34th week of 2008 patent applcation highlights part 57 |
Patent application number | Title | Published |
20080201749 | Method For Authentication On A Subscriber Terminal - An embodiment of the present invention provides a method for performing authentication on a subscriber terminal in a digital television (DTV) network which comprises at least one subscriber terminal and a head end for sending encrypted DTV program data to each subscriber terminal, the subscriber terminal comprising a set top box (STB) and a subscriber identification module for storing key information for decrypting the DTV program data, the method including: reading, by the STB, the life cycle of the key from the subscriber identification module when the STB starts up; initiating, by the STB, an authentication request to the head end when the life cycle expires; performing, by the head end, authentication after receiving the authentication request, and sending a response message to the STB; receiving, by the STB, the response message, and updating the key information when the response message is a response message which indicates successful authentication. | 2008-08-21 |
20080201750 | METHOD, APPARATUS AND SYSTEM FOR IMPLEMENTING SERVICE MANAGEMENT - A method for managing a service includes: receiving a request from a user; obtaining a service management strategy taking the features of the user as manage conditions and determining the manage measure for a service according to the features of the user requesting the service and the service management strategy. A system for managing a service which includes a UE and a network-side device is also provided. An apparatus for managing a service is further provided. With the present invention, a service may be carried out according to the features of a user. | 2008-08-21 |
20080201751 | Wireless Media Transmission Systems and Methods - The present invention relates to a media transmission and reception system that is implemented, in the form of programs stored in a satellite device having a memory, an input mechanism for receiving commands from a user, and a transceiver capable of wirelessly accessing a network, and in a computing device having a memory and a transceiver capable of accessing a network. The program stored in the memory of the satellite device causes user commands to be processed, causes the satellite device to connect to the computing device through the network, and causes the satellite device to transmit command instructions, derived from the commands, to the computing device through the network. The program stored in the memory of the computing device causes the computing device to access media stored in a memory, causes the computing device to process the media, captures the processed media, compresses the media, and causes the computing device to transmit the compressed media to the satellite device. The media access, media processing, media compression, and media transmission occurs in real-time and in response to the command instructions. | 2008-08-21 |
20080201752 | Multicast data packet recovery system - Particular embodiments of the disclosed subject matter provide methods and systems to support a multicast data packet recovery system. In an example embodiment, the system includes a distribution server operable to detect a missed data packet in a multicast data stream; issue a request for a retransmission of the missed data packet to an acquisition server via a unicast data channel; receive the requested data packet via a multicast data channel, in response to the request for a retransmission of the missed data packet; and send the requested data packet to one or more subscribers. | 2008-08-21 |
20080201753 | SYSTEM AND METHOD FOR SAVING AND RECALLING STATE DATA FOR MEDIA AND HOME APPLIANCES - A set of media playback and device settings data from each home appliance of a first set of home appliances is stored on a central server and/or sent to a remote control device upon initiation of a suspend command by a user. The stored media and devices states may be used at a later time to control the first set of home appliances, or a user may, after relocating to a second set of home appliances, initiate a resume state command whereupon media playback and device settings data from the central server and/or remote control device controls each home appliance in the second set of home appliances to bring about the same or substantially similar media and device states as in the first set of home appliances. | 2008-08-21 |
20080201754 | SYSTEM AND METHOD FOR SAVING AND RECALLING STATE DATA FOR MEDIA AND HOME APPLIANCES - A set of media playback and device settings data from each home appliance of a first set of home appliances is stored on a central server and/or sent to a remote control device upon initiation of a suspend command by a user. The stored media and devices states may be used at a later time to control the first set of home appliances, or a user may, after relocating to a second set of home appliances, initiate a resume state command whereupon media playback and device settings data from the central server and/or remote control device controls each home appliance in the second set of home appliances to bring about the same or substantially similar media and device states as in the first set of home appliances. | 2008-08-21 |
20080201755 | BROADCAST RECEIVING SYSTEM - The present invention provides a broadcast receiving system capable of receiving programs with a secondary viewing terminal device(s) even when a primary viewing terminal device is not turned on, and detecting a secondary viewing terminal device(s) used in an unauthorized manner. When device authentication between the secondary viewing terminal device and the primary viewing terminal device is established through a communication line, viewing is allowed for the secondary viewing terminal device. When the device authentication is not established, viewing is controlled for the secondary viewing terminal device based on viewing restriction information generated by the center device based on the power status of the primary viewing terminal device. | 2008-08-21 |
20080201756 | Multi-Media Digital Interface Systems and Methods - Systems and methods are provided herein for interfacing a first multi-media digital device with a second multi-media digital device. An exemplary method includes the steps of: (i) converting a plurality of differential digital content channels from the first multi-media digital device into a plurality of single-ended digital content channels; (ii) transmitting the plurality of single-ended digital content channels from the first multi-media digital device to the second multi-media digital device via one or more coaxial cables; and (iii) receiving the single-ended digital content channels from the one or more coaxial cables and converting the single-ended digital content channels back into a plurality of differential digital content channels that are supplied to the second multi-media digital device. Additional steps of the exemplary method may include: (i) transmitting one or more auxiliary channels between the first multi-media digital device and the second multi-media digital device; and (ii) combining the one or more auxiliary channels with at least one of the plurality of digital content channels to form a combined channel to be transmitted from the first multi-media digital device to the second multi-media digital device. | 2008-08-21 |
20080201757 | APPARATUS AND METHOD FOR PROVIDING INTERACTIVE SERVICE TO DEVICE USING DIFFERENT DIGITAL BROADCAST MIDDLEWARE STANDARDS - An apparatus and method for providing an interactive service to devices using different digital broadcast middleware standards are provided. The apparatus includes an execution information providing module which provides execution information regarding an application that has been executed in a first device using a first middleware standard so that the application can be executed in a second device using a second middleware standard; and a request execution module which receives a request issued by the second device during the execution of the application in the second device, and performs an operation corresponding to the received request. | 2008-08-21 |
20080201758 | Home Communication Systems - Systems and methods are disclosed of a network including a primary device, a plurality of remote devices, and a shared peripheral device. The network allows the remote devices to operate the peripheral device, such as a DVD player, VCR, or camcoder, via the primary device and the network. The peripheral device is typically connected to the primary device and shared among all devices. The network also includes a splitter/isolation module (SIM) that routes the signals between the primary device and the plurality of remote devices. | 2008-08-21 |
20080201759 | VERSION-RESILIENCE BETWEEN A MANAGED ENVIRONMENT AND A SECURITY POLICY - A method and system for enforcing a security policy that is version-independent of a managed environment when loading custom code for a host application is provided. A security system of the managed environment receives an identifier of custom code to be loaded by the host application. Before loading the identified custom code, the managed environment enforces the security policy using the security system. The security system applies the security policy expressed using a version-independent indication of identifiers of untrusted custom code. If the security system determines that the trust of the custom code is unknown, then the security system requests a trust manager associated with the host application to enforce a host application-specific security policy. When the custom code is trusted, the managed environment loads the custom code. | 2008-08-21 |
20080201760 | SYSTEM AND METHOD FOR THE AUTOMATIC EVALUATION OF EXISTING SECURITY POLICIES AND AUTOMATIC CREATION OF NEW SECURITY POLICIES - The present invention relates to methodologies for combining policy analysis and static analysis of code and thereafter determining whether the permissions granted by the policy to the code and to the subjects executing it are appropriate. In particular, this involves the verification that too many permissions have not been granted (wherein this would be a violation of the Principle of Least Privilege), and that the permissions being granted are sufficient to execute the code without run-time authorization failures, thus resulting in the failure of the program to execute. | 2008-08-21 |
20080201761 | Dynamically Associating Attribute Values with Objects - Embodiments are provided to dynamically associate an attribute and an associated value to an object, including attribute-value sets to an object, but the embodiments are not so limited. In an embodiment, a system includes a directory component that can be configured to dynamically assign different values, for a set attributes, to an object. In one embodiment, a directory application can be configured to select an attribute-value set for an object based in part on a group membership determination, and a precedence parameter associated with an attribute-value, set, or other grouping. Other embodiments are available. | 2008-08-21 |
20080201762 | METHOD AND SYSTEM FOR SECURELY EXTENDING A PATH OF A MOBILE AGENT WITHIN A NETWORK SYSTEM - The present description refers in particular to a method, a system, and a computer program product for access control using resource filters for a strict separation of application and security logic. The computer-implemented method for access control may include receiving at least one access request to at least one resource from an application; providing a resource hierarchy for the at least one resource, the resource having at least one resource class, wherein the resource hierarchy is defined in a single resource; providing a policy comprising at least one access control rule for accessing at least one element of the at least one resource class; verifying the at least one access request based on the policy through an authorization service; and processing the at least one access request through a service interface. | 2008-08-21 |
20080201763 | Method and system for securing wireless local area networks - A wireless network security system including a system data store capable of storing network default and configuration data, a wireless transmitter and a system processor. The system processor performs a network security method. An active defense request signal is received, typically from an intrusion detection system. The received request signal includes an indicator of an access point within the wireless computer network that is potentially compromised. In response to the received an active defense of the wireless network is triggered. The triggered active defense may be on or more of transmitting a jamming signal, transmitting a signal to introduce CRC errors, transmitting a signal to increase the difficulty associated with breaking the network encryption (typically by including in the signal packet appearing legitimate but containing randomized payloads, or transmitting a channel change request to the potentially compromised access point. | 2008-08-21 |
20080201764 | METHOD AND SYSTEM FOR CONTROLLING THE SMART ELECTRIC APPLIANCE - The present invention discloses a method for controlling the smart electric appliance by connecting a key device to a smart electric appliance and performing control operations on the smart electric appliance in accordance with the control settings for the key device after positively authenticating the internal device descriptor of the key device. Also, the present invention discloses a system according to the method mentioned above, including a smart electric appliance comprising a USB interface module, an authentication module, an execution module and a general control module, and a key device comprising a smart storage module. By introducing the key device, authenticating the key device before allowance of use of the smart electric appliance, and setting different control operation levels for different users of the smart electric appliance, it becomes very secure to use the smart electric appliance, while it becomes more flexible to use the same. | 2008-08-21 |
20080201765 | METHOD AND APPARATUS FOR AUTHENTICATING A COMMUNICATION DEVICE - A method and apparatus for authenticating a communication device is disclosed. An system that incorporates teachings of the present disclosure may include, for example, an authentication system having a controller element that receives from a communication device over a packet-switched network a terminal ID and a request to authenticate said communication device, generates a first registration ID, stores the first registration ID and a first communication identifier, transmits the first registration ID to the communication device, receives from an interactive response system a second communication identifier and a second registration ID that the interactive response system received during a communication session with the communication device over a circuit-switched network, and authenticates the communication device in response to detecting a match between the first and second communication identifiers and the first and second registration IDs. Additional embodiments are disclosed. | 2008-08-21 |
20080201766 | Efficient data structures for multi-dimensional security - Efficient data structures are generated to enforce permissions on a multi-dimensional representation in a performance management application. A model site is generated having at least one model with at least one dimension. User permissions and group permissions are set for the model. The user permission and the group permissions are deployed to a relational database. A collective user permission table is generated based on the user permissions and the group permissions. Thus, an end user may receive permissions associated with a model and permissions associated with particular dimensions of a model without an inefficient consumption of resources. | 2008-08-21 |
20080201767 | AUTHENTICATED CREDENTIAL-BASED MULTI-TENANT ACCESS TO A SERVICE - Associating a computing device with a group of other computing devices. A service receives a common credential from the computing device and associates the computing device with the other computing devices also associated with the common credential. The service generates a machine-specific credential for use by the computing device in subsequent communications with the service. The machine-specific credential is used to authenticate, identify, and group the computing device with the other computing devices in the subsequent communications. | 2008-08-21 |
20080201768 | Method For Managing A Large Number Of Passwords, Portable Apparatus And Certification Information Storing Device Using The Same, And Certification Information Management Method Using The Same - Disclosed herein are a password management apparatus and method, a certification information storage apparatus and a certification information management method. The password management method of accessing and managing desired passwords through a portable password management apparatus and a terminal on which a password management program is installed, includes a first step of executing the password management program on the management terminal, a second step of receiving a user authentication number from the management apparatus, and comparing the first authentication number with a user authentication number previously stored in the management terminal, thereby authenticating whether a user is a legitimate user, and a third step of, only if the user is authenticated as a legitimate user, receiving a password list from the management apparatus and outputting the received password list onto a screen. | 2008-08-21 |
20080201769 | SYSTEM AND METHOD FOR PROCESSING PAYMENT OPTIONS - Disclosed is a system and method for processing payment options, including consolidation, selection, and secure identification. In one embodiment, multiple payment options such as credit, debit and loyalty cards are registered by a consumer and consolidated into a secure central repository. The consumer securely accesses the central repository over a secure communications channel from a remote access device, such as a point-of sale (POS) terminal at a merchant store, to retrieve and select from one of the available payment methods. Upon selection, additional data sufficient to complete the payment transaction is sent to the POS terminal. The consumer may use a piece of identification and password (e.g., one of the registered cards together with a password or personal identification number) to securely access the multiple payment options. Alternatively, the consumer is identified by using a biometric identifier, such as a fingerprint or retina scanner, without need for additional identification. | 2008-08-21 |
20080201770 | COMMUNICATION CONTROL DEVICE - A communication control device with high confidentiality is provided, which allows content access only from devices in a specific group, and ensures that no content information is exposed to any devices for which content access is not allowed. A password selection portion selects a common password required for connecting to a network, or a secret password required for establishing a communication channel with a specific reception device. A transmission portion transmits contents or information associated therewith to the reception device via the network established by using the common password or the secret password. | 2008-08-21 |
20080201771 | Authentication apparatus, authentication system, authentication method, and authentication program using biometric information for authentication - In order to enable multiple logins by a same user, the authentication server includes a registration portion to store a user record including a fingerprint image for authentication of identity of a user and owner authentication information stored in a IC card issued to the user; an identity authentication portion to compare a fingerprint image received from one of MFPs with the one included in the user record for authentication; a first permission portion to transmit a permission signal permitting login based on the authenticated fingerprint image to the MFP that transmitted the fingerprint image; an owner authentication portion to compare owner authentication information received from one of the MFPs with the one included in the user record for authentication; and a second permission portion to transmit a permission signal permitting login based on the authenticated owner authentication information to the MFP that transmitted the owner authentication information. | 2008-08-21 |
20080201772 | Method and Apparatus for Deep Packet Inspection for Network Intrusion Detection - In a method of determining whether a data stream includes unauthorized data, the data stream is analyzed using a hardware filter to detect a presence of one or more of a first set of patterns in the data stream. It is determined whether a packet in the data stream belongs to one of a plurality of data flows to be further inspected based on the analysis of the data stream by the hardware filter. A set of rules is applied to the packet to produce rule match status data if it is determined that the packet belongs to one of the plurality of data flows to be further inspected. The packet is analyzed to determine if the packet includes unauthorized data using software stored on a computer-readable medium and implemented on a processor if the rule match status data indicates that the packet potentially includes unauthorized data. | 2008-08-21 |
20080201773 | Image Processing Device - An image processing device is provide with an external storage which is detachably connectable to the image processing device, an inputting unit configured to allow a user to input user information, a registration unit configured to register ID information intrinsic to the external storage and the user information input through the inputting unit with registration data in a related manner, a permission unit configured to retrieve the ID information from the external storage and permit access to the external storage connected to the image processing device only if the retrieved ID information is included in the registered ID information which is registered with the registration data, and a data processing unit configured to read/write data from/to the external storage if access to the external storage is permitted by the permission unit. | 2008-08-21 |
20080201774 | Security System - A security system for controlling access to a plurality of secure areas, an interface to obtain verification data, particularly biometric scan data of the user, processing means arranged to compare the biometric scan data with stored template data and return a match condition, and signal means arranged to allow access to at least one of the plurality of secure areas if the match condition is satisfied. | 2008-08-21 |
20080201775 | Multifunction peripheral, password setting system, method and computer readable medium for password setting - There is provided a multifunction peripheral comprising an operation unit, a key definition unit to define usable keys for password setting depending on a type of a certain function, a password setting unit to accept a password through the usable keys defined by the key definition unit and to set the password in the multifunction peripheral, a password authentication unit configured such that when execution of the certain function is instructed, the password authentication unit accepts a password through the plurality of keys of the operation unit and judges whether the password accepted through the plurality of keys matches the password set by the password setting unit, and a function control unit configured to permit execution of the certain function if it is judged by the password authentication unit that the password accepted through the plurality of keys matches the password set by the password setting unit. | 2008-08-21 |
20080201776 | Method And Computing System For Avoiding Denial Of Service Attacks - A computing system configured to receive service requests, comprising a memory for storing service request data and a service request handler. The computing system is configured to respond to a service request by registering a call back routine configured to pass details of the service request to the memory if executed by a panic process upon a system crash, the memory is configured to store the details of the service request passed to it, and the service request handler is configured to compare the service request to the service request data in the memory and to deny the service request if the service request matches a predefined portion of the service request data. | 2008-08-21 |
20080201777 | Method and Agent for the Protection Against the Unauthorized Use of Computer Resources - Method and agent for preventing a hostile use of computer resources by an application running on a workstation. A list of services that are not allowed for access by unspecified applications is provided, and when such unspecified application runs on the workstation, the application is prevented from accessing any resource directly. Any direct or indirect request for access to specific services is analyzed, to determine whether such request is allowable according to the list. The workstation processes the request if it is allowable. The unspecified application is prevented from accessing the requested resource if the request is not allowable. The resource may be any local or remote resource, such as, memory allocation, files, directories, operations with files and directories, such as copy, delete or compress, or any other operation leading to a permanent change in the workstation or its periphery. | 2008-08-21 |
20080201778 | INTRUSION DETECTION USING SYSTEM CALL MONITORS ON A BAYESIAN NETWORK - Selected system calls are monitored to generate frequency data that is input to a probabilistic intrusion detection analyzer which generates a likelihood score indicative of whether the system calls being monitored were produced by a computer system whose security has been compromised. A first Bayesian network is trained on data from a compromised system and a second Bayesian network is trained on data from a normal system. The probabilistic intrusion detection analyzer considers likelihood data from both Bayesian networks to generate the intrusion detection measure. | 2008-08-21 |
20080201779 | AUTOMATIC EXTRACTION OF SIGNATURES FOR MALWARE - Method for the automatic generation of malware signatures from computer files. A common function library (CFL) created, wherein the CFL contains any functions identified as a part of the standard computer language used to write computer files which are known as not containing malware. The functions of a computer file which does contain a malware are extracted and the CFL is updated with any new common functions if necessary, such that the remaining functions are all considered as candidates for generating the malware signature. The remaining functions are divided into clusters according to their location in the file and the optimal cluster for generating the malware signature is determined. One or more of the functions in the optimal cluster is selected randomly, as the malware signature. | 2008-08-21 |
20080201780 | Risk-Based Vulnerability Assessment, Remediation and Network Access Protection - A system administrator may define a vulnerability and vulnerability setting for the client machine and may associate a level of risk with the vulnerability. The client may assess the level of risk associated with the vulnerability setting on the client machine and may report data regarding the level of risk to the system administrator. | 2008-08-21 |
20080201781 | Tool Pack Structure and Contents Execution Device - A tool pack structure includes: a signature value for guaranteeing authenticity of a tool pack; a tool pack identifier for identifying the tool pack; each unit tool pack provided according to a hardware platform; and tool pack data containing initial values assigned when each unit tool pack is used. Each tool pack includes platform information indicating information about hardware in which the tool pack may be used; a tool agent that is a program activated for content execution; and a tool group including at least one tool program activated by the tool pack agent for processing content according to a predetermined rule. A tool agent leaves operation of a protection tool group used by a specific service provider entirely to a tool agent (execution code) provided together with the tool group by service providers. Accordingly, information about the used tools does not have to be disclosed to the public. Since a user terminal simply calls each tool agent, it can support interoperability with other DRM techniques. | 2008-08-21 |
20080201782 | METHOD AND APPARATUS FOR MANAGING DIGITAL CONTENT - A method and apparatus for managing digital content are provided. The apparatus for managing digital content generated by applying digital rights management (DRM) includes: a content execution unit executing digital content; and a control unit confirming whether or not digital content is in a first period in which the digital content can be normally executed, and controlling the content execution unit so that, if the digital content is in the first period, the digital content can be executed normally, and if the digital content is in a second period which is not in the first period, the digital content can be executed in a manner which can be distinguished from that of execution in the first period. According to the apparatus and method, execution of digital content, which is close to expiration, can be controlled, thereby managing the expiration of the digital content for a user. | 2008-08-21 |
20080201783 | Document file, document file generating apparatus, and document file usage method - A document file is configured to restrict, without a costly special-purpose terminal or the like, use of document data contained therein, if the document data is taken out of a predetermined location. A document file contains (i) electronic document data, (ii) usage location information indicating one or more usage locations in which use of the electronic document data is less restricted, and (ii) a data management program that causes, when a user requests use of the electronic document data, a computer to request for user location information indicating the current location of the user. Under control of the data management program, use of the electronic document data is permitted within a first usage pattern, if the user location is included in the usage locations. If not, use of the electronic document data is prohibited or permitted within a second usage pattern which is more restricted than the first usage pattern. | 2008-08-21 |
20080201784 | METHODS AND APPARATUS FOR SECURE DOCUMENT PRINTING - A secure document printing system is provided. A policy server is used to define access rules for a document, and select individual users and/or groups that will have access to the document. The policy server stores the access rules along with a document decryption key. The policy server's name and address are packed in the document, and then encrypted and sent to a print server which stores it for later access. A recipient is notified that the document resides on a particular print server. The print server retrieves the specified document, contacts the policy server named in the document, and requests the document decryption key and access rules for the user, print server, and document from the policy server which replies with the related decryption key and access rules. The print server decrypts the document and prints the document based on the access rules. | 2008-08-21 |
20080201785 | CABLE MODEM LOCATION ANALYZING DEVICE - Systems and methods are disclosed according to the implementations of the present disclosure for determining whether a cable modem has been placed in an unauthorized location. One system, among others, comprises a first cable modem and a second cable modem. The first cable modem is configured to transfer data between a first subscriber device and a headend facility and is intended to be used in a first residence. The second cable modem is configured to transfer data between a second subscriber device and the headend facility and is also intended to be used in the first residence. The first cable modem sends first information, corresponding to at least one parameter of the first cable modem, to the second cable modem. The second cable modem compares the first information with second information corresponding to at least one parameter associated with the second cable modem. | 2008-08-21 |
20080201786 | Transgenic Zebrafish Models of Alzheimer's Disease - The present invention relates to zebrafish models for Alzheimer's disease that allow recapitulation of pathologies associated with Alzheimer's disease. This invention also relates to methods for screening of compounds for their ability to modulate a pathology associated with Alzheimer's disease in vivo in a whole vertebrate organism. The present invention further relates to methods of identifying gene targets for compounds that modulate a pathology associated with Alzheimer's disease. | 2008-08-21 |
20080201787 | Transgenic mouse whose genome comprises a homozygous disruption of its alpha1G gene, a method of preparing the same and use thereof - The disclosure concerns a method for resistance of epilepsy by suppressing the function of alpha 1G protein of T-type calcium channels, use of suppressor of alpha 1G protein for prevention or treatment for epilepsy, knockout mice resisting epilepsy by disrupting alpha 1G subunit of T-type calcium channel, and preparation method thereof. The α1G-knockout transgenic mouse can be used for investigating the relationship between diseases particularly neuropathy or psychopathy and the function of α1G T-type calcium channel via various behavioral tests since α1G subunit is mainly expression in central nervous system (CNS) and pheripheral nervous system (PNS). Further, the α1G-knockout transgenic mouse can be used for screening antileptic agents. | 2008-08-21 |
20080201788 | Mouse in which genome is modified - A mouse or progenies thereof in which genome is modified so as to have decreased or deleted activity of an enzyme relating to modification of a sugar chain in which the | 2008-08-21 |
20080201789 | VARIANTS AND EXONS OF THE GLYT1 TRANSPORTER - The present invention provides polypeptide and polynucleotide sequences for novel splice variants of the sodium and chloride-dependent glycine transporter type 1 (GlyT1). These polypeptides and polynucleotides are useful in the treatment and diagnosis of disorders such as neurological and psychiatric disorders including schizophrenia. The invention also provides antibodies directed specifically against these novel polypeptides, and kits comprising the herein-described polynucleotides, polypeptides, and/or antibodies. | 2008-08-21 |
20080201790 | Method and product for regulating cell responsiveness to external signals - The present invention relates to isolated MEKK proteins, nucleic acid molecules having sequences that encode such proteins, and antibodies raised against such proteins. The present invention also includes methods to use such proteins to regulate signal transduction in a cell. The present invention also includes therapeutic compositions comprising such proteins or nucleic acid molecules that encode such proteins and their use to treat animals having medical disorders including cancer, inflammation, neurological disorders, autoimmune diseases, allergic reactions, and hormone-related diseases. When MEKK is expressed, it phosphorylates and activates MKKs1-4 (also referred to as MEK-1, MEK-2 and JNKK1 and JNKK2). | 2008-08-21 |
20080201791 | T Cell Line-Based Packaging Cell Line for the Production of Retroviruses by Enriching of Cd3 Expressing Cells - The present invention relates to retroviral vector systems, in particular the development of packaging or helper cell lines that are based on T cells and that are suitable for producing T cell receptor retroviruses. Thereby, the present invention relates to T cell line specific retroviral expression vectors, and mammalian T cell line-based helper cell lines. The invention further relates to methods for expressing transgenes and to T cell line specific retroviral vector systems, including biochemical kits, that utilize and/or comprise the T cell line specific retroviral expression vectors and/or mammalian T cell line-based helper cell lines. | 2008-08-21 |
20080201792 | DRY BEAN LINE 08520700 - The invention provides seed and plants of the dry bean line designated 08520700. The invention thus relates to the plants, seeds and tissue cultures of dry bean line 08520700, and to methods for producing a dry bean plant produced by crossing a plant of dry bean line 08520700 with itself or with another dry bean plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of dry bean line 08520700, including the pods and gametes of such plants. | 2008-08-21 |
20080201793 | PEA LINE 08530731 - The invention provides seed and plants of the pea line designated 08530731. The invention thus relates to the plants, seeds and tissue cultures of pea line 08530731, and to methods for producing a pea plant produced by crossing a plant of pea line 08530731 with itself or with another pea plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of pea line 08530731, including the seed, pod, and gametes of such plants. | 2008-08-21 |
20080201794 | DRY BEAN LINE 08530714 - The invention provides seed and plants of the dry bean line designated 08530714. The invention thus relates to the plants, seeds and tissue cultures of dry bean line 08530714, and to methods for producing a dry bean plant produced by crossing a plant of dry bean line 08530714 with itself or with another dry bean plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of dry bean line 08530714, including the pods and gametes of such plants. | 2008-08-21 |
20080201795 | Pea Line 08550848 - The invention provides seed and plants of the pea line designated 08550848. The invention thus relates to the plants, seeds and tissue cultures of pea line 08550848, and to methods for producing a pea plant produced by crossing a plant of pea line 08550848 with itself or with another pea plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of pea line 08550848, including the seed, pod, and gametes of such plants. | 2008-08-21 |
20080201796 | Transformed plants accumulating mono-and/or sesquiterpenes - The present invention relates to plant expressing transgenes and to plants transformed to comprise additional copies of genes, said genes encoding at least a HMGR-CoA reductase and a terpene synthase. The invention further claims methods for preparing the plants, and a method for producing terpenes. The present thus provides a reliable and cost effective platform for generating any terpene, in particular any mono- and/or sesquiterpene of interest. For example, the skilled person may use any gene encoding a sesquiterpene synthase for accumulating the respective sesquiterpene in the plant of the present invention. | 2008-08-21 |
20080201797 | Pearl millet line 53 1 1 with PP3 gene and all derivatives produced by any method - The invention relates to a pearl millet plant, seed, variety, parental line and hybrid. More specifically the invention relates to a pearl millet plant having a mutant allele that increases purple pigmentation in many plant parts. The invention relates to crossing inbreds, varieties, and hybrids containing the purple allele to produce novel types and hybrids of pearl millet and other compatible millet species, both for pigment extraction and ornamental purposes. | 2008-08-21 |
20080201798 | PEA LINE 08540793 - The invention provides seed and plants of the pea line designated 08540793. The invention thus relates to the plants, seeds and tissue cultures of pea line 08540793, and to methods for producing a pea plant produced by crossing a plant of pea line 08540793 with itself or with another pea plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of pea line 08540793, including the seed, pod, and gametes of such plants. | 2008-08-21 |
20080201799 | PROTEIN KINASE STRESS-RELATED PROTEINS AND METHODS OF USE IN PLANTS - A transgenic plant transformed by a Protein Kinase Stress-Related Protein (PKSRP) coding nucleic acid, wherein expression of the nucleic acid sequence in the plant results in increased tolerance to environmental stress as compared to a wild type variety of the plant. Also provided are agricultural products, including seeds, produced by the transgenic plants. Also provided are isolated PKSRPs, and isolated nucleic acid coding PKSRPs, and vectors and host cells containing the latter. | 2008-08-21 |
20080201800 | Antifungal Plant Proteins and Methods of Their Use - DNA constructions that provide for production of potent antifungal proteins in transgenic plants and transformed yeast cells are described. Methods of using the DNA constructs to produce transgenic plants that inhibit growth of plant pathogenic fungi are also disclosed. The use of transformed yeast cells containing the DNA constructs to produce the antifungal proteins and methods of isolating the antifungal proteins are also described. | 2008-08-21 |
20080201801 | Invertebrate MicroRNAs - This invention provides plants having resistance to invertebrate pests. More specifically, this invention discloses a non-natural transgenic plant cell expressing at least one invertebrate miRNA in planta for suppression of a target gene of an invertebrate pest or of a symbiont associated with the invertebrate pest. Also provided are recombinant DNA constructs for expression of at least one invertebrate miRNA in planta, a non-natural transgenic plant containing the non-natural transgenic plant cell of this invention, a non-natural transgenic plant grown from the non-natural transgenic plant cell of this invention, and non-natural transgenic seed produced by the non-natural transgenic plants, as well as commodity products produced from a non-natural transgenic plant cell, plant, or seed of this invention. This invention further provides a method of suppressing at least one target gene of an invertebrate pest of a plant or of a symbiont associated with the invertebrate, including providing a plant including the non-natural transgenic plant cell of this invention, wherein the invertebrate is the invertebrate pest, the recombinant DNA is transcribed in the non-natural transgenic plant cell to the recombinant miRNA precursor, and when the invertebrate pest ingests the recombinant miRNA precursor, the at least one target gene is suppressed. | 2008-08-21 |
20080201802 | Altered linolenic and linoleic acid content in plants - Transformed plants which have increased or decreased linolenic acid content are disclosed. Also disclosed are plants which express a linoleic acid desaturase gene. | 2008-08-21 |
20080201803 | PLANTS WITH ALTERED ROOT ARCHITECTURE, INVOLVING THE RUM1 GENE, RELATED CONSTRUCTS AND METHODS - Isolated polynucleotides and polypeptides and recombinant DNA constructs particularly useful for altering root structure of plants, compositions (such as plants or seeds) comprising these recombinant DNA constructs, and methods utilizing these recombinant DNA constructs. The recombinant DNA construct comprises a polynucleotide operably linked to a promoter functional in a plant, wherein said polynucleotide encodes a polypeptide useful for altering plant root architecture. | 2008-08-21 |
20080201804 | Protein Production - The present invention relates to a method for producing heterologous glycosylated proteins in non-animal eukaryotic cells such as in transformed bryophyte, yeast, ciliate or algae cells. In particular, the method relates to a method for producing glycosylated proteins comprising animal glycosylation patterns—comprising sialic acid residues—, such as pharmaceutical proteins for use in mammals, e.g. humans, in bryophyte cells such as those of | 2008-08-21 |
20080201805 | Polypeptides Having Beta-Glucosidase Activity and Polynucleotides Encoding Same - The present invention relates to isolated polypeptides having beta-glucosidase activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods for producing and using the polypeptides. | 2008-08-21 |
20080201806 | Tetracycline Repressor and Uses Thereof - Compositions and methods relating to the use of tetracycline repressor in plants are provided. Compositions include a polynucleotide modified for expression in a plant, wherein the polynucleotide encodes a tetracycline repressor protein, as well as constructs, vectors, cells, plants and seeds comprising the polynucleotide, an/or produced by the methods. Also provided are methods to provide tetracycline repressor to a cell, and to regulate expression of a polynucleotide of interest in a cell, including a plant cell. | 2008-08-21 |
20080201807 | Gelatinization Temperature Manipulation - The subject invention relates to plants and the starch produced by plants. In particular, the invention relates to processes for the modification of a plant so that the starch produced by the plant comprises amylopectin of an altered structure and/or the starch has an altered gelatinization temperature. The processes principally comprise engineering gene involved in amylopectin synthesis. In a preferred embodiment the starch synthase IIa gene is modified. Also disclosed are processes for altering genes to provide plant which produce starch having a desired gelatinization temperature, and methods of identifying the changes that can be made in genes to achieve a desired gelatinization temperature in the starch produced by a plant comprising such genes. Further disclosed are modified plants and the starch products of the plants. | 2008-08-21 |
20080201808 | Almond variety named 'Sweetheart' - An improved | 2008-08-21 |
20080201809 | Grapevine (Sheegene-15) - A new and distinct variety characterized by a green-colored, medium sized seedless grape that ripens during the fourth week of June, approximately two to three weeks earlier than the Perlette Seedless Grape (unpatented), when grown in the San Joaquin Valley of Central California. The berries of this new variety are produced on strong woody branches and are well adapted to commercial handling. | 2008-08-21 |
20080201810 | Clematis Plant Named 'American Beauty' - A new variety of | 2008-08-21 |
20080201811 | Fallopia plant named 'Igniscum' - A new and distinct cultivar of | 2008-08-21 |
20080201812 | COREOPSIS PLANT NAMED 'LIGHTNING FLASH' - A new and distinct | 2008-08-21 |