmit the response. The response may be a jamming signal configured to disrupt communications between the first medical device and second device. | 2013-09-19 |
20130247195 | OUTPUT CONTROL APPARATUS, COMPUTER-READABLE MEDIUM FOR STORING PROGRAM FOR OUTPUT CONTROL APPARATUS, OUTPUT CONTROL METHOD, AND OUTPUT CONTROL SYSTEM - Provided is an output section that outputs data to outside; a condition storage section that stores an abnormal condition showing at least one of a characteristic of data to be outputted from the output section by means of malicious software and a characteristic of an operational pattern of the output section that results when the malicious software outputs data; and an output control section that prohibits output of data when at least one of a characteristic of data to be outputted from the output section and a characteristic of an operational pattern of the output section satisfies the abnormal condition. | 2013-09-19 |
20130247196 | SYSTEM AND METHOD FOR DETECTION OF NON-COMPLIANT SOFTWARE INSTALLATION - A system and method for performing a security check may include using at least one processor to periodically check a status of a flag, generate and store a baseline representation of modules stored on the device where the flag is determined to be set to a first state, and, where the flag is determined to be set to a second state, generate an active representation of modules stored on the first device, compare the active representation of modules to the baseline representation of modules, and, responsive to a determination in the comparing step of a difference between the baseline and active representations of modules, output an alert. The flag status may depend on an association of the device with one of a plurality of authorization policies, each mapped to one of the two states. Results of the comparison may be appended to an activity log of the device. | 2013-09-19 |
20130247197 | Security network processor system and method - A system, method and computer program product are provided for scanning data received from a computer network. Included is a central processing unit for processing data. Coupled between the central processing unit and a network is a network processor. Such network processor is capable of scanning data received from the network based on an update. Such network processor is further capable of receiving the update via the network. | 2013-09-19 |
20130247198 | Emulator updating system and method - One embodiment includes a method and computer program product for distributing and/or receiving a first emulator extension with respect to an emulator capable of performing an emulation using emulation code. The first emulator extension includes program instructions that aid in the process of emulating in order to detect potentially unwanted computer software. Such program instructions of the first emulator extension are additional beyond that associated with the emulator code, for assisting the emulator code in the emulation by patching the additional program instructions into the emulator in order to aid in detecting the potentially unwanted computer software within the suspect code. In use, an emulation is performed using the first emulator extension and the suspect code. The emulation is performed within an insulated environment in a computer system so that the computer system is insulated from potentially unwanted actions of the suspect code. | 2013-09-19 |
20130247199 | System, method and computer program product for removing null values during scanning - A system, method, and computer program product are provided for scanning data values. Initially, a set of data values are received. Null values between the data values are then removed such that the data values are contiguous. Further, the data values with the null values removed are scanned for the purpose of identifying unwanted data. | 2013-09-19 |
20130247200 | Scanning computer files for specified content - Scanning for computer viruses or E-mail and data content filtering is performed using a distributed programming approach. A master computer | 2013-09-19 |
20130247201 | SYSTEM AND METHOD FOR MALWARE AND NETWORK REPUTATION CORRELATION - A method is provided in one example embodiment and includes receiving a reputation value based on a hash of a file making a network connection and on a network address of a remote end of the network connection. The network connection may be blocked if the reputation value indicates the hash or the network address is associated with malicious activity. In more specific embodiments, the method may also include sending a query to a threat analysis host to request the reputation value. Additionally or alternatively the reputation value may be based on query patterns in particular embodiments. In yet more specific embodiments, the network connection may be an inbound connection and/or an outbound connection, and the reputation value may be based on a file reputation associated with the hash and a connection reputation associated with the network address of the remote end of the network connection. | 2013-09-19 |
20130247202 | DYNAMIC MANAGEMENT OF RESOURCE UTILIZATION BY AN ANTIVIRUS APPLICATION - System and method for dynamically managing utilization of computing capacity by an antivirus application having distinct security modules configurable by adjustment of operational parameters. An identification of the computing resources required by each of the security modules to perform certain corresponding security-related functionality is obtained. A current state of authorization granted to the antivirus application to access each of the plurality of computing resources is determined. The operational parameters are adjusted for the at least one of the security modules in response to a determination that the current state of authorization is insufficient for the antivirus application to access certain ones of the computing resources required by the at least one of the security modules to perform its corresponding functionality. The operational parameters are adjusted to disable the corresponding functionality and to thereby de-allocate a portion of the computing capacity needed to execute that corresponding functionality. | 2013-09-19 |
20130247203 | Identifying Relationships Between Security Metrics - A security metrics system receives security information data for a network system of computers and metric definitions from metric sources. Each metric definition defines a heuristic for calculating a score for the network system from one or more security signal values at a time in the plurality of times, wherein the score quantifies a security metric for the network system. The system calculates each metric definition for a plurality of times and selecting metric definitions that are related to the performance of and are indicative of one or more other metric definitions as candidates to be key performance indicators. | 2013-09-19 |
20130247204 | SYSTEM AND METHOD FOR APPLICATION SECURITY ASSESSMENT - A system and method in one embodiment includes modules for running a test script to generate a request to a target application, receiving a response from the target application, and running a detector script to inspect the response for a vulnerability. More specific embodiments include a target web site, populating a work in a queue, where the work corresponds to content in the response, and running a second test script or detector script to generate a follow-up request to the application if the vulnerability has been identified in the response. Other embodiments include extracting the work from the queue, and running a second test script corresponding to the extracted work. Other embodiments include storing an injection in an injection cache, de-registering the injection from the injection cache if it is identified in the response, and re-crawling the application, if the injection has not been de-registered from the injection cache. | 2013-09-19 |
20130247205 | CALCULATING QUANTITATIVE ASSET RISK - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating quantitative risk metrics for assets and threats. Risk metrics are generated for individual assets and individual threats. These individual metrics can then be analyzed to generate aggregate risk metrics for assets, groups of assets, and threats. Assets and threats can be ordered according to their aggregate risk metrics. | 2013-09-19 |
20130247206 | SYSTEM AND METHOD FOR GROUPING COMPUTER VULNERABILITIES - A system and method in one embodiment includes modules for creating a vulnerability set including one or more vulnerabilities, adding the vulnerability set to a program, and updating the program by adding a new vulnerability to the vulnerability set. More specific embodiments include a program that includes a scan, creating the vulnerability set by generating a query including one or more conditions associated with the vulnerabilities, and creating the vulnerability set by selecting one or more vulnerabilities from a plurality of vulnerabilities. Other embodiments include a program that includes a report template, adding a vulnerability set to the report template by generating a query to include a condition associated with the vulnerability set, running a scan, and generating a report including one or more results from the scan meeting the condition associated with the vulnerability set. | 2013-09-19 |
20130247207 | SYSTEM AND METHOD FOR GROUPING COMPUTER VULNERABILITIES - A system and method in one embodiment includes modules for creating an asset tag including one or more conditions of an asset on a network, adding the asset tag to an asset report template, and generating an asset report from the asset report template. More specific embodiments include creating the asset tag by generating a query for the one or more conditions. The asset tag may include a second asset tag configured to be updated automatically, and a third asset tag configured to be updated manually, and the second asset tag may be updated automatically when the asset tag is updated. Other embodiments include creating a vulnerability set including a selection of vulnerabilities from a plurality of vulnerabilities, adding the vulnerability set to the asset report template, and scanning a plurality of assets on the network. | 2013-09-19 |
20130247208 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PREVENTING DATA LEAKAGE UTILIZING A MAP OF DATA - A system, method, and computer program product are provided for preventing data leakage utilizing a map of data. In use, information describing data stored on at least one system is received. To this end, a map of the data is generated, utilizing the information. Further, data leakage is prevented, utilizing the map. | 2013-09-19 |
20130247209 | AUTOMATED LICENSE MANAGEMENT - Licenses to software services are assigned automatically to users as a function of one or more user attributes. An attribute can include membership in a group such as a license group or a security group, among other things such as location. License assignments can also be retracted automatically upon changes in one or more user attributes. | 2013-09-19 |
20130247210 | Method and System for Protecting Software Authorization - A method for protecting a software authorization utilized in a software installed in a hardware device, which includes a timer to utilize a system time, and including a plurality of functions is disclosed. The method includes setting an authorized time, an accumulated authorization time, an accumulated running time and a last recorded time when the software is initially installed in the hardware device, operating a time-out check for determining whether the software authorization is expired or not according to the system time, the authorized time, the accumulated authorization time, the accumulated running time and the last recorded time when the software is initiated or the plurality of functions are initiated or terminated, and stopping the software from running in the hardware device when the software authorization is expired. | 2013-09-19 |
20130247211 | AUTHORITY CHANGING DEVICE, GENERATING DEVICE, AND COMPUTER PROGRAM PRODUCT - According to an embodiment, an authority changing device includes a first determiner, a second determiner, and a changing unit. A first authority is defined by a first combination of first to third item values, and a second authority is defined by a second combination of the fourth to sixth item values. The first determiner uses a logical expression to determine whether the change from the first authority to the second authority is possible, not possible, or unknown. The second determiner uses a first table to determine the availability of change from the first authority to the second authority when the availability of the change is determined to be unknown. The changing unit changes the first authority to the second authority when the change is determined to be possible. | 2013-09-19 |
20130247212 | Providing User Confidence Information to Third-Party Systems - An online services system includes a mechanism for providing user confidence information to an external data consumer, and for determining user contribution quality. Using stored information about user actions and interactions, user confidence is evaluated for one or more parameters associated with the validity of the user's account and/or quality of the user's contributions to the online services system. Confidence values are assigned to each parameter, and the values are exposed to external data consumers. Using stored information, user actions and interactions are correlated with contribution quality to produce a metric indicative of user contribution quality. Users with low quality parameter metrics may have their contributions shown to a smaller audience or have a lower prominence in a news feed. | 2013-09-19 |
20130247213 | METHOD AND DEVICES TO SECURE THE ENTRY OF AN ALPHANUMERICAL CODE, CORRESPONDING COMPUTER PROGRAM PRODUCT AND STORAGE MEANS - A method and device are provided for securing entry of an alphanumerical code by a user. The method includes: obtaining, through a first device, information for converting at least one portion of the alphanumerical code into at least one portion of converted code, the information for converting being one-time converting means; a piece of information identifying the information for converting; entering, into a second device distinct from the first device, at least the portion of converted code, converted using the information for converting; and transmitting at least the portion of converted code and the piece of information identifying the information for converting towards a secured server. | 2013-09-19 |
20130247214 | Anonymization of Data Over Multiple Temporal Releases - The present disclosure is directed to systems, methods, and computer-readable storage media for anonymizing data over multiple temporal releases. Data is received, and nodes and connections in the data are identified. The data also is analyzed to identify predicted connections. The nodes, the connections, and the predicted connections are analyzed to determine how to group the nodes in the data. The data is published, and the grouping of the nodes is extended to subsequent temporal releases of the data, the nodes of which are grouped in accordance with the grouping used with the data. | 2013-09-19 |
20130247215 | INFORMATION PROCESSING DEVICE FOR DETECTING AN ILLEGAL STORED DOCUMENT,ILLEGAL STORED DOCUMENT DETECTION METHOD AND RECORDING MEDIUM - The present invention provides an information processing device which can detect illegal authorization setting efficiently in a short period of time. The information processing device includes a database which stores electronic documents, a means for storing rank values of users of the database, a means for storing the authorization degree of an electronic document or an electronic document group and authorization degrees of respective document classes of the database, a means for analyzing the electronic documents and combining together documents having mutual similarity in a degree equal to or higher than a certain level into a similar document group, and a means for analyzing authorization degrees of respective document classes in the database with reference to the rank values of the users, and thus detecting an electronic document or an electronic document group whose authorization setting is improper. | 2013-09-19 |
20130247216 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PUBLICLY PROVIDING WEB CONTENT OF A TENANT USING A MULTI-TENANT ON-DEMAND DATABASE SERVICE - In accordance with embodiments, there are provided mechanisms and methods for publicly providing web content of a tenant using a multi-tenant on-demand database service. These mechanisms and methods for publicly providing web content of a tenant using a multi-tenant on-demand database service can allow the web content to be published by a tenant using the multi-tenant on-demand database service for use by non-tenants of the multi-tenant on-demand database service. | 2013-09-19 |
20130247217 | ON-DEMAND SERVICE SECURITY SYSTEM AND METHOD FOR MANAGING A RISK OF ACCESS AS A CONDITION OF PERMITTING ACCESS TO THE ON-DEMAND SERVICE - In accordance with embodiments, there are provided mechanisms and methods for managing a risk of access to an on-demand service as a condition of permitting access to the on-demand service. These mechanisms and methods for providing such management can enable embodiments to help prohibit an unauthorized user from accessing an account of an authorized user when the authorized user inadvertently loses login information. The ability of embodiments to provide such management may lead to an improved security feature for accessing on-demand services. | 2013-09-19 |
20130247218 | System And Method For Verifying Authenticity Of Documents - A system and method for verifying the authenticity of documents is provided. The method and system includes incorporating a machine readable code ( | 2013-09-19 |
20130247219 | SYSTEM AND METHOD FOR ONLINE ACTIVATION OF WIRELESS INTERNET SERVICE - The present invention is related to method and system for online activation of a wireless internet service, which are capable of automatically transferring a MAC address required for an online activation of wireless internet services to an online activation server, thereby eliminating the subscriber burden of having to know the MAC address and preventing incorrect input of the MAC address. | 2013-09-19 |
20130247220 | CONTROLLING ACCESS TO DIGITAL IMAGES POST-TRANSMISSION - Embodiments of the present invention provide a system, method, and program product for controlling access to a digital image. A first computing device receives a digital image from a second computing device. The first computing device stores the digital image in local storage on the first computing device. The first computing device displays the digital image to an authorized user in a first user interface provided by the first computing device. Subsequently, in response to receiving instructions from the second computing device, the first computing device deletes the digital image from local storage on the first computing device. The first computing device can transmit a second digital image to another computing device for display in a user interface and, subsequently, transmit instructions to the other computing device that, when received, cause the other computing device to delete the digital image from local storage. | 2013-09-19 |
20130247221 | PROVIDING ACCESS TO DOCUMENTS REQUIRING A NON-DISCLOSURE AGREEMENT (NDA) IN AN ONLINE DOCUMENT SHARING COMMUNITY - Provided are a computer program product, system, and method for providing access to documents requiring a non-disclosure agreement (NDA) in an online document sharing community. A document request is received from a requesting participant at a requesting participant computer comprising one of the participant computers in the network environment. In response to receiving the document request, an access page is returned to the requesting participant computer including a non-disclosure agreement (NDA) requesting that the requesting participant accept terms of the NDA in order to access the content of the document in the storage system. The content of the document is returned to the requesting participant computer in response to receiving indication from the requesting participant computer accepting the terms of the NDA. | 2013-09-19 |
20130247222 | Systems and Methods for Preventing Access to Stored Electronic Data - The techniques described herein include data security systems and methods adapted to protect stored data from unauthorized access. Encryption keys can be maintained on a removable media that allow an authorized user of an agent computing device to access encrypted portions of the removable media. The agent computing device controls access using predefined access control information. An access elimination command communicated to the agent computing device can prevent further access to encrypted data on the removable media. | 2013-09-19 |
20130247223 | APPARATUS AND METHOD FOR ENSURING PRIVACY IN CONTENTS SHARING SYSTEM - A privacy protection policy is present in a content sharing system. A method for managing contents in a content sharing system includes receiving a content download request from a first account through a first device; and determining whether to carry out the download by considering at least one of a sharing range of a download-requested content, a content access right of the first account, a content access right of an owner account of the first device, a sharing range of a download folder, and sharing acceptance or rejection of an owner of the content. | 2013-09-19 |
20130247224 | OWNER PRIVACY IN A SHARED MOBILE DEVICE - Systems and methods that regulate range of access to personal information of a mobile unit's owner. The access control component can designate granularity for access levels and/or a spectrum of access modes—(as opposed to a binary choice of full access or no access at all). Such access can be based on a spectrum and/or discrete trust relationship between the owner and user of the mobile unit. A profile definition component can exploit an owner's trust relationships to designate levels of security. The profile definition component can further define a profile based on a set of applications, such as entertainment mode, browser mode, and the like. | 2013-09-19 |
20130247225 | SYSTEMS AND METHODS FOR MANAGING RIGHTS TO BROADBAND CONTENT - Systems and methods for managing rights to broadband content are provided. A request for broadband content may be received by a server. The received request may include a client identifier associated with a customer device from which the request is received and a content identifier associated with the requested broadband content. Based at least in part upon the client identifier, a billing account associated with the customer device may be identified, and one or more users associated with the billing account may be identified. A set of access rights for the one or more users may be determined and, based upon an analysis of the set of access rights, a determination may be made as to whether access to the broadband content is authorized. | 2013-09-19 |
20130247226 | CONNECTIVITY-BASED AUTHORIZATION - Techniques which allow definition and enforcement of connectivity-based action and execution authorization policies. On a computer, an action or execution attempt is intercepted in real-time. The connectivity state of the computer, the subject process, the program file of the subject process, the attempted action and the object of the attempted action are determined. An authorization policy considering the connectivity state indicates whether the attempted action is authorized or not. In a tracking mode, the attempted action and its authorization are logged and the attempted action is allowed to proceed. In an enforcement mode, unauthorized attempts are blocked and logged, thereby enforcing the authorization policy. | 2013-09-19 |
20130247227 | Strategies for Controlling Use of a Resource that is Shared Between Trusted and Untrusted Environments - A strategy is described for controlling access to a resource which is shared between a trusted environment and an untrusted environment. The resource can represent a clipboard module. The trusted environment can include trusted client functionality, while the untrusted environment can include potentially untrusted network-accessible entities (e.g., websites) which seek to access the clipboard module. The strategy provides a security presentation which notifies a user when a network-accessible entity is attempting to access the clipboard module, identifying the entity which is making the attempt, together with the nature of the information being read or added to the clipboard module. The security presentation invites the user to approve or deny the particular attempt (or all such attempts from the network-accessible entity), and/or clear the clipboard module. The security presentation does not block the user's interaction with other parts of a user interface presentation. | 2013-09-19 |
20130247228 | METHOD, SYSTEM AND SERVER FOR DIGITAL RIGHT MANAGEMENT - This application discloses methods, systems, and servers for digital right management. One such method may include the steps of: combining content of multiple digital files selected by a user into a new digital file; encrypting the new digital file and generating authorization information according to a key used in the encryption and information of a client where the user logs in; and transmitting the authorization information to the client to instruct the client to use the new digital file based on the authorization information. In some embodiments, contents of multiple digital files selected by a user may be combined into a new digital file, and authorization information for the new digital file may be transmitted to the client, thus achieving authorization for digital works from multiple sources. | 2013-09-19 |
20130247229 | USING FLASH STORAGE DEVICE TO PREVENT UNAUTHORIZED USE OF SOFTWARE - A flash storage device and a method for using the flash storage device to prevent unauthorized use of a software application are provided. An identifier may be encoded within specific sectors of the flash storage device. One bits of the identifier may be encoded as unusable ones of the specific sectors and zero bits of the identifier may be encoded as usable one of the specific sectors. Alternatively, the zero bits of the identifier may be encoded as the unusable ones of the specific sectors and the one bits of the identifier may be encoded as the usable ones of the specific sectors. The software application may be permitted to execute on a processing device connected to the flash storage device only when the identifier is encoded within the flash storage device. | 2013-09-19 |
20130247230 | METHODS AND DEVICES FOR TRUSTED PROTOCOLS FOR A NON-SECURED, DISTRIBUTED ENVIRONMENT WITH APPLICATIONS TO VIRTUALIZATION AND CLOUD-COMPUTING SECURITY AND MANAGEMENT - The present invention discloses methods for trusted protocols for a non-secure computing-environment. Methods include the steps of: upon request for determining that an untrusted computing resource is trustworthy, vouching for the untrusted resource as trustworthy by a trusted computing resource upon satisfying at least one criterion of: the trusted resource was directly involved in setting up and/or activating the untrusted resource; and/or has access to a database of identifying credentials and/or information which allow the trusted resource to verify that the untrusted resource is trustworthy; and concealing at least one secret that needs to be present on any computing resource, wherein at least one secret is concealed differently on each computing resource; and transmitting at least one secret from any computing resource to any other computing resource in a way that changes the step of concealing at least one secret without any computing resource knowing at least one secret. | 2013-09-19 |
20130247231 | SECURE PROCESSING UNIT SYSTEMS AND METHODS - A hardware Secure Processing Unit (SPU) is described that can perform both security functions and other information appliance functions using the same set of hardware resources. Because the additional hardware required to support security functions is a relatively small fraction of the overall device hardware, this type of SPU can be competitive with ordinary non-secure CPUs or microcontrollers that perform the same functions. A set of minimal initialization and management hardware and software is added to, e.g., a standard CPU/microcontroller. The additional hardware and/or software creates an SPU environment and performs the functions needed to virtualize the SPU's hardware resources so that they can be shared between security functions and other functions performed by the same CPU. | 2013-09-19 |
20130247232 | COLON AND PANCREAS CANCER PEPTIDOMIMETICS - The invention relates to a peptidomimetic of an NPC-1 epitope on the MUC5AC protein which is differentially expressed in pancreatic and colorectal cancer, and diagnostic and therapeutic usages. Further, antibodies that selectively bind the NPC-1 epitope peptidomimetics and may be used in diagnostic and therapeutic methods. | 2013-09-19 |
20130247233 | G PROTEIN COUPLED RECEPTORS AND USES THEREOF - The present invention provides GPCR polypeptides and polynucleotides, recombinant materials, and transgenic mice, as well as methods for their production. The polypeptides and polynucleotides are useful, for example, in methods of diagnosis and treatment of diseases and disorders. The invention also provides methods for identifying compounds (e.g., agonists or antagonists) using the GPCR polypeptides and polynucleotides of the invention, and for treating conditions associated with GPCR dysfunction with the GPCR polypeptides, polynucleotides, or identified compounds. The invention also provides diagnostic assays for detecting diseases or disorders associated with inappropriate GPCR activity or levels. | 2013-09-19 |
20130247234 | Histidine Engineered Light Chain Antibodies and Genetically Modified Non-Human Animals for Generating the Same - A genetically modified non-human animal is provided, wherein the non-human animal expresses an antibody repertoire capable of pH dependent binding to antigens upon immunization. A genetically modified non-human animal is provided that expresses a single light chain variable domain derived from a single rearranged light chain variable region gene in the germline of the non-human animal, wherein the single rearranged light chain variable region gene comprises a substitution of at least one non-histidine encoding codon with a histidine encoding codon. Methods of making non-human animals that express antibodies comprising a histidine-containing universal light chain are provided. | 2013-09-19 |
20130247235 | Mice That Produce Antigen-Binding Proteins With pH-Dependent Binding Characteristics - Genetically modified non-human animals are provided that comprise an immunoglobulin heavy chain locus comprising an unrearranged human heavy chain variable region nucleotide sequence comprising an addition of at least one histidine codon or a substitution of at least one endogenous non-histidine codon with a histidine codon. Compositions and methods for making the genetically modified non-human animals as described herein are provided. Non-human animals capable of expressing an antigen-binding protein characterized by pH-dependent antigen binding, enhanced recyclability and/or enhanced serum half-life are also provided. | 2013-09-19 |
20130247236 | Non-Human Animals Expressing pH-Sensitive Immunoglobulin Sequences - Genetically modified non-human animals are provided that express an immunoglobulin variable domain that comprises at least one histidine, wherein the at least one histidine is encoded by a substitution of a non-histidine codon in the germline of the animal with a hisidine codon, or the insertion of a histidine codon in a germline immunoglobulin nucleic acid sequence. Immunoglobulin genes comprising histidines in one or more CDRs, in an N-terminal region, and or in a loop 4 region are also provided. Immunoglobulin variable domains comprising one or more histidines (e.g., histidine clusters) substituted for non-antigen-binding non-histidine residues. Non-human animals that are progeny of animals comprising modified heavy chain variable loci (V, D, J segments), modified light chain variable loci (V, J segments), and rearranged germline light chain genes (VJ sequences) are also provided. Non-human animals that make immunoglobulin domains that bind antigens in a pH-sensitive manner are provided. | 2013-09-19 |
20130247237 | NOVEL GARDEN BEAN SB4534 - A novel garden bean cultivar, designated SB4534, is disclosed. The invention relates to the seeds of garden bean cultivar SB4534, to the plants of garden bean line SB4534 and to methods for producing a garden bean plant by crossing the cultivar SB4534 with itself or another garden bean line. The invention further relates to methods for producing a garden bean plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other garden bean lines derived from the cultivar SB4534. | 2013-09-19 |
20130247238 | BEAN VARIETY WAXC6V1003 - The invention provides seed and plants of the bean line designated WAXC6V1003. The invention thus relates to the plants, seeds and tissue cultures of bean line WAXC6V1003, and to methods for producing a bean plant produced by crossing a plant of bean line WAXC6V1003 with itself or with another bean plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of bean line WAXC6V1003, including the pods and gametes of such plants. | 2013-09-19 |
20130247239 | PEPPER HYBRID SVR 14866143 - The invention provides seed and plants of pepper hybrid SVR 14866143 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of pepper hybrid SVR 14866143 and the parent lines thereof, and to methods for producing a pepper plant produced by crossing such plants with themselves or with another pepper plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2013-09-19 |
20130247240 | TOMATO HYBRID PS 02353389 AND PARENTS THEREOF - The invention provides seed and plants of tomato hybrid PS 02353389 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid PS 02353389 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2013-09-19 |
20130247241 | HYBRID CARROT VARIETY SLENDERCUT - The present invention relates to plants of a carrot variety SLENDERCUT and seeds and progeny thereof. The invention further relates to methods for producing a carrot plant by traditional breeding methods. The invention further relates to a method for producing a carrot plant containing in its genetic material one or more transgenes. | 2013-09-19 |
20130247242 | PLANT HEIGHT REGULATORY GENE AND USES THEREOF - Provided are a crop height regulatory gene from | 2013-09-19 |
20130247243 | LETTUCE VARIETY NUN 6074 LTL - The present invention relates to plants of a lettuce variety NUN 6074 and, seeds and progeny thereof. The invention further relates to methods for producing a lettuce plant by traditional breeding methods. Moreover, the invention relates to a method for producing a lettuce plant containing in its genetic material one or more transgenes. | 2013-09-19 |
20130247244 | LETTUCE VARIETY NUN 06075 LTL - The present invention relates to plants of a lettuce variety NUN 06075 LTL (also referred to as “NUN 06075” or “06075” or “NUN 06075 LTL) and, seeds and progeny thereof. The invention further relates to methods for producing a lettuce plant by traditional breeding methods. Moreover, the invention relates to a method for producing a lettuce plant containing in its genetic material one or more transgenes. | 2013-09-19 |
20130247245 | ENZYMES INVOLVED IN TRITERPENE SYNTHESIS - This invention relates to isolated polynucleotides encoding enzymes consisting of a carboxypeptidase-like protein, a methyltransferase and a glucosyltransferase, involved in the biosynthesis of β-amyrin-derived triterpenes in plants and seeds. The invention also relates to the construction of recombinant DNA constructs comprising all or a portion of the isolated polynucleotides of the invention, in sense or antisense orientation, operably linked to at least one regulatory sequence. | 2013-09-19 |
20130247246 | METHOD TO REDUCE THE CONTENT OF UNSATURATED FATTY ACIDS IN LATEX RECOVERED FROM PARTHENIUM ARGENTATUM OR TARAXACUM KOK-SAGHYZ - A method to reduce the content of unsaturated fatty acids in latex or a resin component, wherein the amount of unsaturated fatty acids in a plant body of | 2013-09-19 |
20130247247 | METHODS AND COMPOSITIONS FOR WEED CONTROL - The present invention provides novel compositions for use to enhance weed control. Specifically, the present invention provides for methods and compositions that modulate glutamine synthetase in weed species. The present invention also provides for combinations of compositions and methods that enhance weed control. | 2013-09-19 |
20130247248 | TRANSCRIPTION FACTORS IN PLANTS RELATED TO LEVELS OF NITRATE AND METHODS OF USING THE SAME - This disclosure concerns plant nitrogen responses. Embodiments concern regulatory factors that contribute to the response to nitrogen sources and/or their metabolites in plants. | 2013-09-19 |
20130247249 | GENE CONTROLLING SHELL PHENOTYPE IN PALM - Nucleic acid sequences for predicting and controlling shell phenotype in palm. | 2013-09-19 |
20130247250 | PLANT IRRIGATION METHODS - The present invention is directed to methods of increasing the environmental stress tolerance of a plant, to methods of improving the quality and/or yield of a plant crop, to methods of application of agrochemicals having a physiological effect on a plant in the plant irrigation water, and to crops produced using said methods. | 2013-09-19 |
20130247251 | INTEIN-MODIFIED ENZYMES, THEIR PRODUCTION AND INDUSTRIAL APPLICATION - A method of predicting an intein insertion site in a protein that will lead to a switching phenotype is provided. The method includes identifying a plurality of C/T/S sites within the protein; selecting from the plurality of C/T/S/ sites those that are ranked 0.75 or higher by a support vector machine, within ten angstroms of the active site of the protein, and at or near a loop-β-sheet junction or a loop-α-helix junction. A method of controlling protein activity and hosts including proteins with controlled activity are also provided. Also, intein modified proteins and plants containing intein modified proteins are provided. | 2013-09-19 |
20130247252 | COMPOSITIONS, ORGANISMS, SYSTEMS, AND METHODS FOR EXPRESSING A GENE PRODUCT IN PLANTS - The present disclosure relates, according to some embodiments, to compositions, organisms, systems, and methods for expressing a gene product in a plant (e.g., a monocot) using a promoter operable in one or more plant tissues and/or cells. In some embodiments, an isolated nucleic acid may comprise an expression control sequence having the sequence of nucleotides 1-4726 of SEQ ID NO: 1, wherein the expression control sequence has stem-regulated and/or defense-inducible promoter activity in at least one monocot (e.g., at least two monocots). | 2013-09-19 |
20130247253 | ALS INHIBITOR HERBICIDE TOLERANT BETA VULGARIS MUTANTS - The present invention relates to an ALS inhibitor herbicide tolerant | 2013-09-19 |
20130247254 | DIG-10 INSECTICIDAL CRY TOXINS - DIG-10 Cry toxins, polynucleotides encoding such toxins, use of such toxins to control pests, and transgenic plants that produce such toxins are disclosed. | 2013-09-19 |
20130247255 | Interspecific tree named 'Bella Kat' - A new and distinct variety of interspecific | 2013-09-19 |
20130247256 | Orange tree named 'Kirkwood Red' - A new and distinct variety of sweet orange tree ( | 2013-09-19 |
20130247257 | Strobilanthus Plant Name 'Lankveld 13' - A new cultivar of | 2013-09-19 |
20130247258 | Hibiscus plant named "My Valentine' - A new and distinct cultivar of hardy herbaceous | 2013-09-19 |
20130247259 | Hibiscus plant named 'Tie Dye' - hybrid plant named ‘Tie Dye’ is a new and distinct cultivar of winter-hardy herbaceous Rose Mallow with an upright, strong well-branched stems producing many flat-faced flowers with deeply-ruffled, dark pink perimeter ring becoming white toward center and a lustrous cherry-red eye in a bull's eye pattern. The foliage is mostly tri-lobed, medium to dark green with limited purple tinting. | 2013-09-19 |
20130247260 | Hibiscus plant named 'Midnight Marvel' - A new and distinct cultivar of winter-hardy herbaceous | 2013-09-19 |
20130247261 | Celosia plant named 'Twisted' - A new and distict variety of | 2013-09-19 |
20130247262 | Pelargonium plant named 'KLEPP11273' - A new variety of | 2013-09-19 |
20130247263 | Pelargonium plant named 'KLEPZ11229' - A new variety of | 2013-09-19 |
20130247265 | Agapanthus plant named 'HinesAg1' | 2013-09-19 |
20130247266 | Helleborus plant named 'ABCRD02' | 2013-09-19 |