22nd week of 2013 patent applcation highlights part 62 |
Patent application number | Title | Published |
20130139230 | Trusted Service Management Process - Techniques for providing trusted management services (TSM) are described. According to one aspect of the techniques, a secure element (SE) is personalized via the TSM. A process is provided to personalize an SE with multiple parties involved and orchestrated by a party or a business running the TSM, hence as a trusted service manager (TSM). The TSM brings the parties together to recognize the SE being personalized so that subsequent transactions can be authorized and carried out with a device embedded with the SE. In operation, each of the parties may load a piece of data into the SE, including registration information, various services or application data, and various keys so that subsequent transactions can be carried out with or via an authorized party and in a secured and acknowledgeable manner. | 2013-05-30 |
20130139231 | SYSTEM AND METHOD OF VERIFYING A NUMBER OF A MOBILE TERMINAL - A client device is coupled with a server. The client device prompts a user to enter a number associated with a mobile device, which can be the client device, and generates data including a code. The code is typically hidden from the user when the code is generated and is saved on the client device. The client device transmits the number entered by the user and the code generated by the client device to the server, which sends a message, including the code, to the mobile device associated with the number. The client device prompts the user to enter the code included in the message. Validity of the number is based on one or more factors, including the accuracy of the code entered by the user. In addition, validity of the number can also be based on whether the second user input was entered within a predetermined time limit. | 2013-05-30 |
20130139232 | Method and Apparatus for Coordinating a Change in Service Provider Between a Client and a Server with Identity Based Service Access Management - A method of configuring a network access device connected to an access network connected to a plurality of service networks, the network device having a first network address allocated to a subscriber of services of a first service provider provided by a first service network, with a new network address allocated to a second subscriber of services of either the first service provider, or a second service provider provided by a second service network. The method comprises the steps of: sending a request from the network access device to the access network with user credentials for the second subscriber requesting access to the first service provider or a change to the second service provider; receiving a response from the access network; and initiating a network address change request using a configuration protocol. In this manner, a second network address allocated to the second subscriber of services of either the first or second service providers is assigned to the network access device to enable the network access device to communicate data packets to the service network providing the selected service. | 2013-05-30 |
20130139233 | SYSTEM AND METHOD FOR CONTROLLING USER ACCESS TO A SERVICE PROCESSOR - According to one aspect, a system for managing user access to a service processor is disclosed. In one embodiment, the system includes a computer-executable management access module for performing functions to authenticate a user. A management computer that is communicatively coupled to the service processor is operative to perform management functions for at least one target computer. User authentication functions include receiving a first set of login data from a user of the management computer and verifying whether the received login data corresponds to an approved user. If the first set of login data corresponds to an approved user, a code is generated and then displayed on the management computer. When recognized by the personal computing device, data from the code is used for providing a second set of login information to the user, for permitting the user to access the service processor via the management computer. | 2013-05-30 |
20130139234 | SYSTEM AND METHOD FOR REMOTE MANAGEMENT OF A PLURALITY OF TARGET COMPUTERS FROM A COMMON GRAPHICAL INTERFACE - A computer system. In one embodiment, the computer system includes a remote management computer with a user input means and a display means, a plurality of target computers communicatively connected to the remote management computer over a communications link, and a computer-executable remote management application. The remote management application is configured to cause the remote management computer to perform functions that include receiving user authentication data for a user to remotely access particular target computers over the communications link, sending a request for remote management data to each of the particular target computers, receiving remote management data from each of the particular target computers in response to the request, and causing the display means to simultaneously display the graphical user console for each one of the particular target computers in a common graphical interface. | 2013-05-30 |
20130139235 | APPLICATION-BASED CREDENTIAL MANAGEMENT FOR MULTIFACTOR AUTHENTICATION - A device receives a request to authenticate an end user of a user device to use an application, based on an application identifier and a user identifier included the request, and determines whether the application is authenticated based on the application identifier. The device also determines whether the user device is authenticated based on the user identifier and utilizing a generic bootstrapping architecture (GBA) authentication procedure, and determines whether the end user is authenticated based on a personal identification number (PIN) associated with the end user. The device further provides, to an application server device hosting the application, results of the authentications of the application, the user device, and the end user. | 2013-05-30 |
20130139236 | IMPOSTER ACCOUNT REPORT MANAGEMENT IN A SOCIAL NETWORKING SYSTEM - Imposter account reports received by a social networking system are put into a report management process that routes the reports into other handling processes based upon the comparison of the probability of fraud in an alleged imposter account versus the probability of fraud in an alleged authentic account. The account determined to be most probably fraudulent is enrolled in an account verification process. In the account verification process, the account-holder is asked to verify their identity through automatic means. If the automatic means fail to verify the identity of the account-holder, a manual process for verification is initiated. | 2013-05-30 |
20130139237 | Method for digital identity authentication - In a preferred embodiment of the invention, an authenticating device ( | 2013-05-30 |
20130139238 | Method and System For Authenticating User Access To A Restricted Resource Across A Computer Network - A method of authenticating user access to a restricted resource across a computer network, the method characterised by: communicating client device configuration data to a server and assigning a risk analysis score based on the client device configuration data; and generating an alert at a client device in response to the risk analysis score. | 2013-05-30 |
20130139239 | DUAL CODE AUTHENTICATION SYSTEM - A verification method and system are disclosed that verify a user. The user is provided a verification code via, for example, a website, to be communicated to a provided electronic contact via a secondary mode of communication, such as through an SMS-enabled device. If the correct verification code is communicated by the user, the user receives a return message (e.g., a return SMS message) containing a second verification code, which the user submits to a website or on-line form or to another verification system for authentication. | 2013-05-30 |
20130139240 | NETWORK SYSTEM, INFORMATION PROCESSING APPARATUS, METHOD FOR CONTROLLING THE INFORMATION PROCESSING APPARATUS, AND COMPUTER-READABLE STORAGE MEDIUM FOR COMPUTER PROGRAM - A network system including at least one client and a user account management server is provided. The user account management server includes a user account saving portion for saving a user identifier and a user password for a cooperative server with which at least one client works in coordination for specific processing. Each of the clients includes an application storage portion for storing an application for the specific processing, a reference information storage portion for storing reference information to be referred to when the application is executed, a location information obtaining portion for obtaining location information indicating a saving location of the user identifier and user password, a user account obtaining portion for obtaining, based on the location information, the user identifier and the user password from the user account management server, and an update portion for updating the reference information to indicate the user identifier and the user password. | 2013-05-30 |
20130139241 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR BRIDGING USER AUTHENTICATION, AUTHORIZATION, AND ACCESS BETWEEN WEB-BASED AND TELECOM DOMAINS - Methods, systems, and computer readable media for bridging user authentication, authorization, and access between web-based and telecom domains are disclosed. In one example, a method includes issuing, to an application hosted in a web-based network, an access token associated with a user identifier subscribed to a telecommunications network, wherein the access token is issued in response to receiving telecommunications network credentials from a client device associated with the user identifier and receiving, at an over the top (OTT) proxy element in the telecommunications network from the application, the access token for requesting user data associated with the client device to be used to access the application. The method further includes retrieving the user data if the access token is valid a telecommunications network context condition is met and providing the user data to the application, wherein access to the application by the client device is based on the user data. | 2013-05-30 |
20130139242 | Network Accessing Device and Method for Mutual Authentication Therebetween - A method for a mutual authentication between access network devices and an access network device are disclosed by the present invention. The method includes: configuring a certificate on the access network device; performing a mutual authentication based on the certificate between the access network devices. The present invention realizes the authentication between the access network devices, thus the user data can be transmitted directly. | 2013-05-30 |
20130139243 | DISTRIBUTED FIREWALLING IN A WIRELESS COMMUNICATION NETWORK - A method and system for distributed collaborative firewalling in a wireless wide area communication network including a plurality of controllers, comprises a binding table that is built by the controller in response to receiving identifiers of wireless clients being served by the controller, where the binding table lists the wireless clients associated with each access port under control of the controller. A processor of the controller is operable to apply stateless firewalling on wireless communication traffic from a wireless client using the binding table, and applying, by each access port, stateful firewalling on the wireless communication traffic from the wireless client. | 2013-05-30 |
20130139244 | ENHANCING NETWORK CONTROLS IN MANDATORY ACCESS CONTROL COMPUTING ENVIRONMENTS - A Mandatory Access Control (MAC) aware firewall includes an extended rule set for MAC attributes, such as a security label or path. Application labels may be used to identify processes and perform firewall rule-checking. The firewall rule set may including conventional firewall rules, such as address checking, in addition to an extension for MAC attributes. | 2013-05-30 |
20130139245 | System and Method for Incorporating Quality-of-Service and Reputation in an Intrusion Detection and Prevention System - An intrusion prevention system includes a processor, processing engines, buffers that are associated with a different range of reputation scores, and a storage device having a database and an application. The processor executes the application to determine that a firewall has admitted a packet, determine a reputation score for the packet from the database, provide the packet to a buffer that has a reputation score range that includes the reputation score of the packet, provide the packet from the buffer to a processing engine, process the packet by in the processing engine to determine if the packet includes an exploit, and forward the packet to the protected network if the first packet does not include the exploit. | 2013-05-30 |
20130139246 | TRANSPARENT BRIDGE DEVICE - The device provides protection for VoIP or like time-sensitive traffic. Packets arriving at a network interface in the data link layer are inspected to identify signaling packet, which are then queued for further analysis. The signaling packets are analyzed for compliance with adaptive criteria to determine whether the packets are considered safe to pass to a user, and the signaling packets failing to meet the adaptive criteria are rejected. The adaptive criteria based are updated based on historical data pertaining to the signaling packets from the same source address for the same user account. | 2013-05-30 |
20130139247 | FIREWALL APPARATUS, SYSTEMS, AND METHODS EMPLOYING DETECTION OF APPLICATION ANOMALIES - In one embodiment, a processor-implemented method for monitoring network traffic between a first device executing a software application and a second device coupled to the first device. The method includes: (a) the processor analyzing application-level data contained within traffic originating from and/or received by the first device, the application-level data including data provided to and/or provided by the software application; (b) based on the results of the analysis in step (a), the processor creating one or more access rules; (c) the processor receiving a request from the second device to access the first device, the request including application-level data; and (d) the processor determining whether the request received in step (c) complies with one or more of the access rules. | 2013-05-30 |
20130139248 | METHOD OF AUTHENTICATING PASSWORD AND PORTABLE DEVICE THEREOF - A method of authenticating a password and a portable device thereof are provided. The method includes: displaying an input keyboard on which a plurality of objects are arranged; changing an object arranged on the input keyboard according to a manipulation of a user; and if an object pattern arranged in a designated position of the input keyboard corresponds to a preset password pattern, authenticating the user. Therefore, it is difficult to use artifacts on the display screen to trace a password after entry, and thus security is improved. As a result, a protection of personal information of a user is strengthened. | 2013-05-30 |
20130139249 | IMAGE PROCESSING APPARATUS, METHOD FOR CONTROLLING THE SAME, AND STORAGE MEDIUM FOR CARRYING OUT LOGIN PROCESSING - An image processing apparatus transmits, after reception of a login notification of an authenticated user, the login notification to an identified application, and then changes displaying of a screen of a display unit to displaying of an initial screen corresponding to the identified application. After the displaying of the display unit has been changed to the displaying of the initial screen, the image processing apparatus transmits the login notification to, among applications belonging to a first group, an application to which the login notification has not been transmitted, and applications belonging to a second group. | 2013-05-30 |
20130139250 | VIRTUAL APPLIANCE PRE-BOOT AUTHENTICATION - A system for pre-boot authentication of a virtual appliance includes one or more subsystems to receive a command to power-on an information handling system (IHS). After receiving the command to power-on the IHS, the system initializes a power-on self test (POST), passes control of the IHS to a hypervisor, loads a concurrent service environment (CSE), requests user credentials, receives user credentials, authenticates user credentials using the CSE and authorizes a specific operating system image from a plurality of images to run on the IHS via the virtual appliance after the user credentials are authenticated. | 2013-05-30 |
20130139251 | ELECTRONIC DEVICE SYSTEM AND ELECTRONIC DEVICE - When a connection device is connected to an SD socket of an electronic device, a process setting unit of the electronic device obtains permission/inhibition information (an output signal) set forth in a permission/inhibition information setting unit of the connection device. Based on the obtained permission/inhibition information, the process setting unit identifies an execution unit whose operation is to be activated among the execution units provided in the electronic device. Then, the process setting unit instructs the identified execution unit to start operation. This realizes operation of execution units in correspondence to the permission/inhibition information. | 2013-05-30 |
20130139252 | SECURING NETWORK COMMUNICATIONS FROM BLIND ATTACKS WITH CHECKSUM COMPARISONS - Blind attacks on a protocol connection, such as a TCP connection, are prevented by inserting checksums computed during protocol connection establishment handshake into data sent through the connection and invalidating data sent through the connection that lacks the protocol setup information checksums. Reset attacks are prevented by invalidating reset requests unless a master checksum computed from the protocol setup information checksums is included with the reset request. Checksums computed from protocol setup information have improved robustness by including a random number with the protocol setup information. | 2013-05-30 |
20130139253 | Deceptive indicia notification in a communications interaction - Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for monitoring deceptive indicia in communications content may implement operations including, but not limited to: receiving one or more signals associated with communication content provided by a first participant in a communications interaction; detecting one or more indicia of deception associated with the one or more signals associated with the communication content; and providing a notification associated with the one or more indicia of deception associated with the communication content to a second participant in the communications interaction receiving the communication content. | 2013-05-30 |
20130139254 | Deceptive indicia notification in a communications interaction - Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for monitoring deceptive indicia in communications content may implement operations including, but not limited to: receiving one or more signals associated with communication content provided by a participant in a communications interaction; detecting one or more indicia of deception associated with the one or more signals associated with the communication content; and providing a notification associated with the one or more indicia of deception associated with the communication content to the participant providing the communication content. | 2013-05-30 |
20130139255 | Detection of deceptive indicia masking in a communications interaction - Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for detecting masking of deceptive indicia in communications content may implement operations including, but not limited to: receiving one or more signals associated with communications content provided by a first participant in a communications interaction; and detecting at least one indicia of a modification of the communications content associated with at least one indicia of deception by the first participant. | 2013-05-30 |
20130139256 | Deceptive indicia profile generation from communications interactions - Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for generating deceptive indicia profiles may implement operations including, but not limited to: detecting one or more indicia of deception associated with one or more signals associated with communication content provided by a participant in a first communications interaction; detecting one or more indicia of deception associated with the one or more signals associated with communications content provided by the participant in a second communications interaction; and generating a deceptive indicia profile for the participant according to indicia of deception detected in the communications content provided by the participant in the first communications interaction and indicia of deception detected in the communications content provided by the participant in the second communications interaction. | 2013-05-30 |
20130139257 | Deceptive indicia profile generation from communications interactions - Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for generating deceptive indicia profiles may implement operations including, but not limited to: detecting one or more indicia of deception associated with one or more signals associated with communication content provided by a participant in a first communications interaction; detecting one or more indicia of deception associated with one or more signals associated with communications content provided by the participant in a second communications interaction; generating a deceptive indicia profile for the participant according to indicia of deception detected in the communications content provided by the participant in the first communications interaction and indicia of deception detected in the communications content provided by the participant in the second communications interaction; and providing a notification associated with the deceptive indicia profile for the participant to the participant. | 2013-05-30 |
20130139258 | DECEPTIVE INDICIA PROFILE GENERATION FROM COMMUNICATIONS INTERACTIONS - Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for generating deceptive indicia profiles may implement operations including, but not limited to: detecting one or more indicia of deception associated with one or more signals associated with communication content provided by a participant in a first communications interaction; detecting one or more indicia of deception associated with one or more signals associated with communications content provided by the participant in a second communications interaction; generating a deceptive indicia profile for the participant according to indicia of deception detected in the communications content provided by the participant in the first communications interaction and indicia of deception detected in the communications content provided by the participant in the second communications interaction; and providing a notification associated with the deceptive indicia profile for the participant to a second participant in a communications interaction with the participant. | 2013-05-30 |
20130139259 | DECEPTIVE INDICIA PROFILE GENERATION FROM COMMUNICATIONS INTERACTIONS - Systems, methods, computer-readable storage mediums and/or circuitry for generating deceptive indicia profiles may implement: detecting one or more indicia of deception associated with one or more signals associated with communication content provided by a participant in a first communications interaction; detecting one or more indicia of deception associated with one or more signals associated with communications content provided by the participant in a second communications interaction; generating a deceptive indicia profile for the participant according to indicia of deception detected in the communications content provided by the participant in the first communications interaction and indicia of deception detected in the communications content provided by the participant in the second communications interaction; and detecting one or more indicia of deception associated with one or more signals associated with communications content provided by the participant in a third communications interaction according to the deceptive indicia profile for the participant. | 2013-05-30 |
20130139260 | Providing a Malware Analysis Using a Secure Malware Detection Process - In certain embodiments, a computer-implemented system comprises a boundary controller and a first malware detection agent. The boundary controller is operable to implement a security boundary between a first computer network environment and a second computer network environment. The second computer network environment has a security classification level that is more restrictive than a security classification level of the first computer network environment. The boundary controller is operable to receive from the first computer network environment a file. The first malware detection agent is positioned in the second computer network environment and is operable to receive via the boundary controller the file and apply a first malware detection process on the file. The first malware detection process is subject to the security classification level of the second computer network environment. | 2013-05-30 |
20130139261 | METHOD AND APPARATUS FOR DETECTING MALICIOUS SOFTWARE THROUGH CONTEXTUAL CONVICTIONS - Novel methods, components, and systems that enhance traditional techniques for detecting malicious software are presented. More specifically, we describe methods, components, and systems that leverage important contextual information from a client system (such as recent history of events on that system) to detect malicious software that might have otherwise gone ignored. The disclosed invention provides a significant improvement with regard to detection capabilities compared to previous approaches. | 2013-05-30 |
20130139262 | Taint injection and tracking - An embodiment or embodiments of an electronic device can comprise an input interface and a hardware component coupled to the input interface. The input interface can be operable to receive a plurality of taint indicators corresponding to at least one of a plurality of taints indicative of potential security risk which are injected from at least one of a plurality of resources. The hardware component can be operable to track the plurality of taints. | 2013-05-30 |
20130139263 | SYSTEMS AND METHODS FOR FINGERPRINTING PHYSICAL DEVICES AND DEVICE TYPES BASED ON NETWORK TRAFFIC - Systems and methods for providing device and/or device type fingerprinting based on properties of network traffic originating from a device to be identified. In one implementation, the method includes capturing packets routed through a network at an intermediate node between the originating device to be identified and destination, measuring properties of the captured traffic, including packet inter-arrival time, and generating a signature based on the measured properties that includes identifying information about the hardware and/or software architecture of the device. Various implementations do not require deep packet inspection, do not require a managed device-side client, are protocol and packet payload agnostic, and effective for MAC or IP-level encrypted streams. Also, various implementations can provide wired-side detection of wireless devices and device types and can detect both previously detected and unknown devices. | 2013-05-30 |
20130139264 | APPLICATION SANDBOXING USING A DYNAMIC OPTIMIZATION FRAMEWORK - A method for preventing malware attacks includes, launching an application on an electronic device, intercepting one or more instructions from the application, determining whether the one or more instructions includes an attempt to access a sensitive system resource of the electronic device, rewriting the one or more instructions to access the secured system resource of the electronic device, executing the rewritten instructions on the electronic device, and observing the results of the rewritten instructions. The application is attempting to execute the one or more instructions. | 2013-05-30 |
20130139265 | SYSTEM AND METHOD FOR CORRECTING ANTIVIRUS RECORDS TO MINIMIZE FALSE MALWARE DETECTIONS - Disclose are system, method and computer program product for correcting antivirus records. In an example method, during analysis of a software object for malware, an antivirus application retrieves from an antivirus database an antivirus record associated with the analyzed object, which identifies the object as malicious or clean. The application also checks if there is a correction for the antivirus record in an antivirus cache and use the correction for analysis of the software object. If no correction is found in the cache, the application checks correctness of the antivirus record with an antivirus server. The antivirus server uses statistical information about software objects collected from antivirus applications deployed on different computers to validate correctness of antivirus records. If the antivirus server provides a correction for the antivirus record, the application uses the provided correction for analysis of the software object for malware. | 2013-05-30 |
20130139266 | DETECTING VULNERABILITIES IN WEB APPLICATIONS - A method, computer program product, and system for detecting vulnerabilities in web applications is described. A method may comprise determining one or more values associated with a web application that flow to response data associated with the web application. The one or more values may be modifiable by unreliable input. The method may further comprise generating a representation of the response data associated with the web application. The method may additionally comprise determining one or more potentially vulnerable portions of the response data based upon, at least in part, the one or more values modifiable by the unreliable input that flow to the response data associated with the web application, and the representation of the response data associated with the web application. | 2013-05-30 |
20130139267 | DETECTING VULNERABILITIES IN WEB APPLICATIONS - A method, computer program product, and system for detecting vulnerabilities in web applications is described. A method may comprise determining one or more values associated with a web application that flow to response data associated with the web application. The one or more values may be modifiable by unreliable input. The method may further comprise generating a representation of the response data associated with the web application. The method may additionally comprise determining one or more potentially vulnerable portions of the response data based upon, at least in part, the one or more values modifiable by the unreliable input that flow to the response data associated with the web application, and the representation of the response data associated with the web application. | 2013-05-30 |
20130139268 | AGENT APPARATUS AND METHOD FOR SHARING ANONYMOUS IDENTIFIER-BASED SECURITY INFORMATION AMONG SECURITY MANAGEMENT DOMAINS - The present invention relates to an agent apparatus and method for sharing anonymous identifier-based security information among security management domains. A plurality of security information sharing agent apparatuses respectively located in a plurality of security management domains and configured to collect security information and transmit collected security information to outside of the security management domains. Each security information sharing agent apparatus includes an identifier conversion unit for converting real name identifier-based security information into anonymous identifier-based security information by converting a real name identifier included in the security information into an anonymous identifier, and a security information communication unit for transmitting the anonymous identifier-based security information obtained by the identifier conversion unit to outside of a corresponding security management domain so that security information is shared among the plurality of security management domains. | 2013-05-30 |
20130139269 | CONTEXTUAL USE AND EXPIRATION OF DIGITAL CONTENT - Technologies related to contextual use and expiration of digital content are generally described. In some examples, a receiving device may connect with a sponsoring device having the digital content. A relationship property defines a relationship context between the receiving device and the sponsoring device. The receiving device may receive the digital content from the sponsoring device and use the digital content so long as allowed, as determined with reference to the relationship property. | 2013-05-30 |
20130139270 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING APPARATUS STARTUP CONTROL METHOD - An information processing apparatus includes a first processor that is connected to an input/output device and is configured to execute a program for controlling an apparatus including the input/output device, and a second processor that is connected to an external network and is configured to execute a program for establishing communication via the external network, wherein when starting the information processing apparatus, the second processor verifies an integrity of the program to be executed by the first processor and starts the first processor when the integrity of the program to be executed by the first processor is verified, and when the integrity of the program to be executed by the first processor is not verified, the second processor issues a problem notification without using a user interface of the first processor. | 2013-05-30 |
20130139271 | CONTENT PROVIDER WITH MULTI-DEVICE SECURE APPLICATION INTEGRATION - Methods and systems for providing access to content are disclosed. The method is performed at least in part at a client computer system having a processor and memory. The method includes executing a host application associated with a first party. In some implementations, the host application is a media player. The method further includes initiating a secure communication channel between the host application and a server associated with the first party. The method further includes executing a supplemental application associated with a second party. The method further includes accessing, with the supplemental application, content licensed to the first party, wherein the licensed content is accessible to the supplemental application via the secure communication channel subject to terms of a licensing agreement. In some implementations, the content is media content, such as music, movies, and the like. | 2013-05-30 |
20130139272 | Resource-Type Weighting of Use Rights - Resource-type weighting is used in evaluating the use-rights associated with hardware resources. | 2013-05-30 |
20130139273 | Chronic Lymphocytic Leukemia Modeled in Mouse by Targeted miR-29 Expression - A mouse model and uses there of for detecting, treating, characterizing, and diagnosing various diseases are described. | 2013-05-30 |
20130139274 | B-CELL STIMULATING FUSION PROTEINS OF AN ANTIGEN WITH BAFF OR APRIL - The invention relates to the fields of molecular biology, medicine, virology and vaccine development. Because the different forms of the presently available vaccines all have their specific drawbacks, there is a need for alternative vaccine strategies. The current invention provides means and methods for such alternative vaccine strategies. | 2013-05-30 |
20130139275 | METHODS FOR PRODUCTION OF SPORELESS AGARICUS BISPORUS MUSHROOMS - Methods of producing hybrid | 2013-05-30 |
20130139276 | DISCOVERY AND UTILIZATION OF SORGHUM GENES (MA5/MA6) - Methods and composition for the production of non-flowering or late flowering sorghum hybrid. For example, in certain aspects methods for use of molecular markers that constitute the Ma5/Ma6 pathway to modulate photoperiod sensitivity are described. The invention allows the production of plants having improved productivity and biomass generation. | 2013-05-30 |
20130139277 | AGRICULTURAL BUSINESS APPLICATIONS AND METHODS OF USE - The present invention relates to agricultural business methods that may be used in conjunction with a novel technology that can predict the yield of a given plant. | 2013-05-30 |
20130139278 | NUCLEOTIDE SEQUENCES AND POLYPEPTIDES ENCODED THEREBY USEFUL FOR MODIFYING PLANT CHARACTERISTICS AND PHENOTYPES - Plants, plant cells, plant material, seed of plants and regenerated plants comprising a nucleic acid molecule that encodes an amino acid sequence which confers at least one improved characteristic to said plants, plant cells, plant material, seed of plants and regenerated plants as compared to wild-type plants cultivated under identical conditions. | 2013-05-30 |
20130139279 | WUSCHEL (WUS) GENE HOMOLOGS - This invention relates to isolated polynucleotides encoding WUS polypeptides. The invention further provides isolated WUS polypeptides. The invention also provides methods of using the polynucleotides to modulate the level of WUS, improve transformation efficiency, to stimulate plant cell growth, including stem cells, to stimulate organogenesis, to stimulate somatic embryogenesis, to induce apomixis, and to provide a positive selection for cells comprising the polynucleotide. The invention also relates to cells, plants and seeds comprising the polynucleotides of the invention or produced by the methods of the invention. | 2013-05-30 |
20130139280 | Plants Having Enhanced Yield-Related Traits and a Method for Making the Same - Methods for enhancing various economically important yield-related traits in plants by modulating expression in a plant of a nucleic acid encoding a LEJ1 (Loss of timing of ET and JA biosynthesisI) polypeptide, ExbB polypeptide, NMPRT (nicotinamide phosphoribosyltransferase) polypeptide, AP2-26-like polypeptide or HD8-like polypeptide are provided. Plants produced by the methods are also provided, which have enhanced yield-related traits relative to corresponding wild type plants or other control plants. Constructs comprising a nucleic acid encoding a LEJ1, ExbB, NMPRT, AP2-26-like or HD8-like polypeptide and uses thereof are provided. | 2013-05-30 |
20130139281 | Transgenic Plants with Increased Stress Tolerance and Yield - Polynucleotides are disclosed which are capable of enhancing a growth, yield under water-limited conditions, and/or increased tolerance to an environmental stress of a plant transformed to contain such polynucleotides. Also provided are methods of using such polynucleotides and transgenic plants and agricultural products, including seeds, containing such polynucleotides as transgenes. | 2013-05-30 |
20130139282 | ENHANCING SECONDARY PHYTOCHEMICAL AND NUTRIENTS IN PLANTS AND PLANT PARTS - According to the invention, the object is achieved by providing all necessary conditions at optimum level to produce plant and plant parts having higher nutrients and secondary metabolites, when compared to normal plants or grown in tap water. Formulated solution containing balanced nutrients, higher levels of targeted nutrient, required pH, single or multiple eliciting factors, required concentrations of natural preservatives and maintained at required temperature and light facilitated to achieve the above object. | 2013-05-30 |
20130139283 | COMPOSITIONS COMPRISING NATURAL COMPONENTS FOR PROTECTING PLANT PRODUCTS AND CROPS - The invention provides a method for protecting plants and crops products against a variety of pests. The damages are prevented or mitigated, or the pest infestation is controlled, by applying a composition containing a pomegranate extract onto fruits and vegetables, or by employing it in the vicinity of the plant or crops. | 2013-05-30 |
20130139284 | Plants and Polynucleotides Encoding Truncated Cry34 Proteins - This invention provides modified, insecticidal Cry34 proteins with enhanced properties as compared to wild-type Cry34 proteins. The modifications to these proteins were based in part on an analysis of the three-dimensional (3D) structure of this protein and other proteins in the Cry34 class. The subject invention also includes polynucleotides that encode these modified proteins, and transgenic plants that produce these modified proteins. This invention further provides methods of controlling plant pests, including rootworms, with these modified proteins. The modified proteins of the subject invention include chimeric toxins involving exchanged segments, domains, and motifs as discussed herein. The subject invention also provides methods of modifying Cry34 proteins. | 2013-05-30 |
20130139285 | CHEMICAL SENSOR WITH OSCILLATING CANTILEVERED PROBE - The invention provides a method of detecting a chemical species with an oscillating cantilevered probe. A cantilevered beam is driven into oscillation with a drive mechanism coupled to the cantilevered beam. A free end of the oscillating cantilevered beam is tapped against a mechanical stop coupled to a base end of the cantilevered beam. An amplitude of the oscillating cantilevered beam is measured with a sense mechanism coupled to the cantilevered beam. A treated portion of the cantilevered beam is exposed to the chemical species, wherein the cantilevered beam bends when exposed to the chemical species. A second amplitude of the oscillating cantilevered beam is measured, and the chemical species is determined based on the measured amplitudes. | 2013-05-30 |
20130139286 | Strawberry plant named 'Cupcake' - The present invention provides a new and distinct strawberry variety designated as ‘Cupcake’ (a.k.a., ‘107615’). | 2013-05-30 |