47th week of 2011 patent applcation highlights part 62 |
Patent application number | Title | Published |
20110289543 | VIDEO STREAMING SYSTEM INCLUDING A FAST CHANNEL CHANGE MECHANISM - A video streaming system including a fast channel change mechanism includes a digital video stream server that may generate and transmit a multicast video stream for each of a number of digital television channels. The system may include a digital television receiver that may receive the multicast video stream. The digital video stream server may transmit to the digital television receiver a unique unicast video stream for a selected channel in response to receiving a channel change request. The digital video stream server may further transmit as a first packet of the unicast video stream, a random access point that occurred prior to a first transmitted successive video content packet of the multicast video stream for the selected channel. The digital television receiver may receive and decode successive packets of video content of the unicast stream for the selected channel upon receiving the random access point. | 2011-11-24 |
20110289544 | VIDEO STREAMING SYSTEM INCLUDING A FAST CHANNEL CHANGE MECHANISM - A video stream server transmits a multicast stream for a number of digital television channels, and a digital television receiver receives the multicast stream. The video stream server may transmit to the television receiver a unique unicast stream for the selected channel at a rate that is faster than a multicast stream live stream rate in response to a channel change request for a selected channel. The video stream server may further transmit as a first packet of the unicast stream, a random access point (RAP) that occurred prior to a current packet of video content of a multicast stream. The digital television receiver may send the RAP for decoding and display upon receipt, and store to the memory unit a number of successive packets corresponding to the multicast stream for the selected channel subsequent to receiving and storing the successive packets corresponding to the unicast stream. | 2011-11-24 |
20110289545 | SINK DEVICE AND WIRELESS TRANSMISSION SYSTEM - When reproducing AV data transmitted from a source device by multicast wireless transmission, a sink device can check the wireless connection status of other sink device which reproduces AV data from the same source device. The sink device ( | 2011-11-24 |
20110289546 | Method and apparatus for protecting markup language document against cross-site scripting attack - A method for decomposing a web application into one or more domain sandboxes ensures that the contents of each sandbox are protected from attacks on the web application outside that sandbox. Sandboxing is achieved on a per-element basis by identifying content that should be put under protection, generating a secure domain name for the identified content, and replacing the identified content with a unique reference (e.g., an iframe) to the generated secure domain. The identified content is then served only from the generated secure domain. | 2011-11-24 |
20110289547 | TAKING CONFIGURATION MANAGEMENT DATA AND CHANGE BUSINESS PROCESS DATA INTO ACCOUNT WITH REGARD TO AUTHORIZATION AND AUTHENTICATION RULES - An approach receives a request from a user, typically a change implementer, on a computer system. The request includes a user identifier and a requested action. A current timestamp corresponding to a computer system clock is retrieved. Scheduled changes are retrieved from a data store accessible by the processor. The current timestamp is compared to the scheduled change periods. The requested action is allowed if the comparison reveals that the current timestamp is within one of the retrieved scheduled changes, and the requested action is denied if the comparison reveals that the current timestamp is outside of the retrieved scheduled change periods. | 2011-11-24 |
20110289548 | Guard Computer and a System for Connecting an External Device to a Physical Computer Network - A guard computer and a system including the guard computer for connecting an external device to a physical computer network are provided. The guard computer includes a network interface for connecting to the physical computer network, a device interface for connecting the external device having a data repository containing data, The guard computer also includes a configuration file containing a set of rules for making the data available to the network and a processor making data available to the network based upon the set of rules. | 2011-11-24 |
20110289549 | METHOD AND SYSTEM FOR A DOCUMENT-BASED KNOWLEDGE SYSTEM - A document-based storage and knowledge production solution designed for use as a primary information system is disclosed. It uses Authentication, Privacy and Security Standards to ensure the source and reliability of the information in the stored documents. It uses Information and Document Standards to explicitly define the information content held in each document. Electronic documents from separate authors, from the same or separate legal entities, are stored together in the same system and can be used in aggregate for the generation of new knowledge. Variations are used to accelerate response times. Other variations describe the method's use as a Variable Electronic Health Record System in which different parts of the system can be produced by separate manufacturers. This is possible because the underlying document-based knowledge system stores the separate documents from each manufacturer's system in such a manner that they can be understood by systems from other manufacturers. | 2011-11-24 |
20110289550 | POLICY MANAGEMENT APPARATUS, POLICY MANAGEMENT SYSTEM, AND METHOD AND PROGRAM USED FOR THE SAME - There are provided a role information storing unit ( | 2011-11-24 |
20110289551 | DYNAMICALLY APPLYING A CONTROL POLICY TO A NETWORK - A method of dynamically applying a control policy to a network is described. A network layer of a plurality of network layers associated with user traffic is determined. A portion of a control policy corresponding to the network layer and the user traffic is accessed. Then, the portion is sent to a security device associated with the network layer, the portion being configured to be applied by the security device to the network layer and the user traffic. | 2011-11-24 |
20110289552 | INFORMATION MANAGEMENT SYSTEM - An information providing device which provides information, a privilege policy providing device which stores a privilege policy setting whether or not information is allowed to be provided and provides the privilege policy, and an authentication device, are provided. The authentication device includes a privilege information management means for storing privilege information indicating whether or not the privilege policy is allowed be provided by the privilege policy providing device, and a privilege certificate issuance means for issuing a privilege policy certificate including a content of the privilege information. The information providing device includes a privilege policy acquisition means for requesting the privilege policy providing device for the privilege policy based on the privilege policy certificate and acquiring the privilege policy, and an information providing means for providing stored information to another device based on the acquired privilege policy. The privilege policy providing device includes a privilege policy providing means for providing the privilege policy to the information providing device based on the privilege policy certificate. | 2011-11-24 |
20110289553 | POLICY AND ATTRIBUTE BASED ACCESS TO A RESOURCE - Techniques are provided for controlling access to a resource based on access policies and attributes. A principal issues a request to a service for purposes of accessing a resource. The principal is authenticated and a service contract for the principal, the service, and the resource is generated. The service contract defines resource access policies and attributes which can be permissibly performed by the service on behalf of the principal during a session. Moreover, the session between the service and the resource is controlled by the service contract. | 2011-11-24 |
20110289554 | SYSTEM AND METHOD FOR APPLICATION PROGRAM OPERATION ON A WIRELESS DEVICE - Embodiments described herein address mobile devices with non-secure operating systems that do not provide a sufficient security framework. More particularly, the embodiments described herein provide a set of applications to the device for providing security features to the non-secure operating system. | 2011-11-24 |
20110289555 | Mechanism for Utilization of Virtual Machines by a Community Cloud - A mechanism for utilization of virtual machines by a community cloud is disclosed. A method of the invention includes authenticating a virtual machine (VM) to be joined to a cloud environment managed by a central administrative computing device as a cloud computing resource, wherein the VM is operating on a workstation that is not a dedicated cloud computing resource, updating a database of VMs utilized as cloud computing resources with information of the VM related to its operational status, and providing instructions for the VM to operate as a cloud computing resource, the instructions based on current demand for cloud services of the cloud environment and an overall current supply of cloud computing resources presently available in the cloud environment. | 2011-11-24 |
20110289556 | Method and Apparatus for Serving Content Elements of a Markup Language Document Protected Against Cross-Site Scripting Attack - A web application decomposed into one or more domain sandboxes ensures that the contents of each sandbox are protected from attacks on the web application outside that sandbox. Sandboxing is achieved on a per-element basis by identifying content that should be put under protection, generating a secure domain name for the identified content, and replacing the identified content with a unique reference (e.g., an iframe) to the generated secure domain. The identified content is then served only from the generated secure domain using a content handler. | 2011-11-24 |
20110289557 | MANAGING SECURITY IN A NETWORK - A method of managing security in a network is described. A data anomaly at a first location on a network is detected. A source of this data anomaly is identified. The source is compared with a plurality of access control policies, wherein each of the plurality of access control policies comprises at least one access restriction instruction associated with one or more sources. Based on the comparing, the source is associated with a corresponding one of the plurality of access control policies. | 2011-11-24 |
20110289558 | NETWORK APPLICATION LAYER ROUTING - Techniques for network application layer routing are provided. Requests for services are inspected at an application layer of a network. A priority for a requestor is obtained and in response to the priority the requests are routed to particular processing environments. Depending on the priority the processing environments may be high performing or low performing. | 2011-11-24 |
20110289559 | Deep Packet Scan Hacker Identification - Securing an accessible computer system typically includes receiving a data packet that includes a payload portion and an attribute portion, where the data packet is communicated between at least one access requestor and at least one access provider. At least the payload portion of the received data packet typically is monitored, where monitoring includes scanning the payload portion for at least one predetermined pattern. When the payload portion is determined to include at least one predetermined pattern, access by the access requestor to the access provider may be controlled. Monitoring the data packet may include scanning the payload portion while handling the data packet with a switch. Controlling access may include denying access by the access requestor to the access provider. | 2011-11-24 |
20110289560 | Method And Apparatus To Bind A Key To A Namespace - A method includes identifying an application installed on a device as an authorized application of a certain domain, the application being signed with a private key; deriving a signer identity using a public key that forms a key pair with the private key; mapping the certain domain to another domain using a deterministic function map; making a request to the another domain to obtain a list of signer identities that are authorized to act on behalf of the certain domain; determining whether the signer of the application is in the list and, if it is, authorizing the application to act with the same privileges as granted in the certain domain. Apparatus and computer programs for performing the method are also disclosed. | 2011-11-24 |
20110289561 | System and Method for Information Handling System Multi-Level Authentication for Backup Services - Access to backup information, such as at network attached storage compliant with NDMP, is managed by interfacing a backup authentication mechanism with a primary authentication system and responding to requests for backup information according to permissions defined by the primary authentication system. A data management application requests access to backup information with an NDMP MD5 hash and includes a domain name and password for an LDAP or AD authentication through a pluggable authentication module. Access to backup information is provided based upon the permissions associated with the domain of the primary authentication mechanism. | 2011-11-24 |
20110289562 | METHOD FOR ENHANCING THE SECURITY OF THE MULTICAST OR BROADCAST SYSTEM - A method for enhancing the security of the multicast or broadcast system comprises the following steps: after having established the system parameter, the base station receives the register request message transmitted by the terminal, and the register request message carries the device identity information of the terminal; the base station registers the terminal according to the register request message and transmits the authorization key to the terminal after successful registration. By the base station establishing the specific system parameter, generating and awarding the corresponding terminal's key based on the parameter, the embodiment of the present invention can construct a secure network system of multicast or broadcast effectively and solve the security problem of the multicast or broadcast from the base station to the terminal in the network system. | 2011-11-24 |
20110289563 | SERVICE PROVISION - A method and system for service provision, comprising: a web browser ( | 2011-11-24 |
20110289564 | SYSTEM AND METHOD FOR PROVIDING AUTHENTICATION CONTINUITY - A computer-implemented method may include receiving first monitored information relating to a user at a time of initial user authentication with a particular application or resource. It may be determined that a second authentication is required at a second time subsequent to the time of initial user authentication. Second monitored information may be captured at the second time. The second monitored information may be compared to the first monitored information to determine whether continued authentication is maintained. Access to the particular application or resource when it is determined that continued authentication is not maintained. | 2011-11-24 |
20110289565 | RETRIEVING ACCESS INFORMATION IN A DISPERSED STORAGE NETWORK - A method begins by a processing module obtaining a set of recovered random numbers, decoding encrypted share slices to produce a set of encrypted shares, and obtaining a set of personalized authenticating values regarding user access to data. The method continues with the processing module generating a set of hidden passwords based on the set of personalized authenticating values, generating a set of blinded passwords based on the set of hidden passwords and a set of blinded random numbers, and generating a set of passkeys based on the set of blinded passwords and the set of recovered random numbers. The method continues with the processing module generating a set of decryption keys based on the set of blinded random numbers and the set of passkeys, decrypting the set of encrypted shares to produce a set of shares, and decoding the set of shares to reproduce the data. | 2011-11-24 |
20110289566 | ENTITY REGISTRATION IN MULTIPLE DISPERSED STORAGE NETWORKS - A method begins by a processing module outputting a registration request message that includes requesting access to a local dispersed storage network (DSN) and requesting access to a global DSN. The method continues with the processing module receiving a registration response message that includes a global universal unique identifier (UUID) and a local UUID. The method continues with the processing module generating a global public-private key pair and a local public-private key pair and generating a global certificate signing request (CSR) based on the global UUID and a private key of the global public-private key pair. The method continues with the processing module generating a local CSR based on the local UUID and a private key of the local public-private key pair, sending the global and local CSRs to a certificate authority (CA), and receiving a signed global certificate and a signed local certificate. | 2011-11-24 |
20110289567 | SERVICE ACCESS CONTROL - A USB memory stick, or similar device, is provided having software installed thereon to enable a user to access restricted applications without a user device needing to handle user credential data. In use, the stick receives a request from the user device for access to an application, obtains first user identification information from the user device, uses the first user identification information and the application information to obtain user credentials from an identity management system, which user credentials are required by the application in order to grant the user access to the application, and provides the user credentials to the application without the user credentials needing to be provided to the user device. | 2011-11-24 |
20110289568 | ACCESS MANAGEMENT APPARATUS, COMMUNICATION TERMINAL, ACCESS MANAGEMENT METHOD ACCESS METHOD, ACCESS MANAGEMENT PROGAM, ACCESS PROGAM, AND RECORDING MEDIUM - An access management apparatus manages access to a local network via a wide area network and includes an access information acquiring unit that acquires access information that is used in accessing the local network; an authenticating unit that performs an authentication process for a portable storage device; and a recording unit that stores the access information acquired by the access information acquiring unit to a storage device authenticated by the authenticating unit. | 2011-11-24 |
20110289569 | METHOD AND SYSTEM FOR IMPLEMENTING AND MANAGING AN ENTERPRISE IDENTITY MANAGEMENT FOR DISTRIBUTED SECURITY - An Enterprise Identity Management system includes a registration component, an ownership component, and an audit component. The registration component is configured to associate a user ID with specific accounts that are accessible via a computer system. The ownership component is configured to verify the ownership of the accounts. The audit component is configured to perform periodic checks to ensure the validity of the association between the user ID and the ownership of the accounts. | 2011-11-24 |
20110289570 | SYSTEM AND METHOD FOR INTEGRATING REMOTELY ACCESSED DATA - A system for integrating remotely accessed data includes a source end for providing data; a conversion device for converting the data from the source end into at least a preset format; a remote storage device for storing the data in the at least a preset format; a server connected to the remote storage device, and a user device connected to the server. A user end logs in to the server through the user device via a user account and/or password to remotely access the data in the at least a preset format stored in the remote storage device, and the remote storage device provides the data in the at least a preset format to the user device through the server, thereby integrating data of various formats into preset formats and providing preferred formats of data to various user devices so as to save costs for system configuration, increase usage efficiency of the system and increase data readability in the user devices. | 2011-11-24 |
20110289571 | INFORMATION PROCESSING APPARATUS, USER AUTHENTICATION METHOD, AND STORAGE MEDIUM - When a first MFP that manages first and second conversion values of user authentication information accesses a second MFP, the first MFP queries about which conversion value is used by the second MFP to execute user authentication processing. The first MFP transmits information based on a conversion value in accordance with the query result to the second MFP. Then, the second MFP executes user authentication processing using information based on a conversion value in accordance with the query result and a conversion value managed by the second MFP. | 2011-11-24 |
20110289572 | System And Method For User Authentication - A computer-implemented authentication method is described. The method includes the steps of (a) receiving an authentication request at an authentication computing system, the request including a resource identifier, (b) identifying one or more authentication pools associated with the resource identifier, each authentication pool including at least one authentication method implementation, (c) executing a pool authentication process for the one or more identified authentication pools, and (d) transmitting a response to the identification authentication request based on the execution of the pool authentication process for the one or more identified authentication pools. | 2011-11-24 |
20110289573 | AUTHENTICATION TO AN IDENTITY PROVIDER - An arrangement for authenticating a user at a service provider is described. The arrangement makes use of the fact that a user of a mobile communication device can be readily and securely identified by a telecommunications provider and re-uses that authentication to identify the same user when accessing the service provider from a different client. The client instructs the mobile communication device to contact an identity provider at the telecommunications provider and shared secrets are exchanged between the identity provider, mobile communication device and client to confirm that the same user is at the client and the mobile communication device. | 2011-11-24 |
20110289574 | SOCIAL NETWORK WITH MULTIPLE LOGINS - A method, apparatus, and system are directed towards seeding a user's contacts for their online social network. The invention is arranged to automatically recommend to the user a set of seed contacts that the user may employ to invite to join their social network. The set of seed contacts may be harvested from the user's existing portal activities, as well as other sources. In one embodiment, the invention analyzes portal activity, such as email exchanges with the user, and the like, to determine a frequency of contact with the user. Other sources may include but not be limited to emails, names within an address book of the user, names within an address book of another person, a buddy list, an instant messaging list, an activity, a mailing list, an online discussion group, a membership in a category, chat group, and the like. | 2011-11-24 |
20110289575 | DIRECTORY AUTHENTICATION METHOD FOR POLICY DRIVEN WEB FILTERING - Enabling web filtering by authenticated group membership, role, or user identity is provided by embedding a uniform resource identifier into an electronic document requested by a client. A client browser will provide directory credentials to a trusted web filter apparatus enabling a policy controlled access to resources external to the trusted network. An apparatus comprises circuits for transmitting a uniform resource identifier to a client, receiving a request comprising authentication credentials, querying a policy database and determining a customized policy for access to an externally sourced electronic document or application. A computer-implemented technique to simplify web filter administrator tasks by removing a need to set each browsers settings or install additional software on each user terminal. | 2011-11-24 |
20110289576 | RUBBING ENCRYPTION ALGORITHM AND SECURITY ATTACK SAFE OTP TOKEN - The present disclosure proposes a secure way to generate the OTP code by way of a web browser. A user does not need any electronic device on hand to obtain OTP for 2FA login. A new Rubbing Encryption Algorithm (REAL) is proposed as the base technology. Implementation method of such web-based OTP token is presented and analyzed. It operates through a web-browser with a multiple REAL keys. It can be integrated into many secure Internet commerce applications as well. A system is provided for secure access to a software program or website. The system has a first entity with a computing device with a processor and a memory. The first entity provides a plurality of data items. The system also has a second entity with at least one display for displaying the plurality of data items. The data items are arranged in a predetermined format. The display also displays a prompt for a user identification and a prompt for a code. The second entity has a member with a transparent portion. The transparent portion comprises a periphery with a plurality of markings placed around the periphery. The markings point to a first direction or to an opposite second direction. The second entity overlays the member over the data items. The markings point to the plurality of data items to reveal a code. The code is input and permits access of the second entity to the computing device of the first entity. | 2011-11-24 |
20110289577 | ACCESSING DATA UTILIZING ENTITY REGISTRATION IN MULTIPLE DISPERSED STORAGE NETWORKS - A method begins by a processing module determining whether a data access request is requesting access to data stored in a plurality of dispersed storage networks (DSNs). The method continues with the processing module determining whether one of the plurality of DSNs is a home DSN to a requesting entity when the data access request is requesting access to data stored in the plurality of DSNs. The method continues with the processing module utilizing a local signed certificate to access one or more dispersed storage (DS) units of the home DSN, validating a global signed certificate with one or more DS units of a non-home DSN of the plurality of DSNs to produce a valid global signed certificate, and utilizing the valid signed certificate to access the one or more DS units of the non-home DSN when the plurality of DSNs includes the home DSN. | 2011-11-24 |
20110289578 | PIN-HOLE FIREWALL FOR COMMUNICATING DATA PACKETS ON A PACKET NETWORK - A pin-hole firewall network communications device that includes a first port configured to communicate data packets over a packet network and a first counter module in communication with the first port. A pin-hole firewall module may be in communication with the first counter module. A call control module may be in communication with the first counter module and the pin-hole firewall function. The call control module is configured to communicate with the pin-hole firewall module to alter the communication of data packets through a firewall pin-hole. A second counter module may be in communication with the pin-hole firewall function and the call control module. A second port may in communication with the second counter module and the packet network and be configured to communicate data packets over a second node segment of the packet network. | 2011-11-24 |
20110289579 | UNIFIED CONTENT SCANNING AND REPORTING ENGINE - A method of unified content scanning in which content is deconstructed into base formats so as to be presented to content filters in a common format. The base formats include text, image and audio. The invention also includes a system of unified content scanning and a gateway appliance embodying the method of unified content scanning. | 2011-11-24 |
20110289580 | NETWORK SECURITY SYSTEM AND REMOTE MACHINE ISOLATION METHOD - In a thin client system in which clients are connected to remote machines via a network so as to implement transactions, a remote machine infected with a virus is isolated from the network in response to a user's instruction on each client whilst communication settings minimally required for transactions are maintained. That is, a request issue agent issues an isolation request in response to a user input, so that a request execute agent changes communication settings of the remote machine in response to the isolation request. In an isolated state of a remote machine isolated from the network, a management server is allowed to change network settings regarding the remote machine with reference to a disconnection setting file, which stores communication settings minimally required for the remote machine in advance. | 2011-11-24 |
20110289581 | TRUSTED E-MAIL COMMUNICATION IN A MULTI-TENANT ENVIRONMENT - Trusted e-mail communication may be provided. A message source organization may be validated. When a message is received from the validated message source organization for a recipient organization, a determination may be made as to whether the recipient organization supports an attribution data extension. If so, the message may be transmitted to the recipient organization with an attribution element associated with the message source organization. | 2011-11-24 |
20110289582 | METHOD FOR DETECTING MALICIOUS JAVASCRIPT - An apparatus and system for scoring and grading websites and method of operation. An apparatus receives one or more Uniform Resource Identifiers (URI), requests and receives a resource such as a webpage, and observes the behaviors of an enhanced browser emulator as controlled by javascript provided by the webpage. The enhanced browser emulator tracks behaviors which when aggregated imply malicious intent. | 2011-11-24 |
20110289583 | CORRELATION ENGINE FOR DETECTING NETWORK ATTACKS AND DETECTION METHOD - A method for detecting network attacks is provided. In one implementation, the method receives a plurality of attack indications based on data transmitted on the network and applies rules to the plurality of attack indications. Also, the method generates an alert if an application of at least a subset of the rules on the plurality of attack indications indicates a potential attack. In addition, a network device that performs the method and a computer program corresponding to the method are provided. | 2011-11-24 |
20110289584 | SYSTEMS AND METHODS TO SECURE BACKUP IMAGES FROM VIRUSES - A system and method provide for storing virus metadata with a backup image. Upon restoring files or data from the backup image, the virus metadata from the backup image is compared with current virus data. The comparison yields a list of new viruses that have been discovered after the backup image was created. The restore process may cause restored files to be scanned for the new viruses, while excluding previously known viruses from the scan. | 2011-11-24 |
20110289585 | Systems and Methods for Policy-Based Program Configuration - Disclosed are systems, methods and computer program products for adaptive policy-based configuration of programs. An example method comprises collecting from computer system configuration and performance information and rating system performance based on the collected information. The method further includes selecting based on the performance rating an operational policy for a computer program. The policy specifies program settings and limits of system resource utilization by the program. The method further includes monitoring system resource utilization during program execution on the computer system to determine whether system resource utilization exceeds the limit specified in the operational policy. If the system resource utilization exceeds the specified limit, the method selects another policy specifying different program settings and a different limit of system resource utilization. | 2011-11-24 |
20110289586 | METHODS, SYSTEMS, AND MEDIA FOR DETECTING AND PREVENTING MALCODE EXECUTION - A system for detecting and halting execution of malicious code includes a kernel-based system call interposition mechanism and a libc function interception mechanism. The kernel-based system call interposition mechanism detects a system call request from an application, determines a memory region from which the system call request emanates, and halts execution of the code responsible for the call request if the memory region from which the system call request emanates is a data memory region. The libc function interception mechanism maintains an alternative wrapper function for each of the relevant standard libc routines, intercepts a call from an application to one or more libc routines and redirects the call into the corresponding alternative wrapper function. | 2011-11-24 |
20110289587 | Method and system for detecting and removing hidden pestware files - A method and system for detecting and removing a hidden pestware file is described. One illustrative embodiment detects, using direct drive access, a file on a computer storage device; determines whether the file is also detectable by the operating system by attempting to access the file using a standard file Application-Program-Interface (API) function call of the operating system; identifies the file as a potential hidden pestware file, when the file is undetectable by the operating system; confirms through an automated pestware-signature scan of the potential hidden pestware file that the potential hidden pestware file is a hidden pestware file; and removes automatically, using direct drive access, the hidden pestware file from the storage device. | 2011-11-24 |
20110289589 | UNAUTHORIZED OPERATION DETECTION SYSTEM AND UNAUTHORIZED OPERATION DETECTION METHOD - The content of operations is identified and an alert is generated to an operation having a high risk of information leakage. | 2011-11-24 |
20110289590 | PRIVACY MANAGEMENT OF DATA - The invention relates to receiving data originating from multiple users, identifying data item combinations occurring within said data, determining privacy sensitivity measures to said data item combinations, and communicating privacy sensitivity measure(s) to user(s) concerned. The privacy sensitivity measures can be used to protect user privacy. | 2011-11-24 |
20110289591 | Software Validity Period Changing Apparatus, Method,and Installation Package - A software validity period changing apparatus includes a password information storage unit, an input device, an authentication unit, and a validity period changing unit. The authentication unit calculates a first hash value of the password stored in the password information storage unit, calculates a second hash value of a password input via the input device, and determines whether the first hash value matches the second hash value. The validity period changing unit decompresses an installation package into components, the installation package including a validity period and version information on each of the components, detects a position of the validity period if it is determined that the first hash value matches the second hash value, changes the validity period identified by the position to a validity period input through the input device, changes the version information, and combines the components to reproduce the installation package. | 2011-11-24 |
20110289592 | DIGITAL RIGHTS MANAGEMENT WITH IRREGULAR NETWORK ACCESS - There is a performing of digital rights management (DRM), operable in an offline mode with respect to a communications network. The performing includes identifying a stored rights object associated with a stored asset. The stored rights object includes reporting duration information associated with the stored asset. The performing also includes determining, utilizing a processor, whether a transmission of an early status message is a successful communication based on an early status message determination. If a failure in communicating the early status message is determined, utilizing the stored asset. The performing may also include transmitting an early status message and/or later status message after identifying the stored rights object. There is also a performing of digital rights management (DRM) associated with a DRM system and operable in an offline mode with respect to a communications network. There are also client devices, communicating systems, computer readable mediums and protocols. | 2011-11-24 |
20110289593 | MEANS TO ENHANCE THE SECURITY OF DATA IN A COMMUNICATIONS CHANNEL - A technique and method for creating a provably secure communications channel between two devices making the observation, recovery and modification of the data within the communications channel difficult. Specifically, the present invention compromises a technique and method for protecting the data within a data channel where security must be assured. | 2011-11-24 |
20110289594 | CONTENT RECEIVER, CONTENT UTILIZATION SYSTEM, VIEWING TIME LIMIT DETERMINATION METHOD, PROGRAM, AND RECORDING MEDIUM - When a control unit of a content receiver causes to write out content to an exchangeable medium, causes to also write out a viewing license of the content to the exchangeable medium, and further causes an invalidating/validating unit to invalidate a viewing license of related content belonging to a same predetermined content group as the content if a viewing time limit of the content is not determined. When a content reproducer reproduces the content recorded in the exchangeable medium, determines the viewing time limit of the content and records it to the exchangeable medium. When the exchangeable medium which is reproduced by the content reproducer is installed, the control unit causes to set a viewing time limit of the related content to the same time limit as the viewing time limit of the content on the exchangeable medium and causes to validate the viewing license of the related content. | 2011-11-24 |
20110289595 | INFORMATION PROCESSING DEVICE, INFORMATION RECORDING MEDIUM MANUFACTURING DEVICE, INFORMATION RECORDING MEDIUM, METHODS THEREFORE, AND COMPUTER PROGRAM - An information processing device for executing content reproduction processing includes: a content reproduction processing unit for executing data transformation processing for replacing a part of configuration data of input content to be reproduced with transformation data, and executing processing for reproducing the reproduction content; and a parameter generating unit for providing the content reproduction processing unit with a parameter to be applied in the data transformation processing; wherein the content reproduction processing unit has a configuration for obtaining a parameter identifier that is different for each segment set as a sectioning region of reproduction content, and outputting a parameter calculation request accompanied by the parameter identifier to the parameter generating unit; and wherein the parameter generating unit has a configuration for providing the content reproducing unit with a parameter corresponding to a segment, in response to the parameter calculation request from the content reproducing unit. | 2011-11-24 |
20110289596 | RESTRICTING ACCESS TO VOLUMES - Architecture that provides programmatic association of a device (e.g., removable) to a currently logged-in user, and restricts access to the drive only to that particular logged-in user. When active, the architecture detects when devices are added to the system, determines which logged-in user a given device (or devices) should be assigned, modifies the security settings for the device(s), and makes a per-user drive letter mapping to that device such that only the logged-in user can see the mapped device. In the context of serially attachable peripheral devices such as USB (universal serial bus) devices (and IEEE 1394 devices), for example, access can be restricted to a user based on the USB hub into which the device is connected. This prevents the operating system from assigning a global drive letter to a device or device volume (for drives) when the device is added. | 2011-11-24 |
20110289597 | Method and Apparatus for Remediating Unauthorized Sharing of Account Access to Online Resources - A number of effective alternatives for discouraging unauthorized online-resource sharing are discussed. An anti-sharing strategy can be built by applying one or more of the alternatives in response to possible, strongly-suspected or virtually certain unauthorized sharing. | 2011-11-24 |
20110289598 | Blocking of Unlicensed Audio Content in Video Files on a Video Hosting Website - A system, method and various software tools enable a video hosting website to automatically identified unlicensed audio content in video files uploaded by users, and initiate a process by which the user can replace the unlicensed content with licensed audio content. An audio replacement tool is provided that enables the user to permanently mute the original, unlicensed audio content of a video file, or select a licensed audio file from a collection of licensed audio, and insert the selected in place of the original audio. Where a video file includes unlicensed audio, the video hosting website provides access to video files to a client device, along with an indication to the client device to mute the audio during playback of the video. | 2011-11-24 |
20110289599 | SERVICE PROVISION - A method and system for service provision, comprising: a web browser ( | 2011-11-24 |
20110289600 | DETECTION OF HIDDEN OBJECTS IN A COMPUTER SYSTEM - System and method for detecting a security compromise of a service module of an operating system running on a computer. At least one native service module returns a first set of requested information relating to at least one object in the computer system in response to a request made by at least one process or thread. A secondary service module generates and returns a second set of requested information relating to the at least one object in the computer system in response to a request made by at least one authorized process or thread, bypassing the at least one native service module. Access of threads is limited to the secondary service module such that only predetermined threads generated by a trusted security application are permitted to access the secondary service module. | 2011-11-24 |
20110289601 | DIGITAL RIGHTS MANAGEMENT OF STREAMING CAPTURED CONTENT BASED ON CRITERIA REGULATING A SEQUENCE OF ELEMENTS - A captured content rights controller detects a first portion of streaming captured content and a second portion of the streaming captured content after the first portion of the streaming captured content is detected. The captured content rights controller determines whether rendering the second portion of the streaming captured content after the first portion of the streaming captured content is subject to at least one digital rights management protection rule for streaming captured content as specified by at least one owner of at least one restricted element within the streaming captured content captured independent of distribution of the content by the owner of the at least one restricted element within the streaming captured content. The captured content rights controller applies the at least one digital rights management protection rule to restrict rendering of the second portion of the streaming captured content after the first portion of the streaming captured content. | 2011-11-24 |
20110289602 | ACTIVATION CODE SYSTEM AND METHOD FOR PREVENTING SOFTWARE PIRACY - A system and method for preventing piracy of a given software application limits the number of times that such software application is activated. A given software application must be activated in order to become fully functional. The user must provide a unique software identification code, relating to the specific software which the user is attempting to activate, to a remote provider. The remote provider determines the number of times that such specific software has already been activated, and provides an activation code to the user unless the number of activations exceeds a predetermined threshold. Once activated, the software becomes fully operational, and the user is allowed complete access to its functions. | 2011-11-24 |
20110289603 | ANTI-KEYLOG EDITOR - Various embodiments for protecting keyboard data inputted by a user in a computer having a keyboard hardware are disclosed. According to one exemplary embodiment, a method for protecting keyboard data, where the keyboard hardware comprises an I/O port having an input buffer and an output buffer, includes: receiving scan code data based on keyboard data inputted by the user, wherein the scan code data are latched in the output buffer of the I/O port; executing an interrupt routine to fetch the scan code data from the output buffer to a CPU of the computer, wherein the latched scan code data remains in the output buffer after the latched scan code data are read from the output buffer; transmitting a control command to the keyboard hardware through the input buffer of the I/O port; and receiving from the keyboard hardware a response signal generated in response to the control command, wherein the keyboard hardware is configured to transmit the response signal to the output buffer of the I/O port. | 2011-11-24 |
20110289604 | Methods for Identifying Modulating Compounds of Lymphangiogenesis, Means Therefore, Compounds and Uses Thereof - The invention relates to a method for testing whether a compound is capable of inhibiting the development of lymphatic channels or lymphangiogenesis and/or the migration of lymphangioblasts in an non-human animal, a non-human embryo or a cell culture, comprising steps of contacting a compound capable of interacting with a Ccbe1 gene, a transcript thereof or a ccbe1 protein with a non-human animal, a non-human embryo or a cell culture; determining whether said compound inhibits the development of lymphatic channels, lymphangiogenesis and/or migration of lymphangioblasts in said non-human animal, a non-human embryo or a cell culture. The invention further related to a method of determining whether an individual is a carrier of, or is suffering from, or at risk of suffering from, a lymph vessel disorder, and to a medicament comprising Ccbe1, or comprising a nucleic acid encoding Ccbe1, for the treatment of a lymph vessel disorder. | 2011-11-24 |
20110289605 | Animal Model for Osteoarthritis and Intervertebral Disc Disease - Provided herein is a transgenic animal whose genome comprises a first nucleic acid sequence encoding a fusion polypeptide, wherein the fusion polypeptide comprises a Cre recombinase and a mutated ligand binding domain of human estrogen receptor (CreER), wherein the first nucleic acid is operably linked to a chondrocyte-specific promoter and a second nucleic acid sequence encoding a β-catenin polypeptide, wherein the second nucleic acid sequence comprises one or more loxP sequences. Also provided is a method of modifying a transgenic animal comprising administering tamoxifen to the transgenic animal. Also provided are methods of screening for an agent that reduces or prevents Cre-Negative Control one or more symptoms of osteoarthritis or intervertebral disc disease in a subject. Methods for identifying a subject with or at risk of developing osteoarthritis or intervertebral disc disease are also provided, as well as methods of treating or preventing osteoarthritis or intervertebral disc disease in a subject. | 2011-11-24 |
20110289606 | EQUINE DISEASE MODEL FOR HERPESVIRUS NEUROLOGIC DISEASE AND USES THEREOF - Disclosed is an in vivo equine disease model and a method of preparing the disease model for equine herpesvirus-1 neurological disease comprising a horse having a low pre-exposure level of herpesvirus-specific CTL precursors wherein the horse is experimentally infected with a neuropathogenic strain of equine herpesvirus or a mutant thereof. Also disclosed is a method of quantifying the risk factors and predicting the development of clinical neurologic signs of equine herpesvirus-1 neurological disease in a horse. Also described in the invention is the determination of the risk of developing the clinical neurologic signs by a mathematical equation. A new live, attenuated vaccine formulation is disclosed that is effective against neurologic disease due to equine herpesvirus-1. | 2011-11-24 |
20110289607 | METHOD OF INHIBITING GENE EXPRESSION - The present invention relates to a method for inhibiting expression of a target gene, which comprises introducing a cell, tissue, or individual organism with a double-stranded polynucleotide comprising DNA and RNA having a substantially identical nucleotide sequence with at least a partial nucleotide sequence of the target gene. | 2011-11-24 |
20110289608 | ANTISENSE MODULATION OF INTERLEUKINS 17 AND 23 SIGNALING - Provided are antisense oligonucleotides and other agents that target and modulate IL-17 and/or IL-23 signaling activity in a cell, compositions that comprise the same, and methods of use thereof. Also provided are animal models for identifying agents that modulate 17 and/or IL-23 signaling activity. | 2011-11-24 |
20110289609 | Neurotransmitter Sensors and Methods of Using the Same - Neurotransmitter biosensors are disclosed, including YbeJ-based glutamate binding biosensors, comprising a neurotransmitter binding domain conjugated to donor and fluorescent moieties that permit detection and measurement of Fluorescence Resonance Energy Transfer upon binding neurotransmitter. Such biosensors are useful for the detection of neurotransmitter concentrations in vivo and in culture. | 2011-11-24 |
20110289610 | HCV/GBV-B CHIMERIC VIRUS - An HCV/GBV-B chimeric virus which maintains the replication function of HCV and is capable of infecting tamarin is disclosed in order to construct an HCV animal model which can be used as a development or evaluation system for therapeutic agents for HCV. The HCV/GBV-B chimeric RNA comprises an RNA of hepatitis C virus and an RNA of GB virus-B, wherein the RNA of hepatitis C virus comprises an RNA encoding leucine at the 1804th position and lysine at the 1966th position in the amino acid sequence of the polyprotein of hepatitis C virus. | 2011-11-24 |
20110289611 | RNA SEQUENCE-SPECIFIC MEDIATORS OF RNA INTERFERENCE - The present invention relates to a Drosophila in vitro system which was used to demonstrate that dsRNA is processed to RNA segments 21-23 nucleotides (nt) in length. Furthermore, when these 21-23 nt fragments are purified and added back to Drosophila extracts, they mediate RNA interference in the absence of long dsRNA. Thus, these 21-23 nt fragments are the sequence-specific mediators of RNA degradation. A molecular signal, which may be their specific length, must be present in these 21-23 nt fragments to recruit cellular factors involved in RNAi. This present invention encompasses these 21-23 nt fragments and their use for specifically inactivating gene function. The use of these fragments (or chemically synthesized oligonucleotides of the same or similar nature) enables the targeting of specific mRNAs for degradation in mammalian cells, where the use of long dsRNAs to elicit RNAi is usually not practical, presumably because of the deleterious effects of the interferon response. This specific targeting of a particular gene function is useful in functional genomic and therapeutic applications. | 2011-11-24 |
20110289612 | Soybean Cultivar S090012 - A soybean cultivar designated S090012 is disclosed. The invention relates to the seeds of soybean cultivar S090012, to the plants of soybean S090012, to plant parts of soybean cultivar S090012, and to methods for producing a soybean plant produced by crossing soybean cultivar S090012 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S090012, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S090012, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S090012 with another soybean cultivar. | 2011-11-24 |
20110289613 | Soybean Cultivar S090020 - A soybean cultivar designated S090020 is disclosed. The invention relates to the seeds of soybean cultivar S090020, to the plants of soybean S090020, to plant parts of soybean cultivar S090020, and to methods for producing a soybean plant produced by crossing soybean cultivar S090020 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S090020, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S090020, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S090020 with another soybean cultivar. | 2011-11-24 |
20110289614 | Soybean Cultivar S090018 - A soybean cultivar designated S090018 is disclosed. The invention relates to the seeds of soybean cultivar S090018, to the plants of soybean S090018, to plant parts of soybean cultivar S090018, and to methods for producing a soybean plant produced by crossing soybean cultivar S090018 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S090018, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S090018, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S090018 with another soybean cultivar. | 2011-11-24 |
20110289615 | Soybean Cultivar 8919112 - A soybean cultivar designated 8919112 is disclosed. The invention relates to the seeds of soybean cultivar 8919112, to the plants of soybean 8919112, to plant parts of soybean cultivar 8919112, and to methods for producing a soybean plant produced by crossing soybean cultivar 8919112 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety 8919112, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 8919112, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar 8919112 with another soybean cultivar. | 2011-11-24 |
20110289616 | Soybean Cultivar S080093 - A soybean cultivar designated S080093 is disclosed. The invention relates to the seeds of soybean cultivar S080093, to the plants of soybean S080093, to plant parts of soybean cultivar S080093, and to methods for producing a soybean plant produced by crossing soybean cultivar S080093 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S080093, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 5080093, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S080093 with another soybean cultivar. | 2011-11-24 |
20110289617 | Cotton Variety FM 9103GT - The cotton variety FM 9103GT is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and cotton lint as well as to hybrid cotton plants and seeds obtained by repeatedly crossing plants of variety FM 9103GT with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of FM 9103GT and to plants of FM 9103GT reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from FM 9103GT. | 2011-11-24 |
20110289618 | Cotton Variety FM 9101GT - The cotton variety FM 9101GT is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and cotton lint as well as to hybrid cotton plants and seeds obtained by repeatedly crossing plants of variety FM 9101GT with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of FM 9101GT and to plants of FM 9101GT reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from FM 9101GT. | 2011-11-24 |
20110289619 | RICE BROWN PLANTHOPPER RESISTANCE GENE AND APPLICATIONS THEREOF - The present invention provides rice brown planthopper resistance gene Bph14. It has a nucleotide sequence as shown in SEQ ID NO:1 and its cDNA sequence is shown in SEQ ID NO:2. The Bph14 gene in the present invention belongs to the CC-NBS-LRR gene family, its coded protein is related to plant disease resistance. Bph14 gene has the function of resisting brown planthopper. By introducing Bph14 gene into ordinary rice variety through genetic transformation and cross breeding, the brown planthopper resistance of rice can be increased, so that the harm caused by brown planthopper can be alleviated and the aim of increasing and stabilizing production can be achieved. | 2011-11-24 |
20110289620 | AAD-1 EVENT DAS-40278-9, RELATED TRANSGENIC CORN LINES, EVENT-SPECIFIC IDENTIFICATION THEREOF, AND METHODS OF WEED CONTROL INVOLVING AAD-1 - This invention relates in part to plant breeding and herbicide tolerant plants. This invention includes a novel aad-1 transformation event in corn plants comprising a polynucleotide sequence, as described herein, inserted into a specific site within the genome of a corn cell. In some embodiments, said event/polynucleotide sequence can be “stacked” with other traits, including, for example, other herbicide tolerance gene(s) and/or insect-inhibitory proteins. Additionally, the subject invention provides assays for detecting the presence of the subject event in a sample (of corn grain, for example). The assays can be based on the DNA sequence of the recombinant construct, inserted into the corn genome, and on the genomic sequences flanking the insertion site. Kits and conditions useful in conducting the assays are also provided. The subject invention also includes related methods of controlling weeds. | 2011-11-24 |
20110289621 | Non-transgenic Tomato Varieties Having Increased Shelf Life Post-harvest - A series of independent human-induced, non-transgenic mutations found in at least one non-ripening (NOR) gene of tomato; tomato plants having these mutations in at least one of their NOR genes; and a method of creating and identifying similar and/or additional mutations in the NOR gene by screening pooled and/or individual tomato plants. The tomato plants of the present invention exhibit fruit that ripen more slowly, rot more slowly, are firmer, and have a longer shelf life post-harvest as a result of non-transgenic mutations in at least one of their NOR genes. | 2011-11-24 |
20110289622 | EXPRESSION CASSETTES FOR TRANSGENIC EXPRESSION OF NUCLEIC ACIDS - The invention relates to expression cassettes and vectors which contain constitutive promoters of plants and to the use of these expression cassettes or vectors for transgenic expression of nucleic acid sequences, preferably selection markers, in organisms, preferably in plants. The invention further relates to transgenic plants which have been transformed with the expression cassettes or vectors, to cultures, parts or propagation material derived from these plants, and to the use of these plants for the production of food and animal feedstuffs, seed, pharmaceuticals, or fine chemicals. | 2011-11-24 |
20110289623 | COMPOSITIONS AND METHODS FOR THE MODIFICATION OF GENE EXPRESSION - Novel isolated plant polynucleotide promoter sequences are provided, together with genetic constructs comprising such polynucleotides. Methods for using such constructs in modulating the transcription of DNA sequences of interest are also disclosed, together with transgenic plants comprising such constructs. | 2011-11-24 |
20110289624 | GENE-TRANSFER VECTOR COMPRISING HELPER-COMPONENT PROTEASE GENE OF PAPAYA RINGSPOT VIRUS FOR BROAD-SPECTRUM VIRUS RESISTANCE IN CROPS AND USE THEREOF - Provided is a recombinant plasmid having a control sequence and a coding sequence fragment of Papaya ringspot virus (PRSV) helper-component protease gene (HC-Pro gene) operably linked to the control sequence. A recombinant microorganism derived therefrom is also provided. A method for providing plants with resistance against virus is also provided. Use of PRSV HC-Pro gene or fragment thereof in generating plants with resistance against virus is also provided. It is proven that the PRSV HC-Pro transgenic plants can solve the problem resulting from breakdown by gene silencing suppression and provide broad-spectrum resistance to various PRSV strains of different geographical origins. | 2011-11-24 |
20110289625 | ALTERED LEAF MORPHOLOGY AND ENHANCED AGRONOMIC PROPERTIES IN PLANTS - The invention provides methods for enhancing agronomic properties in plants by down-regulation of a PALM transcription factor. Nucleic acid constructs for down-regulation of PALM are described. Transgenic plants are provided that comprise increased leafy tissue and increased disease resistance. Plants described herein may be used, for example, as improved forage crops or in biofuel production. | 2011-11-24 |
20110289626 | METHODS AND MATERIALS FOR CONFERRING RESISTANCE TO PESTS AND PATHOGENS OF PLANTS - Methods and materials for conferring pest resistance to plants are provided. Plants are transformed with a silencing construct homologous to a gene of a plant pest that is essential for the survival, development, or pathogenicity of the pest. This results in the plant producing RNAi to the selected gene, which, when ingested by the pest results in silencing of the gene and a subsequent reduction of the pest's ability to harm the plant. In other embodiments, the pest's reduced ability to harm the plant is passed on to pest progeny. Methods and materials for depathogenesis of pests is also provided. | 2011-11-24 |
20110289627 | MODIFIED CRY3A TOXINS AND NUCLEIC ACID SEQUENCES CODING THEREFOR - Methods for making a modified Cry3A toxin are disclosed. Such methods include the insertion of a protease recognition site that is recognized by a gut protease of a target insect, such as corn rootworm, into at least one position of a Cry3A toxin so that a modified Cry3A toxin is thus designed. The coding sequence of the modified Cry3A toxin may be transformed into a host cell and the host cell grown under conditions that allow the host cell to produce the modified Cry3A toxin. The host cell may be a plant cell and the plant may be comprised in a transgenic plant. Thus, the transgenic plant may be used to produce the modified Cry3A toxin. | 2011-11-24 |
20110289628 | POLYUNSATURATED FATTY ACID ELONGASE - An isolated protein which is at least partially encoded by a polynucleotide sequence encoding a novel elongase is provided together with a composition which includes the isolated protein. A transgenic plant or a transgenic seed transformed by a polynucleotide encoding a protein which is at least partially encoded by a novel elongase is also provided. The invention also includes a process for making a very long-chain polyunsaturated fatty acid in a transformed cell or plant expressing the isolated protein which is at least partially encoded by a polynucleotide sequence encoding a novel elongase. | 2011-11-24 |
20110289629 | INCREASING CELL WALL DEPOSITION AND BIOMASS DENSITY IN PLANTS - Modulating in planta expression of a gene encoding WALLDOF, a transcription factor involved in plant cell wall biogenesis, results in increased cell wall deposition and higher plant biomass density. | 2011-11-24 |
20110289630 | METHOD FOR THE EXPRESSION IN PLANT OF THE GLUTAMIC ACID DECARBOXYLASE (GAD65) AND RELATED EXPRESSION VECTORS - The present invention concerns a method of expression in plant of glutamic acid decarboxylase (GAD65), particularly a mutated form of human GAD65 (GAD65mut), and expression vectors thereof. | 2011-11-24 |
20110289631 | METHOD FOR PRODUCING MALE STERILE PLANTS - The present invention relates to a method for producing male sterile plants. It involves selective killing of reproductive cells in plants by using an autophagy related gene plant BECLIN I/ATG6. An expression cassette comprising plant BECLIN I/ATG6, regulated by a tapetum specific promoter can induce killing of tapetum cells. A particular area of interest is transforming a plant with said genetic construct and expression of the plant BECLIN I/ATG6 gene in tapetum at early stage of anther development to cause early collapse of tapetum to produce nonviable pollen, thus imparting male sterility in plants. | 2011-11-24 |
20110289632 | METHYLKETONE SYNTHASE, PRODUCTION OF METHYLKETONES IN PLANTS AND BACTERIA - Isolated genes and amino acid sequences encode methylketone synthase 2 (MKS2) enzymes from tomato plants, including, ShMKS2 and SlMKS2. When expressed recombinantly in bacteria and other host cells, the MKS2 enzymes produce methylketones of various carbon chain lengths ranging from C | 2011-11-24 |
20110289633 | MUTATED EIF4E SEQUENCES FROM POTATO WHICH ARE USEFUL IN IMPARTING VIRUS RESISTANCE - A nucleic acid molecule encoding a mutant form of wild-type translation initiation factor elF4E is disclosed A mutation comprising one or more of I70N, I70E, L82R, DI12N, L48F, S68K, A77D or MI09I in SEQ ID NO 1 imparts virus resistance to potato Nucleic acid constructs, expression vectors, cells, plants, and plant seeds containing the nucleic acid sequence are also disclosed, as are methods of imparting virus resistance to plants | 2011-11-24 |
20110289634 | Xanthomonas Campestris Pv. Campestris Resistant Brassica Plant and Preparation Thereof - The present invention relates to a | 2011-11-24 |
20110289635 | RESONANCE COMPENSATION IN SCANNING PROBE MICROSCOPY - A method includes generating, using a sensor, a data signal. The data signal includes a first component based on a motion in a first direction of an actuator configured to provide motion between a sample and a probe in the first direction, the first direction substantially in the plane of the sample; and a second component based on at least one of topographic variations of the sample in a second direction, and a materials property of the sample. The method further includes generating, using a processor, a compensatory signal based on the first component of the data signal generated by the sensor; and providing the compensatory signal to the actuator. | 2011-11-24 |
20110289636 | HIGH-SPEED SCANNING PROBE MICROSCOPE - The invention is directed to a probe for scanning probe microscopy. The probe | 2011-11-24 |
20110289637 | VARIETY OF ANEMONE PLANT NAMED 'PRETTY LADY DIANA' - A new and distinct | 2011-11-24 |
20110289638 | VARIETY OF ANEMONE PLANT NAMED 'PRETTY LADY EMILY' - A new and distinct | 2011-11-24 |
20110289639 | VARIETY OF ANEMONE PLANT NAMED 'PRETTY LADY SUSAN' - A new and distinct | 2011-11-24 |
20110289640 | SCHLUMBERGERA PLANT NAMED 'PKMSC01' - A new and distinct | 2011-11-24 |