24th week of 2009 patent applcation highlights part 62 |
Patent application number | Title | Published |
20090150982 | APPARATUS AND METHOD FOR DOMAIN MANAGEMENT USING PROXY SIGNATURE - A domain management apparatus and method using a proxy signature is provided. A domain management apparatus which manages a device domain being a set of at least one user device, the apparatus including: a registration performing unit for performing a registration procedure for registering the domain management apparatus in a service providing apparatus; a license issuance authority receiving unit for receiving a license issuance authority for content use from the service providing apparatus; and a service providing unit for providing the at least one user device with a content service and a license generated by the license issuance authority. | 2009-06-11 |
20090150983 | SYSTEM AND METHOD FOR MONITORING HUMAN INTERACTION - A method and system to authenticate human interactive proof (HIP) are described here. In response to a request from a web server, a motion random HIP in the form of motion-captcha is generated. The web server can then display the generated the motion random HIP in a requested web page. The web page is accompanied with a request from the user to provide the response for the generated motion captcha. After evaluation and verification of response received from the particular user, the authentication system determine whether the response to the HIP challenge is from human or from other source like computer software scripted agent. | 2009-06-11 |
20090150984 | Method and system for securely authorizing VoIP interconnections between anonymous peers of VOIP networks - A peering authority or settlement clearinghouse can be used to control access, collect session accounting information, and provide financial settlement of interconnect or session fees among anonymous Internet Protocol (IP) peers or networks. The addition of peering policy criteria, such as price and quality of service, to peer to peer route discovery mechanisms enable a trusted intermediary, such as the settlement clearinghouse, to authorize acceptable interconnection or peering sessions between anonymous IP peers. Any financial settlement transactions which result from the peering sessions may be subsequently executed by the settlement clearinghouse. | 2009-06-11 |
20090150985 | Multiple Identity Management in an Electronic Commerce Site - In electronic commerce (e-commerce) sites that are executed on a single e-commerce application, a user's session is only associated with a single user identity for e-commerce site domain. Acting under a single identity across the site may not be desired. There may be requirements to associate an individual user with one or more separate identities within parts of the site. Aspects of the invention provide a method, system and computer program product for managing multiple user identities for a user of an electronic commerce (e-commerce) site. The method comprises defining the e-commerce site as one or more security domains; and in response to a user's request to invoke an operation of the e-commerce site: determining a one of the one or more security domains to which the operation relates; performing one of a) creating a session and b) reusing a session for the user automatically in accordance with the determined security domain, said session associated with a user identity and a role indicating privileges for invoking operations of the e-commerce site in at least the determined security domain; and persisting said session for reuse. The user's request may be received in association with one or more sessions persisted for the user and a one of the sessions selected in accordance with the determined security domain. In response, either a session may be created or reused. Persisting may comprise providing one or more cookies defining the session to the user for associating with a subsequent request. In accordance with a feature of this aspect, the e-commerce site may define each of the one or more security domains as a hierarchy of organizations and assets owned by the organizations and the determining a one of the one or more security domains to which the operation relates may comprise evaluating the user's request in accordance with the hierarchy. | 2009-06-11 |
20090150986 | User Authorization Using An Automated Turing Test - Methods, apparatus, and products are disclosed for user authorization using an automated Turing Test that include: selecting, by an automated Turing Test module, a challenge token, the challenge token including a challenge key; repeatedly at an Automated Turing Test pace: selecting, by the Automated Turing Test module, a portion of the challenge token in dependence upon predetermined selection criteria, and revealing, by Automated Turing Test module, only the selected portion of the challenge token to a user; receiving, by the Automated Turing Test module from the user, a user response; determining, by the Automated Turing Test module, whether the user response matches the challenge key; and authorizing, by the Automated Turing Test module, the user to access a resource if the user response matches the challenge key. | 2009-06-11 |
20090150987 | SYSTEM AND METHOD FOR CONFIGURING ENVRIONMENTS OF PRIVATE SYSTEM USING SMART CARD IN PUBLIC SYSTEM - Provided is a system and method for configuring environments of a private system using a smart card in a public system. The system includes a smart card that stores owner identification information, system-environment and work-environment information, private data, and payment information; a public system that authenticates a user of the smart card by using the owner identification information of the smart card and reconfigures a system and work environment similar to the private system to perform work continuously ; a service providing sever that provides an installation program or substitute program required for configuring the latest work environment of the user; and a payment server that pay a usage charge for the public system connected to the smart card. | 2009-06-11 |
20090150988 | Authenticated service virtualization - Virtualizing a service is disclosed. A request to access a service from a first server is received from a client. A secret data associated with the first server is used to process the received request. The processed request is sent to a second server. The first and second servers are associated with a virtualization; and wherein the processed request can be used by the second server to authenticate the client. | 2009-06-11 |
20090150989 | USER AUTHENTICATION - A device, method, and system disclosed herein may be used to integrate and control authentication and passwords among various applications and platforms. The exemplary method may obtain a service ticket from a key distribution center of the key distribution center authentication process and generate a random key. A port between the client and the service may be created and utilized to transmit the service ticket and the random key to a service from the client. The random key may replace a password provided by the user. The random key in the password field of the service logon is transmitted to the service. The service authenticates the random key in the password field with the stored random key in the cache of the service. Once authenticated the service ticket is validated. | 2009-06-11 |
20090150990 | INTEGRATED ACCESS AUTHORIZATION - A facility for performing an access control check as an integral component of an operating system and utilizing a centralized policy store is provided. The facility executes as an integral part of an operating system executing on a computer and receives an authorization query to determine whether a principal has authorization to access a resource. The facility applies a policy maintained in a centralized policy store that is applicable to the principal to determine whether authorization exists to access the resource. If authorization does not exist, the facility denies the authorization query and records an indication of the denial of the authorization in an audit log. The facility may trigger events based on the auditing of authorization queries. The facility may also record an indication of authorization to access the resource in the audit log. The facility may additionally determine whether the authorization query is a request for authorization to perform an inherently dangerous operation, and record an indication of an authorization to perform the inherently dangerous operation in the audit log. | 2009-06-11 |
20090150991 | PASSWORD GENERATION - A device, method and system for authentication by a user are disclosed herein. The exemplary method may authenticate a user password entered by a user. User specific attributes may be accessed and used to produce a generated password. The generated password may be produced using an algorithm and the user attributes. The generated password may be used to log onto a resource for the user. | 2009-06-11 |
20090150992 | KEYSTROKE DYNAMICS AUTHENTICATION TECHNIQUES - A keystroke dynamics authentication system collects measurements as a user types a phrase on a keyboard. A first set of derived data values are computed based on the collected measurements, and then a second set of derived data values are computed based on the first set of derived values. The first and second sets of derived values are used to construct a template for identifying the user based on his typing. | 2009-06-11 |
20090150993 | Mobile Device with Frequently Operated Biometric Sensors - A mobile device having a user input component receiving input from a user and a biometric sensor incorporated in the user input component collecting biometric data from the user when the user input component is receiving the input, wherein the input is non-biometric data. In addition, a system and method for receiving input from a user via a user input component of a mobile device and collecting biometric data from the user via a biometric sensor incorporated within the user input component when receiving the input from the user, wherein the input is non-biometric data. | 2009-06-11 |
20090150994 | Biometric access control transactions - Aspects and embodiments of the present disclosure provide devices and methods for biometric authentication of a user during access control transactions. In one aspect, an access control processor device, comprising a biometric input sensor configured to receive user biometric information; a biometric verification processor configured to authenticate the input user biometric information; and a communication element configured to activate when the biometric information entered into the biometric verification system is authenticated and maintain an inactive status for the communication element on the payment processor device when the biometric information entered into the biometric verification system is not authenticated. | 2009-06-11 |
20090150995 | METHODS AND SYSTEMS FOR PROVIDING WEBSITE HOSTING SECURITY - A method for registering user identification data in an application service provider data repository is provided, where the application service provider provides web services for a plurality of customers, each customer having a plurality of users with respective user identification data. The method includes receiving user identification data from one of the users through a website associated with one of the plurality of customers, retrieving customer identification data based on a uniform resource locator assigned to the website, concatenating the user identification data and customer identification data to create a user key, and registering a user account within the data repository based on the created user key. | 2009-06-11 |
20090150996 | APPLICATION PROTECTION FROM MALICIOUS NETWORK TRAFFIC - A program, method and system for embedding a programmable packet filter into an application to protect the application against malicious network packets are disclosed. Traditional packet filtering techniques to protect against malicious packets designed to exploit defects in applications, based on external packet filtering devices create a bottleneck in network traffic and present a large overhead cost. In addition, when security vulnerabilities in applications are discovered, traditional application updating methods lack a fast enough turn-around time to protect the application and users data from attack. These problems can be overcome by embedding a programmable packet filter into the application itself. The application can use the filter to discard malicious network packets. Furthermore, the filter can be updated via configuration files downloaded from the application vendor to update the application's embedded programmable packet filter without having to update the entire program code of the application. | 2009-06-11 |
20090150997 | APPARATUS AND METHOD FOR DETECTING MALICIOUS FILE IN MOBILE TERMINAL - Provided is an apparatus and method for detecting a malicious file that attempts to initiate communication in a mobile terminal without a user's approval. The method of detecting a malicious file in a mobile terminal includes: determining whether a file to be examined is an executable file; when the file is an executable file, examining whether the file is a malicious file that can cause unapproved communication based on at least one predetermined examination condition; and outputting the result of examining whether the file is the malicious file. Accordingly, an attack caused by a new type of malicious code can be coped with. | 2009-06-11 |
20090150998 | REMOTE COLLECTION OF COMPUTER FORENSIC EVIDENCE - The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device. | 2009-06-11 |
20090150999 | SYSTEM, METHOD AND PROGRAM PRODUCT FOR DETECTING COMPUTER ATTACKS - Detecting obfuscated attacks on a computer. A first program function is invoked to render static components of a web page and identify program code within the web page or associated file. In response, before executing the identified program code, a malicious-code detector is invoked to scan the identified program code for malicious code. If the malicious-code detector identifies malicious code in the identified program code, the identified program code is not executed. If no malicious code is detected, a second program function generates revised program code from execution of the identified, program code. In response, before executing the revised program code, the malicious-code detector is invoked to scan the revised program code for malicious code. If the malicious-code detector identifies malicious code in the revised program code, the revised program code is not executed. | 2009-06-11 |
20090151000 | LICENSE MANAGEMENT DEVICE AND METHOD - Security is secured according to the type of a license so that unnecessary processing load is reduced. A license accumulation control unit ( | 2009-06-11 |
20090151001 | METHOD AND APPARATUS FOR OPERATING RIGHTS - A method for operating a Right For Contents (R4C) includes: obtaining, by a terminal, a hybrid RO generated by the RI server, with the R4C items and the operation Rights For Rights (R4Rs) carried in the hybrid RO; operating the R4C items in the hybrid RO according to the R4R. A method for adding an R4R includes: a terminal receives a hybrid RO that includes the existing rights of the terminal and the newly added R4R; the terminal operates the R4C in the hybrid RO according to the new R4R. The present invention also discloses a terminal and a server. The present invention enables the RI to control the rights at a finer granularity, intensifies the RI's control on the rights, and provides a mechanism of purchasing an R4R after an RO is purchased. | 2009-06-11 |
20090151002 | DOCUMENT ACCESS MANAGEMENT METHOD AND SYSTEM - This disclosure provides a document access method and system. The document access method and system are based on a social network model which interconnects members of the social network as a function of trust. This framework provides a basis for documents to be accessed by members which are not directly specified by a document's owner, while providing a certain degree of document security. | 2009-06-11 |
20090151003 | RECEIVER CAPABLE OF MANAGING CONDITIONAL ACCESS SOFTWARE OBJECTS, DOWNLOAD-BASED CONDITIONAL ACCESS SYSTEM INCLUDING THE RECEIVER, AND METHOD FOR MANAGING THE CONDITIONAL ACCESS SOFTWARE - Provided are a receiver with a CA function based on software download, a CA system including the receiver, and a method for managing CA software executed by the receiver. The receiver includes a CA software management means, a download means, a demultiplexer, and a descrambler. The CA software management means performs an overall management operation including the download, execution, state control and termination of a plurality of CA softwares. The download means downloads the CA software from a CA software download server at the request of the CA software management means. The demultiplexer receives scrambled multimedia contents and a CA message and transfers the CA message to the CA software management means. The descrambler receives a descrambling key extracted from the CA message by means of the CA software and descrambles the scrambled multimedia contents with the descrambling key. Thus, a plurality of CA softwares can be operated in one receiver (e.g., a settop box). Also, a plurality of CA softwares can be downloaded beforehand or timely. Also, it is possible to provide a rapid change of running CA software. | 2009-06-11 |
20090151004 | Media markup for visual content alteration - A classification method and system for possible content alteration of a media work may include criteria regarding content that is feasible for alteration. Such criteria may be maintained in records that are accessible to an interested party. Some embodiments may include a record of primary authorization rights applicable to a possible content alteration. A further embodiment feature may include a record of secondary authorization rights applicable to substitute altered content incorporated in a derivative version. Various exemplary identifier markup schemes indicative of a location or category of an alterable media content component may be implemented for audio, visual, and audio/video alterable content. | 2009-06-11 |
20090151005 | METHOD FOR IDENTITY THEFT PROTECTION WITH SELF-DESTRUCTING INFORMATION - A method for identity theft protection includes receiving an identity theft indicator indicating a possible loss or theft of a personal device, wherein the identity theft indicator includes at least one of a user-initiated signal, a geographic range indicator, an expired timer, a failure of a heart-beat verification, and a battery level indicator. The method further includes attempting contact of an owner of the personal device, wherein attempting contact includes at least one of transmitting a message to the owner over a telephone connection, transmitting an email to a registered email address of the owner, and transmitting a text-based message to a registered telephone number on the personal device. The method further includes protecting information stored on the personal device if attempting contact of the owner is not successful. | 2009-06-11 |
20090151006 | GROUP REGISTRATION DEVICE, GROUP REGISTRATION RELEASE DEVICE, GROUP REGISTRATION METHOD, LICENSE ACQUISITION DEVICE, LICENSE ACQUISITION METHOD, TIME SETTING DEVICE, AND TIME SETTING METHOD - There is provided a group registration device or the like which is capable of simplifying registration processing to readily perform group registration while retaining secure registration processing. | 2009-06-11 |
20090151007 | DIGITAL RIGHTS MANAGEMENT FOR RETRIEVING MEDICAL DATA FROM A SERVER - The invention relates to a method of and system for retrieving medical data from a server, the method comprising: requesting the medical data from the server by an uncertified client; installing a certified digital rights management service on the uncertified client; managing the requested medical data according to the installed certified digital rights management service thereby retrieving the medical data from the server; the system comprising means for requesting the medical data from the server by an uncertified client means for installing a certified digital rights management service on the uncertified client; means for managing the requested medical data according to the installed certified digital rights management service thereby retrieving the medical data from the server. | 2009-06-11 |
20090151008 | Media markup system for content alteration in derivative works - A classification method and system for possible content alteration of a media work may include criteria regarding content that is feasible for alteration. Such criteria may be maintained in records that are accessible to an interested party. Some embodiments may include a record of primary authorization rights applicable to a possible content alteration. A further embodiment feature may include a record of secondary authorization rights applicable to substitute altered content incorporated in a derivative version. Various exemplary identifier markup schemes indicative of a location or category of an alterable media content component may be implemented for audio, visual, and audio/video alterable content. | 2009-06-11 |
20090151009 | SYSTEMS AND METHODS FOR END-TO-END RESOURCE RESERVATION AUTHENTICATION - A network device constructs an outgoing resource reservation message and determines an authentication value, using, for example, a cryptographic algorithm and at least a portion of the outgoing message. The network device identifies a destination node for the message and inserts the authentication value in the message. The network device sends the message across a network to the destination node for authentication at the destination node using the authentication value. | 2009-06-11 |
20090151010 | TERMINAL THEFT PROTECTION PROCESS, AND CORRESPONDING SYSTEM, TERMINAL AND COMPUTER PROGRAM - A process is provided for protection against theft of electronic payment terminals utilized in a group including at least two electronic payment terminals organized as a network. The process includes the following steps: mutual detection of the presence of each of the terminals of the group; and transmission of absence information if at least one of the terminals is not detected. | 2009-06-11 |
20090151011 | Chimeric Non-Human Animal and Use Thereof - This invention provides: a pluripotent cell derived from a non-human animal comprising foreign DNA that encodes a desired protein in such a manner that the expression of the desired protein is regulated by the control region of a gene expressed in certain cells and/or tissue, wherein the foreign DNA is bound to a nucleic acid fragment comprising a promoter/the whole or part of 5′ non-translational region/a leader sequence coding region derived from a gene expressed in certain cells and/or tissue, and wherein in said cell one or more drug resistant marker genes used for introducing the foreign DNA into the genome have been removed; a chimeric non-human animal that is prepared from the pluripotent cell and highly expresses the desired protein, or a progeny thereof; a method for producing a desired protein using the chimeric animal; and a method for analyzing in vivo function of a desired gene using the chimeric animal. | 2009-06-11 |
20090151012 | Animal Model Having a Chimeric Human Liver and Susceptible to Human Hepatitis C Virus Infection - The present invention features a non-human animal model that is susceptible to infection by human hepatotrophic pathogens, particularly human hepatitis C virus (HCV). The model is based on a non-human, immunocompromised transgenic animal having a human-mouse chimeric liver, where the transgene provides for expression of a urokinase-type plasminogen activator in the liver. The invention also features methods for identifying candidate therapeutic agents, e.g., agents having antiviral activity against HCV infection. The animals of the invention are also useful in assessing toxicity of various agents, as well as the activity of agents in decreasing blood lipids. | 2009-06-11 |
20090151013 | Modified ES cells and ES cell-specific genes - The invention concerns modified avian ES cells, specifically expressing an exogenous gene when they have a pluripotent character. The invention also concerns a nucleic acid and a polypeptide specifically expressed in pluripotent avian cells, and methods for detecting the pluripotent character of cells using said nucleic acid and polypeptide. | 2009-06-11 |
20090151014 | SOYBEAN CULTIVAR HFPR-5 - A soybean cultivar designated HFPR-5 is disclosed. The invention relates to the seeds of soybean cultivar HFPR-5, to the plants of soybean HFPR-5, to plant parts of soybean cultivar HFPR-5 and to methods for producing a soybean plant produced by crossing soybean cultivar HFPR-5 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars or breeding cultivars and plant parts derived from soybean variety HFPR-5, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar HFPR-5 and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants and plant parts produced by crossing the cultivar HFPR-5 with another soybean cultivar. | 2009-06-11 |
20090151015 | DISEASE-INDUCIBLE PROMOTERS - Disease-inducible promoter sequences have been identified that may be used to produce transgenic plants that are both more resistant to disease than control plants, and are wild-type or nearly wild type in appearance. Any of these disease-inducible promoters may be incorporated into expression vectors that each comprise a defense response protein operably linked to the promoter. The expression vectors can be introduced into plants and the defense response protein then ectopically expressed. Transgenic plants transformed with many of these expression vectors have been shown to be more resistant to disease, in some cases, to more than one type of pathogen, and yet are similar to wild type plants in their morphology and development. | 2009-06-11 |
20090151016 | PLANTS WITH INCREASED HYALURONAN PRODUCTION - The present invention relates to a process for increasing the phosphate content of starches of genetically modified plant cells in comparison with starches from corresponding wild-type plant cells by introducing a foreign nucleic acid molecule which codes for a soluble starch synthase II. The present invention furthermore relates to the overexpression of this soluble starch synthase II in the genetically modified plant cells. Furthermore, the present invention relates to rice starch and rice flour with improved quality characteristics, to rice grains comprising this rice starch, and to rice plants on which these rice grains grow. | 2009-06-11 |
20090151017 | Maize Cellulose Synthases and Uses Thereof - The invention provides isolated cellulose synthase nucleic acids and their encoded proteins. The present invention provides methods and compositions relating to altering cellulose synthase concentration and/or composition of plants. The invention further provides recombinant expression cassettes, host cells, and transgenic plants. | 2009-06-11 |
20090151018 | GDC-1 GENES CONFERRING HERBICIDE RESISTANCE - Compositions and methods for conferring herbicide resistance to plants, plant cells, tissues and seeds are provided. Compositions comprising a coding sequence for a polypeptide that confers resistance or tolerance to glyphosate herbicides are provided. The coding sequences can be used in DNA constructs or expression cassettes for transformation and expression in plants. Compositions also comprise transformed plants, plant cells, tissues, and seeds. In particular, isolated nucleic acid molecules corresponding to glyphosate resistant nucleic acid sequences are provided. Additionally, amino acid sequences corresponding to the polynucleotides are encompassed. In particular, the present invention provides for isolated nucleic acid molecules comprising nucleotide sequences encoding an amino acid sequence shown in SEQ ID NO:3, 6, 8, 11, 19, or 21, or a nucleotide sequence set forth in SEQ ID NO:1, 2, 4, 5, 7, 9, 10, 18, or 20, as well as variants and fragments thereof. | 2009-06-11 |
20090151019 | LATE BLIGHT RESISTANCE GENE FROM WILD POTATO - A novel resistance gene and its encoded protein isolated from the wild potato, | 2009-06-11 |
20090151020 | CHIMERIC AND PROLINE RICH PROTEIN PROMOTERS FOR EXPRESSION IN PLANTS - The present invention provides regulatory polynucleotide molecules isolated from plant proline rich protein genes and linked to a viral enhancer molecule. The invention further discloses compositions, polynucleotide constructs, transformed host cells, transgenic plants and seeds containing the regulatory polynucleotide sequences, and methods for preparing and using the same. | 2009-06-11 |
20090151021 | Novel Stress-Related MicroRNA Molecules and Uses Thereof - Naturally occurring and synthetic novel stress-related miRNAs are provided which can be used to modify the stress tolerance of plants. | 2009-06-11 |
20090151022 | NOVEL TRANSCRIPTION FACTOR FOR INCREASING KERNEL MASS AND YIELD IN PLANTS (831) - The present invention provides novel polynucleotides, related polypeptides and all conservatively modified variants of a novel transcription factor which is associated with kernel mass in plants. Methods are disclosed to alter the genetic composition of crop plants, enhance kernel size and to improve yield. The invention also includes vectors, cells, and modified plants. | 2009-06-11 |
20090151023 | Transformation system for Camelina sativa - The present invention relates to plant biotechnology and specifically to a method for genetically transforming | 2009-06-11 |
20090151024 | Method for Controlling Rust Infections in Leguminous Plants - Method for controlling rust infections in leguminous plants by using heterocyclylcarboxanilides of the formula I | 2009-06-11 |
20090151025 | Indeterminate Gametophyte 1 (ig1), Mutations of ig1, Orthologs of ig1, and Uses Thereof - This invention provides the genes for indeterminate gametophyte1 (ig1), mutants of ig1, homologs of ig1, and orthologs of ig1, as well as the proteins encoded by these genes. This invention also provides compositions and methods which utilize these genes and proteins. | 2009-06-11 |
20090151026 | Polypeptides having feruloyl esterase activity and polynucleotides encoding same - The present invention relates to isolated polypeptides having feruloyl esterase activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides. | 2009-06-11 |
20090151027 | DIACYLGLYCEROL ACYL TRANSFERASE PROTEINS - The invention provides diacylglycerol acyltransferase (DAGAT) proteins, wherein said proteins are active in the formation of triacylglycerol from fatty acyl and diacylglycerol substrates. In one aspect, | 2009-06-11 |
20090151028 | Transgenic camelina sativa - The present invention relates to plant biotechnology and specifically to a method for genetically transforming | 2009-06-11 |
20090151029 | Nucleic acid constructs and methods for producing altered seed oil compositions - The present invention is in the field of plant genetics and provides recombinant nucleic acid molecules, constructs, and other agents associated with the coordinate manipulation of multiple genes in the fatty acid synthesis pathway. In particular, the agents of the present invention are associated with the simultaneous enhanced expression of certain genes in the fatty acid synthesis pathway and suppressed expression of certain other genes in the same pathway. Also provided are plants incorporating such agents, and in particular plants incorporating such constructs where the plants exhibit altered seed oil compositions. | 2009-06-11 |
20090151030 | DUAL TIP ATOMIC FORCE MICROSCOPY PROBE AND METHOD FOR PRODUCING SUCH A PROBE - One inventive aspect is related to an atomic force microscopy probe. The probe comprises a tip configuration with two probe tips on one cantilever arm. The probe tips are electrically isolated from each other and of approximately the same height with respect to the cantilever arm. The outer surface of the tip configuration has the shape of a body with a base plane and an apex. The body is divided into two sub-parts by a gap located approximately symmetrically with respect to the apex and approximately perpendicular to the base plane. Another inventive aspect related to methods for producing such an AFM probe. | 2009-06-11 |
20090151031 | Cherry Tree Named 'Maddison' - ‘Maddison’ is a new and distinct cherry tree notable for its early ripening, large size, and dark color as compared to ‘Bing.’ | 2009-06-11 |
20090151032 | Feijoa variety named 'Kakariki' - A new and distinct variety of | 2009-06-11 |
20090151033 | HYDRANGEA MACROPHYLLA PLANT NAMED 'PIIHM-I' - A new and distinct cultivar of | 2009-06-11 |
20090151034 | PENSTEMON PLANT NAMED 'DARK TOWERS' - A new and distinct | 2009-06-11 |
20090151035 | Raspberry plant named 'Marcianna' - The present invention is a new and distinct primocane fruiting red raspberry cultivar named ‘Marcianna’, which is capable of producing large, bright colored, flavorful and firm fruit that has exceptional consumer appeal characteristics. The cultivar is characterized by its leaf pattern change near and after flower initiation on primocanes, its strong and distinctive flavor and firmness and its fruit morphology, specifically its slight imperfections from conic shape. These imperfections include a slight distension and a small bend in its apparent longitudinal axis. ‘Marcianna’ plants are also unusual in that they produce commercial quantities of large, firm and flavorful fruit in both the fall on primocanes and spring on overwintered floricanes. The floricanes are productive with as little as 250 chilling hours in Spain. | 2009-06-11 |