04th week of 2012 patent applcation highlights part 63 |
Patent application number | Title | Published |
20120023553 | Static Analysis For Verification Of Software Program Access To Secure Resources For Computer Systems - A method includes, using a static analysis, analyzing a software program to determine whether the software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program. The method also includes, in response to an access by the software program to the secure resource without verification that the secure resource can be accessed by the software program, outputting a result indicative of the analyzing. Computer program products and apparatus are also disclosed. An apparatus is disclosed that includes a user interface providing a security report to a user, the security report indicating a result of an analysis of whether or not a software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program. | 2012-01-26 |
20120023554 | SYSTEMS AND METHODS FOR PROVIDING A SMART GROUP - The present invention is directed towards systems and methods for establishing and applying a policy group to control a user's access to an identified resource. A policy group representing an aggregate of one or more access configurations for a user to access one or more identified resources may be established via a policy manager. The policy group may include a login point component representing an entry point to access the identified resource. The login point may be configured via the policy manager to specify a uniform resource locator for the entry point. One or more authentication and authorization methods may be selected for the login point component. The device may receive a request to access the uniform resource locator. The device may initiate the policy group for evaluation. The device may initiate, with the user, one or more authentication and authorization methods specified by the login point component. | 2012-01-26 |
20120023555 | WIRELESS ENVIRONMENTAL MONITORING OF GOODS - A system for wireless environmental monitoring of goods, the system comprising a portable environmental data logger and a portable computerized device, each comprising: a standard short-range radio module; and an authentication and security module, wherein said standard short-range radio modules of said logger and said computerized device are configured to communicate with one another over a standard wireless communication channel, and wherein said authentication and security modules of said logger and said computerized device are each configured to execute, over the standard wireless communication channel, a non-standard authentication routine for authenticating an identity of said computerized device to said logger, so as to provide said computerized device with data access to said logger based on a security profile assigned to said computerized device. | 2012-01-26 |
20120023556 | IDENTITY MANAGEMENT AND SINGLE SIGN-ON IN A HETEROGENEOUS COMPOSITE SERVICE SCENARIO - A server device that includes a memory to store identity information for a group of users, policy information, and context information for a group user devices. The server device also includes a processor to receive, from another server device, a request for login credentials, associated with a user of a user device, that enable a third party application to access a service provider on behalf of the user, the request including identity information associated with the user and context information associated with the user device; verify the identity of the user based on a determination that particular identity information is stored in the memory; authorize the disclosure of the particular identity information based on a determination that the context information matches particular context information stored in the memory and that the policy information permits the disclosure of the particular identity information; and send the particular identity information, that includes the login credentials, to the other server device based on the verified identity and the authorized disclosure. | 2012-01-26 |
20120023557 | METHOD, APPARATUS, SIGNALS, AND MEDIUM FOR MANAGING TRANSFER OF DATA IN A DATA NETWORK - A method and apparatus for managing a transfer of data in a data network identifies data associated with a communication session between a first node and a second node in the data network. Further processing of the communication session occurs when a portion of the communication session meets a criterion and the communication session is permitted to continue when the portion of the communication session does not meet the criterion. | 2012-01-26 |
20120023558 | SYSTEMS AND METHODS FOR AN EXTENSIBLE AUTHENTICATION FRAMEWORK - The present disclosure describes systems and methods of an authentication framework to implement varying authentication schemes in a configurable and extendable manner. This authentication framework provides a level of abstraction in which requirements for credential gathering and authentication workflow are independent from the agents or authentication implementation that does the credential gathering and authentication workflow. A higher level of abstraction and a more comprehensive authentication framework allows handling the associated authentication transactions of complex authentication schemes without requiring any specific understanding of their internals. For example, the requirements to gather certain credentials for a particular authentication scheme may be configured and maintained separately from the client-side authentication agent that gathers the credentials. The flexible, configurable and extendable authentication framework supports a wide variety of authentication scheme and supports third party, proprietary and customized authentication schemes. | 2012-01-26 |
20120023559 | TELECOMMUNICATION METHOD, COMPUTER PROGRAM PRODUCT AND COMPUTER SYSTEM - The invention relates to a telecommunication method having the following steps:
| 2012-01-26 |
20120023560 | INFORMATION PROCESSING APPARATUS - An information processing apparatus includes: a memory that stores, for each of a plurality of items that can be described in extensions included in a certificate signing request, item names and item contents with associating each of the item names with a respective one of the item contents; an acquiring unit that acquires specific information; a preparation unit that makes out a specific certificate signing request including specific extensions in which a specific item name and a specific item content are described, according to a condition for making out specific extensions which is determined in response to a user's instruction, by acquiring the specific item name and the specific item content from the memory and using the acquired specific information, specific item name and specific item content; and an output unit that outputs the specific certificate signing request to an outside. | 2012-01-26 |
20120023561 | ID AUTHENTICATION SYSTEM, ID AUTHENTICATION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING ID AUTHENTICATION PROGRAM - To prevent specification and tracking of a terminal across a plurality of service providers when a user uses a plurality of services. An ID authentication system according to the present invention is an ID authentication system including a terminal apparatus, a service providing apparatus, and an authentication server. A terminal apparatus | 2012-01-26 |
20120023562 | SYSTEMS AND METHODS TO ROUTE NETWORK COMMUNICATIONS FOR NETWORK-BASED SERVICES - Example systems and methods to route network communications for network-based services are disclosed. An example method includes receiving network communications; determining if at least one of a source address or a destination address of the received network communications is associated with a customer to receive a network-based service; forwarding the network communications to a policy enforcement point if the at least one of the source address or the destination address is associated with the customer; determining if the forwarded network communications violates a policy selectively associated with the customer; and forwarding the network communications from the policy enforcement point to the destination address if the network communications is not in violation of the policy. | 2012-01-26 |
20120023563 | METHOD AND APPARATUS FOR CONSTRUCTING A NETWORKING DATABASE AND SYSTEM PROACTIVELY - A method for creating networking database containing a plurality of records for different individuals in which individuals are connected to one another in the database by mutual recognition of a relationship. This mutual recognition of a relationship is inferred by the possession of the Guest Key of one member by the other member. This paradigm for network expansion allows users to proactively grow their networks both using the site features and using tools they may be more familiar with, such as email, messaging, talking, etc. | 2012-01-26 |
20120023564 | ATTACHING A SENSOR TO A WSAN - Methods and arrangements in a WSAN Gateway ( | 2012-01-26 |
20120023565 | SYSTEMS AND METHODS FOR SYSTEM LOGIN AND SINGLE SIGN-ON - Systems and methods for system login and single sign-on are described. A first application of a first system receives a request to access a protected application of a second system. An assertion is generated in response to the request. The assertion asserts an identity in the first system of a user generating the request. The assertion is validated and first account information corresponding to the assertion is extracted. The first account information is information of a first account of the user in the first system. Second account information is determined that is information of a second account of the user in the second system. A mapping is generated between the first account and the second account using the first account information and the second account information. The mapping is used to provide access to the protected application by the requestor. | 2012-01-26 |
20120023566 | Fraudulent Page Detection - A method of determining whether a page is a fraudulent page comprising the steps of: extracting a plurality of tokens from the page, ( | 2012-01-26 |
20120023567 | TOKEN VALIDATION FOR ADVANCED AUTHORIZATION - A server computer for implementing advanced authorization using token validation is provided. The server computer comprises a processor and a computer readable medium coupled to the processor comprising code executable by the processor for implementing a method. The method comprises receiving verification information that is based on a verification token associated with a client computer. The method further comprises receiving transaction information associated with a first transaction and receiving account information associated with a payment account used in the first transaction. A risk score associated with the first transaction is generated based on at least the verification information, the transaction information, and the account information. | 2012-01-26 |
20120023568 | Method and Apparatus for Trusted Federated Identity Management and Data Access Authorization - Systems, methods, and instrumentalities are disclosed that may provide for integration of trusted OpenID (TOpenID) with OpenID. The authentication may be accomplished, in part, via communications between a trusted ticket server on a UE and a network application function. The UE may retrieve platform validation data (e.g., from a trusted platform module on the UE). The UE may receive a platform verification in response to the platform validation data. The platform verification may indicate that the network application function has verified the platform validation data and the user. The platform verification may indicate that the platform validation data matches a previously generated reference value. | 2012-01-26 |
20120023569 | SECURE NETWORK RESOURCE ACCESS SYSTEM - A secure network resource access system facilitates network access by network terminals to network resources located behind an enterprise firewall, and comprises a proxy server and a polling server. The proxy server is located logically outside the enterprise firewall for receiving application data from the network terminals. The polling server is located logically behind the enterprise firewall, and is configured to poll the proxy server to initiate transmission of the received application data from the proxy server to the polling server, to receive application data and associated network resource data from the proxy server in response to the poll, and to direct the application data to one of the network resources in accordance with the associated network resource data. | 2012-01-26 |
20120023570 | WEB VPN - Web-based VPN system and corresponding service. The inventive web VPN system/service could be accessed by the users using only a conventional web browser without the need to install any specialized VPN client software on the user terminal, as it is the case with conventional VPN systems. User's terminal could be a user's desktop computer, notebook or a mobile device, such as a cell prone or a PDA, or any other computing platform what so ever, used by the user to access various network resources, such as web pages. One aspect is a web VPN service that encrypts, using, for example, SSL encryption, all web traffic going between the user's terminal and the Internet. System comprises a VPN server/proxy and an associated web server accessible by the user via a communication network, such as Internet. The web server associated with the VPN server/proxy communicates with the latter and enables the user to access and use the functionality provided by the private VPN server/proxy by means of a conventional web browser installed on the user's terminal. | 2012-01-26 |
20120023571 | IDENTITY-BASED-ENCRYPTION MESSAGE MANAGEMENT SYSTEM - Systems and methods for managing email are provided. Some of the email may be encrypted using identity-based-encryption (IBE) techniques. When an incoming IBE-encrypted message for a recipient in an organization is received by a gateway at the organization, the gateway may request an IBE private key from an IBE private key generator. The IBE private key generator may generate the requested IBE private key for the gateway. The gateway may use an IBE decryption engine to decrypt the incoming message. The decrypted message can be scanned for viruses and spam and delivered to the recipient. Outgoing email messages can also be processed. If indicated by message attributes or information provided by a message sender, an outgoing message can be encrypted using an IBE encryption engine and the IBE public key of a desired recipient. | 2012-01-26 |
20120023572 | Malicious Attack Response System and Associated Method - A system and method for detecting and identifying intruders in a computer network environment by providing a network traffic evaluation and simulation module at the interface between a protected network and external traffic source. The evaluation and simulation module identifies suspected intruders by observing intrusion pattern behavior and then presents a simulated network to the intruder. The simulated network appears to offer the intruder valuable information and provides the intruder with the appearance of success in breaking down the layers of the simulated network to keep the intruder engaged in the intrusion effort while information is gathered to trace and identify the source of the intrusion. Intrusion attempts are identified and categorized in an intrusion analysis module. The network traffic evaluation and simulated network may be provided as a self contained physical module that does not require modification of existing network software. | 2012-01-26 |
20120023573 | METHOD, APPARATUS AND SYSTEM FOR ACCESS MODE CONTROL OF A DEVICE - A method, apparatus, and system for accessing at least a portion of a device based upon an access input. An access input is received. The access input includes information for gaining access to one or more functions of the device. A user access mode of the device is changed from a first access mode to a second access mode based upon at least in part on the access input. An application is selected in the device in response to changing from the first access mode to the second access mode. At least a portion of the output of the selected application is provided. | 2012-01-26 |
20120023574 | Graphical Image Authentication And Security System - A method and system for protection of and secure access to a computer system or computer network. The method includes the steps of receiving a first login account identifier, such as a user name from a user in communication with the computer system or network. A determination is made if the user is recognized and enrolled from the first login account from the first login account identifier. If the user is recognized, a grid of randomly generated visual images is displayed including one visual image from an image category which has been preselected by the user upon enrollment. An image category identifier is randomly assigned to each visual image in the grid. An image category identifier, second login account identifier, such as a password, is entered and received. If the login account identifier and the image category is validated, access is permitted to the computer system or network. | 2012-01-26 |
20120023575 | CONTENT MANAGEMENT DEVICE AND CONTENT MANAGEMENT METHOD - A content management device, includes: a folder level access control information storage unit configured to store folder level access control information indicating access rights of a user to a folder where content is stored; an access control unit configured to acquire content level access control information indicating access rights of a user to content, from a predetermined content level access control unit; and a user interface configured to output display data for displaying a hierarchical structure between at least one folder and at least one content stored in the at least one folder, along with information indicating whether or not an inconsistency has occurred in access rights between the folder level access control information of the at least one folder and the content level access control information of the content stored in the at least one folder. | 2012-01-26 |
20120023576 | INSIDER THREAT CORRELATION TOOL - Systems and methods for calculating threat scores for individuals within an organization or domain are provided. Aspects of the invention relate to computer-implemented methods that form a predictive threat rating for user accounts. In one implementation, a threat score representing a first time period may be calculated. The first threat score may be calculated from a quantification of a plurality of activity violations across a plurality of control groups. Weighting schemes may be applied to certain activities, controls, and/or user accounts. Further embodiments may be configured to consider additional indicators. Further aspects relate to apparatuses configured to execute methods for ranking individual user accounts. Certain embodiments may not block transmissions that violate predefine rules, however, indications of such improper transmission may be considered when constructing a threat rating. | 2012-01-26 |
20120023577 | VERIFYING WORK PERFORMED BY UNTRUSTED COMPUTING NODES - Techniques for verifying work performed by untrusted computing nodes are provided. A central computing system determines a first computation that is to be performed, at least in part, by a first untrusted computing node. The central computing system also determines a transformation function that is applied to the first computation to produce an equivalent second computation that is to be performed, at least in part, by a second untrusted computing node. The central computing system assigns the first computation to the first untrusted computing node and the second computation to the second untrusted computing node while keeping the transformation function secret. The central computing system receives a first result for the first computation and a second result for the second computation. The central computing system analyzes the first and second results to verify the work performed by the first and second untrusted computing nodes. | 2012-01-26 |
20120023578 | MALICIOUS CODE DETECTION - A device includes a pipeline and a detector that are both implemented at least in hardware. Data is moved through the pipeline to perform processing of the data unrelated to detection of malicious code. The detector detects the malicious code within the data as the data is moved through the pipeline, in parallel with the processing of the data as the data is moved through the pipeline. The detector detects the malicious code within the data as the data is moved through the pipeline without delaying movement of the data into, through, and out of the pipeline. | 2012-01-26 |
20120023579 | PROTECTION AGAINST MALWARE ON WEB RESOURCES - A method and system for identification of malware threats on web resources. The system employs a scheduled antivirus (AV) scanning of web resources. The scheduled scanning of web resources allows to create malware check lists and to configure access to web resources. Frequency and depth of inspection (i.e., scan) are determined for each web resource. The user identifiers are used for scheduled AV scanning of web resources. The system allows for scanning a web resource based on selected configurations without using additional client applications. | 2012-01-26 |
20120023580 | METHOD FOR DETECTING AN ATTACK BY FAULT INJECTION INTO A MEMORY DEVICE, AND CORRESPONDING DETECTION SYSTEM - The method for detecting an attack by fault injection into memory positions includes a generation of an initial value of a reference indication including an application of a reversible mathematical operator to the values of the information stored in the memory positions. An updating of the value of this reference indication is performed on each write in at least one memory position by using the operator, the reverse operator and the values of the stored information before and after each write in the at least one memory position. And, in the presence of a request, a check is performed as to whether a criterion involving the values of the information stored in the memory positions at the time of the request and the operator or its reverse is or is not satisfied by the value of the reference indication at the time of the request. | 2012-01-26 |
20120023581 | SYSTEMS, METHODS, AND APPARATUS FOR OTOACOUSTIC PROTECTION OF AUTONOMIC SYSTEMS - Systems, methods and apparatus are provided through which in some embodiments an autonomic unit transmits an otoacoustic signal to counteract a potentially harmful incoming signal. | 2012-01-26 |
20120023582 | SYSTEMS, METHODS, AND APPARATUS FOR OTOACOUSTIC PROTECTION OF AUTONOMIC SYSTEMS - Systems, methods and apparatus are provided through which in some embodiments an autonomic unit transmits an otoacoustic signal to counteract a potentially harmful incoming signal. | 2012-01-26 |
20120023583 | SYSTEM AND METHOD FOR PROACTIVE DETECTION OF MALWARE DEVICE DRIVERS VIA KERNEL FORENSIC BEHAVIORAL MONITORING AND A BACK-END REPUTATION SYSTEM - A method for detecting malware device drivers includes the steps of identifying one or more device drivers loaded on an electronic device, analyzing the device drivers to determine suspicious device drivers, accessing information about the suspicious device drivers in a reputation system, and evaluating whether the suspicious device driver include malware. The suspicious device drivers are not recognized as not including malware. The reputation system is configured to store information about suspicious device drivers. The evaluation is based upon historical data regarding the suspicious device driver. | 2012-01-26 |
20120023584 | DEVICE AND METHOD FOR PROVIDING SOC-BASED ANTI-MALWARE SERVICE, AND INTERFACE METHOD - A device in which a system-on-chip (SOC) providing an anti-malware service is mounted and a method of performing the anti-malware service are provided. The device includes: a storage unit which stores a function library which is a collection of operations provided for use in the SOC providing the anti-malware service; and a scanning data sender which forms SOC transmission data with data to be scanned for viruses by calling at least one of the operations, and transmits the SOC transmission data to the SOC. Accordingly, a mobile device scans files for viruses and filters packets at a high speed. | 2012-01-26 |
20120023585 | Method and Systems for Computer Security - A method for computer security, includes intercepting an incoming communication, placing the communication into a quarantine queue, selecting a communication from the quarantine queue, determining whether the selected communication contains undesirable code, determining whether a quarantine time for the selected communication has lapsed if the selected communication does not contain undesirable code and placing the selected communication back in the quarantine queue if the quarantine time has not elapsed. | 2012-01-26 |
20120023586 | DETERMINING PRIVACY RISK FOR DATABASE QUERIES - A system and method for evaluating security exposure of a query includes evaluating a security risk for a query input to a database configured to generate a response to the query. The query has a plurality of attributes and the security risk is evaluated by determining a risk for each of the plurality of attributes and/or determining an exposure consequence based on at least the query. An overall risk is computed based upon attribute risks and consequences. The overall risk is associated and reported with the query. | 2012-01-26 |
20120023587 | SECURE KIOSK BASED DIGITAL CONTENT DELIVERY - Methods, systems, and apparatus for digital content management and distribution are provided. In an example, a method includes providing a memory device having digital content thereon; receiving an indication of a dock to which the memory device is to be coupled; and protecting the memory device with a unique key corresponding to the dock. | 2012-01-26 |
20120023588 | FILTERING METHOD, SYSTEM, AND NETWORK EQUIPMENT - A filtering method, a filtering system, and network equipment are provided by the present invention. The method includes: intercepting a request packet sent by a user terminal to an Internet server and extracting Uniform Resources Locator (URL) information from the request packet; determining a security level corresponding to the URL information according to the URL information; and processing the request packet according to the security level. Therefore, the problem that the installation of antivirus softwares in the user terminal occupies memory space and CUP resources and the problem of the risk of being bypassed by malwares are solved, which effectively prevents malwares from spreading and attacking, reduces the threat to user terminals from malwares, and improves the network security and user experience. | 2012-01-26 |
20120023589 | Recovering Data In A Storage Medium Of An Electronic Device That Has Been Tampered With - To recover data, tampering of an electronic device that stores data in a storage medium of the electronic device is detected. A recovery procedure receives information relating to prioritizing of types of the data, and the recovery procedure detects a communication link. The recovery procedure sends the data over the communication link for transfer to a recovery destination, wherein the data is sent in an order according to the information relating to prioritizing of the types of the data. | 2012-01-26 |
20120023590 | Systems and Methods Providing a Separable Digital Rights Management Application - Systems and methods providing content having digital rights management (DRM) applications separable from other authorization applications are provided. A system may include a distribution service provider system in communication with a content provider system and consumer premise equipment (CPE) for the transmission of content from the content provider system to the CPE device. The distribution service provider system may: receive A/V content provided by the content provider system, wherein the A/V content includes a DRM application; apply a conditional access system (CAS) application to the A/V content that is independent of the DRM application; and transmit the A/V content including the CAS and the DRM applications to the CPE for presentation. The CPE device can perform DRM authorizations with the content provider or a third-party DRM provider. | 2012-01-26 |
20120023591 | PRE-BOOT PROTECTED MEMORY CHANNEL - Machine readable media, methods, and computing devices are disclosed which establish a protected memory channel between an operating system loader of a user partition and services of a management partition. One computing device includes protected storage, read only memory, firmware, a storage device and a processor. The storage device is to store the virtual machine monitor and an operating system having an operating system loader. The virtual machine monitor is to establish a protected memory channel between the one or more integrity services of a management partition and the operating system loader of a user partition in response to measuring and verifying the operating system loader based upon the manifest. The processor is to execute the code of the read only memory, the firmware, the virtual machine monitor, the operating system, the operating system loader, the management partition, and the user partition. | 2012-01-26 |
20120023592 | MEDICAL ALERT COMPUTER INTERFACE TAMPER-PROOF SECURE DEVICE - A medical information system includes a portable device and remote authentication computing device. The portable device stores a person's personal medical information, which it does not allow to be accessed without authentication, and has an activation mechanism and a computing device communication mechanism. The remote authenticating computing device is connected to a computing device network and stores authentication information and has an authentication software module and a diagnostic software module. The activation mechanism communicates the device with the remote authenticating computing device. The authentication software module requests authentication information from a user, receives input authentication information, verifies received authentication data against the stored authentication information, and after successful verification allows the medical information to be accessed by a computing device. The diagnostic software module determines whether the portable device has been damaged or tampered with and if so the stored medical information is destroyed. | 2012-01-26 |
20120023593 | SYSTEM AND METHOD FOR FILTERING INTERNET CONTENT & BLOCKING UNDESIRED WEBSITES BY SECURE NETWORK APPLIANCE - A secure network appliance for filtering Internet websites checks each request from a user's browser against a whitelist of pre-approved websites and passes it only if it is on the whitelist. Otherwise, the request is replaced with pre-arranged content and returned as a response to the user's web browser. It can also check the port the user's request came through against an approved ports whitelist, and responses sent from the Internet against an approved websites whitelist. The network appliance is encapsulated within a secure container so that only an authorized administrator having a unique key can unlock it and access its control functions. The secure container may be formed as a separate hardware component that is physically interposed between a router and a user's computer, or as secure software that run on or operates with a network server. | 2012-01-26 |
20120023594 | METHOD AND APPARATUS FOR MANAGING CONSUMPTION RIGHT FOR MULTIMEDIA SERVICE - Disclosed is a method and an apparatus for managing a consumption right for each stage for a service including a plurality of stages or episodes. The right issuer includes the access condition, which allows an access to the Right Object (RO) for each stage, in the right object representing the consumption right for the stepped multimedia service and then transfers the right object to the device. When the stepped multimedia service is executed, the device obtains the access information satisfying the access condition corresponding to a corresponding stage from the right issuer or a service provider and then transfers the access information to the RO, allowing a user to access the RO and execute a service of the corresponding stage by using the RO. | 2012-01-26 |
20120023595 | METHOD FOR UPDATING DATA IN ACCORDANCE WITH RIGHTS MANAGEMENT POLICY - Disclosed is a computerized system and method for dynamically applying a rights management policy to a message by allowing an administrator to associate certain rights management policies with certain senders and recipients of messages, with groups of users possessing certain common criteria which define the users and groups of users, with certain attributes of the message, and with certain environmental attributes. In some embodiments, an administrator is allowed to automatically update a rights management protected message as it passes through a message transfer agent. The administrator may determine either on a regular interval or an ad-hoc basis that the message transfer agent scan the messages stored to determine whether or not the content has expired. If the content has indeed expired the administrator may take steps to have the expired content deleted entirely, refreshed with more current content, or replaced with a tombstone indicating that the original content has expired. | 2012-01-26 |
20120023596 | Electronic License Management - In one aspect, this application describes a method for determining a license status of a software application. The method includes receiving a license status request to obtain an indication of whether a software application is licensed for use on a client computing device. The method also includes identifying identity information that corresponds to user identity information, device identity information, or both. The method also includes sending a communication generated from the license status request and the identity information to a licensing service, the communication being used by the licensing service to generate the indication based at least in part on the identity information and licensing information associated with the software application. The method also includes receiving a license status response from the licensing service that includes the indication. The method also includes sending the license status response to the software application for processing by the software application. | 2012-01-26 |
20120023597 | MAGNETICALLY-IMPLEMENTED SECURITY DEVICES - Security devices and methods of securely coupling electronic devices and peripherals are provided. In one embodiment, a peripheral has a first coded magnet on a first surface of a first device. The first coded magnet has at least two different polarity regions on the first surface. A second coded magnet on a second surface of a second device is also provided. The first coded magnet is configured to securely provide data to a device associated with the second coded magnet, if the first and second coded magnets' patterns are keyed to one another. | 2012-01-26 |
20120023598 | BIOS USB WRITE PREVENT - A basic input output system (BIOS) ( | 2012-01-26 |
20120023599 | GENOME EDITING OF CYTOCHROME P450 IN ANIMALS - The present invention provides genetically modified animals and cells comprising edited chromosomal sequences encoding cytochrome P450 (CYP) proteins. In particular, the animals or cells are generated using a zinc finger nuclease-mediated editing process. The invention also provides zinc finger nucleases that target chromosomal sequence encoding CYP proteins, as well as methods of using the genetically modified animals or cells disclosed herein to screen agents for toxicity and other effects. | 2012-01-26 |
20120023600 | COMPOSITIONS AND METHODS OF USE FOR ANTIBODIES OF DICKKOPF-1 - Antibodies and fragments that bind to the protein target Dickkopf (DKK1) are provided, as are methods of use and kits, for treating a target cell, in particular, a cell associated with an osteolytic condition. | 2012-01-26 |
20120023601 | HERBICIDE-RESISTANT SUNFLOWER PLANTS AND METHODS OF USE - Novel herbicide-resistant sunflower plants designated as MUT31 and herbicide-resistant descendents thereof are provided. The MUT31 sunflower plants and the herbicide-resistant descendents thereof comprise increased resistance to at least one imidazolinone herbicide, when compared to wild-type sunflower plants. Methods for controlling weeds in the vicinity of these herbicide-resistant sunflower plants and methods for increasing the herbicide-resistance of a sunflower plant are also provided. | 2012-01-26 |
20120023602 | INTERMARKET CLASS HYBRID LETTUCE - Methods for producing intermarket class hybrid lettuce seed are described. The methods include the steps of providing lettuce plants and releasing | 2012-01-26 |
20120023603 | Brassica Plant Comprising a Mutant Indehiscent Allele - This invention relates to crop plants of which the fruit dehiscence properties are modulated. More specifically the invention relates to improved methods and means for reducing seed shattering, or delaying seed shattering until after harvest, while maintaining at the same time an agronomically relevant treshability of the pods, and for increasing yield. | 2012-01-26 |
20120023604 | HYBRID CULTIVARS OF POA BULBOSA - New hybrid cultivars of | 2012-01-26 |
20120023605 | ALTERING ROOT STRUCTURE DURING PLANT DEVELOPMENT - Isolated nucleic acid fragments and recombinant constructs comprising such fragments for altering root structure during plant development are disclosed along with methods of root structure alteration during plant development. | 2012-01-26 |
20120023606 | SOYBEAN VARIETY A1023535 - The invention relates to the soybean variety designated A1023535. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1023535. Also provided by the invention are tissue cultures of the soybean variety A1023535 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1023535 with itself or another soybean variety and plants produced by such methods. | 2012-01-26 |
20120023607 | SOYBEAN VARIETY A1023585 - The invention relates to the soybean variety designated A1023585. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1023585. Also provided by the invention are tissue cultures of the soybean variety A1023585 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1023585 with itself or another soybean variety and plants produced by such methods. | 2012-01-26 |
20120023608 | SOYBEAN VARIETY A1023667 - The invention relates to the soybean variety designated A1023667. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1023667. Also provided by the invention are tissue cultures of the soybean variety A1023667 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1023667 with itself or another soybean variety and plants produced by such methods. | 2012-01-26 |
20120023609 | SOYBEAN VARIETY A1023673 - The invention relates to the soybean variety designated A1023673. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1023673. Also provided by the invention are tissue cultures of the soybean variety A1023673 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1023673 with itself or another soybean variety and plants produced by such methods. | 2012-01-26 |
20120023610 | SOYBEAN VARIETY A1024227 - The invention relates to the soybean variety designated A1024227. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1024227. Also provided by the invention are tissue cultures of the soybean variety A1024227 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1024227 with itself or another soybean variety and plants produced by such methods. | 2012-01-26 |
20120023611 | Isolated Novel Nucleic Acid and Protein Molecules from Corn and Methods of Using Thereof - This disclosure provides purified nucleic acids and polypeptides and various uses of these sequences such as transcript profiling. Also provided are transgenic plants, seeds, and plant cells containing DNA for expression of the proteins that are useful for imparting enhanced agronomic trait(s) to transgenic crop plants, methods of making such plants and methods of making agricultural commodity including seeds and hybrid seeds from such plants. | 2012-01-26 |
20120023612 | SELECTIVE ABLATION OF DIPLOID EMBRYOS - Methods of selecting haploid embryos are disclosed. Methods of producing haploid embryos and non-viable diploid embryos on a plant are provided. Methods for selecting haploid embryos produced from haploid inducer maize lines are provided. Methods for producing improved maize haploid inducer lines are disclosed. Maize haploid inducer lines comprising transgenes causing ablated or abnormal diploid embryos are disclosed. | 2012-01-26 |
20120023613 | PLANTS HAVING ALTERED AGRONOMIC CHARACTERISTICS UNDER NITROGEN LIMITING CONDITIONS AND RELATED CONSTRUCTS AND METHODS INVOLVING GENES ENCODING LNT9 POLYPEPTIDES - Isolated polynucleotides and polypeptides and recombinant DNA constructs particularly useful for altering agronomic characteristics of plants under nitrogen limiting conditions, compositions (such as plants or seeds) comprising these recombinant DNA constructs, and methods utilizing these recombinant DNA constructs. The recombinant DNA construct comprises a polynucleotide operably linked to a promoter functional in a plant, wherein said polynucleotide encodes an LNT9 polypeptide. | 2012-01-26 |
20120023614 | ENVIRONMENTAL STRESS-INDUCIBLE 557 PROMOTER ISOLATED FROM RICE AND USES THEREOF - The present invention relates to environmental stress-inducible 557 promoter isolated from rice, a recombinant plant expression vector comprising said promoter, a method of producing a target protein by using said recombinant plant expression vector, a method of producing a transgenic plant using said recombinant plant expression vector, a transgenic plant produced by said method, a method of improving resistance of a plant to environmental stress by using said promoter, and a primer set for amplification of said promoter. | 2012-01-26 |
20120023615 | TRANSPLASTOMIC PLANTS FREE OF THE SELECTABLE MARKER - The present invention relates to transplastomic plants free of the selectable marker gene, particularly to leguminous plants, to methods for obtaining such plants and to the vectors and constructs used. | 2012-01-26 |
20120023616 | METHODS FOR PREVENTING OR INHIBITING MICROBIAL INFECTION OF PLANTS AND PLANT EXHIBITING RESISTANCE TO MICROBIAL INFECTION - This invention provides a method for preventing or inhibiting infection with a plant-infecting microorganism and imparting resistivity to plants, a method for preparing plants having resistance to diseases caused by microorganisms such as plant pathogenic filamentous fungi, and a microbial pesticide formulation. The method for preventing or inhibiting infection of a host plant with plant-infecting microorganisms comprises degrading α-1,3-glucan on cell walls of the microorganisms by α-1,3-glucanase. | 2012-01-26 |
20120023617 | PLANTS HAVING ALTERED AGRONOMIC CHARACTERISTICS UNDER NITROGEN LIMITING CONDITIONS AND RELATED CONSTRUCTS AND METHODS INVOLVING GENES ENCODING SNF2 DOMAIN-CONTAINING POLYPEPTIDES - Isolated polynucleotides and polypeptides and recombinant DNA constructs particularly useful for altering agronomic characteristics of plants under nitrogen limiting conditions, compositions (such as plants or seeds) comprising these recombinant DNA constructs, and methods utilizing these recombinant DNA constructs. The recombinant DNA construct comprises a polynucleotide operably linked to a promoter functional in a plant, wherein said polynucleotide encodes a SNF2 domain-containing polypeptide. | 2012-01-26 |
20120023618 | METHODS AND MATERIALS FOR CONFERRING RESISTANCE TO PESTS AND PATHOGENS OF PLANTS - Methods and materials for conferring pest resistance to plants are provided. Plants are transformed with a silencing construct homologous to a gene of a plant pest that is essential for the survival, development, or pathogenicity of the pest. This results in the plant producing RNAi to the selected gene, which, when ingested by the pest results in silencing of the gene and a subsequent reduction of the pest's ability to harm the plant. In other embodiments, the pest's reduced ability to harm the plant is passed on to pest progeny. Methods and materials for depathogenesis of pests is also provided. | 2012-01-26 |
20120023619 | LINEAR DNA MOLECULE DELIVERY USING PEGYLATED QUANTUM DOTS FOR STABLE TRASFORMATION IN PLANTS - Methods for introducing a linear nucleic acid molecule of interest into a cell comprising a cell wall include use of nanoparticles coated with polyethylene glycol. In some embodiments, the cell comprising a cell wall is a plant cell. Methods include genetically or otherwise modifying plants and for treating or preventing disease in plant cells comprising a cell wall. Transgenic plants include a nucleic acid molecule of interest produced by regeneration of whole plants from plant cells transformed with linear nucleic acid molecules. | 2012-01-26 |
20120023620 | PRODUCTION OF FUNCTIONALIZED LINEAR DNA CASSETTE AND QUANTUM DOT/NANOPARTICLE MEDIATED DELIVERY IN PLANTS - Methods for introducing a functionalized linear nucleic acid cassette molecule of interest into a plant cell comprising a cell wall include use of nanoparticles. In some embodiments, the cell comprising a cell wall is a cultured plant cell. Methods include genetically or otherwise modifying plant cells and for treating or preventing disease in any plant, especially crop plants. Transgenic plants include a nucleic acid molecule of interest produced by regeneration of whole plants from plant cells transformed with functionalized linear nucleic acid cassette molecules. | 2012-01-26 |
20120023621 | Cloning and Application of a Pleiotropic Gene Ghd7 that Controls Grains Yield, Heading Date and Plant Height of Rice - The cloning and application of a pleiotropic gene Ghd7 that controls grains yield, heading date and plant height of rice are provided. The gene has the nucleotide sequence as shown in SEQ ID NO: 1. The sequence of the present gene is 3,917 bp in length, contains two exons and encodes 257 amino acids. The cDNA sequence of the gene is as shown in SEQ ID NO: 1. The present gene encodes a protein having the CCT domain of CO protein and having the amino acid sequence as shown in SEQ ID NO: 1. Rice plants transformed with GHD7 gene are obtained using transgenic technology. The transgenic plants all exhibit markedly increased yield, larger number of spikelets per panicle, delayed heading date and elevated plant height as compared to their respective controls (wild type receptors plants). The trait changes are quite consistent with the phenotypes of the two parent genotypes of GHD7 near isogenic lines of Zhenshan 97. The methods for gene cloning, breeding of near isogenic lines and transgene manipulation are also provided, as well as the application of pleiotropic gene GHD7 in research of rice breeding and plant evolution. | 2012-01-26 |
20120023622 | DROUGHT TOLERANT PLANTS AND RELATED CONSTRUCTS AND METHODS INVOLVING GENES ENCODING FERREDOXIN FAMILY PROTEINS - Isolated polynucleotides and polypeptides and recombinant DNA constructs useful for conferring drought tolerance, compositions (such as plants or seeds) comprising these recombinant DNA constructs, and methods utilizing these recombinant DNA constructs. The recombinant DNA construct comprises a polynucleotide operably linked to a promoter that is functional in a plant, wherein said polynucleotide encodes a ferredoxin family protein. | 2012-01-26 |
20120023623 | Polypeptides having beta-glucosidase activity and polynucleotides encoding same - The present invention relates to isolated polypeptides having beta-glucosidase activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides. | 2012-01-26 |
20120023624 | MEANS AND METHODS FOR MEDIATING PROTEIN INTERFERENCE - The present invention belongs to the field of functional proteomics and more particularly to the field of protein aggregation. The invention discloses a method for interfering with the function of a target protein and uses a non-naturally, user-designed molecule, designated as interferor, that has a specificity for a target protein and which induces aggregation upon contact with said target protein. The present invention also discloses such interferor molecules and their use in agrobiotech applications. | 2012-01-26 |
20120023625 | CHEMICAL INHIBITORS OF ETHYLENE BIOSYNTHESIS - The present invention provides methods for improving the quality of harvested plants. The present invention also provides novel ACC synthase inhibitors useful for improving the quality of harvested plants. | 2012-01-26 |
20120023626 | Polypeptides Having Endoglucanase Activity And Polynucleotides Encoding Same - The present invention relates to isolated polypeptides having endoglucanase activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods for producing and using the polypeptides. | 2012-01-26 |
20120023627 | PLANT GENE REGULATORY ELEMENTS - Nucleic acids, vectors, and expression vectors comprising novel plant gene regulatory elements from sorghum. Novel transgenic plants expressing heterologous genes under the control of novel gene regulatory elements. | 2012-01-26 |
20120023628 | Hybrid tea rose plant named 'Meikolyma' - A new and distinct Hybrid Tea rose plant is provided that forms at mid-season abundantly and substantially continuously attractive bright red-purple blossoms. The medium-sized buds are globular-shaped. The growth habit is semi-erect, and the stems are extremely rigid. The vegetation is very strong and attractive very dense leathery glossy dark green foliage is formed. The plant is particularly well suited for providing attractive ornamentation in the landscape. | 2012-01-26 |
20120023629 | Peach Tree Named 'Zee Pride' - A new and distinct variety of peach tree. The following features of the tree and its fruit are characterized with the tree budded on ‘Nemaguard’ Rootstock (non-patented), grown on Handford sandy loam soil with Storie Index rating 95, in USDA Hardiness Zone 9, near Modesto, Calif., with standard commercial fruit growing practices, such as pruning, thinning, spraying, irrigation and fertilization. Its novelty consist of the following combination of desirable features:
| 2012-01-26 |
20120023630 | Chrysanthemum plant named 'Zanmuaval' | 2012-01-26 |