51st week of 2010 patent applcation highlights part 67 |
Patent application number | Title | Published |
20100325702 | AUTHENTICATION-AUTHORIZATION SYSTEM FOR MOBILE COMMUNICATION TERMINAL AND METHOD THEREFOR - An authentication-authorization system for a mobile communication terminal and a method therefor are provided. When a mobile communication terminal is in a connect state, code data randomly generated by a remote encoding terminal is continuously provided to the terminal and data management terminal. When an application service program on the mobile communication terminal or an application service terminal connected to the mobile communication terminal need to execute an authentication-authorization, identification data of the mobile communication terminal and its card and code data can be offered to the data management terminal to carry out a bidirectional dynamic authentication-authorization, to determine whether allow the application service program or the application service terminal to keep providing an application service or not. In a further aspect of the embodiment, at least two aforementioned authentication-authorization systems are joined, and a layered authentication-authorization mechanism is adopted, so as to provide a secured and completed system. | 2010-12-23 |
20100325703 | System and Method for Secured Communications by Embedded Platforms - A method for ensuring secured communications for embedded platforms includes steps for receiving a device identifier at an authenticating server over a public network from an extended trust device, the authenticating server being communicatively coupled between a secured server and the public network and the device identifier derived from a plurality of machine parameters resident on the extended trust device, accessing a database of authorized device identifiers corresponding to known extended trust devices, and establishing, in response to the device identifier matching one of the authorized device identifiers, a secure private network between the extended trust device and the secured server. The machine parameters may be a combination of a user-configurable parameter and a non-user-configurable parameter. The method may be embodied as a series of process steps stored on a computer readable medium executable by a processor. | 2010-12-23 |
20100325704 | Identification of Embedded System Devices - An embedded system device comprises a processor operatively coupled to a first memory space, a second memory space, and a plurality of user controls. The processor is configured to execute only executable code residing within the first memory space, and the executable code includes authentication routine configured to generate a device identifier based at least upon non-user-configurable parameters of the embedded system device. The second memory space includes user configurable options for use by the processor when executing the executable code. The user controls are adapted to configure the user configurable options within the second memory space, wherein the user controls cannot configure the first memory space. | 2010-12-23 |
20100325705 | Systems and Methods for A2A and A2DB Security Using Program Authentication Factors - In various embodiments, security may be provided for application to application (A2A) and application to database (A2DB) implementations. In some embodiments, a method comprises receiving a registration request at a first digital device for a first application, receiving a first program factor associated with the first application, confirming the first program factor, generating a first password for a second application based, at least, on the confirmation of the first program factor, and providing the first password to a second digital. | 2010-12-23 |
20100325706 | AUTOMATED TEST TO TELL COMPUTERS AND HUMANS APART - Techniques for verifying a user is human as opposed to a machine are provided. A series of images may be presented to the user sequentially along with a challenge question that instructs the user to select the image that is responsive to the challenge question. If the user selects the correct image, there likelihood that the user is a human as opposed to a machine is greatly increased. Techniques for varying certain parameters associated with display of images and challenge question are also provided. The variations in these parameters may further help distinguish human users from machines. | 2010-12-23 |
20100325707 | Systems and Methods for Automatic Discovery of Systems and Accounts - In various embodiments, a method comprises scanning a directory structure to generate a scan result comprising a plurality of discovered systems, identifying one or more accounts associated with at least one of the plurality of discovered systems, configuring a security appliance to change one or more old passwords to one or more new passwords for the one or more accounts, and changing, with the configured security appliance, the one or more old passwords to the one or more new passwords. | 2010-12-23 |
20100325708 | SYSTEM AND METHOD FOR PROVIDING A MULTI-CREDENTIAL AUTHENTICATION PROTOCOL - A system and method for providing secure communications between remote computing devices and servers. A network device sends characteristics of a client computing device over the network. A network device receives characteristics of a client computing device over the network. A plurality of credentials are generated where at least one of the plurality of credentials based on both the received characteristics of the client computing device and a unique client key, and at least one of the plurality of credentials based on both the received characteristics of the client computing device and a generic key. A network device sends the plurality of credentials over the network. A network device receives the plurality of credentials via the network. | 2010-12-23 |
20100325709 | Method to store and distribute digital entertainment media data on a portable non-volatile solid-state storage device with a customer pre-selected security indentifier and content management system - A new method for storing and distributing Digital Entertainment Media Data like movies, (or indeed, other media content such as games, software, electronic books, audio books, documents, educational material and other formats of binary or source code), on a portable non-volatile solid-state storage device in a permanent or non-permanent state. | 2010-12-23 |
20100325710 | Network Access Protection - A system or method for network access protection executes steps for receiving, at a server, an access request for access to at least one network resource from a client machine, the access request including account authentication information comprising an account identifier and password, obtaining a client machine identifier from the client machine in response to receiving the request for access, and controlling access to the network resource in response to the access request by authorizing access to the network resource for the access request if the client machine identifier matches a registered machine identifier that is registered for use with the account authentication information and the account authentication information matches registered information for a valid account, but denying access to the network resource if the client machine identifier does not match a registered client machine identifier that is registered for use with the account authentication information. | 2010-12-23 |
20100325711 | System and Method for Content Delivery - A system for content delivery operates as a static network device for delivering content to a mobile node. The system includes a transceiver adapted to receive a device identifier over a public network from the mobile node, the device identifier based on a combination of user-configurable and non-user-configurable parameters of the mobile node, a processor operatively coupled to the transceiver and to memory storing executable code. Executed, the code enables the processor to access a database of authorized device identifiers corresponding to known mobile nodes, establish, in response to the received device identifier matching one of the authorized device identifiers, a secure private network (SPN) with the mobile node, the established SPN tunneling across a segment of the public network, obtain the content for the mobile node, and send the content to the mobile node via the SPN. | 2010-12-23 |
20100325712 | INFORMATION PROCESSING APPARATUS, SECURITY METHOD, AND STORAGE MEDIUM STORING SECURITY PROGRAM - An information processing apparatus includes a key information table memory for storing, in a key information table, key information including first identification information identifying a first nearby device communicating with the information processing apparatus, a communication unit for communicating with a second nearby device present at a location where the second nearby device is communicable with the information processing apparatus, a nearby device information retrieval unit for retrieving nearby device information including second identification information identifying the second nearby device, a movement halt detector for detecting a movement status of the information processing apparatus, a functional limitation determiner for determining, based on the key information, the nearby device information, and/or the movement status, whether to limit execution of a process of a function of the information processing apparatus and a functional limitation executer for controlling the execution of the process based on the determination results. | 2010-12-23 |
20100325713 | MOBILE TERMINAL, DATA COMMUNICATION METHOD, AND COMPUTER PROGRAM - A mobile terminal includes a near-field communication device capable of performing near-field wireless communication with an external device, and a controller configured to instruct the external device or the near-field communication device to execute a command. The near-field communication device has a storage unit, a first mutual authentication unit for authenticating the controller and for requesting the controller to authenticate the near-field communication device, a first communication key setting unit for setting a first communication key, a second mutual authentication unit for authenticating the external device and for requesting the external device to authenticate the near-field communication device, and a second communication key setting unit for setting a second communication key. The controller and the near-field communication device perform secure communication using the first communication key, and the near-field communication device and the external device perform secure communication using the second communication key. | 2010-12-23 |
20100325714 | SYSTEM AND METHOD FOR PROVIDING MOBILITY IN A NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes providing an Internet Protocol (IP) address based on an authentication request associated with a device, the authentication request being associated with a Wi-Fi protocol. The method also includes
| 2010-12-23 |
20100325715 | BROWSER PLUG-IN FOR SECURE CREDENTIAL SUBMISSION - Described is a technology by which a plug-in (e.g., an ActiveX® control) instantiated by a web browser calls functions of a credential service to use a set of credential data (e.g., a card file) for logging into a website. If the credential service determines that a previously used card file for the website exists, a representation of that card file is displayed in the browser, and the data of that card file is used to obtain a token for logging in the user. If not found, an icon is presented instead, by which the user can select a user interface that allows selection of another card file that meets that meet the website's requirements. | 2010-12-23 |
20100325716 | Managing Access To A Document-Processing Device Using An Identification Token - A method and apparatus for accessing a document-processing device is provided. A request to access the document-processing device is received by the document-processing device. For example, the request may be a request to configure the document-processing device or a request to produce an electronic copy of a document. The document-processing device reads authentication data from an authentication token, which is a portable physical object associated with the user that issued the request. For example, the authentication token may be a proximity card, a common access card (CAC), a smart card, a credit card, a driver's license, or a cell phone. The document-processing device determines, based on the authentication data, whether the user has sufficient user access privileges to perform the request. If user has sufficient user access privileges to perform of the request, then the document-processing device performs the request. | 2010-12-23 |
20100325717 | System and Method for Managing Access to a Plurality of Servers in an Organization - A system for managing access to resources in a plurality of servers by a plurality of client computers by using an operating system independent Secure Shell (SSH) protocol running in each server and using a central policy database that centrally stores access rules which specify access to the servers for a plurality of users/accounts. Each time a target server receives a user request to establish an SSH session, it retrieves associated access rules from the central policy database to obtain the latest access rules. Based on the retrieved rules and the identity of the user and the identity of the client computer, the target server determines whether the user has permission to establish the SSH session with the target server. Using a centralized database and requiring the servers to always retrieve the latest access rules from a central database provides consistent application of the access rules across all servers and all client computers. | 2010-12-23 |
20100325718 | Automatic Firewall Configuration - One embodiment of a gateway router is equipped to recognize a trustworthy local server automatically, and to accept certain incoming connections to a local server that the router has recognized as trustworthy. | 2010-12-23 |
20100325719 | System and Method for Redundancy in a Communication Network - A network fail-over system provides redundant first and second secure proxy servers, first and second authentication servers each communicatively coupled to the proxy servers, first and second service monitors configured to monitor, respectively, operating status of the first and second authentication servers, the second service monitor configured to set an operating status of the second authentication server and to accept communication traffic from the first proxy server based on the operating status of the first authentication server, wherein the first service monitor is configured to set an operating status of the first authentication server and to accept communication traffic from the second proxy server based on the operating status of the second authentication server, and wherein the authentication servers are each configured to determine an access privilege of a client device by authenticating a client identifier received from the client device, the client identifier derived from a user-configurable parameter and a non-user-configurable parameter resident in the client device. | 2010-12-23 |
20100325720 | System and Method for Monitoring Attempted Network Intrusions - A system for monitoring attempted intrusions into a secure private network (SPN) includes a transceiver adapted to receive a device identifier over a public network from a network node, the device identifier based on a user-configurable parameter and a non-user-configurable parameter of the network node, and a processor coupled to the transceiver and to memory storing executable code. When executed, the code enables the processor to: access a database of authorized device identifiers corresponding to known network nodes, allow, in response to the received device identifier matching one of the authorized device identifiers, the network node to access the SPN, deny, in response to the received device identifier not matching one of the authorized device identifiers, the network node from accessing the SPN and categorize a connection attempt as an unauthorized connection attempt, and store information regarding the unauthorized connection attempt in local or remote memory. | 2010-12-23 |
20100325721 | IMAGE-BASED UNLOCK FUNCTIONALITY ON A COMPUTING DEVICE - Utilizing an image on a computing device to serve as a template for locking/unlocking the computing device. The image includes a plurality of portions that are defined and thereafter identified and presented to a user via a touch screen. A user selects portions/zones that are defined within the image in a specified sequence and this sequence is stored as a lock/unlock code for unlocking the computing device. In an embodiment, in addition to the specified sequence of selections, a movement or sequence of movements may be also be stored as part of the lock/unlock code. | 2010-12-23 |
20100325722 | INFORMATION PROCESSING APPARATUS INCLUDING LOCKING FUNCTION, LOCKING (UNLOCKING) METHOD FOR INFORMATION PROCESSING APPARATUS AND PROGRAM THEREOF - The present invention provides an information processing apparatus capable of dynamically changing a security level according to significance of overall data saved in a terminal. A portable telephone terminal 100 includes a lock function to inhibit (allow) use of predetermined functions (part of or all of the functions) of the terminal when a lock-in condition (an unlock condition) is satisfied. The terminal 100 includes a secret level evaluating section 16 for calculating a secret level of the overall apparatus on the basis of scores set respectively to saved data items and a lock-in condition setting section 15 for making, in response to the secret level, the lock-in condition (unlock condition) more mitigated or more severe. Due to the configuration, for example, when significant data is received, the secret level of the overall terminal increases and the lock-in condition (unlock condition) is made more mitigated (more severe). | 2010-12-23 |
20100325723 | SHARED REGISTRATION SYSTEM MULTI-FACTOR AUTHENTICATION - A system and method for establishing a chain of trust from a registrant to a registry. A registrant request to a registrar to change a domain name record includes at least one registrant factor, such as a one time password. The registrar can formulate an extended EPP command that includes the factor to effectuate the change and send it to a registry. The registry can verify the at least one factor using at least one validation server. If the factor is successfully verified, the EPP can be processed by the registry. If the factor is not verified, the EPP command may not be processed and an error message may be generated and sent to the registrar. | 2010-12-23 |
20100325724 | SCOPE MODEL FOR ROLE-BASED ACCESS CONTROL ADMINISTRATION - Architecture that provides centrally located role-based administration where role assignments that are used to calculate scopes for each operation and create a filtered request that only returns objects that the user is allowed to manage. No access checks are needed. The architecture addresses the proliferation of scope definitions by at least creating a set of relative scopes such as that can generically apply to multiple users at once. More specifically, self-relative scopes and absolute scopes are provided. | 2010-12-23 |
20100325725 | COMPUTER READABLE MEDIUM, METHOD FOR CONTROLLING EXECUTION OF PROCESSING, AND INFORMATION PROCESSING APPARATUS - A computer readable medium storing program causing a computer to execute a process for controlling execution of a processing, the process includes receiving, outputting, and executing. The receiving step receives a first request indicating an execution request of the processing from a user. The outputting step outputs processing correspondence information corresponding to the processing to recording medium when an execution result of the processing at the time of receiving the first request from user to which a first authority is given and a second authority is not given differs from an execution result of the processing at the time of receiving the first request from a user to which the second authority is given in case that the first request is sent from user to which both of the first authority and the second authority are given. | 2010-12-23 |
20100325726 | UNAUTHORIZED OPERATION MONITORING PROGRAM, UNAUTHORIZED OPERATION MONITORING METHOD, AND UNAUTHORIZED OPERATION MONITORING SYSTEM - It is possible to provide an unauthorized operation monitoring program for calculating a modified score by reflecting a suspicious value determined from a series of operations by a user who operates a computer in order to monitor an unauthorized operation on the computer. When a modified score that indicates probability of an unauthorized operation is calculated for an object event, a suspicious value (PSV) corresponding to the level of the calculated modified score is set. When a new event occurs next time, for the score (direct score) calculated for the new event, a modified score reflecting the PSV set for the previous event and a time difference between the previous event and the new event is calculated. When operations that the probability of the unauthorized operation is high are continuously performed, or when operations of which the suspicious value is high are repeated, a higher level of a modified score is calculated. | 2010-12-23 |
20100325727 | SECURITY VIRTUAL MACHINE FOR ADVANCED AUDITING - A security system collects an audit trail on a computer outside of a boundary created by one or more virtual machines. The security system uses a privileged virtual machine to collect audit logs for each protected virtual machine. As the protected virtual machines run, they send auditing information to the privileged virtual machine. The privileged virtual machine can collect auditing information from protected virtual machines much more quickly than a network server, as well as collecting auditing events from multiple protected virtual machines. Because the auditing destination is located on the same computer as the virtual machine monitored by the audit trail, no network dependency is present. Thus, the security system allows for monitoring the activity of administrators and other users while preventing tampering with the audit trail of each user's actions. | 2010-12-23 |
20100325728 | SYSTEM FOR POLICING JUNK E-MAIL MESSAGES - A system for policying an unsolicited e-mail communication. The system has a plurality of clients, each coupled together using a wide area network of computers, such as the Internet or an interne. Each of the clients is adapted to send an indication of an unsolicited e-mail message through an e-mail device for a display. The system also has a policying server coupled to each of the plurality of clients through the wide area network of computers. The policying server is adapted to receive the indication from at least one of the clients. The e-mail device comprises an SPAM icon on the display. The SPAM icon is adapted to send the indication from the client to the policying server. | 2010-12-23 |
20100325729 | DETERMINATION BY CIRCUITRY OF PRESENCE OF AUTHORIZED AND/OR MALICIOUS DATA - An embodiment may include circuitry that may be comprised in a host. The host may include memory and a host processor to execute an operating system. The circuitry may be to determine, independently of the operating system and the host processor, the authenticity of signature list information, based at least in part upon authentication information received by the circuitry from a remote server. The circuitry also may be to determine, independently of the operating system and the host processor, based at least in part upon comparison of at least one portion of the signature list information with at least one portion of contents of the memory, whether authorized and/or malicious data are present in the at least one portion of the contents of the memory. Of course, many variations, modifications, and alternatives are possible without departing from this embodiment. | 2010-12-23 |
20100325730 | System and Method for Remotely Securing a Network from Unauthorized Access - This invention is an improved system and method of efficiently deploying a large scale roll out of secure networks, including a VPN, to clients with limited or non-existent technical staff. The invention allows for a person with minimal technical skills to install, and, if necessary, uninstall the solution. Through a series of automated and/or remotely-controlled steps provided through connections established from inside the site to a centralized system over an unprotected network, the site's network can be secured, updated, and/or reconfigured, and returned to its previous state if errors should occur. Furthermore, a virtual private network (VPN) can be established that allows multiple hosts on the VPN but on different local networks to have the same IP address. Additionally, without any additional hardware and as part of the installation process, the invention protects the site from unauthorized local network devices either by preventing them from passing traffic off the local network or by generating notification of their existence. | 2010-12-23 |
20100325731 | ASSESSING THREAT TO AT LEAST ONE COMPUTER NETWORK - Apparatus for assessing threat to at least one computer network in which a plurality of systems ( | 2010-12-23 |
20100325732 | Managing Keys for Encrypted Shared Documents - A system administrator, while logged into a system-administrator account, creates and configures a key-administrator account and a member account. A key administrator, while logged into said key-administrator account, creates a group private key, a group public key, and a group symmetric key, a member private key, and a member public key. The key administrator encrypts the group private key with the group symmetric key, and encrypts said group symmetric key with the member public key. A publisher encrypts a document using the group public key. The publisher distributes the resulting encrypted group document so that it is accessible via said member account but not through said key-administrator account. | 2010-12-23 |
20100325733 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD AND PROGRAM - Hindrance of normal execution of a process caused by unexpected processing of a signal handler can be prevented. | 2010-12-23 |
20100325734 | Modular Software Protection - A method for modular software protection includes steps for receiving, at a server, a license key registered for a software executable installed on a client device and machine fingerprint data generated at the client device, accessing, using the server, stored usage rights data indicated by the license key, the usage rights data specifying a number of client devices on which the software executable is licensed to operate and which features of the software executable are enabled, determining, using the machine fingerprint data received by the server, whether operation of the software executable on the client device would cause the number of client devices on which the software executable is licensed to operate to be exceeded, and creating, in response to the determining step, an encrypted license file for transmission to the client device that defines separate features of the software executable to be enabled on the client device. | 2010-12-23 |
20100325735 | System and Method for Software Activation - A system and related method for activating use of software on a computing device utilizes a license server configured so that, responsive to a communication link being available between the license server and the computing device, the license server receives from the computing device, via the communication link, an activation request including (a) a software identifier identifying the software, (b) a device identifier identifying the computer, and (c) a license key for the software, accesses a database storing previously received software identifiers, device identifiers, and license keys, determines an activation instruction through application of a usage policy that compares the activation request to records within the database, and sends the activation instruction to the computing device. | 2010-12-23 |
20100325736 | REMOTE ACCESS CONTROL OF STORAGE DEVICES - An access control device can be communicationally coupled to a storage device and can control access thereto. The access control device can comprise information, such as identities of authorized entities, to enable the access control device to independently determine whether to provide access to an associated storage device. Alternatively, the access control device can comprise information to establish a secure connection to an authorization computing device and the access control device can implement the decisions of the authorization computing device. The access control device can control access by instructing a storage device to execute specific firmware instructions to prevent meaningful responses to data storage related requests. The access control device can also comprise storage-related cryptographic information utilized by the storage device to encrypt and decrypt data. In such a case, the access control device can control access by not releasing the storage-related cryptographic information to the storage device. | 2010-12-23 |
20100325737 | RIGHTS-BASED ADVERTISEMENT MANAGEMENT IN PROTECTED MEDIA - A user playing a media file having ads on a playback device is able to automatically skip the ads during playback depending on the user's subscription level, as indicated in a user license or user account information. Whether an ad is automatically skipped may depend not only on the user license but also on attributes of the ad. An ad may have a skip-level which indicates the “importance” of the ad. If the advertiser wants to ensure that the ad will be seen and not be automatically skipped by a media playback unit, it can pay a higher price for the ad and the ad will be assigned a higher skip-level value. On the user subscription side, a user who wants to avoid ads may pay a higher subscription fee and have a user license that determines, via an auto-skip level value (“user level”), how many ads the user can automatically skip during playback of the media file. With a higher the auto-skip level value, the user is able to automatically skip more ads on the playback device. | 2010-12-23 |
20100325738 | DYNAMIC DUAL PERMISSIONS-BASED DATA CAPTURING AND LOGGING - Embodiments of the present invention address deficiencies of the art in respect to application data logging and provide a novel and non-obvious method, system and computer program product for capturing and logging application data. In an embodiment of the invention, a method for capturing and logging application data can include consulting both administrative permissions for capturing and logging application data, and also user permissions for capturing and logging application data. Subsequently, application data can be captured and logged only if permitted by the administrative permissions and the user permissions. In this regard, it can be determined from either or both of the permissions whether capturing and logging of application data is permitted generally, and also a type or portion of the application data that is permitted to be captured and logged. | 2010-12-23 |
20100325739 | DATA TRANSMISSION APPARATUS AND METHOD, DATA RECEIVING APPARATUS AND METHOD, AND DATA TRANSMISSION AND RECEPTION SYSTEM AND METHOD - The protection of data against illicit transfer with respect to specific data can be ensured. An integrated receiver decoder determines whether or not ATRAC (Adaptive Transform Acoustic Coding) data requiring authentication is contained in selected piece-of-music data in accordance with determination data added into transmitted data. When ATRAC data requiring authentication is contained, the integrated receiver decoder performs an authentication process between it and a storage which is a transfer destination of the ATRAC data, and performs downloading of the ATRAC data after confirming that the storage is a valid apparatus to which the downloading may be performed. | 2010-12-23 |
20100325740 | MANAGING ELECTRONIC DEVICES USING AN ELECTRONIC DEVICE AS A ROOT OF TRUST - Various embodiments pertain to managing electronic devices using an electronic device as a root of trust. According to one embodiment, registration information for an electronic device | 2010-12-23 |
20100325741 | System and Method of Owner Control of Electronic Devices - A system and method of owner control of an electronic device are provided. Owner identification information, such as data integrity and source authentication information, is stored on the electronic device. Received owner control information is stored on the electronic device where the integrity of the received owner control information is verified and/or the source is authenticated using the owner identification information. In one embodiment, owner identification information comprises an owner signature private key. | 2010-12-23 |
20100325742 | Animal Model Based on Targeted Apoptosis for the Study of Genetic Diseases Such as Parkinson's Disease - Described is the use of a non-human transgenic animal, preferably a mouse, characterized in that it contains a modified version of the gene encoding TIF-IA (a) as an animal model for a disease, (b) for analyzing the function of selected stem cells or (c) for ablating malignant cells or microglia cells. Furthermore, methods for screening a therapeutic compound are described which comprise administering a candidate compound to said non-human transgenic animal (or a cell line derived from said non-human transgenic animal) and monitoring a therapeutic effect of said compound. | 2010-12-23 |
20100325743 | Marks as modifiers of the p53 pathway and methods of use - Human MARK genes are identified as modulators of the p53 pathway, and thus are therapeutic targets for disorders associated with defective p53 function. Methods for identifying modulators of p53, comprising screening for agents that modulate the activity of MARK are provided. | 2010-12-23 |
20100325744 | NON-GLYCOSYLATED RECOMBINANT MONOVALENT ANTIBODIES - The present invention provides non-glycosylated monovalent antibodies with a long half-life when administered in vivo, methods of making such monovalent antibodies, pharmaceutical compositions comprising such antibodies, and uses of the monovalent antibodies. | 2010-12-23 |
20100325745 | MEGANUCLEASE VARIANTS CLEAVING A DNA TARGET SEQUENCE FROM THE MOUSE ROSA26 LOCUS AND USES THEREOF - An I-CreI variant, wherein one of the two I-CreI monomers has at least two substitutions, one in each of the two functional subdomains of the LAGLIDADG (SEQ ID NO: 150) core domain situated respectively from positions 26 to 40 and 44 to 77 of I-CreI, said variant being able to cleave a DNA target sequence from the mouse ROSA26 locus. Use of said variant and derived products for the engineering of transgenic mice and recombinant mouse cell lines expressing an heterologous protein of interest. | 2010-12-23 |
20100325746 | Methods and sequences to suppress primate huntington gene expression in vivo - Disclosed herein are sequences, molecules and methods used to suppress the expression of HD genes encoding for huntingtin protein in primates including | 2010-12-23 |
20100325747 | METHOD OF EXPANDING HUMAN HEPATOCYTES IN VIVO - Described herein is a method of expanding human hepatocytes in vivo using an immunodeficient mouse which is further deficient in fumarylacetoacetate hydrolase (Fah). The method comprises transplanting human hepatocytes into the immunodeficient and Fah-deficient mice, allowing the hepatocytes to expand and collecting the expanded human hepatocytes. The method also allows serial transplantation of the human hepatocytes into secondary, tertiary, quaternary or additional mice. Also provided are mutant mice comprising homozygous deletions or point mutations in the Fah, Rag2 and Il2rg genes. | 2010-12-23 |
20100325748 | TOMATO HYBRID EX01420200 AND PARENT LINES THEREOF - The invention provides seed and plants of tomato hybrid EX01420200 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid EX01420200 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2010-12-23 |
20100325749 | LETTUCE VARIETY 79-88 RZ - The present invention relates to a lettuce cultivar having resistance to downy mildew ( | 2010-12-23 |
20100325750 | Major QTLS Conferring Resistance Of Corn To Fijivirus - The invention relates to methods and compositions for identifying maize plants that have newly conferred resistance or enhanced resistance to, or are susceptible to, a Fijivirus, particularly Mal de Río Cuarto Virus (MRCV) and/or Maize Rough Dwarf Virus (MRDV). The methods use molecular genetic markers to identify, select and/or construct resistant plants or identify and counter-select susceptible plants. Maize plants that display newly conferred resistance or enhanced resistance to a Fijivirus that are generated by the methods of the invention are also a feature of the invention. | 2010-12-23 |
20100325751 | TOMATO PLANTS THAT EXHIBIT RESISTANCE TO BOTRYTIS CINEREA - The present invention relates to tomato plants that exhibit resistance to | 2010-12-23 |
20100325752 | Cytokinin Oxidase Promoter from Maize - The present invention provides compositions and methods for regulating expression of nucleotide sequences in a plant. Compositions and methods include expression cassettes and transformed plants and provide for downregulation of cytokinin oxidase in a plant. | 2010-12-23 |
20100325753 | Plants Having Increased Yield-Related Traits and a Method For Making The Same - The present invention relates generally to the field of molecular biology and concerns a method for increasing various plant yield-related traits by modulating expression in a plant of a nucleic acid sequence encoding a yield increasing polypeptide selected from the group consisting of: an AT-hook motif nuclear localized 19/20 (AHL19/20), a GRP (Growth Regulating Protein) (wherein said GRP polypeptide is a metallothionein 2a (MT2a) polypeptide), an alanine aminotransferase (AAT)-like polypeptide, and an alanine aminotransferase (AAT) polypeptide. The present invention also concerns plants having modulating expression of a nucleic acid sequence encoding a yield increasing polypeptide selected from the group consisting of: an AT-hook motif nuclear localized 19/20 (AHL19/20), a GRP (Growth Regulating Protein) (wherein said GRP polypeptide is a metallothionein 2a (MT2a) polypeptide), an alanine aminotransferase (AAT)-like polypeptide, and an alanine aminotransferase (AAT) polypeptide which plants have increased yield-related traits relative to control plants. The invention also provides constructs useful in the methods of the invention. | 2010-12-23 |
20100325754 | Compositions and methods for modulating oxidative burst in plant transformation - A method for introducing a nucleic acid sequence into the genome of a plant cell and regenerating a transformed plant therefrom, including culturing the plant cell on at least one plant transformation media, the at least one plant transformation media comprising an effective amount of a compound or compounds which may modulate oxidative burst, such as melatonin, 6-hydroxy melatonin (a melatonin analog), N-t-butyl hydroxylamine (NtBH), thiamazole, 1,3 dimethylthiourea, Resveratrol, epicatechin, NADPH, or NADH. | 2010-12-23 |
20100325755 | PESTICIDAL COMBINATIONS - A method of controlling or preventing pest and/or pathogenic damage in a plant propagation material, a plant, and/or plant organs that grow at a later point in time, which comprises applying on the plant, part of the plant, or the surrounding area thereof, a pesticidal combination comprising, for example, at least two active ingredient components optionally together with one or more customary formulation auxiliaries, wherein component (I) is one or more insecticide(s) selected from the group comprising thiodicarb, clothianidin, imidacloprid, thiamethoxam, acetamiprid, thiacloprid, chlorantraniliprole, beta-cyfluthrin, lambda-cyhalothrin, tefluthrin, fipronil and abamectin and component (II) is one or more plant activators), provided that a) if component (II) is acibenzolar-S-methyl then component (I) is not solely thiamethoxam, b) if component (II) is acibenzolar-S-methyl or harpin then component (I) is not solely abamectin or a mixture of abamectin with one of clothianidin, imidacloprid or thiamethoxam, c) if component (U) is acibenzolar-S-methyl or harpin then component (I) is not solely thiodicarb or a mixture of thiodicarb with one of clothianidin, imidacloprid or thiamethoxam, and d) if component (II) is acibenzolar-S-methyl or harpin then no plant growth regulator selected from the group comprising paclobutrazol, cyproconazole, uniconazole, tetcyclacis, trinexapac, gibberellic acid and gibberellic acid-3 is present. | 2010-12-23 |
20100325756 | PLASTID TRANSFORMATION UTILIZING ENDOGENOUS REGULATORY ELEMENTS - Disclosed herein are vectors, plants and methods of transforming plants to increase translation efficiency. Specifically disclosed are methods of implementing a regulatory element endogenous to a target plant species and operatively associating said regulatory element with a heterologous gene of interest. Examples of regulatory sequences are disclosed including 5′ UTR sequences of chloroplast genes, such as a psbA gene. | 2010-12-23 |
20100325757 | FUNGICIDAL COMPOSITIONS AND THEIR APPLICATIONS IN AGRICULTURE - Fungicidal compositions are provided that comprise a silthiofam-type fungicide and a fungicide that is selected from the group consisting of diazole fungicides, triazole fungicides and strobilurin type fungicides. Combinations of fluqinconazole and simeconazole or azoxystrobin, and simeconazole and azoxystrobin are also provided. Methods for treating plants and plant propagation materials with the fungicidal compositions are also taught, as are plants and their propagation materials which have been so treated, and controlled release formulations that contain the fungicidal compositions. | 2010-12-23 |
20100325758 | Rice Cultivar Designated 'CL131' - A novel rice cultivar, designated ‘CL131,’ is disclosed. The invention relates to the seeds of rice cultivar ‘CL131,’ to the plants of rice ‘CL131,’ and to methods for producing a rice plant produced by crossing the cultivar ‘CL131’ with itself or another rice variety, and to single gene conversions of such plants. The invention further relates to hybrid rice seeds and plants produced by crossing the cultivar ‘CL131’ with another rice cultivar. The invention further relates to other derivatives of the cultivar ‘CL131.’ | 2010-12-23 |
20100325759 | Protein Kinase Stress-Related Proteins and Methods of Use in Plants - A transgenic plant transformed by a Protein Kinase Stress-Related Protein (PKSRP) coding nucleic acid, wherein expression of the nucleic acid sequence in the plant results in increased tolerance to environmental stress as compared to a wild type variety of the plant. Also provided are agricultural products, including seeds, produced by the transgenic plants. Also provided are isolated PKSRPs, and isolated nucleic acid coding PKSRPs, and vectors and host cells containing the latter. | 2010-12-23 |
20100325760 | FAGOPYRITOL SYNTHASE GENES AND USES THEREOF - The present invention relates to an isolated DNA molecule encoding a fagopyritol synthase. A method for producing a fagopyritol, an insulin mediator, an insulin mediator analogue, an insulin mediator homologue, or an insulin mediator inhibitor is also described. The method includes providing a fagopyritol synthase, providing a substrate comprising a galactosyl donor and a galactosyl acceptor, and combining the fagopyritol synthase with the substrate under conditions effective produce a fagopyritol, an insulin mediator, an insulin mediator analogue, an insulin mediator homologue, or an insulin mediator inhibitor. | 2010-12-23 |
20100325761 | Scanning Probe Microscope and Method of Observing Sample Using the Same - Optical information and topographic information of the surface of a sample are measured at a nanometer-order resolution and with high reproducibility without damaging a probe and the sample by combining a nanometer-order cylindrical structure with a nanometer-order microstructure to form a plasmon intensifying near-field probe having a nanometer-order optical resolution and by repeating approach/retreat of the probe to/from each measurement point on the sample at a low contact force. | 2010-12-23 |
20100325762 | Variety of prunus rootstock named 'Greenpac' - A new and distinct hybrid peach-almond plant used as a rootstock that exhibits moderate root-knot nematode resistance, high productivity, and compatibility with peach, nectarine, almond, and plum varieties. | 2010-12-23 |
20100325763 | Mandarin tree named 'DaisySL' - ‘DaisySL’ is a mid-season maturing diploid mandarin that combines medium-large sized fruit of excellent quality and production with very low seed content even in mixed plantings. It would likely be successful in the mid-season marketing window that currently has very few low-seeded, high quality cultivars. | 2010-12-23 |
20100325764 | Slash pine tree named CF PS1-3352 - A new and distinctive variety of a slash pine tree which has been denominated varietally as ‘CP PS1-3352’ which is distinguished by high growth rate, good resistance to fusiform rust and pitch canker, excellent stem straightness, medium crown width, long stem internodes, flat to medium branch angle and medium branch diameter | 2010-12-23 |
20100325765 | LOBLOLLY PINE TREE NAMED CF LP1-7696 - A new and distinctive variety of a loblolly pine tree which has been denominated varietally as ‘CF LP1-7696’ which is distinguished by high growth rate, good resistance to fusiform rust, excellent stem straightness, medium crown width, medium number of whorls, medium branch angle and medium branch diameter. | 2010-12-23 |