10th week of 2015 patent applcation highlights part 89 |
Patent application number | Title | Published |
20150067857 | IN-SITU TRAINABLE INTRUSION DETECTION SYSTEM - A computer implemented method detects intrusions using a computer by analysing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection. | 2015-03-05 |
20150067858 | DETECTING UNWANTED INTRUSIONS INTO AN INFORMATION NETWORK - The present invention relates to a device for detecting unwanted intrusions into an information network comprising a module for receiving raw data from the network, a plurality of search engines configured to detect an attack indicator and any derived data which may be corrupted, a distribution module suitable for allocating at least one search engine to each piece of raw data, an administrator module linked to the search engines and to the distribution module and configured to transmit each piece of derived data to said module as new raw data if it has not already been processed by said same search engine(s), so as to provide recursive analysis of each piece of raw data received by said receiving module. The invention further relates to a process implemented by a device of this type. | 2015-03-05 |
20150067859 | PREEMPTIVE EVENT HANDLING - A computerized method of preemptive event handling, The method comprises monitoring, in run time at kernel level, a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device, detecting, in run time, a first event of the plurality of events, the first event being performed by a first process of the plurality of processes on the computing device, classifying, in run time, the first process as a malware in response to the detection of the first event, and preventing, in run time, the first process from running on the computing device before the first event is processed by the OS. | 2015-03-05 |
20150067860 | Virus Detector Controlled Backup Apparatus and File Restoration - A store for virus and malware fingerprints is coupled to a backup server apparatus which receives hashes and file shards from backup clients through a network. A circuit compares hashes received from backup clients to determine matches with file shards previously stored and matches with file shards with virus or malware infections. File shards not previously stored are received for backup and inspection by a virus filter. When a received file shard is determined to match a virus or malware fingerprint, a process is initiated to restore the file on the backup client to a clean version and notify the user and the network security administrator. The hashes of file shards determined to match a virus or malware fingerprint are stored for future reference. The data of a file shard which has been determined to be infected is also stored in case of a false-positive determination. | 2015-03-05 |
20150067861 | DETECTING MALWARE USING REVISION CONTROL LOGS - Methods, systems, computer-readable media, and apparatuses for detecting malware using revision control logs are presented. In some embodiments, a computing device may gather one or more revision control logs, and the one or more revision control logs may identify one or more code changes. Subsequently, the computing device may determine, based on one or more risk factors, that at least one code change identified in the one or more revision control logs is potentially malicious. Based on determining that the at least one code change is potentially malicious, the computing device may generate a notification indicating that the at least one code change is potentially malicious. | 2015-03-05 |
20150067862 | MALWARE ANALYSIS METHODS AND SYSTEMS - Methods of analyzing malware and other suspicious files are presented, where some embodiments include analyzing the behavior of a first malware sample on both a virtual machine and a physical computing device, the physical device having been booted from a secondary boot source, and determining whether the behavior of the malware sample was different on the virtual machine and the physical computing device. In certain embodiments, a notification indicating that the behavior was different may be generated. In other embodiments, a malware analysis computing device that is configured to receive a base hard drive image may be networked booted, and the behavior of the malware sample on the malware analysis computing device may be analyzed. In certain embodiments, a malware-infected hard drive image may then be copied off the malware analysis computing device for further forensic analysis. | 2015-03-05 |
20150067863 | METHOD AND APPARATUS FOR PROCESSING FINITE AUTOMATA - A method and corresponding apparatus for run time processing use a Deterministic Finite Automata (DFA) and Non-Deterministic Finite Automata (NFA) to find the existence of a pattern in a payload. A subpattern may be selected from each pattern in a set of one or more regular expression patterns based on at least one heuristic. The DFA may be generated from selected subpatterns from all patterns in the set, and at least one NFA may be generated for at least one pattern in the set, optimizing run time performance of the run time processing. | 2015-03-05 |
20150067864 | SECURED AUTOMATED OR SEMI-AUTOMATED SYSTEMS - Secured automated or semi-automated systems are provided herein. In one embodiment, a sensor system includes a sensor, a legacy computing environment that is configured to communicate with the sensor and process sensor raw data output, and transmit the processed sensor output to a first network node over the network, and a trusted computing environment configured to receive raw sensor output directly from the sensor and transmit the raw sensor output to an additional network node or the first network node over the network. | 2015-03-05 |
20150067865 | Threat Condition Management - Methods, products, apparatuses, and systems may manage a threat condition. A plurality of triggers may be identified over a period of time. Each of the triggers may be associated with a threat risk value. An accumulation value may be determined based on an aggregation of each threat risk value over the period of time. A set of progressive threshold values associated with a set of progressive threat conditions may be defined. A threat condition from the set of threat conditions may be established for the device based on the accumulation value. The threat condition may be managed, for example by defining an operational mode for the device, in response to the threat condition. | 2015-03-05 |
20150067866 | IDENTIFYING MALICIOUS DEVICES WITHIN A COMPUTER NETWORK - This disclosure describes techniques for proactively identifying possible attackers based on a profile of a device. For example, a device includes one or more processors and network interface cards to receive, from a remote device, network traffic directed to one or more computing devices protected by the device, determine, based on content of the network traffic, a first set of data points for the device, send a response to the remote device to ascertain a second set of data points for the device, and receive, from the remote device, at least a portion of the second set of data points. The device also includes a security module operable by the processors to determine a maliciousness rating, and selectively manage, based on the maliciousness rating, additional network traffic directed to the one or more computing devices protected by the security device and received from the remote device. | 2015-03-05 |
20150067867 | Risk Identification - Systems, methods and apparatuses for analyzing a string of terms (e.g., a search query, text of an email, and the like) are provided. In some examples, a determination is made as to whether one or more terms in the string matches a keyword. If so, various parts of speech of one or more terms in the string of terms may be determined. In some examples, a category of risk of the terms for which the part of speech is identified may also be determined. A risk rating may then be determined for the string of terms based on the relationship between the terms (e.g., the parts of speech) and the category or categories identified. In some examples, one or more additional actions may be implemented based on the risk rating. | 2015-03-05 |
20150067868 | APPARATUS AND METHOD FOR MANIFESTING EVENT TO VERIFY SECURITY OF MOBILE APPLICATION - An apparatus and method for manifesting an event to verify the security of a mobile application are provided. The apparatus for manifesting an event to verify the security of a mobile application includes a tester application production unit, a tester application execution unit, and a tester application daemon execution unit. The tester application production unit produces a tester application for testing an application to be tested based on application information which is extracted from the application to be tested. The tester application execution unit executes the application to be tested by manifesting an event included in the extracted application information, and extracts a user view object output to a screen of a smart device when the application to be tested is executed. The tester application daemon execution unit generates a touch event based on the extracted user view object, and performs a screen change. | 2015-03-05 |
20150067869 | PROTECTING PRIVACY VIA A GATEWAY - A system and methods for protecting privacy via a gateway are provided. The system includes a data store comprising a computer readable medium storing a program of instructions for performing the protection of privacy via the gateway; a processor that executes the program of instructions; an event detection unit to detect an event behind the gateway; a correlation unit to detect a source associated with the detected event; a semi-stable identification unit to assign a semi-stable identification for the associated source with the detected event; a vector assigning unit to assign a vector to data associated with the semi-stable identification, the vector being related to the source independent any personal identification information (PII); and a communication unit to transmit the vector to instigate an action. | 2015-03-05 |
20150067870 | SECRET COMMUNICATION METHOD WITH SELF-AUTHENTICATION CAPABILITY - A secret communication method with a self-authentication capability is provided, which comprises steps of dividing a secret message into a plurality of secret segments; converting each of the secret segments into (k+1) shares, wherein k is a positive integer; embedding the shares into a media carrier; selecting every k shares among the (k+1) ones to compute (k+1) copies in value; and checking if the (k+1) copies in value are the same. If the (k+1) copies in value are the same, then the secret message is shown. Otherwise, at least one mark will be utilized to replace the secret message while the part of the secret message which is not falsified can still be correctly shown. By employing the method, the integrity and fidelity of the hidden secret message can thus be verified, thereby achieving a new covert communication process performing both information hiding and self-authentication capability. | 2015-03-05 |
20150067871 | Network Device, System and Method for Rendering an Interactive Multimedia Playlist - A device, method, and system for managing authorization for rendering of digital media recordings by a networked rendering device are disclosed. The device includes a processor and a memory. The device receives metadata identifying a recording of a specific audio performance, and searches for a source providing the recording. The device obtains a token authorizing the source to deliver the recording to the rendering device. The device provides the token to the source, receives the recording from the source, and renders the recording. An agent may serve as an intermediary between the rendering device and the source. | 2015-03-05 |
20150067872 | Method and Apparatus for Providing Security in a Radio Frequency Identification System - A part can receive a communication that originates externally of the part, that conforms to a predetermined communications protocol, and that contains payload information consistent with the protocol but subject to a security provision supplemental to the protocol. The part extracts the payload information from the security provision. | 2015-03-05 |
20150067873 | INFORMATION PROCESSING DEVICE AND METHOD FOR LIMITING FUNCTION - An information processing device includes, a processor; and a memory which stores a plurality of instructions, which when executed by the processor, cause the processor to execute, determining, when an execution of one of a first application and a second application is requested, an execution state of the other of the first application and the second application; and limiting a function of the requested application based on the execution state of the other application. | 2015-03-05 |
20150067874 | SECURING ACCESSIBLE SYSTEMS USING CROSS-LINKING - Systems and techniques for securing accessible computer-executable program code and systems are provided. One or more base functions may be generated and blended with existing program code, such that it may be difficult or impossible for a potential attacker to distinguish the base functions from the existing code. The systems and code also may be protected using a variety of other blending and protection techniques, such as fractures, variable dependent coding, dynamic data mangling, and cross-linking, which may be used individually or in combination, and/or may be blended with the base functions. | 2015-03-05 |
20150067875 | SECURING ACCESSIBLE SYSTEMS USING VARIABLE DEPENDENT CODING - Systems and techniques for securing accessible computer-executable program code and systems are provided. One or more base functions may be generated and blended with existing program code, such that it may be difficult or impossible for a potential attacker to distinguish the base functions from the existing code. The systems and code also may be protected using a variety of other blending and protection techniques, such as fractures, variable dependent coding, dynamic data mangling, and cross-linking, which may be used individually or in combination, and/or may be blended with the base functions. | 2015-03-05 |
20150067876 | Method and device for managing security of information in mobile terminal, and mobile terminal - Disclosed are a method and device for managing security of information in a mobile terminal, as well as a mobile terminal. In creating and initializing a text file, first mobile terminal ID information is written in a starting part of the text file; and in storing information, information to be stored is ciphered and written in the text file, and the text file is stored; in reading the first mobile terminal ID information and the stored information, the first mobile terminal ID information and the ciphered information are loaded into a memory; and a mode of displaying text information is determined; and in displaying the stored information, when it is determined to display text information as plaintext, authentication is performed to determine if a local mobile terminal is authorized to decipher the ciphered information loaded in the memory according to the first mobile terminal ID information, and when the mobile terminal is authorized, the ciphered information is deciphered and displayed as plaintext, or ciphertext is displayed if the mobile terminal is not authorized. With the disclosure, it is possible to effectively stop someone other than a user of a mobile terminal from connecting the mobile terminal to a computer through a Universal Serial Bus (USB) and stealing user information in the mobile terminal. | 2015-03-05 |
20150067877 | APPARATUS AND METHOD FOR SETTING RIGHTS FOR EACH OBJECT OF PIECE OF CONTENT - Disclosed are an apparatus and method for setting rights for each object of a piece of content. A data detection unit detects, for each object, data regions corresponding to each of a plurality of objects in the source code of a piece of digital content including the plurality of objects. A data encryption unit encrypts the data region from among the plurality of data regions that corresponds to the object subject to protection. A data transmission unit transmits the source code of the piece of digital content including the encrypted data region to a user terminal. According to the present invention, use rights can be authorized for each object included in a piece of content, and therefore a user may be provided with the selected object according to the right of the user for the same content. Further, a file may be executed even on a computer in which a DRM program is not installed, and it is possible to set the file such that a user may not access only the encrypted object in the file being executed. | 2015-03-05 |
20150067878 | APPARATUS, SYSTEM, AND METHOD FOR OBFUSCATION AND DE-OBFUSCATION OF DIGITAL CONTENT - Computer-implemented apparatus, system, and method of generating digital content with various degrees of obfuscation applied. A publisher of content, such as a private or commercial publisher of digital content, may set access restrictions to the content, such as to obfuscate and/or de-obfuscate the content based on select criteria. | 2015-03-05 |
20150067879 | SYSTEMS AND METHODS FOR SOCIAL PARENTING PLATFORM AND NETWORK - A parent social network based on relationship of children, including of activities, needs, interests or combinations thereof, is described. The parent social network can identify at least two minors with a common activity, need, interest or combination thereof, identify an adult responsible for the identified minors; and propose to link the identified adults. The parent social network can also provide post and other data to a parent based on interests and activities of a child. The parent social network can also identify and subscribe the parent to relevant children related calendars. The parent social network can allow effective communication between relevant parents using messaging and other means. | 2015-03-05 |
20150067880 | LOCATION SPOOFING FOR PRIVACY AND SECURITY - A sentry system is provided for use within a mobile device to limit access to device location using onboard systems. Access limitation can include access to only spoofed data in accordance to the rules or user instructions. Spoofed data may include refinements to render a location estimate and associated collateral information to be more plausible. | 2015-03-05 |
20150067881 | METHOD AND SYSTEM FOR PROVIDING ANONYMIZED DATA FROM A DATABASE - The invention relates to a method for providing an anonymized value for a data element stored with an original value in a database ( | 2015-03-05 |
20150067882 | METHODS AND SYSTEMS FOR ENCODING AND PROTECTING DATA USING DIGITAL SIGNATURE AND WATERMARKING TECHNIQUES - Systems and methods are provided for determining a presence of a watermark in electronic data. In certain embodiments, a plurality of keys is generated, and a plurality of payloads are retrieved from electronic data using the keys. A statistical indicia of randomness is generated based on the payloads, and the presence of a watermark is determined when the indicia is below a threshold. | 2015-03-05 |
20150067883 | COMPUTING SYSTEM WITH IDENTITY PROTECTION MECHANISM AND METHOD OF OPERATION THEREOF - A computing system includes: a communication unit configured to access a target account including a feature; a control unit, coupled to the communication unit, configured to: calculate a comparison result based on the feature, determine an anonymity threshold for conforming the target account with a comparison account, and determine the feature for the target account based on the comparison result and the anonymity threshold for displaying on a device. | 2015-03-05 |
20150067884 | METHOD AND SYSTEM FOR PROTECTING SOFTWARE - Provided is a method for protecting software. Software license information of an authorized user is used to generate an identifying code of software license. The identifying code of software license is analyzed by the software system of the authorized client terminal wherein the software license information and valid period of said identifying code of software license. The software system of an authorized client terminal then determines whether the current time is within the validation time period. If the current time is within the validation time period, then the protected software is enabled. | 2015-03-05 |
20150067885 | PRIVACY PROTECTION FOR A LIFE-LOG SYSTEM - Technologies are generally described for privacy protection for a life-log system. In some examples, a method performed under control of a life-log system may include receiving, from a user account, a request to change one or more real life-log data entries relating to a real event that are stored in a first part of a database; removing the one or more real life-log data entries relating to the real event from the first part of the database; and storing, in the first part of the database, one or more misleading life-log data entries relating to a false event corresponding to the real event. | 2015-03-05 |
20150067886 | DYNAMIC DATA MASKING SYSTEM AND METHOD - A system and method for providing dynamic data asking for databases through a data masking apparatus. | 2015-03-05 |
20150067887 | DIGITAL CONTENT RIGHTS MANAGEMENT METHOD AND SYSTEM - A digital content rights management method and system belongs to the digital content rights management technique field. The method of the invention includes the steps: registering the system, generating the time stamp, verifying the time stamp when the system starts up, acquiring the certificate, verifying the time before accessing the digital content. The system of the invention comprises a device for accessing the digital content and a server, wherein the device for accessing the digital content comprises: a registering module, a time stamp generating module, a time stamp verification module, a certificate of authorization acquiring module, and a time verification module. The method and system have solved the problem that the digital content can still be used beyond the time limit. | 2015-03-05 |
20150067888 | ENVIRONMENTAL MONITORING DEVICE - An environmental monitoring device that monitors the operation of a legacy electronic device is described. In particular, a sensor in the environmental monitoring device provides sensor data that represents an environmental condition in an external environment that includes the environmental monitoring device. This environmental condition is associated with the operation of the legacy electronic device in the external environment. The environmental monitoring device analyzes the sensor data and provides feedback about the operation of the legacy electronic device based on the analyzed sensor data. Moreover, the sensor provides the sensor data without or excluding communication and/or electrical coupling between the environmental monitoring device and the legacy electronic device. In this way, the environmental monitoring device facilitates monitoring, analysis and feedback of the sensor data without directly interacting with the legacy electronic device. | 2015-03-05 |
20150067889 | Entitlement Predictions - Systems, methods, and devices for predicting entitlements to computing resources. An entitlement associated with a user of a computer system may be identified. The entitlement may indicate a computing resource of the computer system that is accessible to the user. A set of attributes associated with the user may be selected, and an entitlement probability value may be obtained. The entitlement probability value may be based on the set of attributes and indicate a probability that the user is authorized to have the entitlement. The entitlement probability value may be used to determine whether to include the entitlement in an access review. Depending on the entitlement probability value the entitlement may be included in the access review or excluded from the access review. | 2015-03-05 |
20150067890 | IDENTIFICATION SYSTEM - The invention concerns a method of identification of a person to be identified, comprising: receiving, from an input device ( | 2015-03-05 |
20150067891 | METHOD AND SYSTEM FOR DIGITAL RIGHTS MANAGEMENT ENFORCEMENT - A method and system for Digital Right Management (DRM) enforcement on a client device is provided. The method includes: determining client requested digital content; retrieving DRM data associated with the requested digital content; bundling the associated DRM with the requested digital content; transmitting the bundled DRM and digital content to the client device; and enforcing the DRM on the client device. The system includes: a client device configured to issue a request for digital content; a content review module configured to retrieve DRM data associated with the requested digital content; a bundler module configured to bundle the associated DRM with the requested digital content; a connection module configured to transmit the bundled DRM and digital content to the client device; and an enforcement module configured to enforce the DRM on the client device. | 2015-03-05 |
20150067892 | SYSTEM AND METHOD FOR AUTHORIZATION AND AUTHENTICATION, SERVER, TRANSIT TERMINAL - System for authorization and authentication comprises a server and at least one level of transit terminals. The server transmits digital content, server's identifier, and business pattern to the transit terminal. The transit terminal transmits to a lower level transit terminal the digital content, the server's identifier, the business pattern, and identifiers of respective transit terminals through which the digital content passes, and returns the above identifiers to the server. The server performs a match verification on the returned identifiers; if matched, the transit terminal is permitted to parse the business pattern and authorize a client to use the digital content based on privilege in the business pattern. | 2015-03-05 |
20150067893 | CLOUD E-DRM SYSTEM AND SERVICE METHOD THEREOF - A digital rights management system and a service method thereof, and an enterprise digital rights management (E-DRM) system for document security installed in a cloud system are provided. The present systems can be implemented to be used in a variety of environments without being affected by the type or environment of a user terminal using a method which allows the client to use a contents data through a virtual machine system, and the E-DRM system is configured to include a cloud system, a security system and a virtual machine system. | 2015-03-05 |
20150067894 | OBJECT BASED PRIVACY CONTROL - An electronic device may include a processor and a blacklist database listing objects not to be displayed. The processor is to remove an object from a frame before the frame is sent to or received from an electronic device when the object is listed in the blacklist database. In an example, an electronic device can include logic to receive, in a processor, a frame to be sent to or received from an electronic device and logic to scan the frame to identify an object. The electronic device can also include logic to determine if the object is listed in a blacklist database. The electronic device further includes logic to modify the frame to remove the object when the object is listed in the blacklist database and logic to transfer the frame for processing. | 2015-03-05 |
20150067895 | SECURITY DEVICE HAVING PHYSICAL UNCLONABLE FUNCTION - The inventive concept provides a security device capable of reducing an area of a die required for implementation of a stable PUF by increasing the value of entropy from a predefined number of entropy sources and/or minimizing a blind zone of a validity checking module. The security device uses an asynchronous configuration to minimize a blind zone. | 2015-03-05 |
20150067896 | ASSERTING PHYSICAL PRESENCE TO A TRUSTED PLATFORM MODULE BY PHYSICALLY CONNECTING OR DISCONNECTING A HOT PLUGGABLE DEVICE - A method includes asserting a physical presence signal to a trusted platform module of a compute node in response to detecting a change in the physical connection of a hot pluggable device to a port of the compute node. The change in the physical connection of the hot pluggable device to the port is selected from physically connecting the hot pluggable device to the port, physically disconnecting the hot pluggable device from the port, and combinations thereof. Optionally, the compute node has a USB port and the hot pluggable device has a USB connector that is selectively physically connectable to the USB port. In one example, detecting a change in the physical connection of the hot pluggable device to the compute node includes detecting a voltage change on the USB port. | 2015-03-05 |
20150067897 | GENETICALLY MODIFIED NON-HUMAN MAMMALS AND CELLS - Genetically modified mammals are described which lack the mannan binding lectin associated serine protease MASP-2, together with methods and constructs for their production. Such mammals are useful as models for disorders of the complement system, and in the identification of treatments for such disorders. Also described are mammals which lack the associated protein MAp19; such mammals may also lack MASP-2. | 2015-03-05 |
20150067898 | EFFICIENT NON-MEIOTIC ALLELE INTROGRESSION - Methods, uses, and animals for introgression of alleles between animals, including SNPs. One embodiment involves introducing a targeted targeting endonuclease system and a HDR template into a cell with a mismatch in the binding of the targeting endonuclease and the targeted site. | 2015-03-05 |
20150067899 | Multiple Inducible Gene Regulation System - The present invention relates to the field of biotechnology or genetic engineering. More specifically, the present invention relates to a multiple inducible gene regulation system that functions within cells to simultaneously control the quantitative expression of multiple genes. | 2015-03-05 |
20150067900 | NEW REPEAT VARIABLE DIRESIDUES FOR TARGETING NUCLEOTIDES - The present invention relates to polypeptides and more particularly to Transcription Activator-Like Effector derived proteins that allow to efficiently target and/or process nucleic acids. The present invention also concerns methods to use these proteins. The present invention also relates to vectors, compositions and kits in which RVD domains and Transcription Activator-Like Effector (TALE) proteins of the present invention are used. | 2015-03-05 |
20150067901 | PRODUCTION OF FERTILE XY FEMALE ANIMALS FROM XY ES CELLS - Methods and compositions are described for making phenotypically female fertile animals from XY donor cells and suitable host embryos. Culture media and methods are provided for maintaining XY donor cells in culture that after introduction into a host embryo and gestation in a suitable host will result in fertile XY female animals. Methods and compositions are described for making fertile female animals in an F | 2015-03-05 |
20150067902 | SOYBEAN VARIETY XB007G13 - The invention relates to the soybean variety designated XB007G13. Provided by the invention are the seeds, plants and derivatives of the soybean variety XB007G13. Also provided by the invention are tissue cultures of the soybean variety XB007G13 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety XB007G13 with itself or another soybean variety and plants produced by such methods. | 2015-03-05 |
20150067903 | SOYBEAN VARIETY XB04F13 - The invention relates to the soybean variety designated XB04F13. Provided by the invention are the seeds, plants and derivatives of the soybean variety XB04F13. Also provided by the invention are tissue cultures of the soybean variety XB04F13 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety XB04F13 with itself or another soybean variety and plants produced by such methods. | 2015-03-05 |
20150067904 | SOYBEAN VARIETY XB09AE13 - The invention relates to the soybean variety designated XB09AE13. Provided by the invention are the seeds, plants and derivatives of the soybean variety XB09AE13. Also provided by the invention are tissue cultures of the soybean variety XB09AE13 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety XB09AE13 with itself or another soybean variety and plants produced by such methods. | 2015-03-05 |
20150067905 | SOYBEAN VARIETY XB21Z13 - The invention relates to the soybean variety designated XB21Z13. Provided by the invention are the seeds, plants and derivatives of the soybean variety XB21Z13. Also provided by the invention are tissue cultures of the soybean variety XB21Z13 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety XB21Z13 with itself or another soybean variety and plants produced by such methods. | 2015-03-05 |
20150067906 | SOYBEAN VARIETY XB22A13 - The invention relates to the soybean variety designated XB22A13. Provided by the invention are the seeds, plants and derivatives of the soybean variety XB22A13. Also provided by the invention are tissue cultures of the soybean variety XB22A13 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety XB22A13 with itself or another soybean variety and plants produced by such methods. | 2015-03-05 |
20150067907 | SOYBEAN VARIETY XB23AB13 - The invention relates to the soybean variety designated XB23AB13. Provided by the invention are the seeds, plants and derivatives of the soybean variety XB23AB13. Also provided by the invention are tissue cultures of the soybean variety XB23AB13 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety XB23AB13 with itself or another soybean variety and plants produced by such methods. | 2015-03-05 |
20150067908 | SOYBEAN VARIETY XB28T13 - The invention relates to the soybean variety designated XB28T13. Provided by the invention are the seeds, plants and derivatives of the soybean variety XB28T13. Also provided by the invention are tissue cultures of the soybean variety XB28T13 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety XB28T13 with itself or another soybean variety and plants produced by such methods. | 2015-03-05 |
20150067909 | SOYBEAN VARIETY XB33Z13 - The invention relates to the soybean variety designated XB33Z13. Provided by the invention are the seeds, plants and derivatives of the soybean variety XB33Z13. Also provided by the invention are tissue cultures of the soybean variety XB33Z13 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety XB33Z13 with itself or another soybean variety and plants produced by such methods. | 2015-03-05 |
20150067910 | SOYBEAN CULTIVAR UA 5213C - A soybean cultivar designated UA 5213C is disclosed. The invention relates to the seeds of soybean cultivar UA 5213C, to the plants of soybean cultivar UA 5213C, to the plant parts of soybean cultivar UA 5213C, and to methods for producing progeny of soybean cultivar UA 5213C. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar UA 5213C. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar UA 5213C, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar UA 5213C with another soybean cultivar. | 2015-03-05 |
20150067911 | METHOD FOR BREEDING TOMATOES HAVING REDUCED WATER CONTENT AND PRODUCT OF THE METHOD - A method for breeding tomato plants that produce tomatoes with reduced fruit water content including the steps of crossing at least one | 2015-03-05 |
20150067912 | Molecular Markers Associated With Yellow Flash in Glyphosate Tolerant Soybeans - The present invention provides methods and compositions for the identification and selection of loci modulating phenotypic expression of a herbicide tolerance trait in plant breeding. In addition, methods are provided for screening germplasm entries for the performance and expression of this trait. | 2015-03-05 |
20150067913 | Dominant Gene Suppression Transgenes and Methods of Using Same - Pairs of plants are provided in which complementing constructs result in suppression of a parental phenotype in the progeny. Methods to generate and maintain such plants and methods of use of said plants, are provided, including use of parental plants to produce sterile plants for hybrid seed production. Also provided are methods for maintaining a homozygous recessive condition and for repressing transmission of transgenes. | 2015-03-05 |
20150067914 | Drought Stress Tolerance Genes and Methods of Use Thereof to Modulate Drought Resistance in Plants - The present invention has increased the resistance to drought stress in Poplar by integrating a transgene constitutively expressing a pine superoxide dismutase (SOD) into the plant genome. It is contemplated that this approach to drought resistance improvement will be equally successful for all woody perennials. Provided with the invention is an expression cassette, a vector, and a method for increasing SOD activity in woody perennials, as well as transgenic woody perennials with enhanced drought resistance and accompanying phenotype. | 2015-03-05 |
20150067915 | GENERATION OF PLANTS WITH ALTERED PROTEIN, FIBER, OR OIL CONTENT - The present invention is directed to plants that display an improved oil quantity phenotype or an improved meal quality phenotype due to altered expression of an IMQ nucleic acid. The invention is further directed to methods of generating plants with an improved oil quantity phenotype or improved meal quality phenotype. | 2015-03-05 |
20150067916 | GENERATION OF GRAPEVINE ROOTSTOCKS THAT PROVIDE RESISTANCE AND SANITATION IN RELATION TO GRAPEVINE FANLEAF VIRUS (GFLV) - The invention discloses a vector plasmid called “GFLV silencing construct” that confers resistance and sanitation against the grapevine fanleaf virus (GFLV); plant cells transformed with said vector plasmid and a method to impart resistance and sanitation against the grapevine fanleaf virus (GFLV) in non-transgenic grapevines when being grafted onto seedlings generated from cells transformed with said plasmid vector. The “GFLV silencing construct” plasmid vector of the invention comprises inverted sequence duplicates coding for the grapevine fanleaf virus (GFLV) capsid protein. | 2015-03-05 |
20150067917 | ANTI PATHOGEN SYSTEMS - Provided is a system for protecting plants from attack by pests, including pathogens such as fungi. Specifically, a plant defensin is provided in conjunction with a protease inhibitor protects a plant from pest attack or reduces severity of an attack. | 2015-03-05 |
20150067918 | CITRUS PLANTS RESISTANT TO CITRUS HUANGLONGBING (EX GREENING) CAUSED BY CANDIDATUS LIBERIBACTER ASIATICUS (LAS) AND BACTERIAL CANKER CAUSED BY (XANTHOMONAS AXONOPODIS PV. CITRI) (XAC) - Disclosed herein are viral vectors based on modifications of the Citrus Tristeza virus useful for transfecting citrus trees for beneficial purposes. Included in the disclosure are viral vectors including one or more gene cassettes that encode spinach defensin peptide(s). The gene cassettes are positioned at desirable locations on the viral genome so as to enable expression while preserving functionality of the virus. Also disclosed are methods of transfecting plants and plants transfected with viral vector embodiments. | 2015-03-05 |
20150067919 | ENGINEERED BIOMASS WITH INCREASED OIL PRODUCTION - The present invention relates to a genetically modified plant having an increased amount of oil in its green biomass as compared to the oil in the green biomass of its non-genetically modified counterpart. The plants may be used for producing bio-fuels such as biodiesel fuel. | 2015-03-05 |
20150067920 | PLANTS WITH INCREASED STRESS TOLERANCE - Provided herein are plants with increase stress tolerance and methods of making same. | 2015-03-05 |
20150067921 | FAD3 PERFORMANCE LOCI AND CORRESPONDING TARGET SITE SPECIFIC BINDING PROTEINS CAPABLE OF INDUCING TARGETED BREAKS - A method of gene editing or gene stacking within a FAD3 loci by cleaving, in a site directed manner, a location in a FAD3 gene in a cell, to generate a break in the FAD3 gene and then ligating into the break a nucleic acid molecule associated with one or more traits of interest is disclosed. | 2015-03-05 |
20150067922 | GENE TARGETING AND GENETIC MODIFICATION OF PLANTS VIA RNA-GUIDED GENOME EDITING - The present invention provides compositions and methods for specific gene targeting and precise editing of DNA sequences in plant genomes using the CRISPR (cluster regularly interspaced short palindromic repeats) associated nuclease. Non-transgenic, genetically modified crops can be produced using these compositions and methods. | 2015-03-05 |
20150067923 | Transgenic Plants And A Transient Transformation System For Genome-Wide Transcription Factor Target Discovery - Plant genes regulated by transcription factors that control the gene network response to an environmental perturbation or signal are described. This class of genes responds to the perturbation of a transcription factor and the signal it transduces, but surprisingly, without stable binding of the transcription factor. These genes represent members of the “dark matter” of metabolic regulatory circuits. | 2015-03-05 |
20150067924 | CONSTRUCTS FOR EXPRESSING TRANSGENES USING REGULATORY ELEMENTS FROM PANICUM UBIQUITIN GENES - Provided are constructs and methods for expressing a transgene in plant cells and/or plant tissues using the regulatory elements, including the promoters and/or 3′-UTRs, isolated from | 2015-03-05 |
20150067925 | CONSTRUCTS FOR EXPRESSING TRANSGENES USING REGULATORY ELEMENTS FROM BRACHYPODIUM UBIQUITIN GENES - Provided are constructs and methods for expressing a transgene in plant cells and/or plant tissues using the regulatory elements, including the promoters and/or 3′-UTRs, isolated from | 2015-03-05 |
20150067926 | CONSTRUCTS FOR EXPRESSING TRANSGENES USING REGULATORY ELEMENTS FROM SETARIA UBIQUITIN GENES - Provided are constructs and methods for expressing a transgene in plant cells and/or plant tissues using the regulatory elements, including the promoters and/or 3′-UTRs, isolated from | 2015-03-05 |
20150067927 | CONSTRUCTS FOR EXPRESSING TRANSGENES USING REGULATORY ELEMENTS FROM BRACHYPODIUM UBIQUITIN 1C GENES - Provided are constructs and methods for expressing a transgene in plant cells and/or plant tissues using the regulatory elements, including the promoters and/or 3′-UTRs, isolated from | 2015-03-05 |
20150067928 | Stress Tolerant Transgenic Crop Plants - Disclosed herein are novel variant bacterial cold shock proteins and recombinant DNA for expressing such proteins to produce transgenic plants with enhanced stress tolerance and/or enhanced yield. | 2015-03-05 |
20150067929 | ILLUMINATION FOR OPTICAL SCAN AND MEASUREMENT - Optical scanning with an optical probe composed of an elongated cylinder of transparent material mounted upon an optical scanner body; one or more sources of scan illumination mounted in the probe distally or proximally with respect to the scanner body and projecting scan illumination longitudinally through the probe; a radially-reflecting optical element mounted in the probe having a conical mirror on a surface of the radially-reflecting optical element, the mirror oriented so as to project scan illumination radially away from a longitudinal axis of the probe with at least some of the scan illumination projected onto a scanned object; a lens mounted in the probe between the radially-reflecting optical element and the scanner body and disposed so as to conduct to an optical sensor scan illumination reflected from the scanned object. | 2015-03-05 |
20150067930 | Method and Apparatus of Physical Property Measurement Using a Probe-Based Nano-Localized Light Source - An apparatus and method of performing physical property measurements on a sample with a probe-based metrology instrument employing a nano-confined light source is provided. In one embodiment, an SPM probe tip is configured to support an appropriate receiving element so as to provide a nano-localized light source that is able to efficiently and locally excite the sample on the nanoscale. Preferably, the separation between the tip apex and the sample during spectroscopic measurements is maintained at less than 10 nm, for example, using an AFM TR Mode control scheme. | 2015-03-05 |
20150067931 | Method and Means for Coupling High-Frequency Energy to and/or from the Nanoscale Junction of an Electrically-Conductive Tip with a Semiconductor - A method for coupling high-frequency energy, in particular for microwave circuits, to a nanoscale junction involves placing a bias-T outside of the tip and sample circuits of a scanning probe microscope and connecting a portion of a sample of analyzed semi-conductor through an outer shielding layer of coaxial cable so as to complete a circuit with minimal involvement of the sample. The bias-T branches into high and low-frequency circuits, both of which are completed and, at least the high-frequency circuit, does not rely on grounding of implements or other structure to accomplish said completion. | 2015-03-05 |
20150067932 | AFM-COUPLED MICROSCALE RADIOFREQUENCY PROBE FOR MAGNETIC RESONANCE IMAGING AND SPECTROSCOPY - A method of using a AFM/NMR probe, the method comprising the steps of injecting a sample to be analyzed with magnetic particles, introducing a probe into proximity with the sample, the probe capable of both transmitting and sensing electromagnetic radiation; generating a magnetic field via the probe, and adjusting the magnitude of the magnetic field to manipulate the magnetic particles within the sample. | 2015-03-05 |
20150067933 | Cherry rootstock plant named 'STO2' - A new and distinct cultivar of | 2015-03-05 |
20150067934 | Cherry rootstock plant named 'STO1' - A new and distinct cultivar of | 2015-03-05 |
20150067935 | Phalaenopsis orchid plant named 'PHALDRAXIP' - A new and distinct variety of | 2015-03-05 |
20150067936 | Begonia plant named 'First Blush' - A new and distinct form of | 2015-03-05 |
20150067937 | Zoysia japonica L. plant named 'SS-Z15' - A new and distinct cultivar of | 2015-03-05 |
20150067938 | Cosmos plant named 'HAMCOSP' - A new cultivar of | 2015-03-05 |
20150067939 | Salvia greggii plant named 'Ruby Slippers' - A new and distinct | 2015-03-05 |