Patent application number | Description | Published |
20090165171 | Transgenic Plants Exhibiting Increased Tolerance to Stress and Methods of Generating Same - Methods of increasing tolerance of a plant to stress are provided. According to an exemplary aspect a method of increasing tolerance of a plant to a biotic stress is provided. The method comprising expressing within the plant an exogenous thereby increasing the tolerance of the plant to the biotic stress. Also provided are nucleic acid constructs and transgenic plants comprising same. | 06-25-2009 |
20100319091 | METHODS OF MODULATING PRODUCTION OF PHENYLPROPANOID COMPOUNDS IN PLANTS - A method of enhancing production of a phenylpropanoid compound in a plant or plant cell is disclosed. The method comprising: (a) expressing in the plant or plant cell a heterologous polynucleotide which produces a myb gene of the phenylpropanoid pathway; and (b) contacting the plant or plant cell with at least one substrate of the phenylpropanoid pathway, the substrate being upstream to the production of the phenylpropanoid compound, thereby enhancing the production of a phenylpropanoid compound in the plant or plant cell. | 12-16-2010 |
20110126317 | PLANT VIRAL EXPRESSION VECTORS AND USE OF SAME FOR GENERATING GENOTYPIC VARIATIONS IN PLANT GENOMES - A method of generating genotypic variation in a genome of a plant is disclosed. The method comprising introducing into the plant at least one viral expression vector encoding at least one chimeric nuclease which comprises a DNA binding domain, a nuclease and a localization signal to a DNA-containing organelle, wherein the DNA binding domain mediates specific targeting of the nuclease to the genome of the plant, thereby generating genotypic variation in the genome of the plant. | 05-26-2011 |
20120210461 | GENERATING GENOTYPIC VARIATIONS IN PLANT GENOMES BY GAMETE INFECTION - A method of generating genotypic variation in a genome of a plant is disclosed. The method comprising introducing into a gamete or a gamete producing tissue of the plant at least one viral expression vector encoding at least one chimeric nuclease which comprises a DNA binding domain, a nuclease and a localization signal to a DNA-containing organelle, wherein the DNA binding domain mediates specific targeting of the nuclease to the genome of the plant, wherein the introducing is performed such that the gamete or gamete producing tissue expresses the chimeric nuclease but not all plant tissues express the chimeric nuclease, thereby generating genotypic variation in the genome of the plant. | 08-16-2012 |
20130302861 | EXPRESSION CONSTRUCTS AND USES THEREOF IN THE PRODUCTION OF TERPENOIDS IN YEAST - A method of producing at least one terpene in a yeast cell is disclosed. The method comprises exogenously expressing within the mitochondria of the yeast cell or directing localization thereto a terpene synthase. | 11-14-2013 |
20140331360 | PLANT VIRAL EXPRESSION VECTORS AND USE OF SAME FOR GENERATING GENOTYPIC VARIATIONS IN PLANT GENOMES - A method of generating genotypic variation in a genome of a plant is disclosed. The method comprising introducing into the plant at least one viral expression vector encoding at least one chimeric nuclease which comprises a DNA binding domain, a nuclease and a localization signal to a DNA-containing organelle, wherein the DNA binding domain mediates specific targeting of the nuclease to the genome of the plant, thereby generating genotypic variation in the genome of the plant. | 11-06-2014 |
Patent application number | Description | Published |
20090254972 | Method and System for Implementing Changes to Security Policies in a Distributed Security System - Improved approaches for effectuating changes to security policies in a distributed security system are disclosed. The changes to security policies are distributed to those users (e.g., user and/or computers) in the security system that are affected. The distribution of such changes to security policies can be deferred for those affected users that are not activated (e.g., logged-in or on-line) with the security system. | 10-08-2009 |
20100199088 | Method and System For Securing Digital Assets Using Process-Driven Security Policies - Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy. | 08-05-2010 |
20120159191 | METHOD AND APPARATUS FOR TRANSITIONING BETWEEN STATES OF SECURITY POLICIES USED TO SECURE ELECTRONIC DOCUMENTS - Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy and enforced in conjunction with one or more cryptographic methods. | 06-21-2012 |
20120198230 | Document Security System that Permits External Users to Gain Access to Secured Files - A system includes a server with an access manager configured to restrict access to files of an organization and maintain at least encryption keys for internal and external users and an external access server connected to the server and coupled between the server and a data network. The data network is configured to allow the external users use of the external access server. The external access server is also configured to permit file exchange between the internal users and the external users via the server. | 08-02-2012 |
Patent application number | Description | Published |
20090100268 | METHODS AND SYSTEMS FOR PROVIDING ACCESS CONTROL TO SECURED DATA - In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion. | 04-16-2009 |
20140075206 | METHODS AND SYSTEMS FOR PROVIDING ACCESS CONTROL TO SECURED DATA - In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion. | 03-13-2014 |
20140201850 | METHODS AND SYSTEMS FOR PROVIDING ACCESS CONTROL TO SECURED DATA - In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion. | 07-17-2014 |