21st week of 2015 patent applcation highlights part 82 |
Patent application number | Title | Published |
20150143509 | METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR DETERMINING PASSWORD STRENGTH - A method for estimating the strength of a graphicalpassword comprising two or more segments is disclosed. In some embodiments, this advantageous solution is achieved by implementing a multi-step process. In one step, the data processing system applies a first operation on a first segment to produce a transformed segment. In another step, the data processing system performs a comparison operation between the transformed segment and a second segment. In another step, the data processing system performs a penalty operation with respect to the first segment based on an outcome of the comparison operation. The penalty operation includes one or more of (1) calculating a penalty value, wherein the penalty value may be used in calculating a value representing the strength of the graphicalpassword; and (2) disregarding the first or the second segment when calculating the value representing the strength of the graphical password. | 2015-05-21 |
20150143510 | SYSTEMS AND METHODS FOR NOTIFYING A USER OF A USER ENTRY THAT MATCHES SECURITY INFORMATION AND FOR HIDING DISPLAY OF A USER ENTRY THAT MATCHES SECURITY INFORMATION - Systems and methods for notifying a user of a user entry that matches security information and for hiding display of a user entry that matches security information are disclosed. According to an aspect, a method includes receiving user text input. The method also includes determining whether the user text input matches a predetermined portion of security information. Further, the method includes presenting notification of the match via a user interface in response to determining that the user text input matches the predetermined portion of the security information. | 2015-05-21 |
20150143511 | SYSTEM AND METHOD FOR HIGH SECURITY BIOMETRIC ACCESS CONTROL - System and method for high security biometric access control, according to the invention, enable high security access control to single instance or network resources, using biometric data, smart card technology and public key infrastructure or other symmetric/asymmetric encryption/decryption methodology. | 2015-05-21 |
20150143512 | IRIS KEY, SYSTEM AND METHOD OF UNLOCKING ELECTRONIC DEVICE USING THE IRIS KEY - In a method of unlocking an electronic device using an iris key, the iris key transmits an iris signal of a current user to the electronic device. The electronic device reads one or more pre-stored iris signal templates, and compares the received iris signal with the one or more iris signal templates. When the received iris signal matches with one of the one or more iris signal templates, the electronic device can be unlocked. | 2015-05-21 |
20150143513 | PROJECTOR AND CONTROL METHOD FOR PROJECTOR - A projector can be connected in cascade to another projector. Either a first mode for the projector to operate as a leading projector in the cascade connection or a second mode for the projector to operate as a second or subsequent projector in the cascade connection is set. The projector is made available for use based on success of authentication by an authentication unit or on reception of use permission information of the projector by a receiving unit. | 2015-05-21 |
20150143514 | METHODS, APPARATUS, AND SYSTEMS FOR SECURING SIM (SUBSCRIBER IDENTITY MODULE) PERSONALIZATION AND OTHER DATA ON A FIRST PROCESSOR AND SECURE COMMUNICATION OF THE SIM DATA TO A SECOND PROCESSOR - An electronic circuit | 2015-05-21 |
20150143515 | METHOD AND APPARATUS FOR SELECTIVELY ENABLING A MICROPROCESSOR-BASED SYSTEM - A system for selectively enabling a microprocessor-based system is disclosed. State information that describes the operating conditions or circumstances under which a user intends to operate the system is obtained. In the preferred embodiment of the invention, a valid hash value is determined, preferably based on the state information and preferably by locating the valid hash value within a table of valid hash values indexed by the state information. Candidate authorization information is obtained from the user, and a candidate hash value is generated by applying a hashing algorithm to the candidate authorization information, the state information, or a combination of the candidate authorization information and state information. The candidate hash value and the valid hash value are then compared, and the microprocessor-based system is enabled if the candidate hash value matches the valid hash value. In this manner, the designer or distributor of the system can determine, at the time of manufacture or distribution, the conditions and circumstances under which the system may be operated. | 2015-05-21 |
20150143516 | SESSION HOPPING - Method for communicating in a computer network from a first node ( | 2015-05-21 |
20150143517 | SECURITY ARCHITECTURE FOR MALICIOUS INPUT - A computing device detects and mitigates malicious input at the point of origin before such input invades a communication network. A computing device receives, at an operating system kernel, a first input string and stores, in a cache accessible to the kernel, a copy of the first input string. The computing device receives, by the operating system kernel, a second input string and compares the copy of the first input string and the second input string for redundancy before committing the second input string to an application or communication interface. The computer device rejects the second input when the comparing indicates that the copy of the first input string and the second input string are redundant. | 2015-05-21 |
20150143518 | DATA LOSS PREVENTION OF INFORMATION USING STRUCTURED DOCUMENT TEMPLATES AND FORMS - A method and apparatus for identifying information as protected information using a structure is described. A DLP system, incorporating a structure analyzer, monitors outbound data transfers performed by the computing system for violations of a DLP policy. The DLP system analyzes a structure of information contained in an outbound data transfer against a protected structure defined in a DLP policy. The DLP system identifies the information as protected information to be protected by the DLP policy based on the analysis, and, when the information is identified as protected, the DLP system detects a violation of the DLP policy. The protected structure may be derived from document templates, document forms, or from a set of training documents. | 2015-05-21 |
20150143519 | DETECTION OF POTENTIALLY COPYRIGHTED CONTENT IN USER-INITIATED LIVE STREAMS - Systems and methods modifying a presentation of media content in response to a detected violation are provided. In particular, media content such as a media stream broadcasted by a user to other users can be monitored. The broadcasted media stream can be fingerprinted and compared to a fingerprint repository that includes entries associated with media content that is copyrighted or otherwise considered a violation. If the fingerprint matches entries included in the fingerprint repository, then the media stream can be modified such as modified to terminate. | 2015-05-21 |
20150143520 | DISTRIBUTED NETWORK PROTECTION - A method and system for processing frames transmitted in a network including nodes and network segments connecting the nodes. Frames transmitted over network segments are detected. Frame information from each detected frame is stored in a frame information repository. A stored hierarchical data structure includes vectors specifying frame information defining frames permitted in the network, classes including vectors with constraints on the vectors, and patterns including classes with constraints on the classes. The frame information in the detected frames may not match the frame information specified in the vectors. The vectors, if matched by the frame information in the detected frames, may not satisfy the constraints in the classes. The vectors, if matched by the frame information in the detected frames, may satisfy the constraints in the classes, and the classes whose constraints are satisfied by the matched vectors may not satisfy the constraints in the patterns. | 2015-05-21 |
20150143521 | SYSTEM AND METHOD FOR DETECTING MALICIOUS SOFTWARE USING MALWARE TRIGGER SCENARIOS IN A MODIFIED COMPUTER ENVIRONMENT - Disclosed system and methods for malware testing of software programs. An example method includes storing a plurality of malware trigger scenarios specifying different sets of malware trigger events known to trigger malicious behaviour in software programs; in response to obtaining a software program, modifying a computer environment for operating the software program by creating malware trigger events associated with a selected one of the plurality of malware trigger scenarios; analyzing an execution of the software program in the modified computer environment in response to the malware trigger events; upon detecting that the software program exhibits malicious behaviour, performing remedial actions on the software program; and upon detecting that the software program exhibits no malicious behaviour, selecting a different malware trigger scenario from the plurality of malware trigger scenarios for malware testing of the software program. | 2015-05-21 |
20150143522 | IDENTIFICATION OF SYSTEMS WITH ANOMALOUS BEHAVIOUR USING EVENTS DERIVED FROM MACHINE DATA PRODUCED BY THOSE SYSTEMS - Methods and apparatus consistent with the invention provide the ability to organize and build understandings of machine data generated by a variety of information-processing environments. Machine data is a product of information-processing systems (e.g., activity logs, configuration files, messages, database records) and represents the evidence of particular events that have taken place and been recorded in raw data format. In one embodiment, machine data is turned into a machine data web by organizing machine data into events and then linking events together. | 2015-05-21 |
20150143523 | VIRUS PROCESSING METHOD AND APPARATUS - Embodiments of the present disclosure provide a virus processing method and apparatus. In embodiments of the present disclosure, attribute analysis on the threads contained in the target process is performed to determine whether at least one of the threads contained in the target process matches virus attribute information. If at least one of the threads contained in the target process matches virus attribute information, virus type information is determined based on the matched virus attribute information, so that execution of process creation operation is prohibited based on the virus type information. Due to the measures of prohibiting execution of process creation operation, replication of virus in the system can be effectively prevented so as to improve security performance of the system. | 2015-05-21 |
20150143524 | SYSTEM AND METHOD FOR IMPLEMENTING APPLICATION POLICIES AMONG DEVELOPMENT ENVIRONMENTS - In a system for facilitating distributed security and vulnerability testing of a software application, each development sandbox in a set of sandboxes receives a portion of the entire application, and the received portion may be tested based on an application-level security policy to obtain a pass/fail result. The portion of the application corresponding to a certain sandbox may be modified and rescanned (i.e., retested) until the modifications, i.e., development achieves functional and quality requirements, and a pass result is obtained. Thereafter, the scan results are promoted to a policy sandbox, where a compliance result for the entire software application can be obtained based on, at least in part, the promoted results. Other sandboxes may also perform their respective pass/fail testing using the promoted results, thus minimizing the need for synchronizing the code changes in different sandboxes before testing for security policy in any sandbox and/or during application-level scanning. | 2015-05-21 |
20150143525 | ANALYZING ACCESS CONTROL CONFIGURATIONS - A facility is described for analyzing access control configurations. In various embodiments, the facility comprises an operating system having resources and identifications of principals, the principals having access control privileges relating to the resources, the access control privileges described by access control metadata; an access control scanner component that receives the access control metadata, determines relationships between the principals and the resources, and emits access control relations information; and an access control inference engine that receives the emitted access control relations information and an access control policy model, analyzes the received information and model, and emits a vulnerability report. In various embodiments, the facility generates an information flow based on access control relations, an access control mechanism model, and an access control policy model; determines, based on the generated information flow, whether privilege escalation is possible; and when privilege escalation is possible, indicates in a vulnerability report that the privilege escalation is possible. | 2015-05-21 |
20150143526 | ACCESS POINT CONTROLLER AND CONTROL METHOD THEREOF - Provided is a control method of an access point controller (APC), the method including: (a) if occurrence of a predetermined security vulnerability checking event on particular terminal equipment is sensed, controlling the plurality of APs so that port scanning is capable of being performed on the particular terminal equipment; and (b) determining that security vulnerability has occurred in the particular terminal equipment in at least one of a case where the predetermined port is opened, a case where the predetermined port is closed, and a case where the number of opened ports exceeds a predetermined number, as a result of performing port scanning on the particular terminal equipment. | 2015-05-21 |
20150143527 | MANAGING VIRTUAL COMPUTING TESTING - Systems, methods, and interfaces for the management of virtual machine instances and other programmatically controlled networks are provided. The hosted virtual networks are configured in a manner such that a virtual machine manager of the virtual network may monitor activity such as user requests, network traffic, and the status and execution of various virtual machine instances to determine possible security assessments. Aspects of the virtual network may be assessed for vulnerabilities at varying levels of granularity and sophistication when a suspicious event or triggering activity is detected. Illustrative embodiments of the systems and methods may be implemented on a virtual network overlaid on one or more intermediate physical networks that are used as a substrate network. | 2015-05-21 |
20150143528 | Risk Assessment for Software Applications - Disclosed are various embodiments for assessing risk associated with a software application on a user computing device in an enterprise networked environment. An application rating is generated for the software application based at least in part on application characteristics. A risk analysis for the installation of the application is generated based at least in part on the application rating, the user computing device, and user information. | 2015-05-21 |
20150143529 | METHOD AND SYSTEM FOR ANONYMISATION IN CONTINUOUS LOCATION-BASED SERVICES - In some embodiments, a computer-implemented method includes receiving a first location-based service (LBS) request from a requesting device. One or more peer devices are selected from a plurality of actual peer devices. A set of false queries is generated, by a computer processor, based on the selected peer devices. Transmitted to a service provider are a real query, representing the first LBS request of the requesting device, and the set of false queries representing the selected peer devices. A set of query responses are received from the service provider. From the set of query responses, a real query response is extracted, corresponding to the real query. The real query response is transmitted to the requesting device in reply to the first LBS request. | 2015-05-21 |
20150143530 | METHOD FOR SHARING FILE AND ELECTRONIC DEVICE THEREOF - A method of operating an electronic device is provided. The method includes generating an edition file edited in a form that shares an original file, generating a first sharing file by inserting a watermark into the edition file, transmitting the first sharing file to an external electronic device, receiving a transmission request of a second sharing file corresponding to the original file from the external electronic device, and transmitting the second sharing file to the external electronic device. | 2015-05-21 |
20150143531 | Monitoring and Managing User Privacy Levels - Various embodiments pertain to techniques for measuring a user's privacy level as a user interacts with various web services. In various embodiments, entities with which the user interacts are detected and sensitive information shared by the user is logged to determine what a given entity knows about the user. In some embodiments, sensitive information that is shared by a user can be processed using a predictive algorithm to ascertain a user's level of privacy. When a user's identity is predicted by the algorithm, a user can be alerted to the loss of anonymity. In various embodiments, user-defined areas of anonymity can be used to measure a user's definition of privacy. In some embodiments, alerts can also be provided to the user when a new, previously undisclosed, piece of information is shared by the user. | 2015-05-21 |
20150143532 | SYSTEM AND METHOD FOR ENABLING PSEUDONYMOUS LIFELIKE SOCIAL MEDIA INTERACTIONS WITHOUT USING OR LINKING TO ANY UNIQUELY IDENTIFIABLE USER DATA AND FULLY PROTECTING USERS' PRIVACY - A quasi-identity system and methods of operating the same are described. The quasi-identity system may be deployed as a mobile application, website, or Application Programming Interface (API) at which users thereof are allowed to share opinions and other information with one another without ever having to expose their true identity or a reference thereto (e.g., email address, phone number, etc.). Thus, users of the website never have to concern themselves with the potential loss of private information and can, therefore, share their opinions more freely. | 2015-05-21 |
20150143533 | METHOD OF GENERATING A STRUCTURE AND CORRESPONDING STRUCTURE - Disclosed is a method of generating a structure comprising at least one virtual machine, the method comprising: obfuscating a first virtual machine source code, thereby yielding a first obfuscated virtual machine (OVM) source code; associating a processor identifier with the first OVM source code, thereby yielding a processor-specific first OVM source code; compiling the processor-specific first OVM source code, thereby yielding a processor-specific first OVM. Furthermore, a structure generated by said method is disclosed. | 2015-05-21 |
20150143534 | SYSTEM AND METHOD FOR MANAGING, TRACKING, AND UTILIZING COPY AND/OR PASTE EVENTS - A method of enforcing copyright rights over a distributed computer network includes the steps of transmitting website content to a remote user computer, transmitting computer executable instructions to the remote user computer, the computer executable instructions being operable to identify execution of a copy command applied to at least a portion of the website page content, receiving notification, via the computer executable instructions, of execution of a copy command applied to at least a portion of the website content, receiving identification information associated with either the remote user computer or a user of the remote user computer, and identifying publication of the at least a portion of the website page content. | 2015-05-21 |
20150143535 | Method and System to Warn the User in the Event of Potential Confidential Document Security Violations - A method and system to warn the user in the event of potential confidential document security violations. The method includes using a computer, electronically embedding a digital marker in an electronic document to create a marked document; storing the document on a non-removable non-transitory computer readable medium of the computer; upon a request for transmission of the marked document from the computer or for copying the marked document to a removable non-transitory computer readable medium, determining that the marked document contains the digital marker and displaying a warning on a display unit of the computer of the request based on the marked document containing the digital marker; and allowing the transmission or the copying only upon approval of release of the marked document by a human user of the computer. | 2015-05-21 |
20150143536 | SYSTEM AND METHOD FOR LOCATING AND RETRIEVING PRIVATE INFORMATION ON A NETWORK - A system for document retrieval in a network environment is provided where documents are stored with corresponding privacy codes. A query server computer is in communication with the network and is programmed to generate a privacy index of all documents available on the network indexed by their corresponding privacy codes. The privacy codes define document access permissions that are securely associated with the documents and are assigned by document custodians. A search engine in communication with the network is configured to receive a query from a requester and generate a list of documents from the privacy index which match search parameters of the query and privacy codes of the requester. | 2015-05-21 |
20150143537 | Identification of Unauthorized Disclosure - Systems, methods, computer-readable media, and apparatuses for identifying a source of an unauthorized disclosure of information are provided. For instance, a document may be generated and transmitted to a plurality of users. The document transmitted may be the same document (e.g., no additional documents are created for different users). Upon accessing the document, users in different groups of users may view different data items in a data item field in the document. If a disclosure is made, the data item disclosed may aid in identifying the group of users who viewed that data item and may be the source of the disclosure. That identified group may then be further sorted or divided into two or more subgroups and another document may be transmitted to the plurality of users. The process may continue in this manner until a source of the disclosure is identified. | 2015-05-21 |
20150143538 | Portable Eye-Controlled Device, Verification Device and Method, Computer Readable Recording Medium and Computer Program Product - The present invention provides a portable eye-controlled device, which is coupled to a security apparatus and is adapted to verify a user's authority, the portable eye-controlled device comprising: a displaying unit for displaying a password menu to perform a password entering procedure; an image-capturing unit for capturing an eye image of the user's eye; and a processing unit for analyzing the eye image to obtain an input string from the user and compare the input string with a predetermined safe password, wherein, processing unit generates a verification message to the security apparatus when the safe password matches the input string. | 2015-05-21 |
20150143539 | Method and System for Backing Up and Restoring License - A method for backing up and restoring a license is provided, which solves the problem of right proliferation in the prior art caused when an original license is transmitted to a user when a server restores the license. The method includes: backing up, at a server, license information of a first device, and associating the license information with a user identifier, the license information reflecting the current state information of a license when the first device reports the license information the last time; requesting, by a second device, the server to restore the license; and validating, by the server, a user identifier of the second device and the user identifier associated with the license information, and upon determination that the two user identifiers are consistent, generating a license based on the license information backed up, and transmitting the license to the second device. A terminal device, a server, and a license processing system are also provided. | 2015-05-21 |
20150143540 | SYSTEM AND METHOD FOR SELECTIVELY REDACTING INFORMATION IN ELECTRONIC DOCUMENTS - A computer implemented system and method is provided for imposing access controls on selective portions of electronic documents by defining data attributes as conditions for access to particular information in a document. Commands from a redactor identify at least one portion of an electronic document to be subject to access control. A set of selectable access control directives defining conditions for accessing the identified portions is presented to the redactor. Access control is imposed on the identified portions in accordance with the defined conditions in response to receiving the selective access control directives. | 2015-05-21 |
20150143541 | INFORMATION INPUT AND OUTPUT APPARATUS - There is provided an information input and output apparatus including a screen control unit that generates a screen which includes at least one region to input or output information, as a window, a display attribute storage unit that stores a display and a non-display of each of the windows on the screen, and a position and a size of each of the windows when the windows are displayed on the screen, as a display attribute for each window, a display unit that displays the screen generated by the screen control unit, and a contact position detecting unit that is disposed along a display surface of the display unit, and outputs a coordinate for each contact position to the screen control unit when contacts are simultaneously detected at a plurality of positions. The screen control unit determines a region that is formed by connecting a plurality of contact positions, on the basis of coordinate information of the plurality of contact positions acquired by the contact position detecting unit, and changes the display attribute of the window in accordance with the region. | 2015-05-21 |
20150143542 | LICENSING FOR SERVICES - A method, system, and computer-readable storage media for providing licensing for services are provided herein. The method includes determining, via a service partner, whether a user exists in a user provisioning cache and whether the user is provisioned to use a service provided by the service partner. The method also includes querying a licensing service to determine updates to the user provisioning cache if the user does not exist in the user provisioning cache or is not provisioned to use the service, or both. Further, the method includes determining whether the user is provisioned to use the service based on the updates to the user provisioning cache and, if the user is provisioned to use the service, allowing the user access to the service. | 2015-05-21 |
20150143543 | SCALABLE SECURE EXECUTION - In one embodiment a controller comprises logic configured to establish a pairing with a remote processor in a second electronic device, create a first secure communication channel with the remote processor, transmit a first portion of a processing task to the remote processor via the first secure channel, receive, via a second communication channel, an input from the first portion of the processing task, and complete at least a second portion of the processing task using the input. Other embodiments may be described. | 2015-05-21 |
20150143544 | APPARATUSES, METHODS, AND BROWSERS BROWSER DATA PROTECTION - A terminal device may include a storage medium and a processor. The processor may be configured to execute instructions stored in the storage medium to operate a browser under an instruction of a user of the terminal, wherein the browser may include a private mode and a non-private mode; obtain data generated by an operation of the browser by the user; and switch the browser from the non-private mode to the private mode in response to a private mode entry instruction received from the user. When the terminal device receives a data display request from the user, the processor may display the data obtained when the browser is in the private mode and the data obtained when the browser is in the non-private mode together when the browser is in the private mode; and display the data obtained when the browser is in the non-private mode only when the browser is in the non-private mode. | 2015-05-21 |
20150143545 | Function for the Challenge Derivation for Protecting Components in a Challenge-Response Authentication Protocol - The invention relates to a device for authenticating a product with respect to at least one authenticator. Said device comprises a capturing unit, a test unit and a transmitting unit. Said capturing unit is designed to capture a challenge emitted by the authenticator. Said test unit is designed to test an authorization from the authenticator for capturing a response to the emitted challenge. Said transmitter unit is designed to transmit a predetermined response to the authenticator in accordance with the tested authorization and the captured challenge. As a result, increased security during the authentication is ensured. The invention also relates to a system comprising said type of device and an authenticator, and to a method and a computer program product for authenticating a product. | 2015-05-21 |
20150143546 | SERVICE ORIENTED SECURE COLLABORATIVE SYSTEM FOR COMPARTMENTED NETWORKS - A system receives a request to store a document in a database, receives a user security token, analyzes the document to determine an adjudicated security level for the document, compares the user security token to the adjudicated security level, stores the document when the user security token is equal to the adjudicated security level, when the user security token is not equal to the adjudicated security level, queries the user as to whether the document should be stored with the adjudicated security level, receives a response to the query from the user, stores the document when the user agrees to store the document with the adjudicated security level, and when the user does not agree to store the document with the adjudicated security level, transmits a message to a security officer and quarantine the document. | 2015-05-21 |
20150143547 | SECURE PROVISIONING OF NETWORK SERVICES - Provided are systems and methods for secure provisioning of consumer network services. For example, there is a broadband modem for secure provisioning of a network service, where the broadband modem includes a controller having an embeded memory. The controller is configured to enable an unmanaged interface of the broadband modem, to establish a subscription interface link over the enabled unmanaged interface, and to download, over the subscription interface link, a subscriber firmware enabling a managed interface corresponding to the network service. Power cycling the broadband modem erases the downloaded subscriber firmware and disables the managed interface. | 2015-05-21 |
20150143548 | METHODS AND SYSTEMS FOR REMOTELY REMOVING METADATA FROM ELECTRONIC DOCUMENTS - A method and system for removing metadata from email attachments sent from mobile devices includes receiving an email with an attached document. The attached document has metadata removed to create a cleansed version of the attached document. The attached document is replaced by the cleansed version of the attached document, and the email is sent according to the address or addresses included in the email. | 2015-05-21 |
20150143549 | METHOD, AN APPARATUS, A COMPUTER SYSTEM, A SECURITY COMPONENT AND A COMPUTER READABLE MEDIUM FOR DEFINING ACCESS RIGHTS IN METADATA-BASED FILE ARRANGEMENT - The invention relates to a method for a computer system storing electronic objects being defined by metadata items. The method comprises deriving access rights from one or more security components originating from respective metadata items of at least one object, and determining the effective access rights for the object by means of the security components. The invention also relates to a method for a computer system storing electronic objects being defined by metadata items, wherein access rights for an object are determined by means of one or more pseudo-users. The invention also relates to an apparatus, a computer system and a computer readable medium comprising a computer program stored therein for carrying out the methods. | 2015-05-21 |
20150143550 | CHIP AND METHOD FOR DETECTING AN ATTACK ON A CHIP - According to one embodiment, a chip is described comprising a substrate; an energy source configured to provide energy to the substrate; an energy receiver configured to receive energy from the energy source via the substrate and a determiner configured to determine a value of a parameter of the energy transmission between the energy source and the energy receiver, to check whether the value matches a predetermined value of the parameter and to output a signal depending on the result of the check. | 2015-05-21 |
20150143551 | ELECTRONIC TAMPER DETECTION - An apparatus, method and package for electronic tamper detection. In one example, an apparatus, device or package for electronic tamper detection includes: a first inductor positioned at a first distance from a first conductive surface; a first oscillator generating a first frequency in dependence upon the first inductor; and a comparator setting a tamper detected status if the generated first frequency is not within an error tolerance to a pre-stored first frequency. One example of a method for fabricating an electronic tamper detection apparatus, device, or package is also provided. | 2015-05-21 |
20150143552 | BIOCONTROL - Provided is an arthropod male germline gene expression system suitable for conditional expression of an effector gene in an Arthropod male germline. The system comprises a first expression unit comprising an effector gene and a promoter therefor operably linked thereto; and a second expression unit. Said second unit comprises a coding sequence for a transcription factor and an upstream regulatory element operably linked thereto, the transcription factor being capable of acting upon the promoter in the first expression unit to drive expression of the effector gene. The upstream regulatory element includes a promoter for the transcription factor; and a 5′ UTR adjacent a start site for the transcription factor coding sequence. The upstream regulatory element driving sufficient expression of the transcription factor such that the transcription factor protein in turn drives transcription of the effector gene before meiosis. Also provided are uses of the system for instance in methods of biocontrol and quality control. | 2015-05-21 |
20150143553 | Methods And Compositions Comprising A Drosophila Model Of Amyotrophic Lateral Sclerosis - In an aspect, the invention relates to a method of screening for a therapeutic for amyotrophic lateral sclerosis. In an aspect, the invention relates to transgenic | 2015-05-21 |
20150143554 | COMPOSITIONS AND METHODS FOR IN VIVO EVALUATION OF BIOLUMINESCENCE - Compositions and methods are described for normalizing a bioluminescent signal in a live animal. | 2015-05-21 |
20150143555 | FISH AND THE PRODUCTION THEREOF - This invention is directed to the composition, method of production, aid rrse of improved edible fish, crustacean, or mollusk products enriched with one or more components that provide health benefits to humans or other animals consuming the product. | 2015-05-21 |
20150143556 | Mutant Alpha-Synuclein, and Methods Using Same - The present invention relates to a mutant human alpha-synuclein with increased toxicity compared to wild-type alpha-synuclein, or a homologue thereof, wherein the mutant alpha-synuclein or homologue thereof comprises at least one amino acid substitution selected from the group consisting of a substitution at the alanine at position 56 (A56), at the alanine at position 76 (A76), at the methionine at position 127 (M127) and/or at the valine at position 118 (V118), as defined in the claims. Further, the invention relates to a polynucleotide encoding the mutant alpha-synuclein or homologue thereof, or an expression vector comprising said polynucleotide, a cell comprising the polynucleotide or expression vector, as defined in the claims. Also, a non-human animal comprising the cell of the invention is provided, as defined in the claims. Finally, the invention provides methods for identifying a substance that prevents or reduces toxicity of alpha-synuclein, as defined in the claims. | 2015-05-21 |
20150143557 | COMPOSITION FOR INDUCING PROLIFERATION OR ACCUMULATION OF REGULATORY T CELLS - It was found that bacteria belonging to the genus | 2015-05-21 |
20150143558 | NON-HUMAN ANIMALS HAVING A HUMANIZED B-CELL ACTIVATING FACTOR GENE - Non-human animals, cells, methods and compositions for making and using the same are provided, wherein the non-human animals and cells comprise a humanized B-cell activating factor gene. Non-human animals and cells that express a human or humanized B-cell activating factor protein from an endogenous B-cell activating factor locus are described. | 2015-05-21 |
20150143559 | NON-HUMAN ANIMALS HAVING A HUMANIZED A PROLIFERATION-INDUCING LIGAND GENE - Non-human animals, cells, methods and compositions for making and using the same are provided, wherein the non-human animals and cells comprise a humanized a proliferation-inducing ligand gene. Non-human animals and cells that express a human or humanized a proliferation-inducing ligand protein from an endogenous a proliferation-inducing ligand locus are described. | 2015-05-21 |
20150143560 | ANIMAL MODEL FOR EPILEPSY AND METHOD FOR PRODUCING THE SAME - The present invention relates to a technique for inducing epilepsy and a non-human animal model of epilepsy. More particularly, the present invention relates to a method for inducing epilepsy in an animal, a non-human animal model of epilepsy, and a method for manufacturing the same. | 2015-05-21 |
20150143561 | NON-HUMAN ANIMALS HAVING A HUMANIZED B-CELL ACTIVATING FACTOR GENE - Non-human animals, cells, methods and compositions for making and using the same are provided, wherein the non-human animals and cells comprise a humanized B-cell activating factor gene. Non-human animals and cells that express a human or humanized B-cell activating factor protein from an endogenous B-cell activating factor locus are described. | 2015-05-21 |
20150143562 | NON-HUMAN ANIMALS HAVING A HUMANIZED A PROLIFERATION-INDUCING LIGAND GENE - Non-human animals, cells, methods and compositions for making and using the same are provided, wherein the non-human animals and cells comprise a humanized a proliferation-inducing ligand gene. Non-human animals and cells that express a human or humanized a proliferation-inducing ligand protein from an endogenous a proliferation-inducing ligand locus are described. | 2015-05-21 |
20150143563 | ISOLATION OF LIVING CELLS AND PREPARATION OF CELL LINES BASED ON DETECTION AND QUANTIFICATION OF PRESELECTED CELLULAR RIBONUCLEIC ACID SEQUENCES - The invention is directed to reliable and efficient detection of mRNAs as well as other RNAs in living cells and its use to identify and, if desired, separate cells based on their desired characteristics. Such methods greatly simplify and reduce the time necessary to carry out previously-known procedures, and offers new approaches as well, such as selecting cells that generate a particular protein or antisense oligonucleotide, generating cell lines that express multiple proteins, generating cell lines with knock-out of one or more protein, and others. | 2015-05-21 |
20150143564 | PEPPER HYBRID SV3198HJ - The invention provides seed and plants of pepper hybrid SV3198HJ and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of pepper hybrid SV3198HJ and the parent lines thereof, and to methods for producing a pepper plant produced by crossing such plants with themselves or with another pepper plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2015-05-21 |
20150143565 | PEPPER HYBRID SV7017HJ - The invention provides seed and plants of pepper hybrid SV7017HJ and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of pepper hybrid SV7017HJ and the parent lines thereof, and to methods for producing a pepper plant produced by crossing such plants with themselves or with another pepper plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2015-05-21 |
20150143566 | PEPPER HYBRID SV0045HJ - The invention provides seed and plants of pepper hybrid SV0045HJ and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of pepper hybrid SV0045HJ and the parent lines thereof, and to methods for producing a pepper plant produced by crossing such plants with themselves or with another pepper plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2015-05-21 |
20150143567 | PEPPER HYBRID SV8066HJ - The invention provides seed and plants of pepper hybrid SV8066HJ and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of pepper hybrid SV8066HJ and the parent lines thereof, and to methods for producing a pepper plant produced by crossing such plants with themselves or with another pepper plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2015-05-21 |
20150143568 | PEPPER HYBRID PX-11487057 - The invention provides seed and plants of pepper hybrid PX-11487057 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of pepper hybrid PX-11487057 and the parent lines thereof, and to methods for producing a pepper plant produced by crossing such plants with themselves or with another pepper plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2015-05-21 |
20150143569 | PEPPER HYBRID PX 11404796 - The invention provides seed and plants of pepper hybrid PX 11404796 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of pepper hybrid PX 11404796 and the parent lines thereof, and to methods for producing a pepper plant produced by crossing such plants with themselves or with another pepper plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2015-05-21 |
20150143570 | PEPPER HYBRID SV5633HT - The invention provides seed and plants of pepper hybrid SV5633HT and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of pepper hybrid SV5633HT and the parent lines thereof, and to methods for producing a pepper plant produced by crossing such plants with themselves or with another pepper plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2015-05-21 |
20150143571 | TOMATO HYBRID PS 01565172 - The invention provides seed and plants of tomato hybrid PS 01565172 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid PS 01565172 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2015-05-21 |
20150143572 | MELON VARIETY NUN 35007 MEM - The invention relates to the field of | 2015-05-21 |
20150143573 | BRASSICA ROD1 GENE SEQUENCES AND USES THEREOF - The present invention relates to | 2015-05-21 |
20150143574 | NEW PLANT RESISTANCE GENE - The invention relates to a new gene that is able to provide plants with resistance against pathogens, more preferably | 2015-05-21 |
20150143575 | MAJOR QTLS CONFERRING RESISTANCE OF CORN TO FIJIVIRUS - The invention relates to methods and compositions for identifying maize plants that have newly conferred resistance or enhanced resistance to, or are susceptible to, a | 2015-05-21 |
20150143576 | LETTUCE VARIETY 41-188 RZ - The present invention relates to a | 2015-05-21 |
20150143577 | Haplotypes Associated with Improved Stacked Trait Performance in Transgenic Plants - The present invention provides methods and compositions for the identification and selection of loci modulating phenotypic expression of an herbicide tolerance trait in plant breeding. In addition, methods are provided for screening germplasm entries for the performance and expression of this trait. | 2015-05-21 |
20150143578 | PLANT REGULATORY GENES PROMOTING ASSOCIATION WITH NITROGEN FIXING BACTERIA - This disclosure concerns plant nitrogen responses. Embodiments concern regulatory factors that contribute to the functional association of plants (e.g., non-nodulating plants) with nitrogen-fixing bacteria. | 2015-05-21 |
20150143579 | NUCLEOTIDE SEQUENCES AND POLYPEPTIDES ENCODED THEREBY USEFUL FOR MODIFYING PLANT CHARACTERISTICS - Isolated polynucleotides and polypeptides encoded thereby are described, together with the use of those products for making transgenic plants with increased tolerance to abiotic stress (e.g., high or low temperature, drought, flood). | 2015-05-21 |
20150143580 | Compositions and Methods for Controlling Leptinotarsa - Disclosed herein are methods of controlling insect pests, in particular | 2015-05-21 |
20150143581 | Nucleic acid molecules and other molecules associated with plants and uses thereof - Polynucleotides useful for improvement of plants are provided. In particular, polynucleotide sequences are provided from plant sources. Polypeptides encoded by the polynucleotide sequences are also provided. The disclosed polynucleotides and polypeptides find use in production of transgenic plants to produce plants having improved properties. | 2015-05-21 |
20150143582 | PATHOGEN-INDUCIBLE SYNTHETIC PROMOTER - The invention relates to a pathogen-inducible synthetic promoter which is suitable for regulating the transcription of a nucleic acid, and includes a minimal promoter, characterized in that the minimal promoter includes a sequence motif a) dbrmwa or b) twcccmt which is disposed downstream from a TATA region and in front of a transcription starting point which is located on the minimal promoter and at which transcription of the nucleic acid to be regulated starts. | 2015-05-21 |
20150143583 | USE OF THE SOYBEAN SUCROSE SYNTHASE PROMOTER TO INCREASE PLANT SEED LIPID CONTENT - Recombinant DNA constructs comprising the soybean sucrose synthase promoter operably linked to polynucleotides encoding transcription factors such as ODP1, Lec1 and FUSCA3 are disclosed. These constructs are used for increasing oil content while maintaining normal germination in oilseed plants. Methods to increase oil content in the seeds of an oilseed plant using this construct are also disclosed herein. | 2015-05-21 |
20150143584 | NUCLEIC ACID MOLECULES ENCODING POLYPEPTIDES INVOLVED IN REGULATION OF SUGAR AND LIPID METABOLISM AND METHODS OF USE VIII - This invention relates generally to nucleic acid sequences encoding proteins that are related to the presence of seed storage compounds in plants. More specifically, the present invention relates to | 2015-05-21 |
20150143585 | Biomass Production Increasing Gene And Transgenic Plant Using Same - The present disclosure relates to, inter alia, a gene for increasing biomass production isolated from | 2015-05-21 |
20150143586 | GENE FOR INCREASING THE PRODUCTION OF PLANT BIOMASS AND/OR SEEDS AND METHOD FOR USE THEREOF - A technique by which the production of plant biomass can be significantly increased is provided. A protein phosphatase 2C gene having 3 consensus sequences comprising the amino acid sequences shown in SEQ ID NOS: 1-3 from the N-terminal side in such order is over-expressed. | 2015-05-21 |
20150143587 | METHODS FOR PRODUCING TRANSGENIC PLANTS - A method of producing a stably transformed corn plant in a single container is demonstrated. This method allows for the automation of the transformation process and reduces labor, material, and ergonomic costs associated with traditional plant tissue culture systems. | 2015-05-21 |
20150143588 | Universal Donor System For Gene Targeting - A universal donor polynucleotide is described that can be inserted at targeted locations in plant genomes to facilitate rapid and high throughput integration of a donor molecule within a specific genomic location. | 2015-05-21 |
20150143589 | Shrub rose plant named 'Sprolych' - A new and distinct variety of shrub rose plant is provided which forms in abundance on a substantially continuous basis attractive semi-double ivory cream blossoms that possess a substantially non-fading blotch of deep burgundy at the center of the petals. The vegetation is vigorous and strong and the growth habit is compact and bushy. Attractive ornamental semi-glossy dark green foliage is formed. The plant is particularly well suited for growing in a Western landscape. Distinctive ornamentation is provided. | 2015-05-21 |
20150143590 | Miniature rose plant named 'WEKwibypur' - A new variety of Miniature rose suitable for garden decoration, having flowers of black purple coloration with a white eyezone. | 2015-05-21 |
20150143591 | Hybrid tea rose plant named 'JaCelspe' - A new variety of Hybrid Tea rose suitable for garden decoration, having flowers coral pink to coral coloration. | 2015-05-21 |
20150143592 | Hybrid tea rose plant names 'JACibego' - A new variety of Hybrid Tea rose suitable for garden decoration, having flowers white in coloration. | 2015-05-21 |
20150143593 | Hybrid tea rose plant names 'JACnizea' - A new variety of Hybrid Tea rose suitable for garden decoration, having flowers of cream in the center of the bloom and coral on the edges. | 2015-05-21 |
20150143594 | Corylus plant named 'Wepster' - A new and distinct cultivar of | 2015-05-21 |
20150143595 | Vanda plant named SPCDW1319 - ‘SPCDW1319’ is a distinctive variety of | 2015-05-21 |
20150143596 | Vanda plant named 'SPCDW1320' - ‘SPCDW1320’ is a distinctive variety of | 2015-05-21 |
20150143597 | Pelargonium plant named 'KLEIZ13338' | 2015-05-21 |
20150143598 | Pelargonium plant named 'KLEIZ13365' | 2015-05-21 |