40th week of 2014 patent applcation highlights part 86 |
Patent application number | Title | Published |
20140298441 | AUTHENTICATION METHOD, AUTHENTICATION SYSTEM, AND SERVICE DELIVERY SERVER - A client terminal transmits a signal related to an authentication request to a service delivery server through a browser every time an application is started by an instruction from a user. Upon receiving the authentication request from the client terminal, an authentication server executes authentication processing in cooperation with the service delivery server based on authentication information of an application of the client terminal, a session of which has been established, and stored in the service delivery server, and user information related to the user stored in the authentication server. | 2014-10-02 |
20140298442 | PROVIDING A MANAGED BROWSER - Methods, systems, computer-readable media, and apparatuses for providing a managed browser are presented. In various embodiments, a computing device may load a managed browser. The managed browser may, for instance, be configured to provide a managed mode in which one or more policies are applied to the managed browser, and an unmanaged mode in which such policies might not be applied and/or in which the browser might not be managed by at least one device manager agent running on the computing device. Based on device state information and/or one or more policies, the managed browser may switch between the managed mode and the unmanaged mode, and the managed browser may provide various functionalities, which may include selectively providing access to enterprise resources, based on such state information and/or the one or more policies. | 2014-10-02 |
20140298443 | SYSTEM AND METHOD OF EXTENDING A HOST WEBSITE - Some embodiments of the present disclosure provide a system for providing access control. The system may include an extension module for extending a host website; and a marketplace server that is configured to: receive a request to access the extension module from a browsing device, the browsing device is for maintaining a browsing session with the host website, and the extension module is for exchanging data with the host website; generate a first authorization token that is associated with the browsing session; and send, to the browsing device, the first authorization token. The extension module may be configured to receive a second authorization token from the browsing device. One of the extension module or the marketplace server may then be further configured to: verify that the second authorization token matches the first authorization token; and if verification is successful, the extension module can be allowed to exchange data with the host website and communicate with the browsing device. | 2014-10-02 |
20140298444 | SYSTEM AND METHOD FOR CONTROLLING ACCESS TO A DEVICE ALLOCATED TO A LOGICAL INFORMATION PROCESSING DEVICE - A logical information-processing device is allocated based on a request from a terminal device. In an information-processing device, one of plural storage devices is connected to one of plural processing devices each including a managing unit. First correspondence information stores physical identification information identifying the information-processing device in association with address information of the managing unit. Second correspondence information stores the physical identification information in association with logical identification information identifying the logical information-processing device. A managing device obtains address information of the managing unit of the information-processing device corresponding to the logical information-processing device allocated to the terminal device, by using the physical identification information obtained, based on the logical identification information included in the request, from the second correspondence information. A proxy device accesses the managing unit of the corresponding information-processing device based on the address information obtained by the managing device. | 2014-10-02 |
20140298445 | Method and Apparatus for Filtering URL - A method and an apparatus for filtering a uniform resource locator (URL). According to the method, a first category corresponding to a URL connection request can be found in a pre-stored category information table; when the first category conforms to a predetermined URL passing through policy, the URL connection request is allowed to pass through; the URL connection request is forwarded to a corresponding server; a second category corresponding to a URL is determined according to web page content returned by the server; if the second category conforms to the predetermined URL passing through policy, the web page content is sent to a client; if the second category does not conform to the predetermined URL passing through policy, the web page content is blocked. A category to which a URL belongs can be determined in real time, and implementing a function of accurate category filtration. | 2014-10-02 |
20140298446 | METHOD AND EQUIPMENT FOR ESTABLISHING A CONNECTION THROUGH A VIRTUAL PRIVATE NETWORK - Embodiments of the present invention refer to a method for establishing a connection through a virtual private network “VPN” ( | 2014-10-02 |
20140298447 | Method for Enhancing Security of Portable Electronic Device and Related Wireless Charging System - A method for a portable electronic device for enhancing the security of the portable electronic device while charged wirelessly by a power transmission device includes sending a first packet including a security code of the portable electronic device to the power transmission device for starting wireless charging; being charged wirelessly by the power transmission device; and reporting a second packet including the security code to the power transmission device according to a triggering event. | 2014-10-02 |
20140298448 | STORAGE DEVICE, STORAGE SYSTEM, AND AUTHENTICATION METHOD - According to one embodiment, a storage device that has a nonvolatile semiconductor memory includes an authentication information storage unit that previously stores first apparatus authentication information to authenticate an authorized host device and first user authentication information to authenticate an authorized user. The storage device executes apparatus authentication on the basis of second apparatus authentication information received from a newly connected host device and the first apparatus authentication information in the authentication information storage unit and executes an invalidation process of user data stored in the nonvolatile semiconductor memory, when the apparatus authentication is failed. | 2014-10-02 |
20140298449 | OCR-BASED SINGLE SIGN-ON - According to one aspect of the present disclosure, a method and technique for OCR-based single sign-on in a computing environment is disclosed. The method includes: responsive to launching of an application login interface, capturing an image of the login interface; determining a location of a cursor on the login interface from the image; determining whether the location of the cursor corresponds to a credential input field of the login interface; and responsive to determining that the location of the cursor corresponds to the credential input field of the login interface, automatically sending a keystroke to the login interface to insert at least one character to the login interface. | 2014-10-02 |
20140298450 | LEVERAGING BIOMETRICS FOR AUTHENTICATION AND TOUCH DIFFERENTIATION - Biometric authentication and touch differentiation embodiments are described which use a handheld mobile computing device having a signal injection site that injects a signal into a user's hand for a prescribed period of time, and at least one signal sensing site each of which captures a signal emanating from a finger of either of the user's hands that is touching the signal sensing site during at least the period of time the signal is injected. The captured signal or signals are analyzed to determine whether they match, to a prescribed degree, a pre-established signal model that is indicative of a signal or signals expected to be captured. The signal matching determination can be employed to authenticate a user, or identify which finger of a user's hand is touching the computing device. | 2014-10-02 |
20140298451 | Projection Type Image Display Device - A projection type image display device provided with an unauthorized use preventing system includes a button unit or a remote controller for operating the display device, a condition memory for storing information indicating at least one use condition in an authorized use of the display device, a password memory for storing a password for releasing a restriction on the use of the display device, a detector for detecting a used condition of the display device at a power on timing, and a processor for imposing restrictions on the use of the display device when the use condition detected by the detector does not match the at least one use condition indicated by the information stored in the condition memory and for relieving the restriction based upon input of the password. | 2014-10-02 |
20140298452 | SECURE COMPUTING DEVICE USING NEW SOFTWARE VERSIONS - A computing device includes a central processing resource, memory, a network interface, and a security control module. The security control module is operable to determine to change at least a portion of a program of the computing device. When the program, or portion thereof, is to be changed, the security control module sends a request to a software generation module for a new version of the program, or portion thereof. The security control module then receives the new version of the program, or portion thereof, and replaces, within the memory, the program, or portion thereof, with the new version of the program, or portion thereof. When the program is evoked, the central processing resource uses the new version of the program, or portion thereof, such that execution of the program is changed, which changes internal operation of the computing device thereby reducing adverse impact of malicious software. | 2014-10-02 |
20140298453 | SECURE COMPUTING DEVICE USING A LIBRARY OF PROGRAMS - A computing device includes a central processing resource, memory, a network interface, and a security control module. The security control module determines when to change a program of the computing device. When the program is to be changed, the security control module accesses a library of programs that includes a plurality of versions of the program and selects one of the plurality of versions of the program. The security control module then updates an active program list to include the selected version of the program. When the program is evoked, the central processing resource uses the selected version of the program such that execution of the program is changed, which changes internal operation of the computing device thereby reducing adverse impact of the malicious software. | 2014-10-02 |
20140298454 | SECURE COMPUTING DEVICE USING DIFFERENT CENTRAL PROCESSING RESOURCES - A computing device includes central processing resources, memory, a network interface, and a security control module. The security control module determines when to change operation of a program of the computing device. When the operation of the program is to be changed, the security control module identifies a first processing resource of the central processing resources that is currently assigned to execute the program and selects a second processing resource of the central processing resources for subsequent execution the program. The security control module then ascertains first execution settings of the program as used by the first processing resource and facilitates conversion of the first execution settings into second execution settings for the second processing resource. The security control module then de-assigns the first processing resource from executing the program and assigns the second processing resource to execute the program. | 2014-10-02 |
20140298455 | CRYPTOGRAPHIC MECHANISMS TO PROVIDE INFORMATION PRIVACY AND INTEGRITY - A security engine may be selected from a plurality of security engines to apply one or more security mechanisms to a section of source code of an application. In some cases, the section of source code may be identified by one or more security mechanism identifiers included in the source code. The security engine may generate machine-readable code that corresponds to the section of source code for which the one or more security mechanisms are to be applied. The machine-readable code may be executed on a plurality of computing devices. In one implementation, applying the security mechanisms to the section of source code may include producing zero-knowledge proofs of knowledge for the section of source code. | 2014-10-02 |
20140298456 | SECURING APPLICATIONS FOR COMPUTING DEVICES - Systems and methods for securing hybrid applications for computing devices are described. According to the present subject matter, the system(s) implement the described method(s) for building and execution of secure hybrid applications. During build of the hybrid application, the disclosed method may incorporate identifying of at least one non-native file of the hybrid application, generating a primary Unique Identifier (UI) associated with the at least one non-native file, and storing the generated primary UI as a part of the hybrid application to form a secure hybrid application. During execution of the secure hybrid application the disclosed method may incorporate identifying of at least one non-native file of the secure hybrid application, generating a secondary UI associated with the at least one non-native file, extracting primary UI stored in the secure hybrid application. The system/method may further implement determining whether the generated secondary UI is different from the extracted primary UI. | 2014-10-02 |
20140298457 | METHOD AND APPARATUS FOR COLLECTING HARMFUL INFORMATION USING BIG DATA ANALYSIS - Disclosed are a method and apparatus for collecting harmful information that analyze a plurality of packets collected in real time from a network and collect information on harmful sites. The harmful information collecting method includes receiving a plurality of packets collected by at least one packet collecting unit, analyzing whether the received packets include harmful information, extracting information on harmful sites from which corresponding packets are transmitted if the analyzed packets include harmful information, and storing the extracted information on harmful sites in a database. | 2014-10-02 |
20140298458 | DEVICE AND METHOD FOR PROCESSING DATA - An electronic device for processing data includes: an input interface for receiving input data; a processing module for processing data; and an encoding unit configured to encode data words received at the input interface as input data, in order to obtain encoded data words. The encoding unit is configured to encode the data words in such a manner that a specified proportion of all encoded data words have a specified Hamming distance and/or a specified Hamming weight. The processing module is configured to process the encoded data words. | 2014-10-02 |
20140298459 | Device and method for processing data - A device for processing data, the device having an input interface for receiving input data and a processing module for processing data, characterized in that an encoding unit is provided, which is configured to encode data words received at the input interface as input data, in order to obtain encoded data words; measured values characterizing the encoded data words and/or their processing by the device being ascertainable for encoded data words as a function of at least one physical variable of the device; the encoding unit being configured to encode the data words in such a manner, that a specifiable proportion of all measured values, which may be at least approximately 50% of all measured values, exhibit a difference from the setpoint value, which is less than or equal to a specifiable threshold value; and the processing module is configured to process the encoded data words. | 2014-10-02 |
20140298460 | MALICIOUS UNIFORM RESOURCE LOCATOR DETECTION - The techniques described herein use training data to train classification models to detect malicious Uniform Resource Locators (URLs) that target authentic resources (e.g., Web page, Web site, or other network locations accessed via a URL). The techniques train the classification models using one or more machine learning algorithms. The training data may include known benign URLs and known malicious URLs (e.g., training URLs) that are associated with a target authentic resource. The techniques then use the trained classification models to determine whether an unknown URL is a malicious URL. The malicious URL determination may be based on one or more lexical features (e.g., brand name edit distances for a domain and path of the URL) and/or site/page features (e.g., a domain age and a domain confidence level) extracted. | 2014-10-02 |
20140298461 | DISTRIBUTED TRAFFIC PATTERN ANALYSIS AND ENTROPY PREDICTION FOR DETECTING MALWARE IN A NETWORK ENVIRONMENT - Technologies are provided in embodiments to detect malware. The embodiments are configured to receive an entropy rate of a potentially affected system. The embodiments are further configured to compare the entropy rate to an average entropy rate, and to determine a probability that the potentially affected system is infected with malware. The probability is based, at least in part, on a result of the comparison. More specific embodiments can include the received entropy rate being generated, at a least in part, by a genetic program. Additional embodiments can include a configuration to provide the potentially affected system with a specified time-span associated with the genetic program. The specified time-span indicates an amount of time to observe context information on the potentially affected system. In at least some embodiments, the result of the comparison includes an indicator of whether the entropy rate correlates to an infected system or a healthy system. | 2014-10-02 |
20140298462 | Restricted Software Automated Compliance - Automated restricted software compliance may be provided. Periodic scans may be performed to identify applications as potentially restricted applications. Upon identifying a restricted application, a notification of the presence of the restricted application and a proposed remedial action may be provided. If the restricted application is not removed, the remedial action may be performed. | 2014-10-02 |
20140298463 | Information Processing Method, Device, and Server - Embodiments of the present invention provide an information processing method, device, and server, relating to the technical field of communications, and solving the problem that a user continuously releasing illegal information in the network. The method comprises: receiving network information; determining, according to the network information, a rating result of a network object corresponding to the network information; controlling the network object according to the rating result of the network object corresponding to the network information. Embodiments of the present invention further provide an information processing device and server. The present invention is applied to the network information management. | 2014-10-02 |
20140298464 | ANTI-PHISHING PROTECTION - Anti-Phishing protection assists in protecting against phishing attacks. Any links that are contained within a message that has been identified as a phishing message are disabled. A warning message is shown when the phishing message is accessed. The first time a disabled link within the phishing message is selected a dismissible dialog box is displayed containing information about how to enable links in the message. After the user dismisses the dialog, clicking on a disabled link causes the warning message to flash drawing the user's attention to the potential severity of the problem. The links may be enabled by the user by selecting the warning message and choosing the appropriate option. Once the user enables the links, future displays of the message show the links as enabled. | 2014-10-02 |
20140298465 | APPLICATION REPUTATION SERVICE - The claimed subject matter is directed to the use of an application reputation service to assist users with minimizing their computerized machines' exposure to and infection from malware. Specifically, the claimed subject matter provides a method and system of an application reputation service that contains the reputations for elements that are known to be non-malicious as well as those known to be malicious. | 2014-10-02 |
20140298466 | Data Detecting Method and Apparatus for Firewall - A data detecting method and apparatus for a firewall device connected with a network to identify security threat in the data, where the method is implemented by a fast forwarder in the firewall device and includes: the fast forwarder receives application data; obtains application information in the received application data; determines an application protocol type corresponding to the application data according to the application information and an application identifying table; queries a configuration item for threat detection according to the application protocol type to determine whether the application data requires threat detection; and if the application data does not require threat detection, forwarding the application data. The data detecting method avoids a problem that performance of a firewall is degraded because all application data is sent to a detecting processor in the firewall device for detection, thereby improving an performance of the firewall device. | 2014-10-02 |
20140298467 | AUTOMATED SNIFFER APPARATUS AND METHOD FOR MONITORING COMPUTER SYSTEMS FOR UNAUTHORIZED ACCESS - An apparatus for wireless communication including an automated intrusion detection process is provided. The apparatus has a portable housing, which may have a length no greater than 1 meter, a width no greater than 1 meter, and a height of no greater than 1 meter. A processing unit (e.g., CPU) is within the housing. One or more wireless network interface devices are within the housing and are coupled to the processing unit. The apparatus has an Ethernet (or like) network interface device within the housing and coupled to the processing unit. A network connector is coupled to the Ethernet network device. One or more memories are coupled to the processing unit. A code is directed to perform a process for detection of a wireless activity within a selected local geographic region. According to a specific embodiment, the wireless activity is derived from at least one authorized device or at least an other device. A code is directed to receiving at least identity information associated with the wireless activity from the detection process in a classification process. A code is directed to labeling the identity information into at least one of a plurality of categories in the classification process. Depending upon the embodiment, other codes may exist to carry out the functionality described herein. | 2014-10-02 |
20140298468 | UNAUTHORIZED APPLICATION DETECTION SYSTEM AND METHOD - The objective of the present invention is to provide technology for detecting malicious action of an application upon a terminal device using a low load as well as to increase accuracy of detection; in particular, to provide technology capable of performing detection even regarding an application which has been deleted upon the terminal device. A change in the installation state of an application in a terminal device is detected, upon which information for the installed application is reported to a fraud detection server so as to be recorded. In addition, a predetermined feature value based on an application file or component files configuring a package of the application is reported to the fraud detection server. The feature value is associated with the malicious action of the application so as to be registered in an application DB, whereupon if malicious action of the application is detected, fraud detection information is transmitted to the terminal device. When the fraud detection information is received, predetermined response processing is performed upon the terminal device. | 2014-10-02 |
20140298469 | SYSTEM FOR DETECTING, ANALYZING, AND CONTROLLING INFILTRATION OF COMPUTER AND NETWORK SYSTEMS - A method for detecting and manipulating a malicious actor/communication on a computer network or system. The method includes the steps of incorporating one or more synthetic vulnerabilities into the computer system at distinct locations, where each synthetic vulnerability presents an opportunity for exploitation by a malicious actor/communication, detecting an exploitation of one of the vulnerabilities by an actor, analyzing the actor to determine if the actor is a malicious actor/communication; and manipulating the malicious actor/communication. A computer program on a storage medium is also disclosed. | 2014-10-02 |
20140298470 | System and Method for Adaptive Modification of Antivirus Databases - Disclosed are systems, methods and computer program products for adaptively modifying antivirus databases. In one example, a system stores in an antivirus database a list of file types and antivirus records for different file types. When the system receives files for performing antivirus analysis, it retrieves from the database the list of file types and uses it to determine file types of the received files. The system then retrieves from the database antivirus lists for the determined file types and uses them to perform antivirus analysis of the files. The system then identifies files with an unknown file type and attempts to determine the file type of these files. The system then updates the antivirus database by (i) adding to the list of file types a new file type corresponding to said unknown file type, and (ii) adding a new empty antivirus list corresponding to said unknown file type. | 2014-10-02 |
20140298471 | Evaluating Security of Data Access Statements - Techniques are provided for evaluating the security of data access statements. Specifically, in one embodiment of the claimed subject matter there is provided a technique for evaluating the security of data access statements, comprising: evaluating the criticality of multiple SQL statements contained in multiple sessions accessing a database; generating a critical item set from the multiple sessions, each element in the critical item set indicating one or more SQL statements contained in a session; extracting at least one association rule from the critical item set, each of the at least association rule indicating a sequence of SQL statements contained in a session; and calculating the criticality of each of the at least one association rule. | 2014-10-02 |
20140298472 | Method and Apparatus for Automated Vulnerability Detection - A method executable via operation of configured processing circuitry to identify vulnerabilities in program code may include receiving a program and employing a disassembler to disassemble the program, generating a function call tree for the program based on disassembly of the program, receiving an indication of a post condition for which analysis of the program is desired, transforming program statements into logical equations, simplifying the logical equations, propagating post conditions backwards via Dijkstra's weakest precondition variant, analyzing aliases and processing loops to generate a precondition, and using an automated solver to determine whether the precondition is realizable and, if so, providing program inputs required to realize the precondition. | 2014-10-02 |
20140298473 | Methods and Systems for Automated Network Scanning in Dynamic Virtualized Environments - Systems and methods for managing jobs to be scanned based on existence of processing nodes are described. One of the methods includes obtaining identification information regarding operation of a first set of the processing nodes from an inventory and creating a job for scanning the processing nodes of the first set for security vulnerability. The job includes the identification information. The method further includes verifying the inventory to determine the first identifying information of the first set of processing nodes for removal from the job and loading the job having second identifying information for a second set of processing nodes that remain after the verifying operation. | 2014-10-02 |
20140298474 | AUTOMATIC SYNTHESIS OF UNIT TESTS FOR SECURITY TESTING - Performing security analysis on a computer program under test (CPUT). The CPUT can be analyzed to identify data pertinent to potential security vulnerabilities of the CPUT. At least a first unit test configured to test a particular unit of program code within the CPUT can be automatically synthesized. The first unit test can be configured to initialize at least one parameter used by the particular unit of program code within the CPUT, and can be provided at least a first test payload configured to exploit at least one potential security vulnerability of the CPUT. The first unit test can be dynamically processed to communicate the first test payload to the particular unit of program code within the CPUT. Whether the first test payload exploits an actual security vulnerability of the CPUT can be determined, and a security analysis report can be output. | 2014-10-02 |
20140298475 | IDENTIFYING UNAUTHORIZED CONTENT PRESENTATION WITHIN MEDIA COLLABORATIONS - Systems and methods are disclosed for identifying unauthorized presentation of protected content by one or more participants in a media collaboration. In one implementation, a processing device receives one or more content elements, each of the one or more content elements being provided within a media collaboration and associated with one or more users. The processing device identifies an unauthorized presentation of at least one of the one or more content elements within the media collaboration. Based on an identification of the unauthorized presentation, the processing device initiates one or more actions with respect to one or more of the users associated with the at least one of the one or more content elements. | 2014-10-02 |
20140298476 | SYSTEM, METHOD, APPARATUS AND COMPUTER PROGRAMS FOR SECURELY USING PUBLIC SERVICES FOR PRIVATE OR ENTERPRISE PURPOSES - A method, system, apparatus and computer programs are disclosed to process content for an enterprise. The method includes reviewing, using at least one enterprise policy, content that is to be sent through a data communications network to a public service to determine if the content comprises secure data and, in response to identifying secure data, modifying the content to be sent to the public service such that a presence of secure data will be visually imperceptible when the content is rendered at the public service. The step of modifying can include steganographically embedding the secure data or a link to the secure data in a container such as image data. | 2014-10-02 |
20140298477 | SYSTEM, METHOD, APPARATUS AND COMPUTER PROGRAMS FOR SECURELY USING PUBLIC SERVICES FOR PRIVATE OR ENTERPRISE PURPOSES - A method, system, apparatus and computer programs are disclosed to process content for an enterprise. The method includes reviewing, using at least one enterprise policy, content that is to be sent through a data communications network to a public service to determine if the content comprises secure data and, in response to identifying secure data, modifying the content to be sent to the public service such that a presence of secure data will be visually imperceptible when the content is rendered at the public service. The step of modifying can include steganographically embedding the secure data or a link to the secure data in a container such as image data. | 2014-10-02 |
20140298478 | METHOD AND DEVICE FOR PROVIDING A PRIVATE PAGE - Methods and devices for providing a private page are provided. A method includes operations of entering a security mode based on a user input; extracting the private page that corresponds to the security mode; and providing both the private page and a normal page that is provided during a normal mode, wherein the private page includes at least one object that is selected by a user so as to be provided during the security mode. A device includes a user input configured to receive a user input; a controller configured to enter a security mode based on the received user input, and extracting a private page that corresponds to the security mode; and a display configured to provide both the private page and a normal page that is provided during a normal mode, wherein the private page comprises at least one object that is selected by a user so as to be provided during the security mode. | 2014-10-02 |
20140298479 | SECURE DATA TRANSFER FOR CHAT SYSTEMS - The methods and systems disclosed herein pertain to secure data transfers during live chat sessions. At the conclusion of the chat session, any confidential information exchanged using the secure data transfer can be destroyed to maintain the confidentiality and/or privacy of the content of that information. | 2014-10-02 |
20140298480 | Increased Flexibility of Security Framework During Low Power Modes Management - The present invention relates to a method of managing switching from a first mode of operation to a second mode of operation a first processor in a processing device which comprises at least one other processor and a controller processor. The method comprises receiving a message which comprises a request to switch the first processor from a first to a second mode of operation; deciding whether the switching is appropriate; and upon decision of switching, switching the first processor from a first mode of operation to a second mode of operation according to the selected type of switching. | 2014-10-02 |
20140298481 | ENTITLEMENTS DETERMINATION VIA ACCESS CONTROL LISTS - Entitlements to resources can be determined by using access rules that are organized as respective ranges in an entitlement space. An access rule can represent a range between two rational numbers in the entitlement space; the range can be represented by a single rational number. Due to the way the rational numbers are chosen, a child rule is completely covered by its parent, and a parent has remaining room in the entitlement space for unlimited additional children. Entitlement checking for a large batch of resources can be performed quickly based on reusing calculated permitted ranges in the entitlement space. Implied permissions can be supported. Content can easily be added, and the access rules can be modified without unduly impacting the underlying tree structure, if at all. | 2014-10-02 |
20140298482 | TERMINAL DEVICE AND DATA PROCESSING METHOD - A terminal device comprising: a memory configured to store data that has been appended with respective permissibility data representing whether or not provision of the data is permitted and that has been classified into a plurality of different usages; and a processor configured to execute procedure, the procedure comprising: associating a specific application that requests provision of data stored in the memory with a prescribed usage that has been prescribed from out of the plurality of usages; and out of data of the prescribed usage that was associated in the associating, not providing to the application that requested data provision any data appended with the permissibility data representing that provision is not permitted, and providing to the application that requested data provision any data appended with the permissibility data representing that provision is permitted. | 2014-10-02 |
20140298483 | MANAGEMENT DEVICE, MANAGEMENT SYSTEM, CONTROL METHOD, AND STORAGE MEDIUM - Provided is a management device that manages trust relationship information between service providing devices and trust relationship information between a holding device and a service providing device. When the management device determines, based on the acquired trust relationship information, that a second service providing device trusts a first service providing device, the holding device trusts the first service providing device, and the holding device trusts the second service providing device, the management device sets a transfer of access rights to the holding device held by the first service providing device to the second service providing device. | 2014-10-02 |
20140298484 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR MANAGING ACCESS CONTROL - Systems, methods, and computer program products are provided for managing access control. A first set of access control rules is stored in a memory of mobile communication device. The mobile communication device receives from a trusted server over a communication network a notification message indicating that an access control rule has been updated in a secure element. In response to receiving the notification message, the mobile communication device retrieves from the secure element a second set of access control rules including at least the access control rule that has been updated. The first set of access control rules is updated based on the second set of access control rules retrieved from the secure element. An applet stored on the secure element is accessed via an application running on the mobile communication device, in accordance with the updated first set of access control rules. | 2014-10-02 |
20140298485 | PERSISTENT AGENT SUPPORTED BY PROCESSOR - A tamper resistant servicing Agent for providing various services (e.g., data delete, firewall protection, data encryption, location tracking, message notification, and updating software) comprises multiple functional modules, including a loader module (CLM) that loads and gains control during POST, independent of the OS, an Adaptive Installer Module (AIM), and a Communications Driver Agent (CDA). Once control is handed to the CLM, it loads the AIM, which in turn locates, validates, decompresses and adapts the CDA for the detected OS environment. The CDA exists in two forms, a mini CDA that determines whether a full or current CDA is located somewhere on the device, and if not, to load the full-function CDA from a network; and a full-function CDA that is responsible for all communications between the device and the monitoring server. The servicing functions can be controlled by a remote server. | 2014-10-02 |
20140298486 | GRANTING ACCESS TO DIGITAL CONTENT OBTAINED FROM A THIRD-PARTY SERVICE - Described herein are third party digital content services for granting access to digital content. The third party digital content service is not associated with any particular end-user device or brand of end-user device and thus does not comprise means for transferring digital content directly to end-user devices configured to only receive digital content from an authorized vendor specific digital content service. The third party digital content service receives input from a user identifying an item of digital content which has been purchased or otherwise obtained from the third party digital content service. The third party digital content service then transmits a grant request to a vendor specific digital content service authorized to deliver content to a vendor specific end-user device or application. The grant request comprises authorization information for a vendor specific end-user account associated with the user. | 2014-10-02 |
20140298487 | MULTI-USER UNIVERSAL SERIAL BUS (USB) KEY WITH CUSTOMIZABLE FILE SHARING PERMISSIONS - A method, data storage device and computer program product for having multiple users share a single data storage device securely. A data storage device, such as a Universal Serial Bus (USB) key, is plugged into a computing device. A USB controller of the USB key recognizes the computing device and creates an account for the user. The created account is associated with the user as well as associated with the computing device. Data uploaded to the USB key by the user is then associated with the created account. Only that user will be able to view that data on his/her computing device (computing device associated with the created account) unless the user indicates to share that data with other users. Such a process may be repeated each time the USB key is plugged into a different computing device thereby creating multiple accounts associated with multiple computing devices and users. | 2014-10-02 |
20140298488 | METHOD FOR AUTOMATING THE MANAGEMENT AND INTERPRETATION OF DIGITAL DOCUMENTS AND THEIR OWNERS RIGHTS METADATA FOR GENERATING DIGITAL RIGHTS MANAGEMENT PROTECTED CONTENTS - A method for automating the management and interpretation of digital documents and their rights metadata to generate user access of a document protected by digital rights management (DRM), comprising the steps of a server obtaining a digital document and its associated rights metadata, the server interpreting the metadata to ascertain DRM useful information including identifications (IDs) of the document and its users and associated digital rights, and the server generating entries for a DRM database including policies associated with the document ID and users IDs based on the ascertained DRM useful information to enable DRM protection to the document. | 2014-10-02 |
20140298489 | MULTI-USER UNIVERSAL SERIAL BUS (USB) KEY WITH CUSTOMIZABLE FILE SHARING PERMISSIONS - A method, data storage device and computer program product for having multiple users share a single data storage device securely. A data storage device, such as a Universal Serial Bus (USB) key, is plugged into a computing device. A USB controller of the USB key recognizes the computing device and creates an account for the user. The created account is associated with the user as well as associated with the computing device. Data uploaded to the USB key by the user is then associated with the created account. Only that user will be able to view that data on his/her computing device (computing device associated with the created account) unless the user indicates to share that data with other users. Such a process may be repeated each time the USB key is plugged into a different computing device thereby creating multiple accounts associated with multiple computing devices and users. | 2014-10-02 |
20140298490 | ACCESS REQUEST AUTHORIZATION - In a method for controlling physical access to a computing device a first access request to a room containing the computing device is received. In response, a processor determines that the first access request is valid based on the room and the date and time of the first access request and unlocks a door to the room to permit entry to the room. Subsequently, a second access request to a cabinet that is located in the room and contains the computing device is received. In response, a processor determines that the second access request is valid based on the cabinet and the date and time of the second access request and unlocks the cabinet to permit access to the computing device. | 2014-10-02 |
20140298491 | TECHNIQUES FOR RECOVERING MISSING DEVICES - Techniques are provided for assisting owners to recover missing devices. The missing device automatically performs certain actions proactively in response to detecting conditions that indicate that the device has been lost or stolen. Conditions that indicate the device has been lost or stolen (“triggering conditions”) may include that a password failure has occurred more than a predetermined number of times. Any number and type of recovery-assisting actions may be taken, in response to triggering conditions, to assist owners in recovering a missing device. For example, a device may generate a record that indicates the current location of the device, and synchronize the record with an online service or some other device. The generation and synchronization of such records may be repeated on a periodic basis until either (a) the device becomes disabled, or (b) a user enters an appropriate password. | 2014-10-02 |
20140298492 | SECURITY CASE - The present invention is a self contained, portable security case or container. The case is secure in its locked condition by locks which are preferably operated by an electronic key. The electronic key can be programmed to open the case or container dependent upon various different conditions, for example, location, time, identification of operator, etc. In addition to the electronic key, a biometric identification device can be employed. The exterior of the case or container is made from different materials which are impermeable and resistant to heat, drilling and ballistic impact. A GPS type of location device located within the case enables the case to be tracked from remote locations. | 2014-10-02 |
20140298493 | PIK3CA H1047R Knock-In Non-Human Animal Breast Cancer Model - The invention concerns the development of a PIK3CA H1047R knock-in non-human animal breast cancer model, and its use for identification of a spontaneous loss-of-function TP53 mutation involved in spindle cell tumor formation. The invention further concerns the identification of additional somatic mutations and copy number aberrations in the breast tumors using this model, and methods and means for the diagnosis and treatment of breast cancer. | 2014-10-02 |
20140298494 | ANIMAL MODEL OF AUTISM - Some aspects of this invention provide a non-human animal model of autism. Some aspects of this invention provide a non-human animal model for diseases or disorders associated with an overexpression or a copy number variance of a Ube3a gene. Transgenic mammals and transgenic mammalian cells comprising an exogenous copy or exogenous copies of a ube3a protein-encoding nucleic acid sequence are also provided. Some aspects of this invention further provide methods for using the animal models, cells, and transgenic animals for identifying agents or interventions that can alleviate a pathogenic characteristic observed in the animal model, cell, or transgenic animal. | 2014-10-02 |
20140298495 | METHOD FOR OBTAINING A TRIPLOID INTERSPECIFIC HYBRID OF MEAGRE AND RED DRUM - The invention relates to a method for obtaining a triploid interspecific hybrid of meagre and red drum belonging to the family of the Sciaenidae. The method includes the following two steps: a) crossing a meagre | 2014-10-02 |
20140298496 | PHENOCOPY MODEL OF DISEASE - Methods and compositions for generating nonhuman disease models through splicing modulation. | 2014-10-02 |
20140298497 | HUMAN MAST CELL LINES, PREPARATION AND USES - The present invention relates to a human mast cell line corresponding to deposit number CNCM I-4551 and also to the lines derived therefrom, in particular the derived lines corresponding respectively to deposit numbers CNCM I-4552 and CNCM I-4553, and to the uses thereof, in particular for screening for compounds of therapeutic interest. | 2014-10-02 |
20140298498 | INHIBITION OF ONCOGENIC KRAS-INDUCED GM-CSF PRODUCTION AND FUNCTION - The present invention is directed to methods of inhibiting tumor growth in a subject. The present invention is further directed to methods of diagnosing cancer in a subject and identifying a suitable course of treatment for the subject based on the diagnosis. The present invention is also directed to an orthotopic animal model of pancreatic cancer. | 2014-10-02 |
20140298499 | Xylanases, Nucleic Acids Encoding Them and Methods for Making and Using Them - The invention relates to enzymes having xylanase, mannanase and/or glucanase activity, e.g., catalyzing hydrolysis of internal β-1,4-xylosidic linkages or endo-β-1,4-glucanase linkages; and/or degrading a linear polysaccharide beta-1,4-xylan into xylose. Thus, the invention provides methods and processes for breaking down hemicellulose, which is a major component of the cell wall of plants, including methods and processes for hydrolyzing hemicelluloses in any plant or wood or wood product, wood waste, paper pulp, paper product or paper waste or byproduct. In addition, methods of designing new xylanases, mannanases and/or glucanases and methods of use thereof are also provided. The xylanases, mannanases and/or glucanases have increased activity and stability at increased pH and temperature. | 2014-10-02 |
20140298500 | MUTANT PROTEASE BIOSENSORS WITH ENHANCED DETECTION CHARACTERISTICS - A polynucleotide encoding a biosensor polypeptide comprising a modified circularly-permuted thermostable luciferase and a linker linking the C-terminal portion of the thermostable luciferase to the N-terminal portion of the thermostable luciferase. The modified circularly-permuted thermostable luciferase is modified relative to a parental circularly-permuted thermostable luciferase. The linker contains a sensor region capable of interacting with a target molecule in a cell. The modified circularly-permuted thermostable luciferase has an enhanced response after interaction of the biosensor with the target molecule relative to the parental circularly-permuted thermostable luciferase in the presence of the target molecule. Alternatively, the modified circularly-permuted thermostable luciferase has an enhanced response after interaction of the biosensor with the target molecule relative to the modified circularly-permuted thermostable luciferase in the absence of the target molecule. | 2014-10-02 |
20140298501 | MODIFIED ARTHROPOD AND METHOD OF USE - A modified arthropod, an arthropod-modifying bacterium, and use thereof as an agent for control of diseases transmitted by arthropods, particularly mosquitoes, is provided. More specifically, an isolated arthropod-adapted | 2014-10-02 |
20140298502 | DESATURASES AND METHODS OF USING THEM FOR SYNTHESIS OF POLYUNSATURATED FATTY ACIDS - The amino acid and nucleic acid sequences of a Δ | 2014-10-02 |
20140298503 | Glycosylation in Avians - Transgenic avians which produce proteins in their oviduct tissue having modified oligosaccharide structures and methods of making such avians are disclosed herein. The invention also includes the modified proteins produced in the transgenic birds. | 2014-10-02 |
20140298504 | TRANSGENIC CHICKENS WITH AN INACTIVATED ENDOGENOUS GENE LOCUS - The present invention is transgenic chickens obtained from long-term cultures of avian PGCs and techniques to produce and transgenic birds derived from prolonged PGC cultures. In some embodiments, these PGCs can be transfected with genetic constructs to modify the DNA of the PGC, specifically to introduce a transgene encoding an exogenous protein. When combined with a host avian embryo by known procedures, those modified PGCs are transmitted through the germline to yield transgenic offspring. This invention includes compositions comprising long-term cultures of PGCs and offspring derived from them that are genetically modified. The genetic modifications introduced into PGCs to achieve the gene inactivation may also include, but are not restricted to, random integrations of transgenes into the genome, transgenes inserted into the promoter region of genes, transgenes inserted into repetitive elements in the genome, site specific changes to the genome that are introduced using integrase, site specific changes to the genome introduced by homologous recombination, and conditional mutations introduced into the genome by excising DNA that is flanked by lox sites or other sequences that are substrates for site specific recombination. | 2014-10-02 |
20140298505 | PROTEIN HAVING NUCLEASE ACTIVITY, FUSION PROTEINS AND USES THEREOF - The present invention relates to a nucleic acid molecule encoding (I) a polypeptide having the activity of an endonuclease, which is (a) a nucleic acid molecule encoding a polypeptide comprising or consisting of the amino acid sequence of SEQ ID NO: 1; (b) a nucleic acid molecule comprising or consisting of the nucleotide sequence of SEQ ID NO: 2; (c) a nucleic acid molecule encoding an endonuclease, the amino acid sequence of which is at least 70% identical to the amino acid sequence of SEQ ID NO: 1; (d) a nucleic acid molecule comprising or consisting of a nucleotide sequence which is at least 50% identical to the nucleotide sequence of SEQ ID NO: 2; (e) a nucleic acid molecule which is degenerate with respect to the nucleic acid molecule of (d); or (f) a nucleic acid molecule corresponding to the nucleic acid molecule of any one of (a) to (e) wherein T is replaced by U; (II) a fragment of the polypeptide of (I) having the activity of an endonuclease. Also, the present invention relates to a vector comprising the nucleic acid molecule and a protein encoded by said nucleic acid molecule. Further, the invention relates to a method of modifying the genome of a eukaryotic cell and a method of producing a non-human vertebrate or mammal. | 2014-10-02 |
20140298506 | MELON HYBRID SV0331MV AND PARENTS THEREOF - The invention provides seed and plants of melon hybrid SV0331MV and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of melon hybrid SV0331MV and the parent lines thereof, and to methods for producing a melon plant produced by crossing such plants with themselves or with another melon plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2014-10-02 |
20140298507 | Synthetic Clonal Reproduction Through Seeds - Clonal embryos or seeds produced by conversion of apomeiotic gametes into clonal embryos or seeds. Clonal embryos or seeds are produced by crossing a MiMe plant, as either a female or male, with an appropriate plant which induces genome elimination (genome eliminator, GE). MiMe plants are those in which meiosis is totally replaced by mitosis. In specific embodiments MiMe plants are MiMe-1 plants or MIME-2 plants. In specific embodiments MiMe plants are mutant plants. In a more specific embodiment, the genome eliminator is a haploid inducer exhibiting directed genome elimination of its own genome. | 2014-10-02 |
20140298508 | ALPHA-MANNOSIDASES FROM PLANTS AND METHODS FOR USING THE SAME - The present invention is directed to alpha-mannosidase sequences from plants and the use thereof, especially genomic nucleotide sequences containing the regulatory elements controlling their expression, intron and exon sequences and polynucleotide sequences coding for alpha-mannosidase enzymes. Such plants with modified alpha-mannosidase activity can be used for the production of glycoproteins having an altered saccharide composition of great benefit. The present invention also relates to the use of these alpha-mannosidase enzymes for hydrolyzing mannoses. | 2014-10-02 |
20140298509 | VEGETABILE MATERIAL, PLANTS AND A METHOD OF PRODUCING A PLANT HAVING ALTERED LIGNIN PROPERTIES - The present invention is related to a set of genes, which when modified in plants gives altered lignin properties. The invention provides DNA construct such as a vector useful in the method of the invention. Further, the invention relates to a plant cell or plant progeny of the plants and wood produced by the plants according to the invention | 2014-10-02 |
20140298510 | MANIPULATION OF DOMINANT MALE STERILITY - Compositions and methods for modulating male fertility in a plant are provided. Compositions comprise nucleotide sequences, and fragments and variants thereof, which modulate male fertility. Further provided are expression cassettes comprising the male fertility polynucleotides, or fragments or variants thereof, operably linked to a promoter, wherein expression of the polynucleotides modulates the male fertility of a plant. Various methods are provided wherein the level and/or activity of the sequences that influence male fertility is modulated in a plant or plant part. In certain embodiments, the plant is polyploid. | 2014-10-02 |
20140298511 | BREEDING, PRODUCTION, PROCESSING AND USE OF MEDICAL CANNABIS - The invention provides compositions and methods for the breeding, production, processing and use of medical | 2014-10-02 |
20140298512 | SOYBEAN CULTIVAR GO1110272 - The present invention is in the field of soybean variety GO1110272 breeding and development. The present invention particularly relates to the soybean variety GO1110272 and its progeny, and methods of making GO1110272. | 2014-10-02 |
20140298513 | SOYBEAN CULTIVAR WN1118509 - The present invention is in the field of soybean variety WN1118509 breeding and development. The present invention particularly relates to the soybean variety WN1118509 and its progeny, and methods of making WN1118509. | 2014-10-02 |
20140298514 | SOYBEAN CULTIVAR WN1118516 - The present invention is in the field of soybean variety WN1118516 breeding and development. The present invention particularly relates to the soybean variety WN1118516 and its progeny, and methods of making WN1118516. | 2014-10-02 |
20140298515 | SOYBEAN CULTIVAR WN1115965 - The present invention is in the field of soybean variety WN1115965 breeding and development. The present invention particularly relates to the soybean variety WN1115965 and its progeny, and methods of making WN1115965. | 2014-10-02 |
20140298516 | SOYBEAN CULTIVAR BY1212083 - The present invention is in the field of soybean variety BY1212083 breeding and development. The present invention particularly relates to the soybean variety BY1212083 and its progeny, and methods of making BY1212083. | 2014-10-02 |
20140298517 | SOYBEAN CULTIVAR BY1113023 - The present invention is in the field of soybean variety BY1113023 breeding and development. The present invention particularly relates to the soybean variety BY1113023 and its progeny, and methods of making BY1113023. | 2014-10-02 |
20140298518 | SOYBEAN CULTIVAR SJ1112872 - The present invention is in the field of soybean variety SJ1112872 breeding and development. The present invention particularly relates to the soybean variety SJ1112872 and its progeny, and methods of making SJ1112872. | 2014-10-02 |
20140298519 | SOYBEAN CULTIVAR SJ1114205 - The present invention is in the field of soybean variety SJ1114205 breeding and development. The present invention particularly relates to the soybean variety SJ1114205 and its progeny, and methods of making SJ1114205. | 2014-10-02 |
20140298520 | SOYBEAN CULTIVAR SJ1112199 - The present invention is in the field of soybean variety SJ1112199 breeding and development. The present invention particularly relates to the soybean variety SJ1112199 and its progeny, and methods of making SJ1112199. | 2014-10-02 |
20140298521 | SOYBEAN CULTIVAR SJ1112576 - The present invention is in the field of soybean variety SJ1112576 breeding and development. The present invention particularly relates to the soybean variety SJ1112576 and its progeny, and methods of making SJ1112576. | 2014-10-02 |
20140298522 | SOYBEAN CULTIVAR WN1115314 - The present invention is in the field of soybean variety WN1115314 breeding and development. The present invention particularly relates to the soybean variety WN1115314 and its progeny, and methods of making WN1115314. | 2014-10-02 |
20140298523 | SOYBEAN CULTIVAR WN1117512 - The present invention is in the field of soybean variety WN1117512 breeding and development. The present invention particularly relates to the soybean variety WN1117512 and its progeny, and methods of making WN1117512. | 2014-10-02 |
20140298524 | SOYBEAN CULTIVAR SJ1114419 - The present invention is in the field of soybean variety SJ1114419 breeding and development. The present invention particularly relates to the soybean variety SJ1114419 and its progeny, and methods of making SJ1114419. | 2014-10-02 |
20140298525 | SOYBEAN CULTIVAR BY1212201 - The present invention is in the field of soybean variety BY1212201 breeding and development. The present invention particularly relates to the soybean variety BY1212201 and its progeny, and methods of making BY1212201. | 2014-10-02 |
20140298526 | SOYBEAN CULTIVAR BY1212223 - The present invention is in the field of soybean variety BY1212223 breeding and development. The present invention particularly relates to the soybean variety BY1212223 and its progeny, and methods of making BY1212223. | 2014-10-02 |
20140298527 | SOYBEAN CULTIVAR WN1118091 - The present invention is in the field of soybean variety WN1118091 breeding and development. The present invention particularly relates to the soybean variety WN1118091 and its progeny, and methods of making WN1118091. | 2014-10-02 |
20140298528 | SOYBEAN CULTIVAR WN1118163 - The present invention is in the field of soybean variety WN1118163 breeding and development. The present invention particularly relates to the soybean variety WN1118163 and its progeny, and methods of making WN1118163. | 2014-10-02 |
20140298529 | SOYBEAN CULTIVAR WN1118297 - The present invention is in the field of soybean variety WN1118297 breeding and development. The present invention particularly relates to the soybean variety WN1118297 and its progeny, and methods of making WN1118297. | 2014-10-02 |
20140298530 | SOYBEAN CULTIVAR WN1118398 - The present invention is in the field of soybean variety WN1118398 breeding and development. The present invention particularly relates to the soybean variety WN1118398 and its progeny, and methods of making WN1118398. | 2014-10-02 |
20140298531 | Methods and Compositions for Gray Leaf Spot Resistance in Corn - The present invention relates to the field of plant breeding. More specifically, the present invention includes a method of using haploid plants for genetic mapping of traits of interest such as disease resistance. Further, the invention includes a method for breeding corn plants containing quantitative trait loci (QTL) that are associated with resistance to Gray Leaf Spot, a fungal disease associated with | 2014-10-02 |
20140298532 | Molecular Markers Associated With Haploid Induction in Zea Mays - The present invention is the field of plant breeding. More specifically, the invention focuses on the use of molecular markers to select for a genetic locus contributing to haploid induction. | 2014-10-02 |
20140298533 | HIGHLY GLYPHOSATE-RESISTANT MUTATED GENE, METHOD OF MODIFICATION AND USE THEREOF - Disclosed are a method for obtaining highly glyphosate-resistant G1174 gene mutants through artificial mutation and use thereof. Two or more amino acid mutations are introduced in the amino acid sequence from position 95 to position 114 of protein encoded by G1174 gene, and the highly glyphosate-resistant mutants are selected. Also disclosed is a highly glyphosate-resistant mutated G1174 gene, wherein the amino acid sequence from position 95 to position 114 is selected from any one of SEQ ID NO: 4 to SEQ ID NO: 24. The use of the highly glyphosate-resistant mutated gene is for conferring a plant with glyphosate resistance through expression of the transgene in the plant. | 2014-10-02 |
20140298534 | COPPER RESISTANT PLANT AND USE FOR PHYTOREMEDIATION - The present invention relates to a transgenic plant overexpressing an antioxidant protein 1 (ATX1)-like polypeptide, which exhibits resistance to excess or deficiency of copper. The present invention also relates to a method of phytoremediation of an environment contaminated with copper by growing a transgenic plant overexpressing an ATX1-like polypeptide in the environment. | 2014-10-02 |
20140298535 | NUCLEIC ACID SEQUENCES ENCODING TRANSCRIPTION FACTORS REGULATING ALKALOID BIOSYNTHESIS AND THEIR USE IN MODIFYING PLANT METABOLISM - Plant metabolism and alkaloid levels can be regulated by transcription factors that regulate the nicotinic alkaloid biosynthetic pathway. In one embodiment, the disclosure provides a transcription factor that negatively regulates alkaloid biosynthesis, such as nicotine biosynthesis. | 2014-10-02 |
20140298536 | NUCLEIC ACID MOLECULES THAT CONFER RESISTANCE TO COLEOPTERAN PESTS - This disclosure concerns nucleic acid molecules and methods of use thereof for control of coleopteran pests through RNA interference-mediated inhibition of target coding and transcribed non-coding sequences in coleopteran pests. The disclosure also concerns methods for making transgenic plants that express nucleic acid molecules useful for the control of coleopteran pests, and the plant cells and plants obtained thereby. | 2014-10-02 |
20140298537 | Crop Resistance to Nematodes - Methods of inhibiting plant parasitic nematodes, methods of obtaining transgenic plants useful for inhibiting such nematodes, and transgenic plants that are resistant to plant parasitic nematodes through inhibition of plant nematode CLE peptide receptor genes are provided. Methods for expressing genes at plant parasitic nematode feeding sites with plant nematode CLE peptide receptor gene promoters are also provided, along with nematode CLE peptide receptor gene promoters that are useful for expressing genes in nematode feeding sites as well as transgenic plants and nematode resistant transgenic plants comprising the promoters. | 2014-10-02 |
20140298538 | AXMI205 VARIANT PROTEINS AND METHODS OF USE - Compositions and methods for conferring pesticidal activity to bacteria, plants, plant cells, tissues and seeds are provided. Compositions comprising a coding sequence for pesticidal polypeptides are provided. The coding sequences can be used in DNA constructs or expression cassettes for transformation and expression in plants and bacteria. Compositions also comprise transformed bacteria, plants, plant cells, tissues, and seeds. In particular, isolated pesticidal nucleic acid molecules are provided. Additionally, amino acid sequences corresponding to the polynucleotides are encompassed. In particular, the present invention provides for nucleic acid molecules comprising nucleotide sequences encoding the amino acid sequence shown in SEQ ID NO:7, 8, 9, 10, 11, or 12, the nucleotide sequence set forth in SEQ ID NO:4, 5, or 6, as well as variants and fragments thereof. | 2014-10-02 |
20140298539 | SPATIALLY MODIFIED GENE EXPRESSION IN PLANTS - The invention provides methods of engineering plants having lignin deposition or xylan deposition that is substantially localized to the vessels of xylem tissue in the plant. The invention also provides methods of engineering plants to increase production of a desired biosynthetic product, e.g., to have increased secondary cell wall deposition or increased wax/cutin accumulation. The engineered plants of the present invention have use in bioenergy production, e.g., by improving the density and the digestibility of biomass derived from the plant and to improve water usage requirements. | 2014-10-02 |
20140298540 | GENES THAT INCREASE PLANT OIL AND METHOD FOR USING THE SAME - This invention is intended to be used to search for a transcription factor having novel functions of increasing the weight of an individual plant, increasing the weight of a given tissue per individual plant, or improving the productivity of a given substance per individual plant and to improve such properties in the plant. The weight of an individual plant is increased, the weight of a given tissue per individual plant is increased, the productivity of a given substance per individual plant is improved, or the content of a given substance per given tissue of a plant is increased via expression of a transcription factor that has been modified to suppress transcription accelerating activity. | 2014-10-02 |