40th week of 2009 patent applcation highlights part 83 |
Patent application number | Title | Published |
20090249452 | Systems and Methods for Flexible Service Delivery Network Services - A system and method are described that use a subscriber-centric approach to scalably support the delivery of network services across numerous access protocols and across a multitude of access devices. By allowing the use of a service engine that can range in complexity from a simple macro to a rules engine, this approach is suitable for bundled services, as well as single services. | 2009-10-01 |
20090249453 | METHOD AND SYSTEM FOR HUB-AND-SPOKE WEBSITE BROWSING AND NAVIGATION ON A MULTIPANED PLATFORM FOR THE COMMUNICATION, DISTRIBUTION, AND COLLABORATION OF INFORMATION AND DATA - The invention is a method and system for hub-and-spoke website browsing and navigation on a multipaned platform for the communication, distribution and collaboration of information and data. The invention allows multiple non-collocated users to collaborate on an interface created by a server-based application by utilizing a plurality of application spokes and a plurality of application fasteners to facilitate data exchange between a hub and at least one viewing pane on a display device. | 2009-10-01 |
20090249454 | AUTHENTICATION SERVER, AUTHENTICATION SYSTEM, AND AUTHENTICATION METHOD - To provide a technology for enabling authentication according to a state of use of a device on a user side. When, on a communication device ( | 2009-10-01 |
20090249455 | METHOD FOR IDENTIFICATION USING BLUETOOTH WIRELESS KEY - A Bluetooth host solves the aforementioned problems by evaluating a Bluetooth service provider server ID and by determining which of a plurality of access IDs map to the server ID and, correspondingly, providing a Bluetooth access ID that corresponds thereto. Accordingly, one Bluetooth host may readily gain access to any one of a plurality of different devices and different types of devices. Additionally, the Bluetooth host includes capacity to store and provide additional supporting information according to the type of device that is the Bluetooth service provider. Generally, the Bluetooth host stores a plurality of access or link IDs in relation to a plurality of master device IDs and, upon detecting a beacon, determines what access or link ID to provide and whether to provide additional stored information. | 2009-10-01 |
20090249456 | SYSTEM AND METHOD FOR AUTHORIZING AND VALIDATING USER AGENTS BASED ON USER AGENT LOCATION - An embodiment of a method includes receiving a request from a user agent to use a communication network, determining that the user agent is not recognized on the communication network, and requiring submission of location information prior to allowing the user agent to use the network. An embodiment of a system includes a recognition module configured to determine whether the communication device is recognized in response to a request to use a communication network from the communication device, a notification module configured to notify the communication device that the communication device is not recognized, wherein notification that the communication device is not recognized indicates that location information must be submitted prior to the communication device using the communication network; and a location update module configured to receive submitted location information and update the location of the communication device based on the location information. | 2009-10-01 |
20090249457 | ACCESSING SECURE NETWORK RESOURCES - The disclosed implementations generally provide a user access to a secure network resource (e.g., a website, chat application). In some implementations, access to a secure network resource is provided by a communication terminal in communication with a secure access service. The communication terminal detects a presence of a unique identifier (e.g., a Bluetooth MAC address stored in a mobile device), and passes the unique identifier and cryptographic information (e.g., a key code or digital certificate) to the secure access service. The secure access service validates the integrity of the unique identifier and authenticates the user of the device by reading the cryptographic information (e.g., reading the certificate). | 2009-10-01 |
20090249458 | Systems and methods of network operation and information processing, including user engagement and profiling features - Embodiments of a system and method for network operation and information processing, including user engagement and profiling features are described. A method includes transmitting a request for authorization to use a public-access network from a computer, including, with the request, identifier information regarding the user. Data including additional information, such as a terms and conditions page, a splash page, relevant information based on user-specific information such as user location, and other like information is then transmitted over the network. The data to be transmitted is determined by processing software as a function of the identifier information regarding the user. A network connection is then opened up for the user of the computer. | 2009-10-01 |
20090249459 | SYSTEM AND METHOD FOR RECEIVING REQUESTS FOR TASKS FROM UNREGISTERED DEVICES - Embodiments of a system and method for receiving task requests from unregistered devices are described. Embodiments may include a communication interface service configured to receive from a communication device a message indicative of a request to perform a task. The communication interface service may determine that the communication device is not registered with an existing account that provides information for performing said task. The communication interface service may obtain identification and authentication information for an existing account via a communication channel. The existing account may be an account for that is accessible via a network-based interface. The communication channel through which the identification and authentication information is received by the communication interface service may be any communication channel that does not include the network-based interface of the existing account. Additionally, the communication interface service may use the identification and authentication information for performance of the task using the existing account. | 2009-10-01 |
20090249460 | SYSTEM FOR MONITORING THE UNAUTHORIZED USE OF A DEVICE - The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device. | 2009-10-01 |
20090249461 | BUSINESS MANAGEMENT SYSTEM - There is provided a management server technology that allows a user to continuously use a business function of a business server without logging in again to the business server, even if the authority of the user to the business server is changed. The business server receives an access from a user terminal, and requests a management server to perform user authentication. In response to the authentication request, the management server determines a future scheduled authority of the user, generates not only authority information at the time of the user authentication, but also a determination result including the future scheduled authority information, and transmits them to the business server. The business server provides the user terminal with a new business function based on the scheduled user authority information, upon expiration of a validity period of the user authority to the current business function. | 2009-10-01 |
20090249462 | METHOD, APPARATUS, AND SYSTEM FOR SENDING CREDENTIALS SECURELY - A software application executing in a first local operating environment may be used to connect to a remote server that requires a credential of a user to complete a transaction. In a second local operating environment that operates external to the first local environment a user may be authenticated based on a user input received in the second local operating environment. The credential of the user may be securely communicated to the remote server from the second local operating environment. Other embodiments are described and claimed. | 2009-10-01 |
20090249463 | METHOD AND APPARATUS FOR SECURED EMBEDDED DEVICE COMMUNICATION - In a computing device that includes a host operating system and a management engine separate from the host operating system, if the primary operating system is not operating, a management engine may obtain from a credential server via a first network connection logon information for a secured network and the management engine connects to the secure network through a secured connection using the logon information. If the operating system is operating the operating system provides the logon information to the management engine. Certificate verification may be performed by a remote server on behalf of the management engine. Other embodiments are disclosed and claimed. | 2009-10-01 |
20090249464 | FIREWALL FOR REMOVABLE MASS STORAGE DEVICES - A firewall device comprising a first connection device for connecting with a data device supporting transfer data with a removable mass storage device; second connection device for connecting with the removable mass storage device; and a microprocessor, adapted to control and secure data transfer between the data device and the removable mass storage device. | 2009-10-01 |
20090249465 | System and Method for Implementing Content and Network Security Inside a Chip - Systems and methods for implementing content, streaming, and network security inside a chip or inside a computing device are disclosed. In exemplary embodiments, a system comprises a communication chip and a second processor. The communication chip comprises a router and security instructions. The router is configured to intercept untrusted data between a network, and a first router. The second processor is configured to receive the untrusted data from the router, process the untrusted data with the security instructions to produce trusted data, and provide the trusted data to the router. | 2009-10-01 |
20090249466 | METHODS AND DEVICES FOR ENFORCING NETWORK ACCESS CONTROL UTILIZING SECURE PACKET TAGGING - Disclosed are methods, devices, and media for enforcing network access control, the method including the steps of: extracting a packet signature from a packet (or packet fragment) received from a network; storing the packet signature and the packet in a buffer; computing a buffer signature using a per-endpoint secret key; determining whether the packet signature and the buffer signature are identical; and upon determining the packet signature and the buffer signature are identical, transmitting the packet to a protocol stack. Preferably, the step of extracting includes extracting the packet signature from a field (e.g. identification field) of a header of the packet. Preferably, the method further includes the step of: upon determining the packet signature and the buffer signature are not identical, discarding the packet. Methods for receiving a packet from a protocol stack, and transmitting the packet to a network are disclosed as well. | 2009-10-01 |
20090249467 | PROXY SERVER - A proxy server for downloading a data file for a client, such as an email client or web browser, including: a external proxy for downloading the data file for the client from an external server over a network, based on profile data associated with the client stored on the proxy server; a memory module for storing the data file; and an internal proxy for transferring the data file to the client when requested by the client. The external proxy operates asynchronously to the internal proxy, and the proxy server operates transparently with respect to the client. | 2009-10-01 |
20090249468 | Method for establishing distributed filters in a packet-oriented network, based on abstract security defaults - A method for a packet-oriented network is provided. According to the method, after analysis of the network configuration and the existing network elements, the implementation of predefined security guidelines is automatically mapped onto the options of the different network elements and the distribution of the various security functions in the different network elements is optimized in such a way that the protection target is achieved, no network element receives too many configuration entries and no redundant functions are implemented. | 2009-10-01 |
20090249469 | PACKET TRANSFER APPARATUS - Plural retrieval units are prepared, and a retrieval unit which can reduce power consumption is selected according to the condition of a retrieval key. For example, in general, the retrieval unit including a CAM is used. However, when the condition of the retrieval key is simple as in a case where reference is made to only TOS in an interior node of Diffserv and QoS is determined, the retrieval unit including a dscp-QoS table constituted of an FF or RGF is used and the power consumption is reduced. A CAM retrieval start determination section determines that a process is performed by which retrieval unit in accordance with previously set setting information or a previously set header information item. | 2009-10-01 |
20090249470 | COMBINED FIREWALLS - A method of providing a firewall to protect a set of virtual machines on a host node that is one of multiple host nodes that host virtual machines. The method stores a table of allowed connections for each virtual machine on the host node. Upon a particular virtual machine moving from the host node to another host node, the method deletes records of a first set of allowed connections that each identify the particular virtual machine and do not identify any other virtual machine in the set of virtual machines. Also upon the virtual machine moving, the method edits records of a second set of allowed connections, each identifying the particular machine and one other virtual machine in the set of virtual machines on the first host node, to remove an identifier of the particular virtual machine. | 2009-10-01 |
20090249471 | REVERSIBLE FIREWALL POLICIES - A method of determining whether to allow multiple data packets to pass a firewall, each data packet having a source address and a destination address. The method evaluates a data packet by using a first set of policies when no previous packet with an opposite address has been allowed under the first set of policies. Two packets have opposite addresses when a source address of the first of the two packets is the same as the destination address of the second of the two packets and the destination address of the first packet is the same as the source address of the second packet. The method evaluates the data packet using a second set of policies when a previous packet with an opposite address has been allowed under the first set of policies. | 2009-10-01 |
20090249472 | HIERARCHICAL FIREWALLS - A method of implementing a firewall that receives a layer of policies from each of multiple entities with different levels of authority. The method evaluates received packets based on the received layers of policies. A layer of policies of a higher level of authority can accept a received packet, block the received packet, or delegate a decision of whether to accept or block the received packet to a layer of policies of a lower level of authority. | 2009-10-01 |
20090249473 | AUTHORIZING COMMUNICATIONS BETWEEN COMPUTING NODES - Techniques are described for managing communications between multiple computing nodes, such as computing nodes that are separated by one or more physical networks. In some situations, the techniques may be used to provide a virtual network between multiple computing nodes that are separated by one or more intermediate physical networks, such as from the edge of the one or more intermediate physical networks by modifying communications that enter and/or leave the intermediate physical networks. In some situations, the computing nodes may include virtual machine nodes hosted on one or more physical computing machines or systems, such as by or on behalf of one or more users (e.g., users of a program execution service). The managing of the communications may include determining whether communications sent to managed computing nodes are authorized, and providing the communications to the computing nodes only if they are determined to be authorized. | 2009-10-01 |
20090249474 | SYSTEM AND METHOD FOR ADJUSTING THE SECURITY LEVEL OF A REMOVABLE MEDIUM - A method of adjusting a security level of a removable medium, including receiving a unique identification (ID) of a removable medium, a name of a file being processed, and a requested operation, determining the security level of the removable medium, determining a security level of the file being processed, and one of increasing and decreasing the security level of the removable medium based on the determined security level of the file being processed. Further, security levels of removable media are mapped to security zones which are subsequently used to allow or prevent transportation of a removable medium inside or outside of certain boundaries. | 2009-10-01 |
20090249475 | AUTHENTICATION SYSTEM, ELECTRONIC APPARATUS, ELECTRONIC APPARATUS AUTHENTICATION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM HAVING AUTHENTICATION PROGRAM RECORDED THEREON - An authentication system includes a communication unit that originates a call on the basis of an entered telephone number, a vibration reception unit that receives vibrations generated by a portable device in response to an incoming call, vibration pattern registration unit registering a vibration pattern, and an authentication unit that performs authentication by determining whether or not a vibration pattern of the vibrations received by the vibration reception unit matches the vibration pattern registered in the vibration pattern registration unit. | 2009-10-01 |
20090249476 | Using Multi-Touch Gestures to Protect Sensitive Content Using a Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA) - The invention described herein uses a multi-touch manager for authorizing multi-touch devices by first providing a multi-touch test to a multi-touch device. In turn, the multi-touch manager receives a multi-touch response from the multi-touch device. The multi-touch manager then compares the multi-touch response with a multi-touch answer and authorizes the device based upon the comparison. | 2009-10-01 |
20090249477 | METHOD AND SYSTEM FOR DETERMINING WHETHER A COMPUTER USER IS HUMAN - A method and system for determining whether an online service user is human is provided. In one implementation, the method may include collecting personal information about the online service user, generating a question based on the personal information, communicating the question to the online service user in the form of a CAPTCHA, and receiving a response to the question presented in the CAPTCHA, wherein a correct response is interpreted to mean that the online service user is human. The method and system may also include measuring the response time in answering the question. | 2009-10-01 |
20090249478 | User Authentication System and Method - A user authentication system and method are disclosed. The user authentication system includes an authentication device which can be donned and doffed by the user, a sensor to determine whether the authentication device is donned or doffed by the user, and an authentication server to receive information from the sensor and to authenticate the user based on whether the authentication device is donned by the user. | 2009-10-01 |
20090249479 | AUTHENTICATION MANAGEMENT METHODS AND MEDIA - A method for managing authentication includes receiving a request at a directory service for authentication from a first of a plurality of users operating a first of a plurality of products, wherein the directory service associates each of the plurality of users with a plurality of roles for each of the plurality of products. The method also includes authenticating the first user utilizing the directory service, wherein the directory service provides a first role associated with the first user and the first product in response to the request. | 2009-10-01 |
20090249480 | MINING USER BEHAVIOR DATA FOR IP ADDRESS SPACE INTELLIGENCE - The claimed subject matter is directed to mining user behavior data for increasing Internet Protocol (“IP”) space intelligence. Specifically, the claimed subject matter provides a method and system of mining user behavior within an IP address space and the application of the IP address space intelligence derived from the mined user behavior. | 2009-10-01 |
20090249481 | BOTNET SPAM DETECTION AND FILTRATION ON THE SOURCE MACHINE - A method and device are disclosed. In one embodiment the method includes determining that a packet attempting to be sent from a first computer system has at least a portion of a human communication message that may contain spam. The method then increments a spam counter when the difference in time between a first time value in a time stamp within the packet and a second time value of a most recent activity from a human input device coupled to the first computer system is greater than a threshold difference in time value. The method also disallows the packet to be sent to a remote location if the spam counter exceeds a spam outbound threshold value. | 2009-10-01 |
20090249482 | METHOD AND SYSTEM FOR DETECTING RESTRICTED CONTENT ASSOCIATED WITH RETRIEVED CONTENT - In embodiments of the present invention improved capabilities are described for contextual information caused to be attached to data as it passes through a series of computing devices, the contextual information relating to the series of computing devices. The data and the contextual information may then be scanned to determine if the data is a target data. In response to the identification of a target data, the contextual information may be communicated to a central repository. The contextual information may then be analyzed in relation to other information stored in the central repository to determine a target source. | 2009-10-01 |
20090249483 | Command and Control Systems for Cyber Warfare - According to one embodiment, a method includes receiving data regarding a plurality of first parameters of a network. Each first parameter is mapped to a respective second parameter of a computer-readable cyber battle management language. The computer-readable cyber battle management language is operable to express an operational order in the form of a text-based instruction having a computational grammatical structure. The operational order is to be executed at least partially within the network and is related to cyber warfare. The computer-readable battle management language is also operable to express a situation report related to cyber warfare. The situation report is expressed in terms of one or more of the second parameters. The situation report may describe a change in one or more of the first parameters. | 2009-10-01 |
20090249484 | METHOD AND SYSTEM FOR DETECTING RESTRICTED CONTENT ASSOCIATED WITH RETRIEVED CONTENT - In embodiments of the present invention improved capabilities are described for detecting restricted content associated with retrieved content. The method and system may include receiving a client request for content, saving contextual information from the client request, presenting retrieved content in response to the client request, and presenting the contextual information from the client request, and retrieved content, to a scanning facility. The scanning facility may utilize the contextual information from the client request to aid in the detection of restricted content associated with retrieved content. | 2009-10-01 |
20090249485 | Techniques for Capturing Identifying Information on a Device User - A technique for identifying a user of a device includes receiving a tracking mechanism trigger and capturing (e.g., periodically) identifying information on the user of the device in response to the trigger. | 2009-10-01 |
20090249486 | SYSTEM AND METHOD FOR DIGITAL RIGHTS MANAGEMENT CONTROL USING VIDEO ANALYTICS - Digital rights management (DRM) of video data is selectively applied to video data by a video processing system that receives a video, comprising a number of frames, and processes at least one frame from the video to determine the contents of the video. The digital rights management for the video is then configured based on the contents of the video. | 2009-10-01 |
20090249487 | METHOD AND ARRANGEMENT RELATING TO A COMMUNICATION DEVICE - The present invention relates to a novel method for handling applications in a device by associating an application signed by a domain certificate to a pre-defined entity in a device, said device comprising: a module reader for reading subscriber identity, a virtual machine for running at least one application, a memory containing a root certificate, the method comprising: using a data set for aggregating a sub set of data, modifying portion of said data set such that said portion includes reference to said entity. The invention also relates to a device for implementing the method. | 2009-10-01 |
20090249488 | FLEXIBLE APPLIANCE HOSTING WITH COORDINATION OF DEPLOYMENT, LICENSING AND CONFIGURATION - Operating parameters of one or more software appliances may be set at a configuration manager. Compliance of the one or more software appliances with license terms may be maintained at a license manager. Communications may be executed between the license manager and the configuration manager to maintain compliance of the operating parameters with the license terms. A user interface may be provided for administration of the one or more software appliances therewith, the administration including deployment of the one or more software appliances, the license manager, the configuration manager, and a deployment manager within a system landscape. Communication may be executed between the license manager and the deployment manager to maintain compliance of the administration of the one or more software appliances with the license terms. Communication may be executed between the deployment manager and the configuration manager to manage the deployment relative to the operating parameters. | 2009-10-01 |
20090249489 | SECURITY BY CONSTRUCTION FOR WEB APPLICATIONS - Secure distributed Web applications are produced by default upon construction. Mechanisms are provided to address distributed application vulnerabilities (e.g., cross-site scripting, cross-site request forgery, replay attacks . . . automatically. These mechanisms are provided in conjunction with a tier-splitting component that breaks up an application for execution across multiple contexts or tiers. As a result, any application that is tier split is protected from security vulnerabilities by default without any intervention on the part of a developer. | 2009-10-01 |
20090249490 | COMMUNICATION APPARATUS, COMMUNICATION SYSTEM, TRANSMISSION METHOD, AND COMPUTER PROGRAM PRODUCT - A communication apparatus stores encrypted pieces having plural pieces as a part of a content encrypted, and number of transmission times. At least one first piece is encrypted by plural different encryption keys. The communication apparatus selects as priority pieces plural encrypted pieces corresponding to at least one first piece among the first pieces, based on number of untransmitted encrypted pieces of which number of transmission times is zero among plural encrypted pieces of which first piece is encrypted, and stores priority piece information specifying the priority piece. When a piece request is received from other communication apparatus, the communication apparatus determines an encrypted piece to be transmitted, based on priority piece information, and transmits the encrypted piece to the other communication apparatus. | 2009-10-01 |
20090249491 | Contents Data, and Program, Apparatus and Method for Detecting and Controlling Unauthorized Contents - The problem to be solved is to allow anyone other than the contents license owner to acquire a right usage opportunity of contents while the fraud in the contents can be detected. To solve this problem, a contents ID, distribution media information specifying the distribution media of the contents, and identification information containing distribution period information specifying the distribution period of the contents are attached to the contents body When a contents acceptance module | 2009-10-01 |
20090249492 | Fabrication of computer executable program files from source code - A method for protecting a computer program against manipulation and for shielding its communication with other programs against eavesdropping and modification is presented. The method comprises the creation of individualized program copies to different groups of users, the insertion of or the derivation of individual cryptographic keys from the program code, the obfuscation of the program code, and the self-authentication of the program towards other programs. The method is suitable for the protection of online banking, online investment, online entertainment, digital rights management, and other electronic commerce applications. | 2009-10-01 |
20090249493 | Method and System for Determining Software License Compliance - According to one embodiment, a method includes receiving data regarding a plurality of licenses. Each license is associated with one or more respective software products. The data is partitioned such that first and second licenses of the plurality of licenses are grouped together. The first and second licenses are each associated with at least a first software product of the one or more respective software products. A first group identification is assigned to the first and second licenses. | 2009-10-01 |
20090249494 | Method and System for Determining Software License Compliance - According to one embodiment, a method includes providing one or more selectable criteria that each characterize a respective software license restriction. One or more selections of the one or more selectable criteria are received. A license metric is generated. The license metric corresponds to one or more selections of the one or more selectable criteria. A total number of instances of one or more software products is determined using the generated license metric. | 2009-10-01 |
20090249495 | QUICK-RELEASE COMPUTER ACCESS COVER - A latch and latch handle recessed into the computer cover is provided, with the latch handle preferably presently a cam surface internally that interacts with a compatible cam surface associated with a lock bar. Preferably, a key lock is functionally integrated with the latch in such a way that when the key lock is unlocked the latch handle and latch are free to displace and to then urge the retention bar to disengage detents or hooks from slots or receptacles, by way of releasing the cover from a chassis or body of the desktop or workstation. Accordingly, in essentially one efficient movement via engaging the latch handle, a user will be able to quickly remove the cover. | 2009-10-01 |
20090249496 | INFORMATION TERMINAL APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER READABLE MEDIUM STORING PROGRAM THEREOF - There is provided an information terminal apparatus including a detecting unit that detects whether authentication information has been input within a given period of time or not, a determining unit that determines whether the authentication information agrees with given authentication information or not, a processing unit that performs processing in a first mode if the authentication information is not detected by the detecting unit within the given period of time or if the authentication information is detected by the detecting unit within the given period of time but the determining unit determines that it does not agree with the given authentication information, and a log processing unit that memorizes/stores operation history information operated while the processing in the first mode is being performed. | 2009-10-01 |
20090249497 | METHOD FOR MONITORING THE UNAUTHORIZED USE OF A DEVICE - The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device. | 2009-10-01 |
20090249498 | Methods of diagnosing alzheimer's disease and markers identified by set association - The present disclosure relates to genetic markers and methods of diagnosing and screening for late-onset Alzheimer's disease (LOAD). As such, the disclosure encompasses a whole-genome association analysis of single nucleotide polymorphisms (SNPs) of which a number are located within the GRB2-associated binding protein 2 (GAB2) gene as well as other markers associated with other genes. The disclosure identifies two novel haplotypes within the GAB2 gene, i.e., a LOAD risk-enhancing and a LOAD risk-decreasing haplotype. These haplotypes modify LOAD risk differentially in combination with APOE alleles. Further encompassed are therapeutic methods and agents of decreasing the deterioration of cells associated with LOAD. | 2009-10-01 |
20090249500 | SYSTEM FOR MONITORING BACTERIAL TUMOR TREATMENT - A method to follow the progress of tumor treatment in subjects utilizes bacteria that have been modified to express a fluorescent protein. The method can also monitor expression of genes associated with the bacteria that produce therapeutic agents during the course of treatment, optionally against a background of fluorescence generated by the tumor itself. The method permits visualization of the progress of treatment in live subjects so that treatments can be modified according to their efficacy. | 2009-10-01 |
20090249501 | CISD2-Knockout Mice and Uses Thereof - The present invention is related to a Cisd2 knockout mouse with phenotype comprising mitochondrial breakdown and dysfunction, wherein Cisd2 is defined as SEQ ID NO. 1. The present invention is also related to a mouse model of Wolfram Syndrome 2 (WFS2) disease consisting of a Cisd2 knockout mouse. The present invention is further related to a method for screening a candidate agent for preventing or treating WFS2 disease. | 2009-10-01 |
20090249502 | NUCLEIC ACID AND CORRESPONDING PROTEIN ENTITLED 193P1E1B USEFUL IN TREATMENT AND DETECTION OF CANCER - A novel gene (designated 193P1E1B) and its encoded protein, and variants thereof, are described wherein 193P1E1B exhibits tissue specific expression in normal adult tissue, and is aberrantly expressed in the cancers listed in Table I. Consequently, 193P1E1B provides a diagnostic, prognostic, prophylactic and/or therapeutic target for cancer. The 193P1E1B gene or fragment thereof, or its encoded protein, or variants thereof, or a fragment thereof, can be used to elicit a humoral or cellular immune response; antibodies or T cells reactive with 191P1E1B can be used in active or passive immunization. | 2009-10-01 |
20090249503 | ENZYME CONJUGATES FOR USE AS DETOXIFYING AGENTS - Disclosed are detoxifying enzyme conjugates, including conjugates of variants of such detoxifying enzymes. The detoxifying enzymes are preferably chlolinesterases, and more preferably, butyrylcholinesterase. Also disclosed are methods of making and using such conjugates. | 2009-10-01 |
20090249504 | NOVEL SNAP PEA VARIETY SUGAR DEUCE - A novel snap pea cultivar, designated Sugar Deuce, is disclosed. The invention relates to the seeds of pea cultivar Sugar Deuce, to the plants of pea line Sugar Deuce and to methods for producing a pea plant by crossing the cultivar Sugar Deuce with itself or another pea line. The invention further relates to methods for producing a pea plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other pea lines derived from the cultivar Sugar Deuce. | 2009-10-01 |
20090249505 | METHODS FOR PRODUCING A HYBRID SEED PRODUCT - A method for increasing production of hybrid seed of bee-pollinated crops, such as alfalfa and soybean at predetermined hybridity levels. Hybrid seed is produced using female and pollenizer plants at a selected ratio of female plants to pollenizer plants. The female plants and the pollenizer plants are intermingled in the hybrid seed production field. Prediction of percentage of hybridity at various female to pollenizer ratios allows for selection of a ratio of female plants to pollenizer plants to provide seed at a test percentage of hybridity. The percentage of hybridity may be increased post-harvest by employing techniques using seed properties such as size differential, color or density to remove a higher percentage of non-hybrid seed. The hybrid seed product is maximized at various hybridity levels. Planting according to subrows allows for separate harvesting of intermingled crops. Testing the hybrid seed product provides verification of percentage of hybridity. | 2009-10-01 |
20090249506 | Soybean Cultivar 7511119 - A soybean cultivar designated 7511119 is disclosed. The invention relates to the seeds of soybean cultivar 7511119, to the plants of soybean 7511119, to plant parts of soybean cultivar 7511119 and to methods for producing a soybean plant produced by crossing soybean cultivar 7511119 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars or breeding cultivars and plant parts derived from soybean variety 7511119, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 7511119 and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants and plant parts produced by crossing the cultivar 7511119 with another soybean cultivar. | 2009-10-01 |
20090249507 | Soybean Cultivar 7509171 - A soybean cultivar designated 7509171 is disclosed. The invention relates to the seed of soybean cultivar 7509171, to the plants of soybean 7509171, to plant parts of soybean cultivar 7509171 and to methods for producing a soybean plant produced by crossing soybean cultivar 7509171 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars or breeding cultivars and plant parts derived from soybean variety 7509171, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 7509171 and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants and plant parts produced by crossing the cultivar 7509171 with another soybean cultivar. | 2009-10-01 |
20090249508 | Soybean Cultivar 26074414 - A soybean cultivar designated 26074414 is disclosed. The invention relates to the seeds of soybean cultivar 26074414, to the plants of soybean 26074414, to plant parts of soybean cultivar 26074414 and to methods for producing a soybean plant produced by crossing soybean cultivar 26074414 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars or breeding cultivars and plant parts derived from soybean variety 26074414, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 26074414 and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants and plant parts produced by crossing the cultivar 26074414 with another soybean cultivar. | 2009-10-01 |
20090249509 | Inbred Corn Line BB38 - An inbred corn line, designated BB38, is disclosed. The invention relates to the seeds of inbred corn line BB38, to the plants and plant parts of inbred corn line BB38 and to methods for producing a corn plant, either inbred or hybrid, by crossing the inbred line BB38 with itself or another corn line. The invention further relates to methods for producing a corn plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other inbred corn lines derived from the inbred BB38. | 2009-10-01 |
20090249510 | Inbred Corn Line IV2 - An inbred corn line, designated IV2, is disclosed. The invention relates to the seeds of inbred corn line IV2, to the plants and plant parts of inbred corn line IV2 and to methods for producing a corn plant, either inbred or hybrid, by crossing the inbred line IV2 with itself or another corn line. The invention further relates to methods for producing a corn plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other inbred corn lines derived from the inbred IV2. | 2009-10-01 |
20090249511 | METHOD FOR IN VITRO MASS CULTURE OF ALOE VERA - The present invention provides a method for producing a true-to-type clone of an | 2009-10-01 |
20090249512 | ARABIDOPSIS PROMOTERS - The present invention provides several promoters isolated from | 2009-10-01 |
20090249513 | Method for Expression and Accumulation of Peptide in Plant - The present invention relates to a method for expressing and accumulating a low-molecular peptide in plant seeds; a vector therefore; and a plant transformed with the vector. In the present invention, an intended peptide composed of 3 to 40 amino acid residues is expressed and accumulated in seeds of a plant by transforming the plant with a fusion protein expression vector comprising a gene encoding a member of the glutelin multigene family and two or more copies of a gene encoding the intended peptide ligated downstream of the gene under the control of a promoter. | 2009-10-01 |
20090249514 | Improved Methods for the Production of Stably Transformed, Fertile Zea Mays Plants - The present invention relates to improved methods for the incorporation of DNA into the genome of a | 2009-10-01 |
20090249515 | Antisense DNA of Sweetpotato Expansin cDNA and Method For Increasing Storage Root Yield Using The Same - Disclosed herein are antisense DNA of a sweetpotato expansin (IbExpansin) cDNA, a plant transformation vector carrying the same, and a method for increasing storage root production using the same. The transgenic sweetpotatoes prepared using the antisense DNA of IbExpansin cDNA have storage root production increased by up to one and half times. Thus, the gene is useful in the generation of highly productive transgenic storage roots for the increase of bioethanol production. | 2009-10-01 |
20090249516 | Diacylglycerol acyltransferases from flax - The invention relates to isolated diacylglycerol acyltransferases and polynucleotide sequences encoding the DGAT enzymes; polynucleotide constructs, vectors and host cells incorporating the polynucleotide sequences; and methods of producing and using same. Also provided are transformed cells and transgenic plants, especially | 2009-10-01 |
20090249517 | Alteration of Oil Traits in Plants - The preparation and use of nucleic acid fragments useful in altering the phenotype in plants are disclosed. Chimeric constructs incorporating such nucleic acid fragments and suitable regulatory sequences can be used to create transgenic plants having altered phenotypes. Methods for altering the phenotype of plants using such nucleic acid fragments also are disclosed. | 2009-10-01 |
20090249518 | Modification of plant development and morphology - A method of modifying morphology in a plant by introducing into a plant at least one chimaeric gene having a promoter sequence operably associated with a nucleic acid sequence, the promoter sequence being operable to direct expression in specific cells of the plant and the nucleic acid sequence encoding at least one gene product capable of altering the metabolism of or causing death of the specific cells and/or nearby cells. In particular, the promoter sequence is operable to direct expression in lateral bud or lateral shoot and the nucleic acid encoding at least one gene product capable of disrupting the metabolism of or causing the death of the lateral bud or lateral shoot or nearby cells. Preferably the promoter sequence has the sequence shown as SEQ ID No. 1 or SEQ ID No. 7 or SEQ ID No. 4, or a part thereof capable of regulating expression of a gene, or a sequence having at least 60%, preferably at least 75%, homology to SEQ ID No. 1 or SEQ ID No. 7 and being capable of regulating expression of a gene. | 2009-10-01 |
20090249519 | IMMUNIZATION OF FISH WITH PLANT-EXPRESSED RECOMBINANT PROTEINS - Plants are produced that express an amino acid sequence that, when administered to a fish, produce an antigenic or immune response in the fish. The amino acid sequence in one embodiment is an antigen from an organism that causes pathology in fish. The plant tissue may be fed to the fish, or mixed with other materials and fed to fish, or extracted and administered to the fish. | 2009-10-01 |
20090249520 | METHOD AND SYSTEM FOR NEAR-FIELD SPECTROSCOPY USING TARGETED DEPOSITION OF NANOPARTICLES - There is provided in one embodiment of the invention a method for analyzing a sample material using surface enhanced spectroscopy. The method comprises the steps of imaging the sample material with an atomic force microscope (AFM) to select an area of interest for analysis, depositing nanoparticles onto the area of interest with an AFM tip, illuminating the deposited nanoparticles with a spectrometer excitation beam, and disengaging the AFM tip and acquiring a localized surface enhanced spectrum. The method may further comprise the step of using the AFM tip to modulate the spectrometer excitation beam above the deposited nanoparticles to obtain improved sensitivity data and higher spatial resolution data from the sample material. The invention further comprises in one embodiment a system for analyzing a sample material using surface enhanced spectroscopy. | 2009-10-01 |
20090249521 | High frequency deflection measurement of IR absorption - An AFM based technique has been demonstrated for performing highly localized IR spectroscopy on a sample surface. Such a technique implemented in a commercially viable analytical instrument would be extremely useful. Various aspects of the experimental set-up have to be changed to create a commercial version. The invention addresses many of these issues thereby producing a version of the analytical technique that cab be made generally available to the scientific community. | 2009-10-01 |
20090249522 | SYSTEM AND METHODS FOR CONTROLLING PROPERTIES OF NANOJUNCTION DEVICES - An exemplary, highly integrated, SPM-based system for measuring the conductivity and/or force of substance under programmable engaging/stretching processes is described. A sample bias is applied across two electrodes. A substance to be measured is sandwiched between them. A first electrode is first brought relative to a second electrode (engaging) in programmable pathways that can be described as stretching distance versus time curves. The process of engaging the electrodes continues until a certain current reached, a certain force reached and whichever case happens first. The electrodes are then separated (stretching) in programmable pathways that can be described as stretching distance versus time curves. A periodic modulation can be applied to the engaging/stretching process to realize different stretch pathways. The sample bias across the electrodes is kept constant or swept in a programmable shape over time, described as a voltage-versus time curve. The conductivity, engaging/stretching distance, and/or force are measured simultaneously. | 2009-10-01 |
20090249523 | Eucalyptus cladocalyx plant named 'EUC78' - ‘EUC78’ is a distinctive variety of | 2009-10-01 |
20090249524 | MAGNOLIA PLANT NAMED 'JURMAG4' - A new and distinct | 2009-10-01 |
20090249525 | MISCANTHUS PLANT NAMED 'LOTTUM' - A new and distinct | 2009-10-01 |