11th week of 2013 patent applcation highlights part 63 |
Patent application number | Title | Published |
20130067572 | SECURITY EVENT MONITORING DEVICE, METHOD, AND PROGRAM - The security event monitoring device includes: a storage module which stores in advance a correlation rule; a log collection unit which receives each log from each monitoring target device; a correlation analysis unit which generates scenario candidates by associating each of the logs; a scenario candidate evaluation unit which calculates the importance degrees of each scenario candidate; and a result display unit which displays/outputs the scenario candidate of a high importance degree. The scenario candidate evaluation unit includes: a user association degree evaluation function which calculates user association degrees; an operation association degree evaluation function which calculates the operation association degrees; and a scenario candidate importance reevaluation function which recalculates the importance degrees of each of the scenario candidates by each user according to the user association degrees and the operation association degrees. | 2013-03-14 |
20130067573 | SYSTEM AND METHOD FOR HUMAN IDENTIFICATION PROOF FOR USE IN VIRTUAL ENVIRONMENTS - System, method and computer program product for verifying an avatar owner as a human user of an avatar in a virtual world environment in which humans interact through avatars via client devices in network communication with a server device. A request for challenging an avatar in the virtual world environment is received to determine whether that avatar is controlled by an application program user (bot). A user client device associated with a challenged avatar is identified and a Human Identification Proof (HIP) message for detecting a human user versus a bot controlling the challenged avatar is generated and communicated, for receipt at the identified user client device. It is determined from the response, whether the user is a bot or a human user. If a challenged avatar is determined to be a bot, then the server device prevents the challenged avatar from further interaction in the virtual world environment. | 2013-03-14 |
20130067574 | FIGHT-THROUGH NODES FOR SURVIVABLE COMPUTER NETWORK - A survivable network is described in which one or more network device includes enhanced functionality to fight through cyber attacks. A Fight-Through Node (FTN) is described, which may be a combined hardware/software system that enhances existing networks with survivability properties. A network node comprises a hardware-based processing system having a set of one or more processing units, and a hypervisor executing on each one of the processing units; and a plurality of virtual machines executing on each of the hypervisor. The network node includes an application-level dispatcher to receive a plurality of transaction requests from a plurality of network communication session with a plurality of clients and distribute a copy of each of the transaction requests to the plurality of virtual machines executing on the network node over a plurality of time steps to form a processing pipeline of the virtual machines. | 2013-03-14 |
20130067575 | DETECTION OF NETWORK SECURITY BREACHES BASED ON ANALYSIS OF NETWORK RECORD LOGS - Computer program products and methods of inspecting a log of security records in a computer network are provided. The method includes retrieving a log record, processing the log record including deriving a key to a table, determining a data value from information in the log record and adding the data value to a list of data values associated with the key if the data value is unique. One or more entries of the table are evaluated based on predetermined criteria to detect attempted security breaches. | 2013-03-14 |
20130067576 | Restoration of file damage caused by malware - In accordance with an example embodiment of the present invention, there is provided a method including: detecting a malware in a computer system and in response to the detection of the malware in the computer system initiating a deactivation of malware; detecting a file altered by the malware in response to a successful deactivation of the malware; and initiating a restoration of the altered file in response to the detection of the file altered by the malware. | 2013-03-14 |
20130067577 | Malware scanning - According to a first aspect of the present invention there is provided a method of scanning a computer device in order to detect potential malware when an operating system running on the computer device prevents applications installed on the device from accessing installed files of other applications installed on the device. The method includes the steps of detecting installation of an application on the device, identifying one or more installation files that are required to perform the installation of the application, and performing a malware scan of the identified installation files and/or information obtained from the installation files. | 2013-03-14 |
20130067578 | Malware Risk Scanner - A technique for improving the installation of anti-malware software performs an analysis of a computer on which anti-malware software is to be installed prior to complete installation of the anti-malware software. If the analysis determines that the computer may already contain malware, then an attempt may be made to scan and clean the computer prior to the installation of a portion of the anti-malware software. Otherwise, the pre-installation scan and clean may be bypassed, allowing the installation of that portion of the anti-malware software. | 2013-03-14 |
20130067579 | System and Method for Statistical Analysis of Comparative Entropy - In accordance with one embodiment of the present disclosure, a method for determining the similarity between a first data set and a second data set is provided. The method includes performing an entropy analysis on the first and second data sets to produce a first entropy result, wherein the first data set comprises data representative of a first one or more computer files of known content and the second data set comprises data representative of a one or more computer files of unknown content; analyzing the first entropy result; and if the first entropy result is within a predetermined threshold, identifying the second data set as substantially related to the first data set. | 2013-03-14 |
20130067580 | Computer Virus Screening Methods and Systems - A method includes receiving a status update from a client device, the status update reflects at least one change associated with the client device, updating a model of the client deice based on the status update, receiving data to be screened for a virus, the data is received after an updating of the model of the client device, and screening the model of the client device for the virus. Systems and articles of manufacture are also disclosed. | 2013-03-14 |
20130067581 | INFORMATION SECURITY CONTROL SELF ASSESSMENT - Apparatuses, computer readable media, methods, and systems are described for identifying risk assessment queries for assessing risk of a process, providing the identified risk assessment queries to a client device for presentation, receiving response data from the client device comprising responses to the risk assessment queries, determining response values for at least some of the risk assessment queries based on the received response data, and calculating a process risk metric based on the determined response values. | 2013-03-14 |
20130067582 | SYSTEMS, METHODS AND DEVICES FOR PROVIDING DEVICE AUTHENTICATION, MITIGATION AND RISK ANALYSIS IN THE INTERNET AND CLOUD - The present invention is a method to provide mechanisms and judgment to determine the ongoing veracity of “purported” devices (sometimes called spoofing) with such parameters as unique device ID, access history, paths taken and other environmental data (Device Authentication). | 2013-03-14 |
20130067583 | ANALYZING ACCESS CONTROL CONFIGURATIONS - A facility is described for analyzing access control configurations. In various embodiments, the facility comprises an operating system having resources and identifications of principals, the principals having access control privileges relating to the resources, the access control privileges described by access control metadata; an access control scanner component that receives the access control metadata, determines relationships between principals and resources, and emits access control relations information; and an access control inference engine that receives the emitted access control relations information and an access control policy model, analyzes the received information and model, and emits a vulnerability report. In various embodiments, the facility generates an information flow based on access control relations, an access control mechanism model, and an access control policy model; determines, based on the generated information flow, whether privilege escalation is possible; and when privilege escalation is possible, indicates in a vulnerability report that privilege escalation is possible. | 2013-03-14 |
20130067584 | Content-Checking of Embedded Content in Digitally Encoded Documents - Methods and apparatus for network security content-checking, in particular simplifying the critical element of a content-checker so that it can be trusted and implemented in hardware logic. A method comprises determining whether a digitally encoded document contains any embedded documents; content-checking, by means of at least one hard-ware-implemented content-checker, at least one of the embedded documents separately from those parts of the digitally encoded document within which it was embedded; and releasing a version of the digitally encoded document responsive to the content-checking. | 2013-03-14 |
20130067585 | SEPARATE SCRIPT CONTEXT TO ISOLATE MALICIOUS SCRIPT - Various embodiments provide an ability to isolate execution of trusted content and/or script from execution of untrusted content and/or script. Separate contexts and/or execution environments can be used for the trusted content and untrusted content, respectively. A trusted context and/or execution environment associated with execution of trusted content can be configured to enable access to sensitive resources associated with a computing device. An untrusted context and/or execution environment associated with execution of untrusted content can be configured with limited and/or no access to the sensitive resources. Alternately or additionally, data generated within the untrusted context can be transferred to the trusted context in a benign manner. | 2013-03-14 |
20130067586 | Anti-counterfeit System using product authentication and rewards points - A authentication system to avoid the consumption of counterfeit products comprising a method using the World Wide Web to verify each individual merchandise using a unique identification number and verifying the unique number against a database online. Further the authentication system comprises a loyalty program in order to encourage customers to use and to denounce counterfeit product sellers. | 2013-03-14 |
20130067587 | PROTECTING ARCHIVE STRUCTURE WITH DIRECTORY VERIFIERS - An archive of an object set may include various security features that enable a detection of alterations of the contents of the objects. However, the security measures of an archive may fail to detect an inadvertent or intentional alteration of the structure of the object set, including the addition of new objects, changes to the metadata (e.g., the name, position within the object set, and location and size within the archive) of respective objects of the object set, and the deletion of directory entries for the objects. Therefore, an archive may be generated with verifiers (e.g., hashcodes) calculated not only for the contents of objects, but for the directory of the archive, and may be included in the signature of the archive. This verification may extend the detecting of alteration of the archive to include the structure of the archive as well as the contents of the objects contained therein. | 2013-03-14 |
20130067588 | Method for Enhancing Privacy of Internet Browser Users - A method for enhancing the privacy of individuals who may be tracked while visiting different sites on the Internet using conventional browsers is disclosed. The method is based on randomizing the information collected in cookies that are used for tracking by different websites. | 2013-03-14 |
20130067589 | DYNAMIC COMMUNITY GENERATOR - Embodiments of the invention are directed to systems, methods, and computer program products configured to determine communities within an organization dynamically based on the distribution of entitlements within the organization. | 2013-03-14 |
20130067590 | COMBINING CLIENT AND SERVER CLASSIFIERS TO ACHIEVE BETTER ACCURACY AND PERFORMANCE RESULTS IN WEB PAGE CLASSIFICATION - In one embodiment, an internet monitor service may use a final content rating to determine access to a webpage. A monitor client | 2013-03-14 |
20130067591 | METHOD FOR FILTERING WEB PAGE CONTENT AND NETWORK EQUIPMENT WITH WEB PAGE CONTENT FILTERING FUNCTION - A method for filtering web page content is disclosed in this invention. In the method, a web page request to obtain a web page from a web server is received from a client through a network equipment after the client builds a connection with the web server. The network equipment transmits the web page request to a cloud server for determining if the web page needs to be blocked according to the web page request. A first disconnection request and a second disconnection request is generated according to the web page request if it is determined that the web page needs to be blocked. The first disconnection request is transmitted to the client and the second disconnection request is transmitted to the web server through the network equipment. Subsequently, the connection between the client and the web server is disconnected. | 2013-03-14 |
20130067592 | SYSTEM AND METHOD FOR ROLE BASED ANALYSIS AND ACCESS CONTROL - A system and method for program access control includes, for a typestate, providing typestate properties and assigning a role to the typestate in a program in accordance with the typestate properties. Access to operations is limited for the typestate in the program based on the role assigned to the typestate and an access permission level. | 2013-03-14 |
20130067593 | SYSTEMS AND METHODS TO DISTRIBUTE CONTENT OVER A NETWORK - The present embodiments provide methods, apparatuses, and systems to distribute content over a network. Some embodiments provide methods to distribute content within a local media network. These methods receive a request for a first content to be transferred to a sink device, request from the source an access criteria for a first content that is protected according to a first digital rights management (DRM), forward the access criteria to the sink device, receive an evaluation of the access criteria from the sink device regarding at least whether the sink device can interpret the first DRM, determine according to the evaluation received from the sink device whether the sink device can utilize the first content that is protected according to the first DRM, and initiate a transfer of the first content from the source device to the sink device when the sink device can utilize the first content. | 2013-03-14 |
20130067594 | Shared Item Account Selection - Techniques for sharing of items from online storage (e.g., cloud storage) are described herein. In at least some embodiments, sharing links can be configured as one-time sharing links that provide recipients with limited, one-time access to a shared item for the purpose of selecting or registering an account to use for subsequent access to the item. Recipients are able to select accounts they find most convenient for accessing a shared item without the owner/sharer of the item necessarily having contact information for those accounts or sending a link to the accounts. Selection of a one-time link initiates an authentication sequence that selectively provides an option to select a particular account. Once the one-time sharing link is redeemed, the one-time sharing link is invalidated for subsequent access to the item. | 2013-03-14 |
20130067595 | Data Isolation Service for Data and Information Sharing - A Data Isolation Service for data, information, and knowledge sharing giving organizations using any type of software solution the ability to provide the public with certain public declassified information using a public facing instance of the same software solution. The Data Isolation Service allows for sensitive data to remain secure using a hybrid data storage model. This hybrid model allows for all data to remain secure without the risk that the private data becomes compromised when sharing public data. The Data Isolation Service can be used with any software technology and application system. The Data Isolation Service is a technology service that keeps private and public data partitioned allowing for the transport of public declassified data from within the organization or private database to a public database for public use, then allowing the public declassified data to re-enter the private database for internal organization use. | 2013-03-14 |
20130067596 | DETECTION FILTER - A detection filter installed in an application server including a secure application is disclosed. In one embodiment, the filter includes a rules engine for receiving request data representing an access request for the secure application from a user. The engine applies at least one risk condition rule to the request data to generate a risk probability level, and detects at least one fraud condition when the risk probability level exceeds a threshold level, before passing the access request to the secure application. | 2013-03-14 |
20130067597 | SYSTEM FOR CONTROLLING ACCESS TO USER RESOURCES AND METHOD THEREOF - A system for controlling access to user resources and a method thereof are provided. The system includes a client device and a server. The client device receives an input of access regulations, which define an access level and access agent for first-user resources, from a first user, and transmits the received access regulations to the server. When a second user has access to the user resources, the server controls the access in compliance with the access regulations. | 2013-03-14 |
20130067598 | TECHNIQUES FOR PRESENTING AND COLLECTING END USER LICENSE AGREEMENT ACCEPTANCE - Techniques are disclosed for presenting and collecting end user license agreement acceptance for software applications or firmware components executed on a computing appliance. A sentry component allows only certain commands to be executed before the relevant end user license agreements are accepted, e.g., commands to configure a network interface and web server on the appliance executed on a shell over a serial interface. Once configured the web server is used to provide a rich interface for presenting end user license agreements and obtaining acceptance thereof. Once the user accepts the terms of the relevant license agreements, then the appliance is made active and all configuration commands become operational, including commands needed to configure the device and start services which would otherwise be prohibited by the sentry component prior to license acceptance. | 2013-03-14 |
20130067599 | Software distribution service federation - Software update distribution techniques are disclosed. Authentication information is received, from a content source authenticator, by an update agent included in a client device. The authentication information comprises a list of a plurality of content sources, wherein the plurality of content sources have been verified by the content source authenticator as being authentic content sources for legitimate software applications. The update agent selects a first content source of the plurality of content sources, where the first content source is configured to provide updates for a first software application. The update agent checks the first content source for updates for the first software application. | 2013-03-14 |
20130067600 | SELECTIVE FILE ACCESS FOR APPLICATIONS - Methods, systems, and computer program products are provided for enabling selective file system access by applications. An application is installed in a computing device. An application manifest associated with the application is received. The application manifest indicates one or more file types that the application is allowed to access. The indicated file type(s) are registered in a location accessible by a broker service. The application is launched as an application process. The application process is isolated in an application container. The application container prevents direct access by the application process to file system data. An access request related to first data of the file system data is received at the broker service from the application process. Access by the application process to the first data is enabled when the broker service determines that a file type of the first data is included in the registered file type(s). | 2013-03-14 |
20130067601 | GENERATING DEVELOPER LICENSE TO EXECUTE DEVELOPER APPLICATION - One or more techniques and/or systems are disclosed for generating a developer license that allows a developer application to run on developer machine. A user identification (userID) used to register a user can be used by the user to register as a developer. The userID can be authenticated for the registered developer. Further, a machine used by the developer for the developer application can be registered, and a resulting hardware identification (hardwareID) can be authenticated for the registered developer machine. Additionally, a developer certificate can be generated for the registered developer. The developer certificate can be authenticated and used to sign the developer application. The developer license can be generated for the developer, allowing the developer machine to execute the developer application, based at least upon the authenticated userID, the authenticated hardwareID, and the authenticated developer certificate. | 2013-03-14 |
20130067602 | Copyrights with Post-Payments for P2P File Sharing - In accordance with an embodiment, a method, apparatus or tangible computer medium (which stores computer executable code or program code) performs or facilitates: determining one or more aspects of an unauthorized copy of electronic content accessible to or through a user device; and conducting a transaction between the user device and a legitimizing party to legitimize the electronic content in view of the determined aspect(s). The electronic content may be unsecured copyrighted content. | 2013-03-14 |
20130067604 | Method of Treatment or Prevention of Hair Loss or for the Enhancement of Hair Growth - The present application relates to use of a Midkine family protein for growing hair on a mammal, or in the manufacture of a medicament for growing hair on a mammal, especially for treatment or prevention of different forms of alopecia. | 2013-03-14 |
20130067605 | hnRNP A1 KNOCKOUT ANIMAL MODEL AND USE THEREOF - A nucleic acid construct comprising a genetic engineered heterogeneous nuclear ribonucleoprotein (hnRNP) A1 gene is provided. A transgenic mouse in which the expression of hnRNP A1 gene has been disrupted is also provided. The mouse is useful for studying the role of hnRNP A1 gene in normal and disease states of a neurodegenerative disease or a cancer for developing therapies to treat any of these diseases. Therefore, a method of screening a compound for potential use in prevention and/or treatment of neurodegenerative disease or cancer is further provided. | 2013-03-14 |
20130067606 | MODULATING PRODUCTION TRAITS IN AVIANS - The present invention relates to methods of modulating traits, particularly production traits, in avians such as chickens. In particular, the invention relates to the in ovo delivery of a dsRNA molecule, especially siRNAs, to modify production traits in commercially important birds. | 2013-03-14 |
20130067607 | MEGANUCLEASE VARIANTS CLEAVING A DNA TARGET SEQUENCE FROM A RAG GENE AND USES THEREOF - An I-CreI variant, wherein one of the I-CreI monomers has at least two substitutions, one in each of the two functional subdomains of the LAGLIDADG core domain situated respectively from positions 26 to 40 and 44 to 77 of I-CreI, said variant being able to cleave a DNA target sequence from a RAG gene. Use of said variant and derived products for the prevention and the treatment of a SCID syndrome associated with a mutation in a RAG gene. | 2013-03-14 |
20130067608 | COLON CANCER TARGETS AND USES THEREOF - The present invention provides a method for diagnosing and detecting diseases associated with colon. The present invention provides one or more proteins or fragments thereof, peptides or nucleic acid molecules differentially expressed in colon diseases (CCAT) and antibodies binds to CCAT. The present invention provides that CCAT is used as targets for screening agents that modulates the CCAT activities. Further the present invention provides methods for treating diseases associated with colon. | 2013-03-14 |
20130067609 | Mammalian Genes Involved in Tularemia and Other Infections - The present invention relates to nucleic acid sequences and cellular proteins encoded by these sequences that are involved in infection or are otherwise associated with the life cycle of one or more pathogens. | 2013-03-14 |
20130067610 | BROCCOLI HYBRID RS05151611 AND PARENTS THEREOF - The invention provides seed and plants of broccoli hybrid RS05151611 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of broccoli hybrid RS05151611 and the parent lines thereof, and to methods for producing a broccoli plant produced by crossing such plants with themselves or with another broccoli plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants. | 2013-03-14 |
20130067611 | SOYBEAN CULTIVAR S100319 - A soybean cultivar designated S100319 is disclosed. The invention relates to the seeds of soybean cultivar S100319, to the plants of soybean cultivar S100319, to the plant parts of soybean cultivar S100319, and to methods for producing progeny of soybean cultivar S100319. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S100319. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S100319, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S100319 with another soybean cultivar. | 2013-03-14 |
20130067612 | SOYBEAN CULTIVAR 94L41 - A soybean cultivar designated 94L41 is disclosed. The invention relates to the seeds of soybean cultivar 94L41, to the plants of soybean cultivar 94L41, to the plant parts of soybean cultivar 94L41, and to methods for producing progeny of soybean cultivar 94L41. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar 94L41. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar 94L41, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar 94L41 with another soybean cultivar. | 2013-03-14 |
20130067613 | SOYBEAN CULTIVAR S100282 - A soybean cultivar designated S100282 is disclosed. The invention relates to the seeds of soybean cultivar S100282, to the plants of soybean cultivar S100282, to the plant parts of soybean cultivar S100282, and to methods for producing progeny of soybean cultivar S100282. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S100282. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S100282, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S100282 with another soybean cultivar. | 2013-03-14 |
20130067614 | SOYBEAN CULTIVAR S100312 - A soybean cultivar designated S100312 is disclosed. The invention relates to the seeds of soybean cultivar S100312, to the plants of soybean cultivar S100312, to the plant parts of soybean cultivar S100312, and to methods for producing progeny of soybean cultivar S100312. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S100312. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S100312, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S100312 with another soybean cultivar. | 2013-03-14 |
20130067615 | SOYBEAN CULTIVAR S100322 - A soybean cultivar designated S100322 is disclosed. The invention relates to the seeds of soybean cultivar S100322, to the plants of soybean cultivar S100322, to the plant parts of soybean cultivar S100322, and to methods for producing progeny of soybean cultivar S100322. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. The invention also relates to soybean cultivars or breeding cultivars, and plant parts derived from soybean cultivar S100322. The invention also relates to methods for producing other soybean cultivars, lines, or plant parts derived from soybean cultivar S100322, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing cultivar S100322 with another soybean cultivar. | 2013-03-14 |
20130067616 | Plant Defensive Peptides - A broad-range plant defense system employing thionins is disclosed. The invention protects various crop species and other plant species from attack by a wide range of phytopathogens, providing broad resistance to diverse plant diseases, using transgenes encoding a seed-derived thionin and a suitable signal peptide. Resistant crop varieties can not only prevent yield losses due to bacterial and fungal diseases, but can also expand the geographic boundaries of possible growing areas for economically important crops. | 2013-03-14 |
20130067617 | PLANTS HAVING STRESS RELATED TRAITS AND METHODS FOR MAKING THE SAME - This invention relates generally to a plant cell with increased yield, preferably under condition of transient and repetitive abiotic stress as compared to a corresponding non-transformed wild type plant cell by increasing or generating one or more activities of RING proteins in plants. | 2013-03-14 |
20130067618 | METHODS AND COMPOSITIONS FOR WEED CONTROL - The present invention provides novel compositions for use to enhance weed control. Specifically, the present invention provides for methods and compositions that modulate acetolactate synthase in weed species. The present invention also provides for combinations of compositions and methods that enhance weed control. | 2013-03-14 |
20130067619 | GENES AND PROTEINS FOR AROMATIC POLYKETIDE SYNTHESIS - Nucleic acid molecules encoding polypeptides having polyketide synthase activity have been identified and characterized. Expression or over-expression of the nucleic acids alters levels of cannabinoid compounds in organisms. The polypeptides may be used in vivo or in vitro to produce cannabinoid compounds. | 2013-03-14 |
20130067620 | Improved Compositions and Methods for Pathogen Control in Plants - Methods and compositions for use in reducing biotic stress in plants by providing recombinant DNA molecules encoding methkyletone thioesterase into the cells of a plant in order to achieve a reduction in infestation by nematodes, insects and other pests are described. The plant cells in some cases produce one or more of 2-nonanone, 2-undecanone, 2-tridecanone and 2-pentadecanone. Also described are methods for making transgenic plants that express the recombinant DNA molecule for use in protecting plants from pest infestations. | 2013-03-14 |
20130067621 | Soybean Seed and Oil Compositions And Methods Of Making Same - Methods for obtaining soybean plants that produce seed with low linolenic acid levels and moderately increased oleic levels are disclosed. Also disclosed are methods for producing seed with low linolenic acid levels, moderately increased oleic levels and low saturated fatty acid levels. These methods entail the combination of transgenes that provide moderate oleic acid levels with soybean germplasm that contains mutations in soybean genes that confer low linolenic acid phenotypes. These methods also entail the combination of transgenes that provide both moderate oleic acid levels and low saturated fat levels with soybean germplasm that contains mutations in soybean genes that confer low linolenic acid phenotypes. Soybean plants and seeds produced by these methods are also disclosed. | 2013-03-14 |
20130067622 | Miniature Rose Plant 'PACseventy' - A new miniature rose plant which has abundant, white colored flowers and attractive foliage. The variety successfully propagates from softwood cuttings and is suitable for year round production in commercial glass houses as a flowering pot plant. This new and distinct variety has shown to be uniform and stable in the resulting generations from asexual propagation. | 2013-03-14 |
20130067623 | Miniature Rose Plant 'PACninetyfive' - A new miniature rose plant which has abundant, red colored flowers and attractive foliage. The variety successfully propagates from softwood cuttings and is suitable for year round production in commercial glass houses as a flowering pot plant. This new and distinct variety has shown to be uniform and stable in the resulting generations from asexual propagation. | 2013-03-14 |
20130067624 | Vanda plant named 'SPCDW1103' - A new and distinct | 2013-03-14 |
20130067625 | Vanda plant named 'SPCDW1110' - A new and distinct | 2013-03-14 |