39th week of 2011 patent applcation highlights part 74 |
Patent application number | Title | Published |
20110239285 | AUTHENTICATION BYPASS METHOD - A method for reactivating a telematics device configured to make a data call via a roaming partner of a service provider is disclosed. The service provider has an authentication bypass feature which uses an authentication bypass key common to the telematics device and the service provider to allow the telematics device to make a data call without authentication. The method comprises setting the authentication bypass key on a server of the service provider equal to a previous authentication bypass key, wherein the previous authentication bypass key was used by the authentication bypass feature prior to deactivation of the telematics device. The method includes setting the authentication bypass key on the telematics device equal to the previous authentication bypass key. The method further comprises commencing the data call through the roaming partner by sending the authentication bypass key to the service provider from the telematics device via the roaming partner. | 2011-09-29 |
20110239286 | MOBILE COMMUNICATIONS TERMINAL AUTHENTICATION AND SETTLEMENT SYSTEM AND METHOD - To authenticate fingerprint information detected by a mobile communications terminal at a fingerprint registration depot provided on the Internet, to thereby perform appropriate and reliable electronic authentication and electronic settlement, in a mobile communications terminal authentication and settlement system in which a mobile communications terminal accesses various websites on the Internet to perform electronic authentication and electronic settlement, the mobile communications terminal includes an operation panel that can be used in common for a fingerprint sensor mode and a touch panel mode. On the Internet, there is provided a fingerprint registration depot, to which the mobile communications terminal is connected and at which detected fingerprint information is compared with fingerprint authentication information registered in advance, to thereby perform fingerprint authentication. The mobile communications terminal is authorized to access the various websites via the Internet when authentication is successfully performed at the fingerprint registration depot. | 2011-09-29 |
20110239287 | METHOD FOR SHARING CONTENT - Disclosed is a method of sharing content. According to the content sharing method, content is received from a service provider using a receive device. A content protection solution supported in a target device is detected. The content is converted so that it is compatible with a content protection solution supported in any one of the target device and the receive device on the basis of the detected content protection solution. The receive device can include a security solution level, indicating a security characteristic of the receive device, in a certificate of the receive device. Accordingly, content transmitted from a service provider using a receive device can be shared efficiently by redistributing the content in such a way as to be compatible with a security solution of a home device. | 2011-09-29 |
20110239288 | EXECUTABLE CODE VALIDATION IN A WEB BROWSER - An active filter monitors a web browser session to identify executable code transmitted in the session. The executable code may be analyzed to determine if the code is digitally signed. When the code is digitally signed by the web server or by another trusted source, the code may be executed. When the code is neither digitally signed or when the source is not trusted, the code may be rejected and not executed. The filter may be implemented as a web browser component or plugin, as well as a gateway device, proxy, or other service. The filter may also be implemented on the server side to reject incoming data that may include unauthenticated code. | 2011-09-29 |
20110239289 | System and Method to Associate a Private User Identity with a Public User Identity - The inventive system includes a host, a network including a security gateway, and a public application. Established are an access session between the network and the host and an application session between the public application and the network. An application session record is created for the application session, and includes the user's public user identity used to access the public application, the user's private user identity used to access the network, a host identity, and an application session time. To determine the private user identity for the application session, the security gateway sends a query with the host identity and the application session time. These are compared with the host identity and access session time in an access session record. If they match, then the private user identity in the access session record is returned, and it is stored as the private user identity in the application session record. | 2011-09-29 |
20110239290 | SECURE SHARING OF TRANSPORT LAYER SECURITY SESSION KEYS WITH TRUSTED ENFORCEMENT POINTS - Embodiments of the present invention address deficiencies of the art in respect to security enforcement point operability in a TLS secured communications path and provide a novel and non-obvious method, system and computer program product for the secure sharing of TLS session keys with trusted enforcement points. In one embodiment of the invention, a method for securely sharing TLS session keys with trusted enforcement points can be provided. The method can include conducting a TLS handshake with a TLS client to extract and decrypt a session key for a TLS session with the TLS client traversing at least one security enforcement point. The method further can include providing the session key to a communicatively coupled key server for distribution to the at least one security enforcement point. Finally, the method can include engaging in secure communications with the TLS client over the TLS session. | 2011-09-29 |
20110239291 | Detecting and Thwarting Browser-Based Network Intrusion Attacks For Intellectual Property Misappropriation System and Method - Detecting and thwarting browser-based network intrusion attacks for intellectual property misappropriation is provided by enabling a local machine to direct retrieval of resources using uniform resource identifiers to a browser operating within a virtual machine whose internet protocol address is within a range external to a trusted network sub-circuit. Such a virtual machine is constrained by not having access to the Active Director Server of the trusted network. Such a virtual machine is constrained by not having access to other resources of the trusted network. Such a virtual machine is constrained by a monitor application which terminates the virtual machine if characteristics of intrusion or network attack are observed within the virtual machine. | 2011-09-29 |
20110239292 | SYSTEM AND METHOD OF SECURITY FUNCTION ACTIVATION FOR A MOBILE ELETRONIC DEVICE - A system and a method are provided for activating one or more security functions of a mobile electronic device. The system and method provide for the activation of one or more security functions when the mobile electronic device is stored in a mobile electronic device holder. Security functions include, for example, closing a data item currently being displayed on the mobile electronic device, erasing decrypted information stored on the mobile electronic device, locking the mobile electronic device, and performing a secure garbage collection operation. | 2011-09-29 |
20110239293 | AUDITING ACCESS TO DATA BASED ON RESOURCE PROPERTIES - Described is a technology, such as implemented in an operating system security system, by which a resource's metadata (e.g., including data properties) is evaluated against an audit rule or audit rules associated with that resource (e.g., object). The audit rule may be associated with all such resources corresponding to a resource manager, and/or by a resource-specific audit rule. When a resource is accessed, each audit rule is processed against the metadata to determine whether to generate an audit event for that rule. The audit rule may be in the form of one or more conditional expressions. Audit events may be maintained and queried to obtain audit information for various usage scenarios. | 2011-09-29 |
20110239294 | SYSTEM AND METHOD FOR DETECTING MALICIOUS SCRIPT - Provided are a system and method for detecting a malicious script. The system includes a script decomposition module for decomposing a web page into scripts, a static analysis module for statically analyzing the decomposed scripts in the form of a document file, a dynamic analysis module for dynamically executing and analyzing the decomposed scripts, and a comparison module for comparing an analysis result of the static analysis module and an analysis result of the dynamic analysis module to determine whether the decomposed scripts are malicious scripts. The system and method can recognize a hidden dangerous hypertext markup language (HTML) tag irrespective of an obfuscation technique for hiding a malicious script in a web page and thus can cope with an unknown obfuscation technique. | 2011-09-29 |
20110239295 | METHOD FOR SUPPORTING ATTACK DETECTION IN A DISTRIBUTED SYSTEM - A method for supporting attack detection in a distributed system, wherein a message being sent within the distributed system from a source entity to one or more target entities is transmitted via one or more intermediate entities, and wherein at least one of the one or more intermediate entities—tagging entity—appends an attack information tag to the message indicating whether the message constitutes or is part of an attack, is characterized in that a reputation system is provided, the reputation system being configured to receive the attack information tag generated by the tagging entity, and to generate a rating of the attack information tag. | 2011-09-29 |
20110239296 | TRACING UNAUTHORIZED USE OF SECURE MODULES - At least methods and systems for generating tracing data for tracing rogue secure modules in a population of secure modules are described wherein said rogue secure modules are configured for unauthorized provisioning of control words to a control word sharing network. One method comprises: executing a predetermined number of tracing experiments on said population, wherein each of said tracing experiments comprises: sending at least one tracing event message to each secure module in said selected population, wherein event information in said tracing event message is used to select at least part of said secure modules in said population to generate a tracing event; in response to the reception of said at least one tracing event message, a tracing event detector monitoring for a predetermined time the presence of at least one tracing event in said control word sharing network; and, storing tracing data in an event database, said tracing data comprising said event information and event detection information indicating whether or not a tracing event is detected. | 2011-09-29 |
20110239297 | TAMPERING MONITORING SYSTEM, CONTROL DEVICE, AND TAMPERING CONTROL METHOD - A management device detects whether any normal monitoring module that has not been tampered with exists by referring to monitoring results received from an information security device and selects, when existence is detected, one of the monitoring modules and assumes that the selected monitoring module has been tampered with. The monitoring device then successively applies a procedure to monitoring modules other than the selected monitoring module by referring to the monitoring results, starting from the selected monitoring module, the procedure being to assume that any monitoring module determining that a monitoring module assumed to have been tampered with is normal has also been tampered with. As a result of the procedure, when all of the monitoring modules are assumed to have been tampered with the management device determines the selected monitoring module to be a normal monitoring module that has not been tampered with. | 2011-09-29 |
20110239298 | CONCURRENT AND DELAYED PROCESSING OF MALWARE WITH REDUCED I/O INTERFERENCE - Systems, methods and non-transitory, tangible computer readable storage mediums encoded with processor readable instructions to scan files for malware are disclosed. An exemplary method includes writing, via a communication pathway, a first file to a storage medium that is utilized by the computer, requesting access to the first file so as to enable the first file to be scanned for malware, and delaying, when the first file resides on the storage medium, access to the first file while there is at least one I/O operation relative to the storage medium that has a higher priority level than a priority level of the request to access the first file. In addition, except to enable the first file to be scanned for malware, access to the first file is prevented until the first file has been scanned for malware. | 2011-09-29 |
20110239299 | ADAPTIVE DISTINCT COUNTING FOR NETWORK-TRAFFIC MONITORING AND OTHER APPLICATIONS - In one embodiment, a counting method of the invention uses an adaptive sketching-update process to compress an unknown cardinality into a counter value that counts the number of binary ones in a hashed bitmap vector. The sketching-update process is probabilistic in nature and uses bit-flip probabilities that are adaptively decreased as the counter value increases. Parameters of the sketching-update process are selected so that the relative error of cardinality estimates obtained based on the counter values is relatively small and substantially constant over a relatively wide range of cardinalities, e.g., from one to about one million. Due to the latter property, the counting method can advantageously be implemented in the form of embedded software that relies on a relatively small, fixed amount of memory. | 2011-09-29 |
20110239300 | WEB BASED REMOTE MALWARE DETECTION - A method for detecting HTML-modifying malware present in a computer includes providing a server which serves a web page (HTML) to a browser. A determination is made whether a modified string exists in the page received by said browser and if a modifying element is found, determining the malware is present in the computer. | 2011-09-29 |
20110239301 | TECHNIQUE OF DETECTING DENIAL OF SERVICE ATTACKS - The invention detects a denial of service attack at a node by monitoring the number of discarded packets in relationship to the number of inbound packets. When an attack is detected, relevant inbound packet information is collected during the attack to help characterize the attack and at least to pinpoint the source of the last hop to the attacked node. | 2011-09-29 |
20110239302 | APPARATUS AND METHOD FOR PERFORMING SYSTEM EVALUATION IN PORTABLE TERMINAL - An apparatus and method for performing a system evaluation such as real-time virus scan/diagnosis/cure in order to improve system performance in a portable terminal are provided. The apparatus includes an operation monitoring unit for determining an idle state duration and an active state duration by monitoring an operation of the portable terminal, and a pattern analysis unit for defining the idle state duration as a system evaluation duration. | 2011-09-29 |
20110239303 | THREAT MANAGEMENT SYSTEM AND METHOD - In a threat management system and method for managed systems, leveraging of identifications and/or assessments of common threats, and/or valuation of assets which may be susceptible to common threats, can be applied to facilitate monitoring of customer compliance with policies needed to guard against threats to customer assets. Threat identification and response in managed systems may be tailored for different customers, in some instances without having to parse individual customer details, such as assets at risk and types of threats to those assets. | 2011-09-29 |
20110239304 | MANAGING INFORMATION RELATING TO SECURE MODULE APPLICATIONS - An apparatus capable of hosting a secure module, which secure module comprises at least one secure module application. The apparatus is configured to provide connectivity to the secure module. A processing module is configured to obtain from the secure module information concerning the at least one secure module application. The processing module is, based on the obtained information, configured to check whether a compatible counterpart application is present in the apparatus. A communication module is configured to obtain the compatible counterpart application from an outside source in case no compatible counterpart application is present in the apparatus. | 2011-09-29 |
20110239305 | WIRELESS COMMUNICATION DEVICE, INFORMATION DISTRIBUTION SYSTEM, PROGRAM - There is provided a wireless communication device including a communication section which receives, from an information distribution device that distributes distribution information or another wireless communication device that has received the distribution information, the distribution information using ad hoc wireless communication, a position information acquisition section which acquires position information indicating a current position, a movement amount calculation section which calculates a movement amount from the information distribution device based on a change in the position information acquired by the position information acquisition section, and a distribution information management section which manages availability of the distribution information based on the movement amount and a predetermined limited area-radius that defines a limited area in which the distribution information is distributed. | 2011-09-29 |
20110239306 | DATA LEAK PROTECTION APPLICATION - A data leak protection method for managing user interaction with a computing device, the computing device comprising a kernel mode of operation and a user mode of operation, the method comprising: monitoring the kernel mode of the computing device in order to detect user-initiated events; determining whether a given user-initiated event has a forbidden status or an allowed status; performing an action in dependence on the status of the given user-initiated event. | 2011-09-29 |
20110239307 | METHOD FOR SECURING JAVA BYTECODE - The invention relates to a virtual machine. The virtual machine is set to recognize, in addition to a set of conventional bytecodes, at least one secure bytecode functionally equivalent to one of the conventional bytecodes. It is set to process secure bytecodes with increased security, while it is set to process conventional bytecodes with increased speed. The invention also relates to a computing device comprising such a virtual machine, to a procedure for generating bytecode executable by such a virtual machine, and to an applet development tool comprising such procedure. | 2011-09-29 |
20110239308 | SYSTEM AND METHOD OF VETTING DATA - Systems and methods for vetting data include receiving a notification at a second processor that a first processor has written first output data to an output data buffer in an output device. A hardware-implemented buffer access flag controls a permission for the first processor to write data to the output data buffer. The second processor sets the hardware-implemented buffer access flag to a first setting that prevents the first processor from writing additional output data to the output data buffer while the first output data in the output data buffer is being inspected. The second processor has a read-write permission to the hardware-implemented buffer access flag. The first processor has a read-only permission to the hardware-implemented buffer access flag. | 2011-09-29 |
20110239309 | DATA DEPENDENCE ANALYZER, INFORMATION PROCESSOR, DATA DEPENDENCE ANALYSIS METHOD AND PROGRAM - A data dependence analyzer includes: inter-process communication detection means which, on the basis of a processing content of inter-process communication performed for transferring data to be copied between resources, detects the inter-process communication; access detection means which successively detects an access event to the data in the resource due to the process; recording means which, for each of the access events detected by the access detection means, records the access target data in the access event; and analysis means which, among the access target data recorded by the recording means, searches data respectively corresponding to the copy source and the copy destination of the data transferred through the inter-process communication detected by the inter-process communication detection means and imparts a dependence relationship between the searched data. | 2011-09-29 |
20110239310 | TRANSGENIC FISH AND USES THEREOF - The present invention relates to a transgenic fish having at least one genomically integrated expression cassette containing a 5′-regulatory nucleotide sequence responsive to hormones, particularly estrogenic hormones, connected in a functional manner upstream of a nucleotide sequence encoding a reporter protein. The present invention further relates to methods of using the transgenic fish for various purposes, including, for example: (1) identifying estrogenic endocrine disruptors; (2) monitoring estrogen-like activity of test samples; (3) identifying anti-estrogenic endocrine disruptors; and (4) investigating the effects of endocrine disruptors on liver regeneration. Expression cassettes, host cells, and transgenic cells of aquatic animals are also disclosed. | 2011-09-29 |
20110239311 | Agonists of NR2F6 For Immunosupression - The present invention relates to agonists/activators of NR2F6 (nuclear orphan receptor receptor Ear2) for the treatment of a disease related to an augmented immune response. Furthermore, pharmaceutical compositions comprising said agonists/activators of NR2F6 and a pharmaceutical carrier are comprised. In a further aspect, the present invention provides for a method for identifying immunosuppressants comprising contacting a cell, tissue or a non-human animal comprising a reporter construct for NR2F6-activation with a candidate molecule, measuring the reporter signal and selecting a candidate molecule which alters the reporter signal. Furthermore, the present invention relates to non-human transgenic animals or cells or tissue derived therefrom useful in the provided methods for identifying immunosuppressants. In yet another aspect, the present invention relates to ligand-mediated reporter gene expression constructs, ligand displacement constructs, fluorescent cellular sensor fusion mutant constructs, and ligand-induced homo- and/or heterodimer constructs useful in the provided methods for identifying immunosuppressants. | 2011-09-29 |
20110239312 | METHODS OF DIAGNOSING AND TREATING MOTOR NEURON DISEASES - Use of an agent which upregulates an activity or amount of miRNA-9 or miRNA-9* is disclosed for the preparation of a medicament for the treatment of a motor neuron disease (MND). | 2011-09-29 |
20110239313 | METHOD FOR PRODUCTION OF TRACP5b - Silkworms which have (i) a DNA encoding a transcriptional regulator operably linked downstream of a promoter of a DNA encoding a protein specifically expressed in the silk gland and (ii) a DNA encoding TRACP5 operably linked downstream of a target promoter of the transcriptional regulator were produced. The result showed that active TRACP5b was produced from the silkworms. This means that TRACP5 produced from the silk gland of the silkworms undergoes processing in the silk gland that is similar to the processing taking place at bone resorption sites. | 2011-09-29 |
20110239314 | Gene of porcine alpha-si casein, a promoter of the same and use thereof - The present invention relates to a porcine alpha-S1-casein gene, a porcine alpha-S1-casein gene promoter, an expression comprising the same promoter, and a method for the production of a target protein using the same expression vector. The promoter of the present invention facilitates the mammary gland-specific expression of the target protein. Accordingly, an animal transformed with the promoter secretes the target protein in milk at high concentration, and thus can be advantageously used for the production of useful proteins. | 2011-09-29 |
20110239315 | MODULAR DNA-BINDING DOMAINS AND METHODS OF USE - The present invention refers to methods for selectively recognizing a base pair in a DNA sequence by a polypeptide, to modified polypeptides which specifically recognize one or more base pairs in a DNA sequence and, to DNA which is modified so that it can be specifically recognized by a polypeptide and to uses of the polypeptide and DNA in specific DNA targeting as well as to methods of modulating expression of target genes in a cell. | 2011-09-29 |
20110239316 | ANTI-cMET ANTIBODY - Antibody capable of binding specifically to the human c-Met receptor and/or capable of specifically inhibiting the tyrosine kinase activity of said receptor, with an improved antagonistic activity, said antibody comprising a modified hinge region. A composition comprising such an antibody antagonist to c-Met and its use as a medicament for treating cancer. | 2011-09-29 |
20110239317 | POLYNUCLEOTIDES ENCODING PROMYOSTATIN POLYPEPTIDES - The present invention provides isolated polynucleotides encoding promyostatin polypeptides or a peptide portion thereof, polynucleotides complementary thereto, and oligonucleotides that can specifically hybridize to such polynucleotides. The present invention also provides an isolated polynucleotide encoding a mature myostatin peptide. | 2011-09-29 |
20110239318 | METHODS FOR PRODUCING FISH WITH HIGH LIPID CONTENT - The invention provides methods for producing biofuel from algae, that use fish which have a high capacity of producing and/or accumulating lipids to harvest algae from an algal culture. The invention also provides methods for growing fish that result in a high lipid content. The invention also provides methods for creating fish that have a high capacity of producing and accumulating lipids by breeding and/or recombinant DNA techniques. Also included are transgenic fish that have a higher lipid content than wild-type fish. | 2011-09-29 |
20110239319 | Use of Endonucleases for Inserting Transgenes Into Safe Harbor Loci - The present invention concerns the endonucleases capable of cleaving a target sequence located in a “safe harbor loci”, i.e. a loci allowing safe expression of a transgene. The present invention further concerns the use of such endonucleases for inserting transgenes into a cell, tissue or individual. | 2011-09-29 |
20110239320 | SOYBEAN VARIETY D5624041 - The invention relates to the soybean variety designated D5624041. Provided by the invention are the seeds, plants and derivatives of the soybean variety D5624041. Also provided by the invention are tissue cultures of the soybean variety D5624041 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety D5624041 with itself or another soybean variety and plants produced by such methods. | 2011-09-29 |
20110239321 | HERBICIDE TOLERANT SOYBEAN PLANTS AND METHODS FOR IDENTIFYING SAME - The invention provides specific transgenic soybean plants, plant material and seeds, characterized in that these products harbor a stack of specific transformation events at specific locations in the soybean genome. Tools are also provided which allow rapid and unequivocal identification of these events in biological samples. | 2011-09-29 |
20110239322 | IN VITRO FLOWERING/SEED SET LEADING TO PARTIAL OR COMPLETE MALE STERILITY IN GRASSES - The present invention relates to a method of manipulating plant development that allows for partial or complete male sterility in grasses. | 2011-09-29 |
20110239323 | ISOLATION AND USE OF FAD2 AND FAE1 FROM CAMELINA - The present invention provides isolated FAD2 and FAE1 genes and FAD2 and FAE1 protein sequences of | 2011-09-29 |
20110239324 | Production of Plants with Decreased Nitrite Content - The present invention relates in one aspect to a method for producing a transgenic plant, comprising introducing into an unmodified plant an exogenous gene encoding a nitrite reductase, wherein expression of the nitrite reductase encoded by the exogenous gene reduces nitrite content in the transgenic plant relative to the unmodified plant. Also provided are transgenic plants and plant cells comprising an exogenous gene encoding a nitrite reductase, as well as associated uses, chimaeric genes and plant transformation vectors. | 2011-09-29 |
20110239325 | POLYNUCLEOTIDE SEQUENCE OF FRUIT SOFTENING ASSOCIATED A-MANNOSIDASE AND ITS USES FOR ENHANCING FRUIT SHELF LIFE - The present invention provides isolated polynucleotide sequences encoding α-mannosidase. The present invention further provides DNA constructs comprising the polynucleotide sequence coding for α-mannosidase in sense or anti-sense orientation, RNAi contructs, recombinant vectors comprising the constructs, and host cells comprising the recombinant vector. The present invention further provides transgenic plants, plant cells, transgenic progeny and seeds expressing the polynucleotide with reduced α-mannosidase protein accumulation, having enhanced fruit shelf life. | 2011-09-29 |
20110239326 | HYBRID-TYPE HISTIDINE KINASE GENE ISOLATED FROM INDICA RICE IR64 - The present invention provides a hybrid-type histidine kinase gene isolated from indica rice IR64, and being capable of osmosensing and inducible by multiple stresses, and hence, being capable of improving the multiple stress tolerance of the crop plants even in subsequent generations so as to make the plants capable of coping-up with the more than one environmental abiotic stress conditions, and therefore, increasing the economic value of the crop plants while maintaining the yield thereof. The present invention also provides a method of isolation of hybrid-type histidine kinase gene from indica rice IR64, and its functional characteristics and its sequence listing and cloning, at least, with yeast expression vector and the plant expression vector, and clones produced thereby, and method of improving multiple stress tolerance of crop plant and crop plants having improved multiple stress tolerance. | 2011-09-29 |
20110239327 | Nematicidal Effects of Cysteine Proteinases and Methods of Use Thereof to Treat Nematode Infestation - This invention provides methods and compositions for control of nematicidal damage to economically important plants by contacting the nematodes with cysteine proteinases. The cysteine proteinases may be provided as crude plant extracts or as refined enzyme extracts. In addition, the cysteine proteinases may be provided by the plants expressing these enzymes. Furthermore, the cysteine proteinase treatment according to this invention may be utilized to potentiate the anti-nematode effects of a non-enzymatic nematicide. | 2011-09-29 |
20110239328 | SWEETPOTATO SRD1 cDNA AND TRANSGENIC PLANTS WITH HIGH-NUMBERED STORAGE ROOTS USING THE SAME - Disclosed herein are a sweetpotato SRD1 cDNA, a plant transformation vector carrying the same, and a transgenic plant comprising the vector. The thickening growth of storage roots of the transgenic sweetpotato prepared using the SRD1 cDNA is stimulated, increasing the number of storage roots by up to two times. Therefore, SRD1 according to the present subject matter is useful in the generation of transgenic root crops with high-numbered storage roots or early-maturing storage root plants. | 2011-09-29 |
20110239329 | Secondary Wall Forming Genes from Maize and Uses Thereof - The present invention provides polynucleotides and related polypeptides of the class of genes involved in maize secondary wall (ZmSCW) formation. The invention provides genomic sequence for the ZmSCW genes. ZmSCW are responsible for controlling plant growth, secondary cell wall development and yield in crop plants. | 2011-09-29 |
20110239330 | GENE CAPABLE OF INCREASING THE PRODUCTION OF PLANT BIOMASS AND METHOD FOR USING THE SAME - According to the present invention, a technique with which the production of plant biomass can be drastically increased and salt stress resistance can be imparted to a plant is provided. | 2011-09-29 |
20110239331 | Insecticidal Compounds and Methods for Selection Thereof - A series of potent and highly specific insecticidal toxins characterized by an amino acid sequences SEQ ID NO: 2-35. | 2011-09-29 |
20110239332 | PROPAGATION OF SWITCHGRASS AND MISCANTHUS - Methods and materials for clonally increasing switchgrass and | 2011-09-29 |
20110239333 | Polypeptides Having Xylanase Activity And Polynucleotides Thereof - The present invention relates to isolated polypeptides having xylanase activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods for producing and using the polypeptides. | 2011-09-29 |
20110239334 | NEMATODE-RESISTANT PLANTS, AND MODIFIED BACILLUS THURINGIENSIS CRY GENES AND PROTEINS - The subject invention concerns plants protected from nematode feeding damage and improved versions of Cry proteins. Synthetic genes encoding Cry proteins are also part of the subject invention. Another embodiment of the subject invention includes plants transformed with the genes of the subject invention. In yet another embodiment the subject invention concerns Bt proteins for in-plant protection against crop damage by root knot nematode (RKN; | 2011-09-29 |
20110239335 | Soybean Seed and Oil Compositions and Methods of Making Same - Methods for obtaining soybean plants that produce seed with low linolenic acid levels and moderately increased oleic levels are disclosed. Also disclosed are methods for producing seed with low linolenic acid levels, moderately increased oleic levels and low saturated fatty acid levels. These methods entail the combination of transgenes that provide moderate oleic acid levels with soybean germplasm that contains mutations in soybean genes that confer low linolenic acid phenotypes. These methods also entail the combination of transgenes that provide both moderate oleic acid levels and low saturated fat levels with soybean germplasm that contains mutations in soybean genes that confer low linolenic acid phenotypes. Soybean plants and seeds produced by these methods are also disclosed. | 2011-09-29 |
20110239336 | Low Drift Scanning Probe Microscope - A scanning probe microscope, such as an atomic force microscope, include a z-stage and a bridge structure comprised substantially free of Invar. A scanner containing a probe is mounted to the z-stage, which is movable in the z-axis to raise and lower the probe. A drift compensation system is provided to reduce thermal drift of the z-stage and the bridge. The drift compensation system includes heating elements thermally coupled to the z-stage and the bridge, ambient temperature sensors, and a controller to actively control the heating elements to maintain the bridge and the z-stage at an elevated temperature. | 2011-09-29 |
20110239337 | Cherry laurel plant named 'Ivory' - ‘Ivory’ is a new | 2011-09-29 |
20110239338 | Vanda plant named 'SPCDW0901' - A new and distinct | 2011-09-29 |
20110239339 | Vanda plant named 'SPCDW0902' - A new and distinct | 2011-09-29 |
20110239340 | Dianthus plant named 'WP10 SAB06' - A new cultivar of | 2011-09-29 |
20110239341 | Bermudagrass Plant Named 'MSB-04-264' - Bermudagrass plant ‘MSB-04-264’ is a new and distinct variety of bermudagrass cultivar characterized by its good growth habit, extremely fine leaf texture, upright as opposed to prostrate leaf orientation, and good fall and winter color retention. ‘MSB-04-264’ is particularly suited for golf course greens and the like. | 2011-09-29 |
20110239342 | Calibrachoa plant named 'KLECA09208' | 2011-09-29 |
20110239343 | Calibrachoa plant named 'KLECA09204' | 2011-09-29 |
20110239344 | Calibrachoa plant named 'KLECA09210' | 2011-09-29 |
20110239345 | Calibrachoa plant named 'KLECA09207' | 2011-09-29 |