20th week of 2014 patent applcation highlights part 71 |
Patent application number | Title | Published |
20140137235 | Proximity Based Device Security - Devices, systems and methods are disclosed for additional security, functionality, and convenience in the operation of a wireless communication device with the use of a separate proximity security token in communication with the wireless communication device. In exemplary embodiments, the token is carried by the user while device logic is installed on the user's wireless communication device. The device logic along with transceivers allows the device to sense proximity of the token through wireless communication. Given a certain range of the proximity security token, as determined by the wireless signal strength, the device logic determines whether the device is in a locked or unlocked state. If the proximity security token is outside the range, then the device is locked. The proximity security token uses ultra-low power communications for optimal battery life. | 2014-05-15 |
20140137236 | METHOD AND SYSTEM FOR TRANSFERRING REPLICATED INFORMATION FROM SOURCE STORAGE TO DESTINATION STORAGE - Machine implemented method and system for transferring replicated information from a first storage location managed by a storage operating system at a first storage system node and accessible to a client computing system to a second storage location managed by a second storage system node are provided. A resource pool having a plurality of tokens is maintained for authorizing a replication engine to transfer replicated information from the first storage location to the second storage location. The number of available tokens is increased when traffic due to client requests for accessing the first storage location is less than a first threshold level. The number of available tokens is decreased for reducing transfer of information via the replication engine, when latency in responding to the client requests reaches a second threshold value and the traffic due to client requests reaches the first threshold value. | 2014-05-15 |
20140137237 | SINGLE SYSTEM IMAGE VIA SHELL DATABASE - A single system image is provided for a parallel data warehouse system by exposing a shell database within a database management system comprising metadata and statistics regarding externally stored data. Further, functionality of the database management system can be exploited to perform pre-execution tasks. In one instance, one or more execution plans can be generated by the database management system for an input command and subsequently employed to generate a distributed execution plan. | 2014-05-15 |
20140137238 | METHOD AND SYSTEM FOR TRACING INFORMATION LEAKS IN ORGANIZATIONS THROUGH SYNTACTIC AND LINGUISTIC SIGNATURES - One embodiment of the present invention provides a system for tracing information leaks. The system introduces linguistic and syntactic changes to a document, and associates these changes with a user identifier, which facilitates identification of a user that may have leaked the document. During operation, the system receives a document. The system then determines a most similar original document based on the received document. The system determines difference between the most similar original document and the received document, and determines a user identifier based on the determined difference. | 2014-05-15 |
20140137239 | Application-Level Anomaly Detection - An example includes intercepting one or more activities performed by an application on a computing device. The intercepting uses an instrumentation layer separating the application from an operating system on the computing device. The one or more activities are compared with one or more anomaly detection policies in a policy configuration file to detect or not detect presence of one or more anomalies. In response to the comparison detecting presence of one or more anomalies, indication(s) of the one or more anomalies are stored. Another example includes receiving indication(s) of anomaly(ies) experienced by an application on computing device(s) and analyzing the indication(s) of the anomaly(ies) to determine whether corrective action(s) should be issued. Responsive to a determination corrective action(s) should be issued based on the analyzing, the corrective action(s) are issued to the computing device(s). Methods, program products, and apparatus are disclosed. | 2014-05-15 |
20140137240 | AUTOMATED SECURITY ANALYTICS PLATFORM - A network security platform stores network telemetry information in an active memory, such as DRAM, and analyzes the network telemetry information to detect and respond to network security threats. Using a common active memory to store sensed network telemetry information and analyze that information provides a real-time dataflow engine for detecting security threats and neutralizing detected threats. | 2014-05-15 |
20140137241 | AUTOMATED SECURITY ANALYTICS PLATFORM WITH PLUGGABLE DATA COLLECTION AND ANALYSIS MODULES - Pluggable network security modules provide a collaborative response across plural networks by allowing modules associated with detection and neutralization of a network security threat to plug into a network security platform of other networks. Plugging the security modules in provides an automated insertion of detection and neutralization tools into the network security platform to respond to potential threats based upon proven successful responses at other networks. | 2014-05-15 |
20140137242 | AUTOMATED SECURITY ANALYTICS PLATFORM WITH MULTI-LEVEL REPRESENTATION CONVERSION FOR SPACE EFFICIENCY AND INCREMENTAL PERSISTENCE - Active memory for managing network telemetry information, or other types of information stored as objects, has objects partially-serialized to allow greater amounts of information to store in a memory of a given size with slightly increased retrieval times. Storing additional information in an active memory provides an overall increase in network security platform responsiveness by allowing a greater amount of information to be accessible from the active memory instead of archive. | 2014-05-15 |
20140137243 | AUTOMATED SECURITY ANALYTICS PLATFORM WITH VISUALIZATION AGNOSTIC SELECTION LINKED PORTLETS - Visualization agnostic selection linked portlets provide a tree from a parent to one or more children that present each portlet with its own visualization and data synchronized with a root portlet based upon related filters. Each portlet uses its visualization to display a data set derived by applying its filter in conjunction with the filters of its ancestors. Each portlet then presents data that is at most the same size as its root in a visualization adapted to the child's type and quantity of data. | 2014-05-15 |
20140137244 | Runtime Based Application Security and Regulatory Compliance in Cloud Environment - A mechanism is provided in a data processing system for runtime based application security. The application runtime environment executing within a virtual machine on the data processing system receives notification of a change in execution environment for the virtual machine. Responsive to determining the virtual machine is being migrated to a virtualized environment based on the notification of a change in execution environment, the application runtime environment dynamically modifies execution of an application in the application runtime environment, wherein the application comprises a set of application modules. | 2014-05-15 |
20140137245 | INFORMATION PROCESSING APPARATUS AND CONTROL METHOD - According to one embodiment, a controller detects generation of an event and transmits a content of the event to a management module. The management module transmits to the controller a determination result which represents permission or inhibition of execution of the processing. The determination result is decided based on a first policy or a second policy different from the first policy that are selectively employed in accordance with a use situation of the apparatus. The management module decides whether to notify a server of the content of the event, in accordance with which of a period in which the first policy is employed and a period in which the second policy is employed is a period in which the event has occurred. | 2014-05-15 |
20140137246 | Application-Level Anomaly Detection - An example includes intercepting one or more activities performed by an application on a computing device. The intercepting uses an instrumentation layer separating the application from an operating system on the computing device. The one or more activities are compared with one or more anomaly detection policies in a policy configuration file to detect or not detect presence of one or more anomalies. In response to the comparison detecting presence of one or more anomalies, indication(s) of the one or more anomalies are stored. Another example includes receiving indication(s) of anomaly(ies) experienced by an application on computing device(s) and analyzing the indication(s) of the anomaly(ies) to determine whether corrective action(s) should be issued. Responsive to a determination corrective action(s) should be issued based on the analyzing, the corrective action(s) are issued to the computing device(s). Methods, program products, and apparatus are disclosed. | 2014-05-15 |
20140137247 | Limiting Information Leakage and Piracy due to Virtual Machine Cloning - Techniques for detecting a cloned virtual machine instance. A method includes transmitting an identifier associated a virtual machine from an agent embedded in the virtual machine akin to a malware to a detection entity in a network, determining whether the identifier is a unique identifier or whether the identifier is a clone of an identifier associated with a separate virtual machine in the network, and initiating at least one remedial action with the agent embedded in the virtual machine if the identifier is determined to be a clone of an identifier associated with a separate virtual machine in the network. | 2014-05-15 |
20140137248 | Client Token Storage for Cross-Site Request Forgery Protection - Systems and methods can secure against cross-site request forgery using client-side token storage. A client browser can initiate an action associated with a first web service and generate a token. The token may be stored in client-side storage at the computing device. An indicator of the action may also be stored within the client-side storage. A return link, associated with a passed copy of the token, may be generated. The client may perform the redirect and return to the first web service according to the return link. The passed copy of the token can be extracted from the return link. The indicator of the action and the stored token may be loaded from the client storage. The passed copy of the token and the stored token may be compared. The action according to the indicator of the action may be performed in response to the comparison matching. | 2014-05-15 |
20140137249 | Dynamic Selection and Loading of Anti-Malware Signatures - An anti-malware system dynamically loads and unloads additional malware detection signatures based on a collection of data sources that indicate what signatures are relevant to a host machine in its current environment. A signature selector component determines what relevant signatures should be loaded. The signature selector component uses a variety of data sources either individually, or in combination, to determine relevancy of the available malware detection signatures. The anti-malware system dynamically determines which of the available malware detection signatures and classes of signatures are relevant and should be provided to a machine based on available information. The malware detection signatures are obtained and loaded automatically from one or more sources when a threat becomes relevant. A program or application may be blocked from accessing files until the relevant malware detection signatures have been loaded onto the machine. | 2014-05-15 |
20140137250 | SYSTEM AND METHOD FOR DETECTING FINAL DISTRIBUTION SITE AND LANDING SITE OF MALICIOUS CODE - A system and method for detecting final distribution and landing sites of a malicious code. The method extracts and collecting new article URLs and advertisement banner URLs by inspecting a main page of a press company; filters malicious-suspected URLs suspicious of hiding the malicious code from the new article URLs and the advertisement banner URLs; collects files created when the malicious-suspected URLs are visited, through visit inspection; self-inspects the created files collected through the created file collection using a commercial vaccine; and traces, if the malicious code is detected in the created file, the final distribution and landing sites distributing the detected malicious code. | 2014-05-15 |
20140137251 | SYSTEM FOR IDENTIFYING MALICIOUS CODE OF HIGH RISK - Disclosed is a system for identifying malicious codes of high risk. The system includes a statistical data creation module for creating statistical data by collecting and processing malicious codes by channel, ranking, period, type, re-infection and vaccine diagnosis; a trend data creation module for creating trend data by processing the collected malicious codes by channel, field and type; a malicious code filtering module for extracting the malicious code of high risk from the collected malicious codes based on priority information including a URL type, the number of distribution sites, the number of landing sites, a vaccine diagnosis rate and the number of reports; and a database for processing and storing the statistical data, the trend data and the malicious codes of high risk in a form of a graph, a pie chart and a table. | 2014-05-15 |
20140137252 | METHOD AND SYSTEM FOR UNLOCKING AND DELETING FILE AND FOLDER - A method and system for unlocking and deleting a file or a folder. The method for unlocking the file or the folder comprises: receiving an unlock request of a file or a folder, wherein the unlock request includes an input parameter; verifying whether the input parameter complies with a preset condition; if the input parameter complies with the preset condition, correcting a deformed path format of the file or the folder and/or the special file name of the file or the special folder name of the folder according to a preset rule; determining whether restrictive setting of the corrected file or folder is present; and if yes, cleaning the restrictive setting of the file or the folder. The embodiments of the present invention relieves layer by layer the protections arranged by files infected with a virus by employing a plurality of means such as removing the read-only lock, removing the routine lock, adding the authority and closing the handle, thereby increasing the confrontation capacity of a security software against a malignant program. | 2014-05-15 |
20140137253 | SECURITY METHOD AND APPARATUS - In accordance with an example embodiment of the present invention, there is provided an apparatus, comprising: at least one processor; and at least one memory including executable instructions. The at least one memory and the executable instructions are configured to, in cooperation with the at least one processor, cause the apparatus to perform at least the following: during the loading of an operating system, loading a boot time driver installed by an anti-virus application; reading a master boot record data by the boot time driver as soon as the operating system is ready to handle the request for reading the master boot record data; analyzing the collected master boot record data to identify any malicious entities; and in the event that malicious entities are identified, controlling the behavior of the processing system in order to disable the malicious entity. | 2014-05-15 |
20140137254 | MALICIOUS WEBSITE IDENTIFYING METHOD AND SYSTEM - The present disclosure discloses a method of identifying malicious websites. The method includes: filtering a target website using a local website-filtering list; if the target website is not on the local website-filtering list, filtering the target website using a server website-filtering list. The present disclosure also discloses, based on the above-described method, a system for identifying malicious websites. By using the disclosed malicious website identifying method and system, the number of times needed to access a network to identify malicious websites can be reduced effectively. That is, the number of times that the identification calculation is performed by a network server can be reduced and, thus, increasing the speed of the identification process and reducing network traffic. As a result, the efficiency of the malicious website identifying process can be improved. | 2014-05-15 |
20140137255 | Method, System, and Apparatus for Detecting Malicious Code - A method, a system, and an apparatus for detecting malicious code to solve the problem that detection efficiency is low and that more resources are occupied. The method includes: monitoring execution of an instruction in a virtual machine supervisor of a host computer, where the instruction is generated in escape mode when a read-write request generated during execution of program code in a virtual machine of the host computer is delivered to the virtual machine supervisor; obtaining execution characteristics of the program code according to execution of the instruction; and comparing the obtained execution characteristics with pre-stored execution characteristics of known malicious code, and determining that the program code is malicious code when the obtained execution characteristics and the pre-stored execution characteristics are the same. This improves the detection efficiency, and saves the storage resources and the processing resources in the host computer. | 2014-05-15 |
20140137256 | SECURITY ANALYSIS USING RELATIONAL ABSTRACTION OF DATA STRUCTURES - Analyzing program code can include detecting an instance of a container within the program code using a processor, selecting a model container correlated with the container using the processor, and creating an instance of the model container within memory using the processor. A data-flow of the program code can be tracked through the instance of the model container instead of the instance of the container. | 2014-05-15 |
20140137257 | System, Method and Apparatus for Assessing a Risk of One or More Assets Within an Operational Technology Infrastructure - A system, method and apparatus assesses a risk of one or more assets within an operational technology infrastructure by providing a database containing data relating to the one or more assets, calculating a threat score for the one or more assets using one or more processors communicably coupled to the database, calculating a vulnerability score for the one or more assets using the one or more processors, calculating an impact score for the one or more assets using the one or more processors, and determining the risk of the one or more assets based on the threat score, the vulnerability score and the impact score using the one or more processors. | 2014-05-15 |
20140137258 | IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach to repair vulnerabilities (e.g., security vulnerabilities) in images (e.g., application images) in a networked computing environment (e.g., a cloud computing environment). Specifically, an image is checked for vulnerabilities using a database of known images and/or vulnerabilities. If a vulnerability is found, a flexible/elastic firewall is established around the image so as to isolate the vulnerability. Once the firewall has been put in place, the vulnerability can be repaired by a variety of means such as upgrading the image, quarantining the image, discarding the image, and/or generating a new image. Once the image has been repaired, the firewall can be removed. | 2014-05-15 |
20140137259 | METHODS AND APPARATUS FOR SOFTWARE LICENSE MANAGEMENT - Systems and techniques for managing software licensing are described. When a computing system service request is made, the request is intercepted and software information that may be more or less continuously updated in a managed computing environment is examined to determine the effect of the service request on software usage by the system. The software usage represented by the service request is evaluated based on licensing information to determine license usage by the system and changes in license usage based on the service request, and license usage information is determined based on the software usage and the licensing information. The license usage information may be used in connection with a system of rules to govern actions such as reporting licensing usage or allowing or preventing the use of software based on whether use of the software will violate licensing requirements. | 2014-05-15 |
20140137260 | Privacy Preserving Statistical Analysis for Distributed Databases - Aggregate statistics are determined by first randomizing independently data X and Y to obtain randomized data {circumflex over (X)} and Ŷ. The first randomizing preserves the privacy of the data X and Y. Then, the randomized data {circumflex over (X)} and Ŷ is randomized secondly to obtain randomized data {tilde over (X)} and {tilde over (Y)} for a server, and helper information T | 2014-05-15 |
20140137261 | Methods and Apparatus for Software License Management - Systems and techniques for managing software licensing are described. When a computing system service request is made, the request is intercepted and software information that may be more or less continuously updated in a managed computing environment is examined to determine the effect of the service request on software usage by the system. The software usage represented by the service request is evaluated based on licensing information to determine license usage by the system and changes in license usage based on the service request, and license usage information is determined based on the software usage and the licensing information. The license usage information may be used in connection with a system of rules to govern actions such as reporting licensing usage or allowing or preventing the use of software based on whether use of the software will violate licensing requirements. | 2014-05-15 |
20140137262 | SECURE DATA COPYING - A method, computer program product, and system for the anonymization of sensitive data from a plurality of selected business objects or tables stored in a plurality of data fields in at least one primary database included in an enterprise database system when copying portions of the at least one primary database to a secondary database or updating an existing database with anonymized values for the sensitive fields therein. A plurality of data fields is specified for copying from the at least one primary database. At least one integrity map is generated and populated for each data field in the primary database requiring anonymization before copying to the secondary database. The at least one integrity map is stored in a table associated with the primary database. An anonymized value is generated for each data field in the primary database requiring anonymization. Each data field in the primary database requiring anonymization is substituted with the anonymized value. The portions of the at least one primary database including anonymized values are copied to a secondary database. | 2014-05-15 |
20140137263 | INFORMATION PROCESSING APPARATUS WITH HIBERNATION FUNCTION, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM STORING CONTROL PROGRAM THEREFOR - An information processing apparatus that is capable of preventing leakage of confidential information from data saved on a nonvolatile memory even when the apparatus makes a transition to a hibernation state. The information processing apparatus with a hibernation function has a volatile memory and a nonvolatile memory. A security-area determination unit determines whether a memory area allocated to the volatile memory is a security area. A transition unit to save data saved on a memory area of the volatile memory that is determined as a non-security area by the security-area determination unit and not to save data saved on a memory area of the volatile memory that is determined as a security area, when going to a hibernation state. A resuming unit writes the data that is saved on the nonvolatile memory back to the volatile memory at the time of resuming from the hibernation state. | 2014-05-15 |
20140137264 | METHOD AND APPARATUS FOR PRIVACY-ORIENTED CODE OPTIMIZATION - Methods and apparatuses are provided for automatically optimizing application program code for minimized access to privacy data. A privacy-oriented code optimizing module process and/or facilitate a processing one or more code segments, one or more execution logs associated with the one or more code segments, or a combination thereof to determine at least one privacy intrusion signature associated with the one or more code segments. Further, the privacy-oriented code optimizing module determines one or more recommendations for one or more alternate code segments based, at least in part, on the at least one privacy intrusion signature. | 2014-05-15 |
20140137265 | System and Method For Securing Critical Data In A Remotely Accessible Database - A system and method for securing data on data network accessible server including computer implement the steps of receiving user data from a remote application over a write-only data interface, and identifying in the first database a subset of received user data as selectively replicated user data and transmitting the identified selectively replicated user data over a secured data interface. The method also includes receiving the transmitted selectively replicated user data over a communicatively coupled second secured data interface and storing the received selectively replicated user data in a transactional database. The method further includes receiving a request for requested user data from a remote application at the transactional database over a read-only data interface and transmitting at least a portion of the stored selectively replicated user data as the requested user data responsive to the received request. | 2014-05-15 |
20140137266 | ACCESS SYSTEM AND METHOD THEREOF - An access system including a storage medium and a host is disclosed. The storage medium includes an identification code. The host includes a processor, at least one connection port and an identification port. The processor executes a mass-production application program. The connection port is coupled to at least one electronic product. The identification port is coupled to the storage medium. When the mass-production application program is executed, the processor determines whether the identification code matches a key code. When the identification code matches the key code, the processor writes mass-production data to the electronic product. | 2014-05-15 |
20140137267 | DISTRIBUTING OVERLAY NETWORK INGRESS INFORMATION - Aspects of the present disclosure relate to providing secure access to resources of a private network. For example, a client device may transmit a request identifying the protected resource to an authentication server. The authentication server queries a network address lookup table to identify a network address of the protected resource based on the identifying information of the request. If the network address denotes a network location that is not generally accessible, the authentication server generates a resource record that identifies a bastion host, a port, and a connection method for accessing the protected resource. The resource record and the network address may then be transmitted to the client device. In response, the client device may use the information in the resource record to establish a tunnel connection with the bastion host, and the client device uses the tunnel connection to access the protected resource via the bastion host. | 2014-05-15 |
20140137268 | Rights control method and apparatus for digital living network alliance - Disclosed in the disclosure are a rights control method and an apparatus for Digital Living Network Alliance (DLNA). An address/rights recoding unit is expanded at a DLNA apparatus side to record what addresses and corresponding rights; a service control program is expanded at the DLNA apparatus side, and when another DLNA apparatus requires the present DLNA apparatus to provide a service, the address of said another DLNA apparatus and the address/rights recording unit are compared and the rights is found out. Only users with a Media Access Control (MAC) address set as allowed to have related service can be allowed to use the service of the DLNA apparatus of the technology and to obtain Extensible Markup Language (XML) files of the apparatus and the service description. The service of DLNA service points can be flexibly arranged so as to enable different access users to obtain different rights, thus well guaranteeing the security of the multimedia data and the flexibility of the multimedia service management. The security, privacy and manageability of the DLNA apparatus are ensured. | 2014-05-15 |
20140137269 | REQUESTING ACCESS TO RESTRICTED OBJECTS BY A REMOTE COMPUTER - A method for requesting access rights for an object of a computerized system, comprising invoking in a remote computer linkable to the computerized system an add-on program configured for notifying an owner of the object of the computerized system according to received contact data of the owner of the object, thereby requesting from the owner of the object access rights to the object independently of the computerized system, and an apparatus for performing the same. | 2014-05-15 |
20140137270 | DIGITAL MEDIA ASSET IDENTIFICATION SYSTEM & METHOD - The present invention provides a system and method for identifying and transferring digital media assets within a system through the use of identification data. The identification data is applied to each transferred copy and includes data specific to the customer and digital media asset. To facilitate transfers and ease of use the digital media assets can be made DRM-free. | 2014-05-15 |
20140137271 | DATA SECURITY AND ACCESS TRACKING IN MEMORY - A memory device includes but is not limited to a substrate, a non-volatile memory array integrated on the substrate, and data security logic integrated with the non-volatile memory array on the substrate. The data security logic is operable to perform at least one data security function associated with the non-volatile memory array. | 2014-05-15 |
20140137272 | Limiting Information Leakage and Piracy due to Virtual Machine Cloning - Techniques for detecting a cloned virtual machine instance. A method includes transmitting an identifier associated a virtual machine from an agent embedded in the virtual machine akin to a malware to a detection entity in a network, determining whether the identifier is a unique identifier or whether the identifier is a clone of an identifier associated with a separate virtual machine in the network, and initiating at least one remedial action with the agent embedded in the virtual machine if the identifier is determined to be a clone of an identifier associated with a separate virtual machine in the network. | 2014-05-15 |
20140137273 | SYSTEM AND METHOD FOR SECURING THE UPLOAD OF FILES FROM A SYSTEM SERVER - Embodiments of the invention include a system and method to prevent a user from copying and storing files on a third party storage device or a user's personal computer. To do this, the system and method may perform a process of connecting the authorized user to the company's computer storage to access computer files for modification and, if the authorized user attempts to copy the file to the user's computer or a third party storage site, determining whether the file should be copied. To determine whether the file should be copied, the system may use inspection modules that inspect the data files to determine whether or not the user has been restricted from copying the data file. | 2014-05-15 |
20140137274 | INDUCED MALIGNANT STEM CELLS | 2014-05-15 |
20140137275 | HYBRID LIGHT CHAIN MICE - Genetically modified mice are provided that express human λ variable (hVλ) sequences, including mice that express hVλ sequences from an endogenous mouse λ light chain locus, mice that express hVλ sequences from an endogenous mouse κ light chain locus, and mice that express hVλ sequences from a transgene or an episome wherein the hVλ sequence is linked to a mouse constant sequence. Mice are provided that are a source of somatically mutated human λ variable sequences useful for making antigen-binding proteins. Compositions and methods for making antigen-binding proteins that comprise human λ variable sequences, including human antibodies, are provided. | 2014-05-15 |
20140137276 | VARIETY CORN LINE DC4016YD - The present invention provides an inbred corn line designated DC4016YD, methods for producing a corn plant by crossing plants of the inbred line DC4016YD with plants of another corn plant. The invention further encompasses all parts of inbred corn line DC4016YD, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line DC4016YD, and plants produced according to these methods. | 2014-05-15 |
20140137277 | TRAIT IMPROVEMENT IN PLANTS EXPRESSING AP2 PROTEINS - Polynucleotides and polypeptides incorporated into expression vectors are introduced into plants and were ectopically expressed. These polypeptides may confer at least one regulatory activity and increased photosynthetic resource use efficiency, increased yield, greater vigor, greater biomass as compared to a control plant. | 2014-05-15 |
20140137278 | METHODS AND COMPOSITIONS FOR PRODUCING NEMATODE RESISTANT COTTON PLANTS - The present invention relates to methods for breeding cotton plants containing a recombination event such that quantitative trait loci (“QTL”) on chromosome 11 are present, associated with resistance to both root-knot nematode (“RKN”) and reniform nematode (“REN”) infection (“stacked nematode resistance”). The invention further provides germplasm and the use of germplasm containing such stacked nematode resistance as a source of nematode resistance alleles for introgression into elite germplasm in a breeding program, thus producing novel elite germplasm comprising the stacked nematode resistance trait. | 2014-05-15 |
20140137279 | COTTON VARIETY PX8262RF - The disclosure relates to a cotton variety, designated PX8262RF, the plants and seeds of the cotton variety PX8262RF, methods for producing a cotton plant, either varietal or hybrid, produced by crossing the cotton variety PX8262RF with itself or with another cotton plant, hybrid cotton seeds and plants produced by crossing the variety PX8262RF with another cotton variety or plan, methods for producing a cotton plant containing in its genetic material one or more transgenes, and the transgenic cotton plants produced by that method. This disclosure also relates to cotton varieties derived from cotton variety PX8262RF, to methods for producing other cotton varieties derived from cotton variety PX8262RF, and to the varieties derived by the use of those methods. | 2014-05-15 |
20140137280 | COTTON VARIETY PX433906WRF - The disclosure relates to a cotton variety, designated PX433906WRF, the plants and seeds of the cotton variety PX433906WRF, methods for producing a cotton plant, either varietal or hybrid, produced by crossing the cotton variety PX433906WRF with itself or with another cotton plant, hybrid cotton seeds and plants produced by crossing the variety PX433906WRF with another cotton variety or plan, methods for producing a cotton plant containing in its genetic material one or more transgenes, and the transgenic cotton plants produced by that method. This disclosure also relates to cotton varieties derived from cotton variety PX433906WRF, to methods for producing other cotton varieties derived from cotton variety PX433906WRF, and to the varieties derived by the use of those methods. | 2014-05-15 |
20140137281 | COTTON VARIETY PX433915WRF - The disclosure relates to a cotton variety, designated PX433915WRF, the plants and seeds of the cotton variety PX433915WRF, methods for producing a cotton plant, either varietal or hybrid, produced by crossing the cotton variety PX433915WRF with itself or with another cotton plant, hybrid cotton seeds and plants produced by crossing the variety PX433915WRF with another cotton variety or plan, methods for producing a cotton plant containing in its genetic material one or more transgenes, and the transgenic cotton plants produced by that method. This disclosure also relates to cotton varieties derived from cotton variety PX433915WRF, to methods for producing other cotton varieties derived from cotton variety PX433915WRF, and to the varieties derived by the use of those methods. | 2014-05-15 |
20140137282 | COTTON VARIETY P05X.5322-11.WRF - The disclosure relates to a cotton variety, designated P05X.5322-11WRF, the plants and seeds of the cotton variety P05X.5322-11WRF, methods for producing a cotton plant, either varietal or hybrid, produced by crossing the cotton variety P05X.5322-11WRF with itself or with another cotton plant, hybrid cotton seeds and plants produced by crossing the variety P05X.5322-11WRF with another cotton variety or plan, methods for producing a cotton plant containing in its genetic material one or more transgenes, and the transgenic cotton plants produced by that method. This disclosure also relates to cotton varieties derived from cotton variety P05X.5322-11WRF, to methods for producing other cotton varieties derived from cotton variety P05X.5322-11WRF, and to the varieties derived by the use of those methods. | 2014-05-15 |
20140137283 | Fungal Resistant Plants Expressing CASAR - The present invention relates to a method of increasing resistance against fungal pathogens of the family Phacopsoraceae in plants and/or plant cells. This is achieved by increasing the expression of a CASAR protein or fragment thereof in a plant, plant part and/or plant cell in comparison to wild type plants, wild type plant parts and/or wild type plant cells. Furthermore, the invention relates to transgenic plants, plant parts, and/or plant cells having an increased resistance against fungal pathogens, in particular, pathogens of the family Phacopsoraceae, and to recombinant expression vectors comprising a sequence that is identical or homologous to a sequence encoding a CASAR protein. | 2014-05-15 |
20140137284 | Method of Producing Plants Having Increased Resistance to Pathogens - The present invention relates to a method of producing a transgenic plant cell, a transgenic plant or a transgenic part thereof having an increased resistance to pathogens, wherein the content and/or activity of a receptor-like protein kinase is increased. | 2014-05-15 |
20140137285 | VARIETY CORN LINE FF6788 - The present invention provides an inbred corn line designated FF6788, methods for producing a corn plant by crossing plants of the inbred line FF6788 with plants of another corn plant. The invention further encompasses all parts of inbred corn line FF6788, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line FF6788, and plants produced according to these methods. | 2014-05-15 |
20140137286 | VARIETY CORN LINE HID3483 - The present invention provides an inbred corn line designated HID3483, methods for producing a corn plant by crossing plants of the inbred line HID3483 with plants of another corn plant. The invention further encompasses all parts of inbred corn line HID3483, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line HID3483, and plants produced according to these methods. | 2014-05-15 |
20140137287 | VARIETY CORN LINE FX8609 - The present invention provides an inbred corn line designated FX8609, methods for producing a corn plant by crossing plants of the inbred line FX8609 with plants of another corn plant. The invention further encompasses all parts of inbred corn line FX8609, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line FX8609, and plants produced according to these methods. | 2014-05-15 |
20140137288 | VARIETY CORN LINE MFX7589 - The present invention provides an inbred corn line designated MFX7589, methods for producing a corn plant by crossing plants of the inbred line MFX7589 with plants of another corn plant. The invention further encompasses all parts of inbred corn line MFX7589, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line MFX7589, and plants produced according to these methods. | 2014-05-15 |
20140137289 | Method For Accumulating A Protein In Plant Cell - A method for accumulating a protein in a plant cell, in which by co-expressing a gene which encodes a polypeptide having an ability to form an ER body, and a gene which encodes a target protein having an endomembrane system migration signal peptide at the N-terminus and having an ER retention signal peptide at the C-terminus in the plant cell, the target protein or a protein in which the N-terminus domain of the target protein is lacking is accumulated in an ER body formed in the plant cell. | 2014-05-15 |
20140137290 | MOLECULAR CLOCK MECHANISM OF HYBRID VIGOR - Methods are provided including methods of promoting growth vigor in plants. In one embodiment, a method for promoting growth vigor in a plant comprises providing a plant comprising a circadian clock gene; and modifying expression of the circadian clock gene or modifying activity of a protein produced by the circadian clock gene so as to modify a flowering time of the plant; modify a starch, sugar, chlorophyll, metabolite, or nutrient content of the plant, or increase biomass or yield of the plant. In some embodiments, methods are provided including preparing a transgenic plant and using circadian clock genes as DNA and/or expression markers to select and predict the best combinations of parents to make hybrid plants with enhanced vigor. | 2014-05-15 |
20140137291 | PLANT TRANSCRIPTION FACTORS - This invention relates to an isolated nucleic acid fragment encoding a transcription factor. The invention also relates to the construction of a chimeric gene encoding all or a portion of the transcription factor, in sense or antisense orientation, wherein expression of the chimeric gene results in production of altered levels of accumulated oil in a transformed host cell. | 2014-05-15 |
20140137292 | CITRUS TREES WITH RESISTANCE TO CITRUS CANKER - Methods and compositions for making citrus plants with enhanced resistance to Asiatic citrus canker (ACC) and other forms of citrus canker caused by | 2014-05-15 |
20140137293 | NOVEL ETO1 GENES AND USE OF SAME FOR REDUCED ETHYLENE AND IMPROVED STRESS TOLERANCE IN PLANTS - The invention provides isolated ethylene over-producer 1 (ETO1) nucleic acid molecules which are associated with ethylene production in plants and their encoded proteins. The present invention provides methods and compositions relating to altering ethylene production and abiotic stress response in plants. The invention further provides recombinant expression cassettes, host cells, transgenic plants and antibody compositions. | 2014-05-15 |
20140137294 | GLUCOSINOLATE TRANSPORTER PROTEIN AND USES THEREOF - Methods and means to alter the glucosinolate (GSL) content in plants, in particular in specific plant parts, by modifying glucosinolate transporter protein (GTR) activity in plants or parts thereof are herein described. In particular, methods are provided to decrease GSL content of plant seed and meal thereof, as well as methods to increase GSL content in green plant tissue, of Brassicales plants. | 2014-05-15 |
20140137295 | USE OF INVERTASE SILENCING IN POTATO TO MINIMIZE CHIP AND FRENCH FRY LOSSES FROM ZEBRA CHIP AND SUGAR ENDS - The present invention provides a convenient method for producing potato products such as chips and French fries that have lower incidence of sugar ends and less off-color development due to infection from the zebra chip pathogen. | 2014-05-15 |
20140137296 | MODULATION OF SOLANACEAE FRUIT RIPENING - The present invention relates to a transcription factor gene that plays a key role in Solanaceae fruit ripening. Plants overexpressing the gene have fruits with deeper pigmentation and ripen more rapidly than controls. The invention also relates to transgenic plants comprising said gene, and methods of making said plants. | 2014-05-15 |
20140137297 | EXPRESSION CONSTRUCT AND PROCESS FOR ENHANCING THE CARBON, NITROGEN, BIOMASS AND YIELD OF PLANTS - The assimilated C and N largely influence plant growth and crop yields. Previous attempts to alter the carbon and nitrogen status of the plants attempted with one or two genes The present invention involves simultaneous co-overexpression of three genes wherein one gene (PEPCase) efficiently capture CO2 whereas the other two encode for enzymes (Asp AT and GS) involved in nitrogen assimilation. The combined effect is the enhancement of carbon and nitrogen status of the plant and the productivity. | 2014-05-15 |
20140137298 | PLANT DEFENSE SIGNAL PEPTIDES - A 23 amino acid peptide, AtPep1, plays an important role as a signaling component of the innate immune system of | 2014-05-15 |
20140137299 | METHOD TO IDENTIFY ASIAN SOYBEAN RUST RESISTANCE QUANTITATIVE TRAIT LOCI IN SOYBEAN AND COMPOSITIONS THEREOF - The present invention is in the field of plant breeding and disease resistance. More specifically, the invention includes a method for breeding soybean plants containing quantitative trait loci that are associated with resistance to Asian Soybean Rust (ASR), a fungal disease associated with | 2014-05-15 |
20140137300 | ATOMIC FORCE MICROSCOPE SYSTEM USING SELECTIVE ACTIVE DAMPING - An atomic force microscope (AFM) system comprises a cantilever arm attached to a probe tip. The system controls a height of the cantilever arm to press the probe tip against a sample and then separate the probe tip from the sample, to detect a disturbance of the cantilever arm after the separation of the probe tip from the surface, and to engage active damping of the cantilever arm to suppress the disturbance. | 2014-05-15 |
20140137301 | Shrub rose plant named 'CHEwsumsigns' - A new variety of Shrub rose suitable for garden decoration, having flowers of light pink coloration with a distinctly darker eyezone. | 2014-05-15 |
20140137302 | Vaccinium hybrid plant named 'RIDLEY 1403' - A new and distinct cultivar of | 2014-05-15 |
20140137303 | Nectarine tree named 'Sunectwentyfour' - A new and distinct nectarine tree variety, | 2014-05-15 |