37th week of 2010 patent applcation highlights part 67 |
Patent application number | Title | Published |
20100235884 | Communication system and method, information processing terminal and method, and information processing device and method - The present invention relates to a communication system and method, an information processing terminal and method, and an information processing device and method which enable simple and secure restricted access. When a PDA | 2010-09-16 |
20100235885 | Secure Client-Side Aggregation of Web Applications - A web browser client includes an aggregated web application runtime environment that controls access by a program fragment of an aggregated web application to a resource therein based upon the originating domain of the program fragment. To do so, the aggregated web application runtime environment appends an access attribute to the Document Object Model (DOM) node associated with the resource. This access attribute is associated with a plurality of access rights definitions where each access rights definition defines a set of access rights to the resource for program fragments originating from a domain with a specific access rights status. Accordingly, the aggregated web application runtime environment sets one or more access rights statuses of the originating domain of the program fragment, and thereafter, grants or denies the program fragment access to the resource based upon one or more sets of access rights defined for that program fragment. | 2010-09-16 |
20100235886 | AUTOMATED RELATIONSHIP MANAGEMENT FOR ELECTRONIC SOCIAL NETWORKS - A computer-implemented method of automatically managing relationships between a plurality of users within an electronic social network. The method includes monitoring interactions between the plurality of users in relationships within the electronic social network over time, and obtaining interaction information associated with the monitored interactions, and automatically updating and managing access privileges of users based on the obtained interaction information, to access profile information of respective users. The method ensures automated, adequate and dynamically changing representation of relationships in an ESN system, thereby greatly increasing the value of the ESN system to the user and ways to pro-actively maintain and improve existing relationships or prevent them from decaying. | 2010-09-16 |
20100235887 | SYSTEM AND METHOD FOR QUEUING TO A CLOUD VIA A QUEUING PROXY - System and method for servicing queue requests via a proxy are described. In one embodiment, the system includes an enterprise queuing proxy (“EQP”) disposed within an enterprise computing environment and having an enterprise queue associated therewith; a cloud queuing proxy (“CQP”) disposed within a cloud computing environment, the CQP connected to a plurality of cloud queues each having associated therewith at least one queue service process listening on the cloud queue for queue requests to service; and a secure communications mechanism for interconnecting the EQP and the CQP. Upon receipt of a queue request from an enterprise service, the EQP evaluates the request against policy to determine whether to service it locally or remotely and, if the request is to be serviced remotely, forwards the request to the CQP via the secure communications mechanism. Upon receipt of the request, the CQP evaluates the queue request against policy to select one of the cloud queues to which to route the queue request for servicing. | 2010-09-16 |
20100235888 | IMAGE FORMING APPARATUS, FUNCTION EXTENDING METHOD AND USER AUTHENTICATION SYSTEM - An image forming apparatus includes an user authentication part | 2010-09-16 |
20100235889 | APPLICATION PRODUCTS WITH IN-APPLICATION SUBSEQUENT FEATURE ACCESS USING NETWORK-BASED DISTRIBUTION SYSTEM - An improved system, device and method for accessing features of digital products with assistance from a product distribution site are disclosed. In one embodiment, a user of a client device may have previously acquired rights or permissions to access one or more supplemental features of one or more digital products (e.g., application programs). Typically, a user would purchase an application program and then sometime later also purchase supplemental features for use with the application program. In one implementation the supplemental features can be purchased using the application program with the assistance of a remotely located product distribution server. Sometime thereafter, in some cases, the user desires to make use of such previously acquired one or more supplemental features on another client device. For example, the user may wish or need to transfer from a former client device to a new client device. As another example, the user may wish to utilized (e.g., share) such previously acquired one or more supplemental features with another client device associated with the user, such as another client device within user's account. | 2010-09-16 |
20100235890 | Communication of Session-Specific Information to User Equipment from an Access Network - In conjunction with establishment of a session between an access network and user equipment of a communication system, session-specific information is transmitted from the access network to the user equipment. The session-specific information transmitted from the access network to the user equipment comprises information to be utilized in an authentication protocol carried out between the user equipment and an authentication server of the system. For example, the session-specific information transmitted from the access network to the user equipment may comprise an identifier of a gateway coupled between the access network and the authentication server. | 2010-09-16 |
20100235891 | METHOD AND SYSTEM FOR FACILITATING SYNCHRONIZING MEDIA CONTENT BETWEEN A VEHICLE DEVICE AND A USER DEVICE - A user uploads content such as files containing audio, video, graphical, data, points of interest, and other information from a user device such as a personal computer to a central server over the interne. Upon determining that a trigger event has occurred, communication and processing circuitry in a vehicle device automatically download the previously uploaded content over the interne and a short-range wireless network and store the content for use by a device such as an audio/visual/navigation unit. Examples of a trigger event include proximity to a short-range wireless communication network coupled to the internet, presence within a geofence, turning off a vehicle's engine, or detecting an SMS wake-up message while the vehicle device's main processor, transceivers not used for SMS, and auxiliary circuitry are in sleep mode. The short-range wireless network can be a vehicle owner's home network, or a commercial wi-fi hot spot, or subscription wireless service. | 2010-09-16 |
20100235892 | SYSTEM FOR, AND METHOD OF, PROVIDING THE TRANSMISSION, RECEIPT AND CONTENT OF A REPLY TO AN ELECTRONIC MESSAGE - A server transmits a message from a sender to a recipient. The server receives from the recipient an attachment relating to the message route between the server and the recipient. The server transmits to the sender the message and the attachment and their encrypted digital fingerprints and expunges the transmitted information. To subsequently authenticate the message and the attachment, the sender transmits to the server what the server has previously transmitted to the sender. The server then prepares a digital fingerprint of the message and decrypts the encrypted digital fingerprint of the message and compares these digital fingerprints. to authenticate the message. The server performs the same routine with the attachment and the encrypted digital fingerprint of the attachment to authenticate the attachment the recipient replies to the sender's message through the server. The server records proof of the delivery and content of the reply to the sender and the recipient. | 2010-09-16 |
20100235893 | SYSTEM AND METHOD FOR ASSOCIATING MESSAGE ADDRESSES WITH CERTIFICATES - A system and method for associating message addresses with certificates, in which one or more secondary message addresses are identified and associated with a user-selected certificate. The secondary message addresses are saved in a data structure that resides in a secure data store on a computing device, such as a mobile device. When a message is to be encrypted and sent to an individual using a particular certificate, an address mismatch would not be detected so long as the address to which the message is to be sent matches any of the message addresses associated with the certificate. The message addresses associated with the certificate include any message addresses contained within the certificate itself (“primary message addresses”) as well as any secondary message addresses that have been subsequently associated with the certificate. | 2010-09-16 |
20100235894 | Accessing Materials Via Voice and a Menu - A computer implemented method for accessing materials for a meeting may include receiving a call from a meeting participant by a system, wherein the meeting participant calls a prearranged teleconference number to participate in the meeting. The method may also include validating participation of the meeting participant in the meeting by the system. The method may further include providing access to an appropriate set of materials to the meeting participant based on a predetermined attribute associated with the meeting participant. | 2010-09-16 |
20100235895 | CAPTIVE NETWORK NEGOTIATION INTERFACE AND AUTOMATION - A method and apparatus of to negotiate access with a captive network is described. In an exemplary method, a mobile client detects, with a network interface, a network. The mobile client associates with the network, where associating allows the mobile client to communicate with the network. In addition, the mobile client probes the network by requesting a web page, where the web page is independent of the network. In response to the web page request, the mobile client receives a capture web page. The mobile client determines the type of authentication used for the network based on the received capture web page. | 2010-09-16 |
20100235896 | Instrument access control system - A system for centrally managing a set of network-connected laboratory instruments is disclosed. For example, the system includes a centralized database that includes information about the instruments in the system and about the authorized users of the system. In particular, the centralized database indicates which users are authorized to use each of the instruments in the system. The database may also include information about the operations that each user is authorized to perform using the instruments and information indicating whether tests performed by each instrument must be signed using one or more electronic signatures. The system may recognize a number of “roles,” each of which is associated with a particular set of rights, and may assign one or more roles to each user. Instruments and other elements of the system may access the centralized database over a network to enforce the user rights represented by the information in the database. | 2010-09-16 |
20100235897 | PASSWORD MANAGEMENT - A method for recording a password for providing access to secure resources in a computer network, including a user establishing a session via the computer network in which the user is in communication with a password authority via the session; the user identifying themselves to the password authority via the session and requesting a password via the session; the password authority sending a code to the user otherwise than via the session; the user receiving the code and providing the code to the password authority via the session; the user providing a proposed password value to the password authority via the session; the password authority receiving and checking the validity of the code provided by the user and, if the code entered is valid, recording the proposed password value entered by user; in which the code is only valid if provided via the session via which the password is requested. | 2010-09-16 |
20100235898 | INFORMATION PROCESSING SYSTEM AND PROCESSING METHOD THEREOF - When a plurality of information processing apparatuses having an authentication function executes a cooperative job, user authentication information is transmitted from a cooperative information source processing apparatus to a destination cooperative information processing apparatus that executes the cooperative job. It is determined whether or not a user account with authentication information that is the same as the transmitted authentication information exists in the destination cooperative information processing apparatus. The determined result is then notified to the cooperative information source processing apparatus. In this case, when the cooperative information source processing apparatus is notified that a user account with the same authentication information does not exist, the cooperative information source processing apparatus creates a user account based on the authentication information. Authentication is performed using the created user account, and the cooperative job is executed by the cooperative information source processing apparatus and the destination cooperative information processing apparatus. | 2010-09-16 |
20100235899 | DATA PROCESSING SYSTEM, CONTROLLER, AND METHOD THEREOF FOR SEARCHING FOR SPECIFIC MEMORY AREA - A data processing system, a controller, and a method for searching for a specific logical block are provided. Logical blocks are searched out from a peripheral unit, where data of the searched logical blocks are not yet stored in a cache memory of a master control unit. During searching for the logical blocks, a plurality of read commands are executed. The read commands are set to read data of a plurality of separated logical blocks of the peripheral unit respectively, such that the search time is shortened. | 2010-09-16 |
20100235900 | EFFICIENT TWO-FACTOR AUTHENTICATION - Methods, devices, and systems are provided for an efficient two-factor authentication process. In particular, a card challenge is combined with a user-provided password or similar user-based credential before a transformation of the data is performed. Once the combined challenge and user-provided credential have been transformed, the transformed data is used as a basis for authentication verification. | 2010-09-16 |
20100235901 | CIFS PROXY AUTHENTICATION - Techniques are described for a proxy system to provide a client device with transparent access to multiple network file servers. The proxy system may appear to the client device as a single network file server. The proxy may be configured to forward requests received from the client device to multiple servers as well as provide responses from the server back to the client. Further, the proxy system may authenticate itself, as the client, to each of the multiple network servers using authentication credentials supplied by the client. After prompting a user to submit credentials to establish a session with a first network server, the proxy system may send a session timeout error code, prompting the client to submit a fresh authentication request used by the proxy system to establish a session with a second network server. | 2010-09-16 |
20100235902 | SERVER PROTECTION FROM DISTRIBUTED DENIAL OF SERVICE ATTACKS - A network device connects between a client and a server. The network device is configured to store information regarding an application operating on the server; receive a first message, from the client, intended for the server; generate a second message in response to the first message; send the second message to the client; receive a third message from the client; generate, based on the information regarding the application on the server, a fourth message, that includes the information regarding the application operating on the server; send the fourth message to the client; receive a service request from the client in response to the fourth message; and establish, based on the service request, a connection between the client and the server. | 2010-09-16 |
20100235903 | SYSTEM AND METHOD FOR TRANSPARENT CLOUD ACCESS - System and method for transparent cloud access are described. In one embodiment, the system comprises an enterprise computing environment maintained by an enterprise and a cloud computing environment maintained by a cloud provider; and a secure bridge mechanism for interconnecting the enterprise computing environment and the cloud computing environment. The secure bridge mechanism comprises a first secure bridge portion associated with the enterprise and a second secure bridge portion associated with the cloud computing environment. The first and second secure bridge portions interoperate to provide transparent and secure access by resources of one of the computing environments to those of the other computing environment. | 2010-09-16 |
20100235904 | INFORMATION PROCESSING SYSTEM AND PROCESSING METHOD THEREOF - When a plurality of information processing apparatuses that have an authentication function cooperate to execute a job, user authentication information is transmitted from a cooperative information source processing apparatus to a destination cooperative information processing apparatus that execute the cooperative job. A user account is created at the destination cooperative information processing apparatus based on the transmitted authentication information. When the cooperative information source processing apparatus notifies execution of a cooperative job to the destination cooperative information processing apparatus, authentication information that is authenticated at the cooperative information source processing apparatus is transmitted to the destination cooperative information processing apparatus. The destination cooperative information processing apparatus creates a user account based on the authentication information, and executes the cooperative job using the created user account. | 2010-09-16 |
20100235905 | REALIZATION OF ACCESS CONTROL CONDITIONS AS BOOLEAN EXPRESSIONS IN CREDENTIAL AUTHENTICATIONS - A method, reader, and system are provided for performing group authentication processes. In particular, a group access decision can be made upon the analysis of a group rule. The group rule may contain a Boolean expression including one or more Boolean conditions. If an appropriate group of credentials are presented to a reader such that the Boolean expression is satisfied, then the group of credentials and the holders thereof are allowed access to a protected asset. | 2010-09-16 |
20100235906 | METHOD AND APPARATUS FOR ACTIVATE AN AUTHENTICATION ON A MOBILE DEVICE - In accordance with an example embodiment of the present invention, a mobile device comprising: a processor configured to receive security data from a dongle and activate, on the mobile device, at least one of the following: a power supply, an application, or a login based at least in part on the received security data. | 2010-09-16 |
20100235907 | Authorization Caching In A Multithreaded Object Server - Systems and methods are included for accessing resource objects in a multi-threaded environment. A request is received from a requester to perform an operation with respect to a resource object, where the requested resource object has multiple associations with other objects. A determination as to whether an authorization cache entry corresponding to the requested resource object contains sufficient permission data for granting or denying the request for access to the requested resource object is made. A grant or deny of access to the requested resource object is returned when the authorization cache entry corresponding to the requested resource object contains sufficient permission data. | 2010-09-16 |
20100235908 | System and Method for Detection of a Change in Behavior in the Use of a Website Through Vector Analysis - A system and method for identifying the change of user behavior on a website includes analyzing the actions of users on a website comprising a plurality of parameters or parameters that identify the actions performed on a website including parameters or fields related to previous actions by that user or other users of the website. The parameters or fields are represented in a vector format where each vector represents a different session of activity on the website, page of the website, user of the website, or other attribute of the use of a website. Analysis is performed to determine if new sessions are similar or dissimilar to previously known sessions. | 2010-09-16 |
20100235909 | System and Method for Detection of a Change in Behavior in the Use of a Website Through Vector Velocity Analysis - A system and software for identifying the change of user behavior on a website includes analyzing the actions of users on a website comprising a plurality of fields or input parameters that identify the actions performed on a website including fields related to previous actions by that user or other users of the website. The fields or input parameters are represented in a vector format where vectors represent different sessions of activity on the website, pages of the website, users of the website, or other attributes of the use of a website. Analysis is performed to determine if new sessions are similar or dissimilar to previously known sessions and if a session is converging or diverging from known sessions based on the velocity and direction of the velocity of the vectors in the vector space. | 2010-09-16 |
20100235910 | SYSTEMS AND METHODS FOR DETECTING FALSE CODE - Systems and methods for detecting false code in web pages linked to a web site are provided. One system includes a web server for administering the web site and a surveillance server for collecting generated or updated web pages from among the web pages linked to the web site, selecting tags of a given tag type included in the collected web pages, determining whether the selected tags comprise false code, and providing the determination result to an administrator terminal such that an administrator can check the determination result. One method includes collecting web pages that were generated or updated within a set time period from among the web pages linked to the web site, determining whether tags included in the collected web pages comprise false code, and providing the determination result to an administrator terminal such that an administrator can check the determination result. | 2010-09-16 |
20100235911 | SYSTEMS, METHODS, AND COMPUTER READABLE MEDIA FOR DETECTING AND MITIGATING ADDRESS SPOOFING IN MESSAGING SERVICE TRANSACTIONS - Systems, methods, and computer readable media for detecting and mitigating address spoofing in messaging service transactions are disclosed. A messaging service firewall (MSF) separate from a short message service center (SMSC) receives a mobility management reply message (MMR) that is sent by a mobile location register element in response to an associated mobility management query (MMQ) and that includes a serving switch identifier. The MSF allocates a global title address (GTA) from a pool of GTAs and stores a correlation between the allocated GTA and the originating SMSC. The MSF replaces the serving switch identifier in the MMR with the allocated GTA and routes the modified MMR. The MSF then receives a messaging service message (MSM) that is addressed to the allocated GTA and that includes the purported originating SMSC. If the purported originating SMSC does not match the SMSC to which the GTA is correlated, the MSM is discarded. | 2010-09-16 |
20100235912 | Integrity Verification Using a Peripheral Device - A peripheral device includes an interface configured to communicate with a computer, the peripheral device; logic configured to perform an integrity verification of an operating system of the computer; and a display configured to display a result of the integrity verification. A method for integrity verification of a computer using a peripheral device includes connecting the peripheral device to the computer; sending a challenge from the device to the computer; computing attestation data using the challenge and information stored in the computer, retrieving the attestation data from the computer by a client program running on the computer; sending the attestation data to the peripheral device; and verifying the attestation data by the peripheral device. | 2010-09-16 |
20100235913 | Proactive Exploit Detection - Malware detection systems and methods for determining whether a collection of data not expected to include executable code is suspected of containing malicious executable code. In some embodiments, a malware detection system may disassemble a collection of data to obtain a sequence of possible instructions and determine whether the collection of data is suspected of containing malicious executable code based, at least partially, on an analysis of the sequence of possible instructions. In one embodiment, the analysis of the sequence of possible instructions may comprise determining whether the sequence of possible instructions comprises an execution loop. In a further embodiment, a control flow of the sequence of possible instructions may be analyzed. In a further embodiment, the analysis of the sequence of possible instructions may comprise assigning a weight that is indicative of a level of suspiciousness of the sequence of possible instructions. In a further embodiment, the sequence of possible instructions may begin with a possible instruction that comprises at least one candidate operation code (opcode) that has been determined to occur frequently in executable code. | 2010-09-16 |
20100235914 | INTRUSION DETECTION FOR VIRTUAL LAYER-2 SERVICES - The invention is directed to detecting an attempt of an intruder system to participate in a virtual Layer-2 service provided over a packet switching network. Embodiments of the invention monitor operational status of an interface port of a PE router to which a CE router is communicatively coupled for providing the virtual Layer-2 service, determine, consequent to a change in said status, whether information that should relate to the CE router has changed; and thereby, in the affirmative, interpret said change to indicate that an intruder system has attempted to participate in the virtual Layer-2 service. Advantageously, this capability is complementary to other security measures such as MAC filters and Anti-spoofing filters that depend on the content of data packets exchanged between the CE and PE routers and not on the operational status of communicative connections between them. | 2010-09-16 |
20100235915 | USING HOST SYMPTOMS, HOST ROLES, AND/OR HOST REPUTATION FOR DETECTION OF HOST INFECTION - Detecting and mitigating threats to a computer network is important to the health of the network. Currently firewalls, intrusion detection systems, and intrusion prevention systems are used to detect and mitigate attacks. As the attackers get smarter and attack sophistication increases, it becomes difficult to detect attacks in real-time at the perimeter. Failure of perimeter defenses leaves networks with infected hosts. At least two of symptoms, roles, and reputations of hosts in (and even outside) a network are used to identify infected hosts. Virus or malware signatures are not required. | 2010-09-16 |
20100235916 | Apparatus and method for computer virus detection and remediation and self-repair of damaged files and/or objects - A method and apparatus for detecting and remediating damaged files as well as files containing proscribed code content, involving locating damage or proscribed code within a file, recording an identity of said file in which damage or proscribed code has been located, removing the damage or proscribed code by destroying the file that contains the damage or proscribed code, utilizing a search utility to locate a copy of the destroyed file according to one or more locations which are designated, and when located, copying the file to the original location of the destroyed file. | 2010-09-16 |
20100235917 | SYSTEM AND METHOD FOR DETECTING SERVER VULNERABILITY - Systems and methods for detecting vulnerability of a server are provided. One system includes: a check server for collecting response information with respect to at least one predetermined command from one or more service servers that provide service, and thus may be attacked from outside, and detecting and analyzing vulnerabilities of the service servers based on the collected response information; an administration terminal for displaying the results of detecting and analyzing the vulnerabilities of the service servers; and a database for storing and managing pattern information concerning the detected vulnerabilities. One method includes identifying a server that may be attacked by port scanning, receiving response information with respect to at least one predetermined command from the identified server, detecting and analyzing vulnerability of the server based on the response information, and reporting the result of the detection to an administration terminal. | 2010-09-16 |
20100235918 | Method and Apparatus for Phishing and Leeching Vulnerability Detection - A system and method for protection of Web based applications are described. Anomalous traffic can be identified by comparing the traffic to a profile of acceptable user traffic when interacting with the application. Phishing and leeching are one type of anomalous traffic that is detected. The anomalous traffic, or security events, identified at the individual computer networks are communicated to a central security manager. Various responsive actions may be taken in response to detection of phishing or leeching. | 2010-09-16 |
20100235919 | ATTACK CORRELATION USING MARKED INFORMATION - Techniques are described for providing security to a protected network. Techniques are described for thwarting attempted network attacks using marked information. The attack correlation system provides marked information to computing devices that probe for sensitive information, and monitors subsequent communications for use of the marked information. In one example, the attack correlation system reroutes communications containing the marked information to a dedicated vulnerable device that logs the communications to monitor the attackers' methods. The attack correlation system may also include functionality to exchange information regarding attempted attacks with other attack correlation systems to gain broader knowledge of attacks throughout one or more networks. | 2010-09-16 |
20100235920 | METHOD AND DEVICE FOR QUESTIONING A PLURALITY OF COMPUTERIZED DEVICES - Some embodiments of the present invention may relate to a device and a method of questioning computerized devices within an organization's network. The device, in accordance with some embodiments of the present invention, may include a questioning module and an agentless module. The questioning module may be adapted to receive data specifying a plurality of computerized devices to be questioned, and to receive data indicating which one or more questioning subjects are selected to be questioned on the specified computerized devices. The agentless module may be adapted to invoke and configure at least a remote access process, to question at least a registry of a remote computerized device. In accordance with some embodiments of the present invention, the questioning module may be adapted to utilize multiple threads of the agentless module to invoke and configure a plurality of remote access processes to question in parallel and without using agents at least a registry of the specified computerized devices, in accordance with the selected questioning subjects. | 2010-09-16 |
20100235921 | License Scheme for Use with Stackable Devices | 2010-09-16 |
20100235922 | PERSONAL INFORMATION MANAGEMENT DEVICE - A personal information management apparatus acquires associated information that is associated with target information for which transmission has been requested, and if the acquired associated information includes personal information, transmits the target information after modifying the associated portions of the target information. This structure enables improving protection of personal information by protecting not only personal information but also information that cannot be used independently to identify a person but can be easily correlated with other information and used to identify a specific individual with reference to the other information. | 2010-09-16 |
20100235923 | Methods and Systems for Applying Parental-Control Policies to Media Files - A computer-implemented method may intercept a file-system call associated with a media file. The computer-implemented method may determine an attribute of the media file. The computer-implemented method may also identify a parental-control policy associated with the attribute of the media file. The computer-implemented method may further apply the parental-control policy to the media file. Various other methods, systems, and computer-readable media are also disclosed. | 2010-09-16 |
20100235924 | Secure Personal Medical Process - A process of accessing and controlling medical information data by a Secure Process that includes two schemas—Medical Access Permission Schema (MAPS) information access system and encryption schema. In particular, the invention relates to a secure process for creating an access control and authentication methodology that identifies specific roles found in the medical field, applies these roles to content attributes, and binds those attributes to secret keys associated with an encryption schema. | 2010-09-16 |
20100235925 | METHOD FOR EXECUTING DIGITAL RIGHT MANAGEMENT AND TRACKING USING CHARACTERISTIC OF VIRUS AND SYSTEM FOR EXECUTING THE METHOD - A method of performing Digital Rights Management (DRM) and tracking using a virus characteristic and a system for executing the method are provided. The method of performing DRM and tracking with respect to a digital content, includes the steps of: providing a DRM code to the digital content in a DRM system, wherein the DRM code includes a virus characteristic; and performing the DRM and tracking with respect to the digital content, based on DRM information, wherein the DRM information is generated based on the DRM code. | 2010-09-16 |
20100235926 | Hairless Transgenic Animal - The present invention provides a hairless transgenic nonhuman animal used in the development of a therapy for dermatitis such as human atopic dermatitis and drug discovery. Specifically, the present invention provides a transgenic nonhuman animal, into which recombinant DNA comprising a heparin-binding EGF gene and a type 2 keratin gene promoter for regulating expression of the above gene has been introduced. | 2010-09-16 |
20100235927 | NON-HUMAN ANIMAL MODEL FOR LUNG CARCINOMA - A transgenic mouse expressing JSRV Env transgene that is operably linked to a surfactant protein C promoter (SPCp) is disclosed. The transgenic mouse is prone to developing a lung tumor and serves as an animal model for human lung carcinoma. | 2010-09-16 |
20100235928 | TRANSGENIC ANIMALS FOR ASSESSING DRUG METABOLISM AND TOXICITY - The present invention relates to transgenic non-human animals, tissues or cells derived therefrom and methods of producing them. The transgenic non-human animals or tissues or cells derived therefrom provide a system capable of expressing human proteins responsible for drug metabolism in place of the homologous endogenous non-human animal proteins and for the controlled expression of human genes introduced into the animal so that the expression of the human genes is regulated in a manner more closely analogous to that seen in vivo in humans. | 2010-09-16 |
20100235929 | Compositions and Methods for Producing Antibodies Having Human Idiotypes in Transgenic Birds - The invention relates to compositions and methods for producing antibodies having human idiotypes in non-human animals. | 2010-09-16 |
20100235930 | METHODS OF SELECTING HOST RESISTANT ANIMALS - The present invention is directed to a method of selecting animals that are genetically resistant to one or more intestinal parasite infections by testing mucus samples for the presence of an antibody against one or more of said intestinal parasites and segregation and selecting the animals that test positive. The animals that test negative are less parasite resistant and can be subjected to parasite management regimes. | 2010-09-16 |
20100235931 | Novel Neurological Function of mPKCI - Wildtype and mice lacking the gene encoding PKCI/HINT 1 (PKC | 2010-09-16 |
20100235932 | ANIMAL MODELS CARRYING TUMORS EXPRESSING HUMAN LIVER CANCER-SPECIFIC ANTIGEN AND METHOD FOR ANALYZING PREVENTION AND TREATMENT EFFICACY OF DENDRITIC CELLS-DERIVED IMMUNOTHERAPEUTICS USING THE ABOVE - The present invention relates to a method for analyzing the prevention and treatment efficacy of a dendritic cell-derived immunotherapeutic for liver cancer using an animal model carrying tumors expressing a human liver cancer-specific antigen, which comprises the steps of: (a) (a1) administering to a normal animal other than human dendritic cells to be analyzed, or (a1) administering to a normal animal other than human a cancer cell line expressing the human liver cancer-specific antigen to induce cancer in the normal animal; (b) (b1) administering to the animal the cancer cell line expressing the human liver cancer-specific antigen to induce cancer in the animal when the step (a1) is performed in the step (a), or (b1) administering to the animal with cancer dendritic cells to be analyzed when the step (a1) is performed in the step (a); and (c) determining the prevention and treatment efficacy of the dendritic cells as immunotherapeutics for liver cancer by measuring the formation or growth of cancer cells originated from the cancer cell line in the animal. | 2010-09-16 |
20100235933 | Kaspp (lrrk2) gene, its production and use for the detection and treatment of neurodegenerative disorders - The present invention refers to a newly discovered gene named KASPP for Kinase Associated with Parkinsonism with Pleiomorphic Pathology or alternatively named LRRK2 for Leucine-Rich Repeat Kinase 2, its production, biochemical characterization and use for the detection and treatment of neurodegenerative disorders, such as Parkinson disease (PD) including, without limitation, sporadic PD, Alzheimer disease (AD), amyotrophic lateral sclerosis (ALS), and other synucleinopathies and/or tauopathy as well as several polymorphisms and mutations in the KASPP/LRRK2 gene segregated with PD. | 2010-09-16 |
20100235934 | HYDROCARBON-PRODUCING GENES AND METHODS OF THEIR USE - The invention provides isolated nucleic acids and isolated polypeptides involved in the synthesis of hydrocarbons and hydrocarbon intermediates. Homologs of, conservative variants of, and sequences having at least about 35% sequence identity with nucleic acids involved in the synthesis of hydrocarbons and hydrocarbon intermediates are also provided. The invention further provides methods for producing an aliphatic ketone or a hydrocarbon, as well as a method for identifying an enzyme useful for the production of hydrocarbons. | 2010-09-16 |
20100235935 | PLASMA ANTI-DIABETIC NUCB2 PEPTIDE (PLADIN) AND USES THEREOF - The present invention provides pladin (plasma anti-diabetic nucb2 peptide) polypeptide and functional equivalent thereof that are useful for treating diabetes. The present invention provides a method of treating diabetes by administering to a subject nesfatin-1, pladin, or a functional equivalent thereof. The present invention also provides a method of treating diabetes by administering to subject plasmin inhibitors. | 2010-09-16 |
20100235936 | ZINC-FINGER NUCLEASE AND RNA INTERFERENCE MEDIATED INACTIVATION OF VIRAL GENOMES - Embodiments of the present invention provide methods for targeted inactivation of viral genomes. In one embodiment, zinc-finger proteins in which DNA binding sites are altered such that they recognize and bind different, desired DNA sequences contained in hepatitis B virus (HBV) and that include nuclease domains are used for inactivation. Other embodiments for targeted inactivation of viral genomes use small nucleic acid molecules, such as short micro-RNA molecules or short hairpin RNA molecules capable of mediating RNA interference (RNAi) against the hepatitis B virus. | 2010-09-16 |
20100235937 | PRODUCTION OF TRANSGENIC AVIAN ORGANISMS EMPLOYING EMBRYONIC STEM CELLS - Method of culturing embryonic stem (ES) cells of avian origin includes the steps of: a) suspending ES cells originating from the blastoderm disk of fertilized un-incubated avian egg(s) in a basal culture medium supplemented with: insulin-like growth factor-1 (IGF-1) and ciliary neurotrophic factor (CNTF); and animal serum; and, optionally, at least one growth factor selected from among interleukin 6 (II-6), interleukin 6 receptor (II-6R), stem cell factor (SCF), fibroblast growth factor (FGF), leukemia inhibitory factor (LIF), interleukin 11 (II-11), oncostatin and/or cardiotrophin; | 2010-09-16 |
20100235938 | Nicotiana Nucleic Acid Molecules and Uses Thereof - The present invention features | 2010-09-16 |
20100235939 | INBRED CORN LINE PH8BC - A novel inbred maize line designated PH8BC and seed, plants and plant parts thereof. Methods for producing a maize plant that comprise crossing inbred maize line PH8BC with another maize plant. Methods for producing a maize plant containing in its genetic material one or more traits introgressed into PH8BC through backcross conversion and/or transformation, and to the maize seed, plant and plant part produced thereby. Hybrid maize seed, plant or plant part produced by crossing the inbred line PH8BC or an introgressed trait conversion of PH8BC with another maize line. Inbred maize lines derived from inbred maize line PH8BC, methods for producing other inbred maize lines derived from inbred maize line PH8BC and the inbred maize lines and their parts derived by the use of those methods. | 2010-09-16 |
20100235940 | Inbred Corn Line BB36 - An inbred corn line, designated BB36, is disclosed. The invention relates to the seeds of inbred corn line BB36, to the plants and plant parts of inbred corn line BB36 and to methods for producing a corn plant, either inbred or hybrid, by crossing the inbred line BB36 with itself or another corn line. The invention further relates to methods for producing a corn plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other inbred corn lines derived from the inbred BB36. | 2010-09-16 |
20100235941 | F.OXYSPORUM F.SP. MELONIS RACE 1,2-RESISTANT MELONS - Methods for conveying | 2010-09-16 |
20100235942 | METHODS FOR CORN TRANSFORMATION - The present invention relates to a novel transformation system for generating transformed corn plants. In particular, the invention relates to a rapid selection system at an elevated temperature that allows faster and more efficient transformation. | 2010-09-16 |
20100235943 | Methods and genetic compositions to limit outcrossing and undesired gene flow in crop plants - The present invention relates to methods to control the spread of recombinant DNA molecules between sexually compatible plants of differing genetic composition. The invention describes the production of transgenic plants that comprise recombinant traits of interest or concern linked to repressible lethal genes. The lethal genes are blocked by the action of repressor molecules produced by the expression of repressor genes located at a different genetic locus. The lethal phenotype is only expressed after the segregation of the repressible lethal gene construct and the repressor gene following meiosis. The present invention may be employed for both open-pollinated and hybrid seed production systems and may be used to maintain genetic purity by blocking unintended introgression of genes from plants devoid of the specific repressor gene. The invention includes methods that impart traits that are desirable for environmentally responsible heterologous protein production, to genetic material used to impart said traits and to new plants and products derived by said methods. | 2010-09-16 |
20100235944 | Grain Quality Through Altered Expression of Seed Proteins - The present invention is directed to compositions and methods for altering the levels of seed proteins in cereal grain. The invention is directed to the alteration of seed protein levels in plant grain, resulting in grain with increased digestibility/nutrient availability, improved amino acid composition/nutritional value, increased response to feed processing, improved silage quality, and increased efficiency of wet milling. | 2010-09-16 |
20100235945 | NICOTIANA NUCLEIC ACID MOLECULES AND USES THEREOF - The present invention features | 2010-09-16 |
20100235946 | PLANT TRANSCRIPTIONAL FACTORS AS MOLECULAR MARKERS - The present invention discloses methods for identification and use of nucleotide sequences associated with loci encoding plant transcription factors as markers for genetic mapping and breeding in plant species including legume species such as | 2010-09-16 |
20100235947 | Rice Pollen-Preferential Promoters And Uses Thereof - The present invention relates to rice genomic promoter sequences which promote transcription preferentially in microspores and/or pollen of plants. Also provided are chimeric genes comprising these promoter sequences, and plant transformation vectors comprising these chimeric genes. The present invention also discloses plant cells, plant tissues, plants, seeds and grains comprising these chimeric genes. The invention further discloses methods for expressing foreign nucleic acid sequences preferentially in pollen and for producing plants with modified pollen fertility. | 2010-09-16 |
20100235948 | PLANTS MODIFIED WITH MINI-CHROMOSOMES - The invention is generally related to methods of generating plants transformed with novel autonomous mini-chromosomes. Mini-chromosomes with novel compositions and structures are used to transform plants cells which are in turn used to generate the plant. Methods for generating the plant include methods for delivering the mini-chromosome into plant cell to transform the cell, methods for selecting the transformed cell, and methods for isolating plants transformed with the mini-chromosome. Plants generated in the present invention contain novel genes introduced into their genome by integration into existing chromosomes. | 2010-09-16 |
20100235949 | SEED TREATMENT WITH PRF - The invention relates to a method to enhance germination of seeds and/or growth of plants or plant parts and/or plant yield by subjecting seeds to a pulsed radiofrequency electrical field (PRF). | 2010-09-16 |
20100235950 | PESTICIDAL PLANT EXTRACT CONTAINING LOLINE DERIVATIVES - This invention relates to a pesticidal compositions containing at least one pyrrolizidine alkaloid compound derived from a plant and endophyte combination, and applying the pesticidal compositions to another plant without pesticidal protection, where upon application of the composition, the plant confers pest protection. The pyrrolizidine alkaloid compound is of Formula wherein: R═H or CH | 2010-09-16 |
20100235951 | NOVEL GENES ENCODING INSECTICIDAL PROTEINS - The present invention relates to novel gene sequences encoding insecticidal proteins produced by | 2010-09-16 |
20100235952 | Nicotiana Nucleic Acid Molecules and Uses Thereof - The present invention features | 2010-09-16 |
20100235953 | CELERY VARIETY STIX (PYC 6651) - A new variety of celery designated as STIX (PYC 6651) and whose seed has an ATCC accession number PTA-9654 is presented. STIX has long petioles that make it well suited for making celery sticks. | 2010-09-16 |
20100235954 | DUAL-TIP CANTILEVER - A device comprising at least one cantilever comprising at least two tips is described, where the tips have substantially the same tip heights. Methods for making and using such a device are also provided. The height of one tip off of the surface can be more easily determined when the two tips have equal height. | 2010-09-16 |
20100235955 | VIBRATION COMPENSATION IN PROBE MICROSCOPY - A The local probe microscopy apparatus ( | 2010-09-16 |
20100235956 | ATOMIC FORCE MICROSCOPY TRUE SHAPE MEASUREMENT METHOD - An atomic force microscopy (AFM) method includes a scanning probe that scans a surface of a structure to produce a first structure image. The structure is then rotated by 90° with respect to the scanning probe. The scanning probe scans the surface of the structure again to produce a second structure image. The first and second structure images are combined to produce best fit image of the surface area of the structure. The same method is used to produce the best fit image of a flat standard. The best fit image of the flat standard is subtracted from the best fit image of the structure to obtain a true topographical image in which Z direction run out error is substantially reduced or eliminated. | 2010-09-16 |