15th week of 2014 patent applcation highlights part 55 |
Patent application number | Title | Published |
20140101711 | VIRTUAL CONVERGED CABLE ACCESS PLATFORMS FOR HFC CABLE NETWORKS - A virtual converged cable access platform (CCAP) system and method for hybrid fiber CATV (HFC) cable networks. The system uses a new type of digital optical fiber node configured to receive optical fiber data packets, and reconstitute the optical data packets into RF waveforms suitable for injection into the system's CATV cable. The system replaces the legacy HFC head end with a simplified “virtual head end”. The system's virtual head end operates using a new type of virtual CCAP controller and virtual CCAP software that in turn controls high performance edge routers. Much of the intelligence of running the HFC cable system is managed by the controller software, while the edge router manages the interface between the CATV portion of the system and outside networks. The system can handle even legacy CATV RF signals by appropriate conversion operations, while reducing power and space needs, and improving operational flexibility. | 2014-04-10 |
20140101712 | SYSTEM AND METHOD FOR FACILITATING FAST-FORWARDING OF FIRST-RUN PROGRAMS - A system and method are disclosed for facilitating fast-forwarding by viewers through a first-run program beyond the current broadcast point. In one embodiment, the first-run program is distributed before its scheduled publication time, and may be viewed at any time after the publication time. In a second embodiment, content is distributed on or after the publication time, but at a rate greater than the normal viewing rate. In a third embodiment, content is distributed on demand after the publication time by a media distribution server. In a fourth embodiment, a viewer participating in a multicast session of the content requests content beyond the current broadcast point. The viewer is switched to a unicast session, and the requested content is transmitted to the viewer. In alternative embodiments, a release code may be provided to control the time after which the viewer will be permitted to view program segments beyond the current broadcast point. | 2014-04-10 |
20140101713 | DATA MAPPING USING TRUST SERVICES - Embodiments are directed to mapping encryption policies to user data stored in a database using a policy column uniform resource identifier (URI). In one scenario, a computer system receives the following: a database schema name that identifies the name of a specified schema within a relational database in which user data is stored, a table name that identifies a specified table within the relational database, a column name that identifies a specified column in the specified table and a namespace identifier that identifies a set of relational databases. The computer system also receives an indication that identifies which type of encryption is to be applied when encrypting the column of data specified by the column name. The computer system then generates a policy column URI that includes a hierarchical string comprising the namespace identifier, the database schema name, the table name and the column name. | 2014-04-10 |
20140101714 | PRIVACY AWARE AUTHENTICATED MAP-REDUCE - A computer-implemented process for privacy aware authenticated map-reduce processing receives data for a MapReduce operation to form received data, identifies a control point in a set of control points of the MapReduce operation to form an identified control point and identifies an applicable set of policies for the identified control point to form a selected set of policies. The selected set of policies is applied at the identified control point and responsive to a determination that application of the selected set of policies at the identified control point returned a positive result, the computer-implemented process continues operation to a next stage in the MapReduce operation. | 2014-04-10 |
20140101715 | PRIVACY AWARE AUTHENTICATED MAP-REDUCE - A computer-implemented process for privacy aware authenticated map-reduce processing receives data for a MapReduce operation to form received data, identifies a control point in a set of control points of the MapReduce operation to form an identified control point and identifies an applicable set of policies for the identified control point to form a selected set of policies. The selected set of policies is applied at the identified control point and responsive to a determination that application of the selected set of policies at the identified control point returned a positive result, the computer-implemented process continues operation to a next stage in the MapReduce operation. | 2014-04-10 |
20140101716 | Transaction Security Systems and Methods - Outbound traffic of a host application may be received from a host device having a host processor. The secure resource may be configured to provide a secure transaction based on the outbound network traffic. Using a second processor different than the host processor, it may be determined whether the host application is authorized to provide the outbound network traffic to the secure resource. The outbound network traffic may be allowed to be forwarded to the secure resource if the host application is authorized. The outbound network traffic may be disallowed to be forwarded to the secure resource if the host application is not authorized. | 2014-04-10 |
20140101717 | MOBILE APPLICATION DEPLOYMENT FOR DISTRIBUTED COMPUTING ENVIRONMENTS - Embodiments of the present invention provide a method, system, and computer program product for ensuring the veracity of a mobile application for deployment in a distributed computing environment. In an embodiment of the invention, a method for ensuring the veracity of a mobile application for deployment in a distributed computing environment is provided. The method includes detecting a mobile application being uploaded for deployment to a mobile computing device in the distributed computing environment, creating and then storing a fingerprint for the uploaded mobile application, calculating an offset value according to the fingerprint for the uploaded mobile application, and storing the offset value for the uploaded mobile application. The method further includes, prior to deploying the uploaded mobile application to the mobile computing device, validating the offset value for the uploaded mobile application to determine that the uploaded mobile application is an unaltered version of the uploaded mobile application. | 2014-04-10 |
20140101718 | CROSS-DOMAIN AUTHENTICATION - Providing services within a network of service providers sharing an authentication service and a set of business rules. A central server receives a first request from a first server to provide a first service to a user via a client without forcing the user to present credentials. In response to the received first request, the central server stores data identifying the first service on the client. The central server further receives a second request from a second server to provide a second service to the user via the client after the user presents the credentials to the second service. After receiving the second request and the presented credentials, the central server allows the user access to the second service. In response to allowing the user access to the second service, the central server further allows the user access to the first service as a result of the stored data. | 2014-04-10 |
20140101719 | SYSTEMS AND METHODS FOR PROVIDING A NETWORK STORAGE SYSTEM - Systems and methods are provided for providing a network storage system. One method includes receiving a request from a client coupled to a local communication network to provide access to a network storage system. The request can include a data item identifier, and the network storage system can include a local network storage, coupled to the local communication network, and a remote network storage, coupled to a public communication network. The method can further include identifying, based on the request, one of the local network storage and the remote network storage for serving the request, and providing the request to the identified one of the local network storage and the remote network storage to provide the client with an access to the identified one of the local network storage and the remote network storage. | 2014-04-10 |
20140101720 | CONFIGURING INITIAL SETTINGS OF A NETWORK SECURITY DEVICE VIA A HAND-HELD COMPUTING DEVICE - Process, equipment, and computer program product code for configuring a network security device using a hand-held computing device are provided. Default initial settings for a network security device are received by a mobile application running on a hand-held computing device. The default initial settings represent settings that allow the network security device to be remotely managed via a network to which the network security device is coupled. The default initial settings are presented to a network administrator via a touch-screen display of the hand-held computing device. Revisions to or acceptance of the default initial settings are received by the mobile application. The mobile application causes the network security device to be configured with the revised or accepted default initial settings by delivering the settings to the network security device via a management interface to which the hand-held computing device is coupled via a connecting cable. | 2014-04-10 |
20140101721 | TRANSMISSION TERMINAL, TRANSMISSION SYSTEM AND RECORDING MEDIUM - A transmission terminal includes an authentication unit that determines, when the transmission terminal is not connected to a network, whether authentication of a storage medium is confirmed based on authentication information stored in a storage unit and authentication information read from the storage medium, and transmits, when the transmission terminal is connected to the network, an authentication request containing the authentication information read from the storage medium to an authentication device connected to the network, and a maintenance unit that alters maintenance functions executable on the transmission terminal based on whether authentication of the storage medium is confirmed based on the authentication information stored in the storage unit or a notice indicating that authentication of the storage medium is confirmed is received from the authentication device. | 2014-04-10 |
20140101722 | Secure Content Access Authorization - A secure content delivery or access method may include coordination among three devices such as servers—a content management server, a delivery server, and an authorization server. A request for content may originate from an authorization server application, and may involve the application obtaining two digitally signed tokens for the request. The first token may be from the authorization server, and may include a content management server identifier for the requested content. The second token may include two identifiers for the content: the first identifier being the content management server identifier, and the second being a delivery server identifier. The first and second tokens may be signed by the authorization server and content management server, respectively, and may be delivered to the delivery server for validation. Successful validation may result in the delivery server providing a content decryption key for the requested content to a device requesting the content. | 2014-04-10 |
20140101723 | EXTENSIBLE CONFIGURATION SYSTEM TO ALLOW A WEBSITE TO AUTHENTICATE USERS BASED ON AN AUTHORIZATION PROTOCOL - An extensible configuration system to allow a website to authenticate users based on an authorization protocol is disclosed. In some embodiments, the extensible configuration system includes receiving an identifier for an authentication provider; and automatically configuring a website to use the authentication provider for logging into the website. | 2014-04-10 |
20140101724 | NETWORK ATTACK DETECTION AND PREVENTION BASED ON EMULATION OF SERVER RESPONSE AND VIRTUAL SERVER CLONING - Network attacks can be evaluated to determine typical responses provided by networks configured to provide services. Typically, service requests directed to a selected address are associated with data or a data streams responsive to requests to selected addresses. These responses are used to define scripts that can be executed by decoy nodes responsive to service requests at the selected addresses. Receipt of a request for services at an unused IP address and port number can trigger playback of the associated script, typically as a data stream mimicking that produced by an operational network. | 2014-04-10 |
20140101725 | COMMUNICATION SYSTEM, CLIENT APPARATUS, RELAY APPARATUS, AND COMPUTER-READABLE MEDIUM - A communication system includes a client apparatus and a relay apparatus. The client apparatus includes an acquisition unit and a request unit. The acquisition unit acquires permission information indicating permission to access a service provider apparatus, from the service provider apparatus. The request unit transmits the permission information and user identification information which has been input, to the relay apparatus so as to request access to the service provider apparatus. The relay apparatus includes a storage controller and an access unit. The storage controller stores the permission information and the user identification information which are received from the client apparatus, in a storage unit in such a manner that the permission information and the user identification information are associated with each other. The access unit accesses the service provider apparatus by using the permission information stored in the storage unit. | 2014-04-10 |
20140101726 | TRUSTED WLAN CONNECTIVITY TO 3GPP EVOLVED PACKET CORE - Systems, devices, and configurations to implement trusted connections within wireless networks and associated devices and systems are generally disclosed herein. In some examples, a wireless local area network (WLAN) may be attached to a 3GPP evolved packet core (EPC) as a trusted access network, without use of an evolved packet data gateway (ePDG) and overhead from related tunneling and encryption. Information to create the trusted attachment between a mobile device and a WLAN may be exchanged using Access Network Query Protocol (ANQP) extensions defined by IEEE standard 802.11u-2011, or using other protocols or standards such as DHCP or EAP. A trusted WLAN container with defined data structure fields may be transferred in the ANQP elements to exchange information used in the establishment and operation of the trusted attachment. | 2014-04-10 |
20140101727 | COMMUNICATION SYSTEM AND COMMUNICATION METHOD - A communication system includes a transmission terminal and a management device, and when having received contact list information about a second user from the management device while displaying a contact list about a first user or the transmission terminal, the transmission terminal creates the contact list about the second user based on the contact list information about the second user, and displays the contact list of the second user. | 2014-04-10 |
20140101728 | METHOD FOR PROTECTION OF DATA SHARED BETWEEN DEVICES CONNECTED IN A NETWORK AND CORRESPONDING APPARATUS - The invention proposes a method and device for protection of data for devices connected in a network such as a local area network or LAN. The method and device can for example be implemented on a gateway, which acts as an interconnecting device between the devices in the LAN network and that can offer these devices an access to an external network such as a wide area network or WAN. The method and device thus offers a protected environment for applications that are executed on the gateway, such as applications downloaded from the WAN. The method and device gives the applications executed on the gateway controlled access to the LAN resources in order to protect the data that the LAN devices share within the LAN, while giving the applications access to the WAN. | 2014-04-10 |
20140101729 | Methods, Systems and Computer Program Products for Secure Access to Information - Methods for secure communications are provided. The methods include creating a safe user account on a secure access system, wherein creating an account includes provision of at least one strong authenticator to be associated with a user of the secure access system; providing a unique login and the at least one strong authenticator associated with the user to the secure access system to gain access to information associated with a referring organization, the referring organization being registered with the secure access system; and accessing the information associated with the referring organization based on the unique login and the at least one strong authenticator provided to the secure access system. Related systems and computer program products are also provided. | 2014-04-10 |
20140101730 | SYSTEM AND METHOD FOR VERIFYING THE AGE OF AN INTERNET USER - A method of verifying the age of a prospective Internet user comprises establishing an age check account; receiving information about a user, the information including an alleged age of the user; sending the information to be verified; and receiving a notification that the information has been verified. | 2014-04-10 |
20140101731 | SECURE IDENTIFICATION OF COMPUTING DEVICE AND SECURE IDENTIFICATION METHODS - A method implemented on a computing device provides for identifying the device and/or a user to an application on the device. The method comprises receiving a function call for a public identifier, responding to the function call, performing a hash operation and returning the public identifier. Responding to the function call comprises requesting a publisher ID from a first memory location within the device and requesting a private ID from a second memory location. Performing a hash operation on the publisher ID and the private ID creates the public identifier. The public identifier is then returned to the application. A method of allowing a developer to test an application on a mobile device or emulator is also described. A mobile device programmed to return a public identifier to an application is also described. | 2014-04-10 |
20140101732 | Communication with a Voice-Based Account Management System - According to an embodiment, a method facilitates communication with a voice-based management system. An authentication credential is received. Based on the authentication credential, a user is allowed to access an on-line management system operable to facilitate management of an account. The on-line management system receives a request to connect the user to a voice-based management system operable to facilitate providing a response to a question included in the request. A user type associated with the user is determined. A context associated with the question included in the request is determined. A response unit in the voice-based management system is determined according to the user type and the context. The user is connected to the response unit in the voice-based management system without requiring the user to provide the authentication credential to the response unit. | 2014-04-10 |
20140101733 | SYSTEM AND METHOD FOR SECURE USER AUTHENTICATION WITH A SINGLE ACTION - A system and method for securely authenticating a user provides the user the convenience of performing a single action to authenticate the user to an online business without any need for the user to enter, much less remember, any credentials specific to logging into the online business. An actionable item is provided to the user via a message sent to a messaging address that the user has provided when signing up with a backend system incorporating the disclosed authentication system. The actionable item, which incorporates authentication-related information for the user, is so formulated that a single action performed on the actionable item causes an authentication request to be sent to the backend system. The backend system, upon receiving the request, authenticates the user using the authentication-related information retrieved from the authentication request. Optionally, the user will be presented a destination page personally selected during the sign-up following a successful authentication. | 2014-04-10 |
20140101734 | CREDENTIAL AUTHENTICATION METHODS AND SYSTEMS - Methods and systems are provided for performing and verifying transactions involving authentication with a secure credential, such as a smart card, in an untrusted or semi-trusted environment. An application module, operating in an untrusted or semi-trusted environment can be denied access to sensitive data. The application module can determine a preliminary command to be sent to the credential and transmit the preliminary command to a broker module. The broker module, operating in a trusted environment, can supply sensitive data and transmit the command to the credential. Subsequently, the broker module can extract sensitive data from a response before it is transmitted to the application module. A verification server can audit the transaction to verify that it was carried out properly. | 2014-04-10 |
20140101735 | SYSTEM AND METHOD FOR ASSEMBLING AND ANALYZING A CANDIDATE APPLICATION FOR A CREDENTIAL - An automated system and method for assembling and analyzing a candidate application to determine a type of credential in a professional credentialing area for the candidate is provided. The automated system may facilitate the receipt of application materials from various sources and may enable review and appraisal of the application by multiple parties. The application may be tailored to a specific type of requested credential. | 2014-04-10 |
20140101736 | Authenticating Credentials For Mobile Platforms - Systems and methods for providing services are disclosed. One aspect comprises authenticating a user associated with a first service, receiving a selection of a second service, generating an opaque identifier associated with the user and the first service, wherein the opaque identifier facilitates the anonymous collection of data relating to the second service. Another aspect can comprise transmitting the opaque identifier to the second service, and receiving data relating to the second service. | 2014-04-10 |
20140101737 | MOBILE DEVICE AND CONTROL METHOD THEREOF - A mobile device and a method are provided. A mobile device includes a display, a sensor configured to sense a user operation with respect to the display, a fingerprint sensor configured to sense a fingerprint of the user that input the user operation, a storage configured to store preregistered fingerprint information, and a controller configured to perform an operation corresponding to the user operation when the fingerprint sensed by the fingerprint sensor matches the stored fingerprint information and perform a fingerprint registration operation when the fingerprint sensed by the fingerprint sensor does not match the stored fingerprint information. | 2014-04-10 |
20140101738 | APPLYING A PARTIAL PASSWORD IN A MULTI-FACTOR AUTHENTICATION SCHEME - A method includes transmitting a User ID and a full Password of a user of a client device to a server via the client device, and then establishing a network connection between the client device and the server after the User ID and the full Password. The method also includes receiving, from the server via the client device, an encrypted secret PIN (ESPIN) and a challenge for corresponding positions of a Partial Password, entering the Partial Password via the client device, and computing a secret PIN (SPIN) from the ESPIN via the client device in response to a correct entry of the Partial Password. The Additional Factor is unlocked using the SPIN, and the unlocked Additional Factor is transmitted to the server to request authentication of the user of the client device. The client device includes a processor and memory having instructions for the above method. | 2014-04-10 |
20140101739 | SEMANTIC CHALLENGE FOR AUDIO HUMAN INTERACTIVE PROOF - In one embodiment, a human interactive proof portal | 2014-04-10 |
20140101740 | Methods, Systems, and Products for Authentication of Users - Methods, systems, and products authenticate users for access to devices, applications, and services. Skills of a user are learned over time, such that an electronic model of random subject matter may be generated. The user is prompted to interpret the random subject matter, such as with a drawing, physical arrangement, or performance. The user's interpretation is then compared to the electronic model of the random subject matter. If the user is truly who they purport to be, their interpretation will match the electronic model, thus authenticating the user. If interpretation fails to match the electronic model, authentication may be denied. | 2014-04-10 |
20140101741 | METHOD AND SYSTEM FOR MOBILE DEVICE BASED AUTHENTICATIONSERVICES ENVIRONMENT - In this specification, access may be provided to secure systems by authentication using mobile devices. Users may register a mobile device and password with an authentication system. To access a secure system, users may send a request with a registered phone number via SMS, internet or phone. In an embodiment, the authentication server system may send the token and the position of the password via SMS. Users may enter the authentication code comprising of the token and the password at the secure system. The secure system compares the authentication code with the stored authentication code to grant access to the secure system. Secure access may be used in credit card, pre-paid card, debit card or any other card transactions other financial transactions authentication, login authentication for a computer system and security access authentication. | 2014-04-10 |
20140101742 | Method, Client and Server of Password Verification, and Password Terminal System - The present disclosure provides techniques for authenticating a password. These techniques may enable a user terminal to retrieve a diagram using a computing device. The diagram is inputted by a user in a terminal and is displayed in form of a diagram in connection to a password. The computing device may then transfer operand points passed through by the diagram to a server terminal for password authentication, and then receive a result of the password authentication from the server terminal. These techniques improve password authentication security. | 2014-04-10 |
20140101743 | Method for authenticating a user to a service of a service provider - Methods, devices, and computer programs for an authentication of a user to a service of a service provider are disclosed. Access for the user to the service of the service provider is requested. One or more authentication security profiles are selected by the service provider for specifying an authentication security requirement of the service provider for the authentication of the user to the service. An indication of the one or more selected authentication security profiles and a user identity identifying the user to an identity provider are sent from the service provider to the identity provider for requesting the authentication of the user by the identity provider. The user is authenticated based on the user identity and one of the one or more selected authentication security profiles. An assertion indicating the authentication of the user to the service provider is sent to the service provider. | 2014-04-10 |
20140101744 | DYNAMIC INTERACTIVE IDENTITY AUTHENTICATION METHOD AND SYSTEM - An identity authentication system includes a storage unit, a display character set generation unit, a display unit and a password authentication unit. An identity authentication method includes the following steps: generating the dynamic display character sets; inputting a dynamic input code; and comparing the dynamic input code with the user password. This invention can improve the security of identity authentication and is convenient to use. | 2014-04-10 |
20140101745 | CUSTOMIZABLE SIGN-ON SERVICE - Techniques are described for providing customizable sign-on functionality, such as via an access manager system that provides single sign-on functionality and other functionality to other services for use with those services' users. The access manager system may maintain various sign-on and other account information for various users, and provide single sign-on functionality for those users using that maintained information on behalf of multiple unrelated services with which those users interact. The access manager may allow a variety of types of customizations to single sign-on functionality and/or other functionality available from the access manager, such as on a per-service basis via configuration by an operator of the service, such as co-branding customizations, customizations of information to be gathered from users, customizations of authority that may be delegated to other services to act on behalf of users, etc., and with the customizations that are available being determined specifically for that service. | 2014-04-10 |
20140101746 | SYSTEMS AND METHODS FOR INHIBITING ATTACKS WITH A NETWORK - Systems and methods for inhibiting attacks with a network are provided. In some embodiments, methods for inhibiting attacks by forwarding packets through a plurality of intermediate nodes when being transmitted from a source node to a destination node are provided, the methods comprising: receiving a packet at one of the plurality of intermediate nodes; determining at the selected intermediate node whether the packet has been sent to the correct one of the plurality of intermediate nodes based on a pseudo random function; and forwarding the packet to the destination node, based on the determining. In some embodiments an intermediate node is selected based on a pseudo random function. In some embodiments, systems and methods for establishing access to a multi-path network are provided. | 2014-04-10 |
20140101747 | SYSTEM AND METHOD FOR COMMUNICATION BETWEEN DYNAMIC TOKEN AND TOOL - The present invention relates to the field of information security. Disclosed are a system and method for communication between a dynamic token and a tool, the system comprising a tool part and a dynamic token part; the tool part comprises a control module and a tool radio frequency communication module; the dynamic token part comprises an MCU and liquid crystal module and an OTP radio frequency communication module. The method comprises: the tool part transmits a modulated wake-up command signal to the dynamic token part in the form of an electromagnetic wave; when a wake-up response command signal returned by the dynamic token part is correctly received, the tool part transmits the modulated command signal to the dynamic token part in the form of an electromagnetic wave; and the tool part detects the amplitude variation of the generated carrier signal, judges whether the response signal is correctly received, and operates correspondingly. | 2014-04-10 |
20140101748 | Adaptive System Behavior Change on Malware Trigger - A hardware secured flag mechanism which is activated by trusted Anti-Malware (AM) software. Upon being activated, the information handling system takes action to reduce user exposure even if the AM software is subsequently subverted. In certain embodiments, the flag mechanism is only reset by user intervention at a BIOS or other off-line mechanism. In certain embodiments, the flag mechanism may only be reset via a signed unlock key stored on an external memory device such as a universal serial bus (USB) key. | 2014-04-10 |
20140101749 | METHOD FOR PROVIDING MEDIA COMMUNICATION ACROSS FIREWALLS - The present invention supports a method for transmitting information packets across network firewalls. A trusted entity is provisioned with an address designation for a pinhole through the firewall during setup of a communication session between two communication devices. This pinhole address is used throughout the communication session between the two communication devices to transmit information packets onto and out of the communication network. Information packets addressed to the communication device inside the firewall are received by the trusted entity, which replaces address header information in the information packet with the address for the pinhole. The information packet is routed to the pinhole where it passes onto the network for routing to the communication device inside the firewall. Information packets transmitted from the network are also routed to the trusted entity for routing toward the communication device outside the firewall. | 2014-04-10 |
20140101750 | SUPERVISED DATA TRANSFER - An apparatus and method are provided for controlling a transfer of data between data communications networks. In a preferred implementation, an apparatus is provided comprising: a data store; computer providing, in a first computing environment, a first network interface for accessing a first data communications network and a first user interface for receiving a first data transfer request to download data from a data source linked to the first data communications network to the data store; computer providing, in a second computing environment isolated from the first computing environment, a second network interface for accessing a second data communications network and a second user interface for receiving a second data transfer request to transfer downloaded data from the data store to a recipient device linked to the second data communications network; and data transfer controller with access to resources in both the first and second computing environments for controlling downloads and transfers of data according to the first and second requests, further comprising a supervisory controller arranged to determine, prior to implementing the second request, that at least the second request originates from a human user. | 2014-04-10 |
20140101751 | HARDWARE ENGINE FOR HIGH-CAPACITY PACKET PROCESSING OF NETWORK BASED DATA LOSS PREVENTION APPLIANCE - Provided is a network-based data loss prevention (DLP) system. The network-based DLP system includes a FPGA engine including a pattern matcher and a MCP engine including a session list filter. The a pattern matcher hash-processes a payload of an input packet in units of a certain size, compares a pre-stored pattern and the hash-processed packet, checks a matching rule ID and an upload channel ID corresponding to the pre-stored pattern when there is a match therebetween, adds tagging information to a header of the input packet, and outputs the packet. The session list filter receives the packet with the tagging information added thereto, and performs pre-registered processing on the pre-registered session, or passes the received packet. The processor uploads, forwards, or drops the received packet in correspondence with the matching rule ID. | 2014-04-10 |
20140101752 | SECURE GESTURE - Aspects of the disclosure provide a system that includes a protected module, an input module and a gesture engine. The protected module is configured to be accessible based on a specific gesture of a user predetermined to have a right to access the protected module. The input module is configured to receive an input gesture from a requester to access the protected module. The gesture engine is configured to be trained to process the input gesture in order to grant/deny an access to the protected module by the requester. | 2014-04-10 |
20140101753 | Risk Adaptive Information Flow Based Access Control - Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the organization is determined and allocated among a plurality of subjects within the organization. Allocation is accomplished using either a centralized, request/response or free market mechanism. As requested from subjects within the organization for access to objects, i.e. information and data, are received, the amount of risk or risk level associated with each requested is quantified. Risk quantification can be accomplished using, for example, fuzzy multi-level security. The quantified risk associated with the access request in combination with the identity of the object and the identity of the subject are used to determine whether or not the request should be granted, denied or granted with appropriated mitigation measures. | 2014-04-10 |
20140101754 | METHODS AND SYSTEMS FOR ALLOCATING A USB DEVICE TO A TRUSTED VIRTUAL MACHINE OR A NON-TRUSTED VIRTUAL MACHINE - The methods and systems described herein provide for allocating a universal serial bus (USB) device to one of a trusted virtual machine and a non-trusted virtual machine. A control program receives data indicating a USB port on the computing machine received a USB device and identifies at least one attribute of the USB device. The control program selects, based on application of a policy to the identified at least one device attribute, one of a trusted virtual machine and a non-trusted virtual machine executing. The control program grants, to the virtual machine selected by the control program, access to the USB device. | 2014-04-10 |
20140101755 | MOBILE WIRELESS COMMUNICATIONS DEVICE PROVIDING SECURITY FEATURES BASED UPON WEARABLE NEAR FIELD COMMUNICATION (NFC) DEVICE AND RELATED METHODS - A system may include at least one wearable near field communication (NFC) device including a carrier capable of being worn adjacent to a hand, a sensor coupled to the carrier and capable of sensing positioning adjacent to the hand, and a first NFC transceiver coupled to the carrier and the sensor. The system may further include a mobile wireless communications device including a second NFC transceiver capable of communicating with the first NFC transceiver, and a processor coupled to the second NFC transceiver and being capable of switching from a security mode to a normal operating mode based upon the sensor sensing positioning adjacent to the hand and the second NEC transceiver establishing NEC communication with the first NEC transceiver. | 2014-04-10 |
20140101756 | REMEDIATION OF SECURITY VULNERABILITIES IN COMPUTER SOFTWARE - Processing a downgrader specification by constructing a set of candidate downgrader placement locations found within a computer software application, where each of the candidate downgrader placement locations corresponds to a transition between a different pair of instructions within the computer software application, and where each of the transitions participates in any of a plurality of data flows in a set of security-sensitive data flows within the computer software application, applying a downgrader specification to the set of candidate downgrader placement locations, and determining that the downgrader specification provides full coverage of the set of security-sensitive data flows within the computer software application if at least one candidate downgrader placement location within each of the security-sensitive data flows is a member of the set of candidate downgrader placement locations. | 2014-04-10 |
20140101757 | ADAPTIVE INTEGRITY VALIDATION FOR PORTABLE INFORMATION HANDLING SYSTEMS - Portable information handling systems dynamically allocate resources to anti-malware functions based upon available resources and threat status. Dynamic allocation of resources to anti-malware functions provides a timely and targeted response to specific threats with resources dedicated based upon availability and the impact on other information handling system functions. An adaptive mobile integrity validation system interfaces with plural portable information handling systems to selectively update anti-malware settings as threats emerge. | 2014-04-10 |
20140101758 | SERVER WITH MECHANISM FOR REDUCING INTERNAL RESOURCES ASSOCIATED WITH A SELECTED CLIENT CONNECTION - According to certain non-limiting embodiments disclosed herein, the functionality of a server is extended with a mechanism for identifying connections with clients that have exhibited attack characteristics (for example, characteristics indicating a DoS attack), and for transitioning internal ownership of those connections such that server resources consumed by the connection are reduced, while keeping the connection open. The connection thus moves from a state of relatively high resource use to a state of relatively low server resource use, and the server is able to free resources such as memory and processing cycles previously allocated to the connection. In some cases, the server maintains the connection for at least some time and uses it to keep the client occupied so that it cannot launch—or has fewer resources to launch—further attacks, and possibly to gather information about the attacking client. | 2014-04-10 |
20140101759 | METHOD AND SYSTEM FOR DETECTING MALWARE - A system and method of analysis. NX domain names are collected from an asset in a real network. The NX domain names are domain names that are not registered. The real network NX domain names are utilized to create testing vectors. The testing vectors are classified as benign vectors or malicious vectors based on training vectors. The asset is then classified as infected if the NX testing vector created from the real network NX domain names is classified as a malicious vector. | 2014-04-10 |
20140101760 | DAD-NS TRIGGERED ADDRESS RESOLUTION FOR DOS ATTACK PROTECTION - A first network element that receives an appropriation message from a second network element that indicates a target address which the second network element intends to appropriate for its use. In response to the appropriation message, the first network element broadcasts a discovery message to a plurality of network elements on the network to request a link-layer address in association with the first target address. The first network element receives a discovery response from the second network element with the first target address and the link-layer address of the second network element. Then the first network element updates a neighbor cache to include a pre-cached neighbor cache entry associating the link-layer address to the first target address. This prevents one or more future neighbor cache misses associated with the first target address. | 2014-04-10 |
20140101761 | SYSTEMS AND METHODS FOR CAPTURING, REPLAYING, OR ANALYZING TIME-SERIES DATA - Provided is an intrusion detection system configured to detect anomalies indicative of a zero-day attack by statistically analyzing substantially all traffic on a network in real-time. The intrusion detection system, in some aspects, includes a network interface; one or more processors communicatively coupled to the network interface; system memory communicatively coupled to the processors. The system memory, in some aspects, stores instructions that when executed by the processors cause the processors to perform steps including: buffering network data from the network interface in the system memory; retrieving the network data buffered in the system memory; applying each of a plurality of statistical or machine-learning intrusion-detection models to the retrieved network data; aggregating intrusion-likelihood scores from each of the intrusion-detection models in an aggregate score, and upon the aggregate score exceeding a threshold, outputting an alert. | 2014-04-10 |
20140101762 | SYSTEMS AND METHODS FOR CAPTURING OR ANALYZING TIME-SERIES DATA - Provided is an intrusion detection system configured to detect anomalies indicative of a zero-day attack by statistically analyzing substantially all traffic on a network in real-time. The intrusion detection system, in some aspects, includes a network interface; one or more processors communicatively coupled to the network interface; system memory communicatively coupled to the processors. The system memory, in some aspects, stores instructions that when executed by the processors cause the processors to perform steps including: buffering network data from the network interface in the system memory; retrieving the network data buffered in the system memory; applying each of a plurality of statistical or machine-learning intrusion-detection models to the retrieved network data; aggregating intrusion-likelihood scores from each of the intrusion-detection models in an aggregate score, and upon the aggregate score exceeding a threshold, outputting an alert. | 2014-04-10 |
20140101763 | SYSTEMS AND METHODS FOR CAPTURING OR REPLAYING TIME-SERIES DATA - Provided is an intrusion detection system configured to detect anomalies indicative of a zero-day attack by statistically analyzing substantially all traffic on a network in real-time. The intrusion detection system, in some aspects, includes a network interface; one or more processors communicatively coupled to the network interface; system memory communicatively coupled to the processors. The system memory, in some aspects, stores instructions that when executed by the processors cause the processors to perform steps including: buffering network data from the network interface in the system memory; retrieving the network data buffered in the system memory; applying each of a plurality of statistical or machine-learning intrusion-detection models to the retrieved network data; aggregating intrusion-likelihood scores from each of the intrusion-detection models in an aggregate score, and upon the aggregate score exceeding a threshold, outputting an alert. | 2014-04-10 |
20140101764 | METHODS AND APPARATUS TO DETECT RISKS USING APPLICATION LAYER PROTOCOL HEADERS - Methods, apparatus, systems and articles of manufacture to detect risks using application protocol headers are disclosed. An example method includes extracting characteristics from a header of a received hypertext transport protocol (HTTP) request, determining a first score corresponding to a first characteristic of the characteristics, determining a second score corresponding to a second characteristic of the characteristics, adding the first score and the second score to determine a combined score, and indicating that the received HTTP request is malware when the combined score meets a threshold. | 2014-04-10 |
20140101765 | AUDITING A DEVICE - The auditing of a device that includes a physical memory is disclosed. One or more hardware parameters that correspond to a hardware configuration is received. Initialization information is also received. The physical memory is selectively read and at least one result is determined. The result is provided to a verifier. | 2014-04-10 |
20140101766 | DATA MANAGEMENT OF POTENTIALLY MALICIOUS CONTENT - In a data management system, examination of first data for malicious content by a malicious content scanner is initiated in response to a request to write first data to a data storage device. In response to the examination revealing no malicious content in the first data, the first data, a first signature representative of a version of the malicious content scanner at a time of the examination of the first data, and second data linking the first signature to the first data as read-only data are written to the data storage device. | 2014-04-10 |
20140101767 | SYSTEMS AND METHODS FOR TESTING AND MANAGING DEFENSIVE NETWORK DEVICES - The field of the invention relates to systems and methods for securing networked computing devices, and more particularly to systems and methods for testing and managing defensive network systems. In a preferred embodiment, a defensive network management subsystem is included. The subsystem is operatively coupled to a defensive network system and a networked computing system. The defensive network management subsystem is configured to generate test data for the networked computing system, transmit the generated test data to the networked computing system, and record the networked computing system's response to the generated test data. The subsystem is further configured to correlate its recorded data with the defensive network system's response to said generated test data to assess the defensive network system's efficacy. | 2014-04-10 |
20140101768 | Limiting the Functionality of a Software Program Based on a Security Model - Systems, methods, routines and/or techniques for limiting the functionality of a software program based on a security model are described. One or more embodiments may include limiting the functionality of a software program (e.g., a widget) based on one or more operations that the widget intends to take. One or more embodiments may include limiting the functionality of a widget that is located on and/or accessible via a lock screen of a mobile device. One or more embodiments may include preventing a widget from causing an application to perform sensitive actions when a system is in an un-authenticated state. One or more embodiments may include preventing a widget from installing and/or displaying on a particular screen of a mobile device (e.g., a lock screen) if the widget includes a function that indicates that a sensitive operation will be taken. | 2014-04-10 |
20140101769 | REMEDIATION OF SECURITY VULNERABILITIES IN COMPUTER SOFTWARE - Processing a downgrader specification by constructing a set of candidate downgrader placement locations found within a computer software application, where each of the candidate downgrader placement locations corresponds to a transition between a different pair of instructions within the computer software application, and where each of the transitions participates in any of a plurality of data flows in a set of security-sensitive data flows within the computer software application, applying a downgrader specification to the set of candidate downgrader placement locations, and determining that the downgrader specification provides full coverage of the set of security-sensitive data flows within the computer software application if at least one candidate downgrader placement location within each of the security-sensitive data flows is a member of the set of candidate downgrader placement locations. | 2014-04-10 |
20140101770 | Systems and Methods for Security Detection - Systems and methods are provided for security detection. For example, an initiation module in a process that initiates a sensitive operation is determined; identification information of the initiation module is collected; and security of the sensitive operation is detected based on at least information associated with the collected identification information and a predetermined database. | 2014-04-10 |
20140101771 | FIELD DEVICE HAVING TAMPER ATTEMPT REPORTING - A method of tamper attempt reporting includes receiving a write attempt to configuration data stored within a field device in an industrial plant configured to run a process involving a plurality of physical process parameters including a network server, a plurality of processing units, and a plurality of field devices. The plurality of field devices include (i) a sensor for measuring at least one of the plurality of physical process parameters or (ii) an instrument for performing control output actions for at least one of the plurality of processing units. The plurality of field devices are in communication with at least one remote host system or device. The write attempt is automatically detected. An alert of the write attempt is automatically sent to at least the remote host system or device. | 2014-04-10 |
20140101772 | INPUT METHOD, INPUT APPARATUS, AND INPUT PROGRAM - An input apparatus includes an information storage unit which stores identification information of an application or a service and user information such that the identification information and the user information are correlated with each other, an input manipulation detecting unit which detects an input manipulation on an editable region in an image area of the application, a region detecting unit which detects editable regions included in the image area of the application, and a control unit which, if at least one of the detected editable regions includes a first region having a prescribed input attribute for input of first information in the user information, performs a control so that at least part of the user information is input using, as a reference, the first region or the editable region whether the input manipulation is detected. | 2014-04-10 |
20140101773 | SYSTEM, A METHOD AND A COMPUTER READABLE MEDIUM FOR TRANSMITTING AN ELECTRONIC FILE - Provided is an electronic file transmission system comprising a data acquiring section that acquires data including an electronic file that is created or attached by a first communication terminal; an extracting section that extracts from the data the electronic file and recipient identification information identifying a correct recipient of the electronic file; an encoding section that encodes the extracted electronic file; and a management information transmitting section that transmits, to a pass phrase management apparatus that transmits to a second communication terminal a pass phrase needed to decode the encoded electronic file, first file identification information identifying the encoded electronic file, the pass phrase, and the recipient identification information. | 2014-04-10 |
20140101774 | TRANSACTION GATEWAY - According to one aspect of an example, there is provided a transaction gateway in a first network for receiving a transaction from the first network and for sending the transaction to a transaction processor in a second network. The transaction gateway is arranged to identify restricted data in the transaction, to modify the received transaction by replacing identified restricted data with replacement data different to the identified restricted data, and to send the modified transaction to the transaction processor in the second network. | 2014-04-10 |
20140101775 | METHOD AND SYSTEM FOR DELIVERING ENCRYPTED DATA FROM A GATEWAY SERVER BASED ON A SENDER PREFERENCE - A method, system and computer program product configured for providing a recipient with an email message or data according to a delivery preference definition. According to an embodiment the delivery preference definition is defined by a sending enterprise, and comprises one or more secure delivery mechanisms. The system comprises an encrypted gateway server configured to receive the email message or data and apply, e.g. encrypt, the email according to one of the secure delivery mechanisms selected according to the delivery preference definition. The encrypted gateway server attempts delivery of the encrypted email message or data. According to an embodiment, another secure delivery mechanism may be selected and delivery attempted if the first or previous attempt does not succeed. | 2014-04-10 |
20140101776 | Digital Asset Distribution Media - Content distribution devices and systems are presented. A content distribution device can include a memory storing a secured media asset where a media player is restricted from fully rendering the asset. The memory of the device can also store an asset descriptor key, which can be used, in conjunction with media player identification information, to obtain an asset access key from a rights management server. The asset access key can include authorization parameters that govern an extent to which the media player can render the asset. | 2014-04-10 |
20140101777 | APPARATUS AND METHOD FOR PROTECTING DATA IN TERMINAL - An apparatus and a method for protecting data in a lock-screen state of a terminal are provided. The apparatus includes a controller for preventing access to data by performing a protection function for the data in a lock screen mode and controlling to release the protection function for the data in a lock screen release mode, and a memory protection area for the protection function in the lock screen mode. | 2014-04-10 |
20140101778 | METHOD, A SYSTEM AND AN APPARATUS FOR DELIVERING MEDIA LAYERS - A system for facilitating access to multiple layer media items over communication network. The system comprises a media database which is used for storing multiple layer media items as independently accessible channels. The system further comprises plurality of subscriber applications which are connecting via a communication network, e.g. The Internet, to the media database. Users can use the subscriber application to access to each channel of the multiple layer media items independently. | 2014-04-10 |
20140101779 | Software Distribution Service Federation - Software update distribution techniques are disclosed. Authentication information is received, from a content source authenticator, by an update agent included in a client device. The authentication information comprises a list of a plurality of content sources, wherein the plurality of content sources have been verified by the content source authenticator as being authentic content sources for legitimate software applications. The update agent selects a first content source of the plurality of content sources, where the first content source is configured to provide updates for a first software application. The update agent checks the first content source for updates for the first software application. | 2014-04-10 |
20140101780 | Method for comment response request feeds to a social networking profile - A method for adding comments to documents and billing items in the context of an online network. As the comments are created a message system within the network automatically sends a notification to the member or members of the online community to whom the comment is directed, showing them the comment and providing a live link to the associated document or billing item. Each comment is associated with a specific document or billing item, and can be customized to be directed to one or several users of the social network, and those users may also then create responses to the original comment using the same method. | 2014-04-10 |
20140101781 | PEER-TO-PEER, REAL-TIME, DIGITAL MEDIA DISTRIBUTION - Systems are provided, including inventive servers configured to eliminate the traditional limitations on the distribution of real-time video/audio/images while at the same time making real-time broadcasting to millions of viewers accessible to anyone with a video/audio/image enabled mobile device and internet connection. At the same time, the same audience of millions can interact in real-time with fellow viewers as the broadcast occurs. This may be done in a secure/controlled way via, in some embodiments, DRM supports. | 2014-04-10 |
20140101782 | DIGITAL VIDEO GUARD - This invention relates to the veracity of information displayed to a user of a computer, and information provided to a computer by human input devices such as mice and keyboards. A digital video guard (DVG) device is a peripheral that is retrofitted to commodity computer devices. The DVG resides in-line with a digital display and enables secure end-to-end interactions between a user and a displayed (usually remote) application. In-band signalling within the digital video stream is used to carry encrypted information from a local or remote source, over untrusted network infrastructure through the digital video guard device to a user. The DVG decrypts and verifies the integrity of the digital video. The integrity of the displayed information is indicated by a trusted LED on the DVG hardware. Portions of the video signal may be designated as trusted, if the received data has been encrypted, signed, or labelled as trustworthy. | 2014-04-10 |
20140101783 | Execution Environment File Inventory - A method is described to maintain (including generate) an inventory of a system of a plurality of containers accessible by a computer system. At least one container is considered to determine whether the container is executable in at least one of a plurality of execution environments characterizing the computer system. Each execution environment is in the group comprising a native binary execution environment configured to execute native machine language instructions and a non-native execution environment configured to execute at least one program to process non-native machine language instructions to yield native machine language instructions. The inventory is maintained based on a result of the considering step. The inventory may be used to exercise control over what executables are allowed to execute on the computer system. | 2014-04-10 |
20140101784 | ANALYSIS AND SPECIFICATION CREATION FOR WEB DOCUMENTS - Described herein is a method for rendering specification creation, including identifying, within one or more contents, labels as sensitive labels when data associated with the label are determined sensitive based on one or more user-defined policy rules, wherein the identifying considers structural locations of labels determined as sensitive and the data associated with the sensitive label; configuring rendering specifications for data associated with the identified sensitive labels; and associating the configured rendering specifications with the sensitive labels of the data determined as sensitive, for execution in real time. | 2014-04-10 |
20140101785 | GENETICALLY ENCODED CALCIUM INDICATORS AND METHODS OF USE - Genetically encoded calcium indicator (GECI) polypeptides and the nucleic acid molecules encoding such polypeptides are provided. In addition, methods of using such nucleic acids and polypeptides in methods of screening for agonists or antagonists of G-protein coupled receptor (GPCR) or ion channels and methods of monitoring neural activity also are provided. | 2014-04-10 |
20140101786 | GENERATION OF AUTOLOGOUS T-CELLS IN MICE - The invention provides an animal model and methods of generating large numbers of diverse, functional, naïve T cells in mice using bone marrow cells from adult donors. | 2014-04-10 |
20140101787 | LETTUCE VARIETY 79-315 RZ, DRAKE - The present invention relates to a | 2014-04-10 |
20140101788 | GENOME SHUFFLING METHOD FOR AUTOGAMOUS PLANTS UTILIZING DOMINANT MALE STERILITY OBTAINED BY GENE ENGINEERING TECHNIQUE, AND RECURRENT SELECTION BREEDING SYSTEM BASED ON THE GENOME SHUFFLING METHOD - A genome shuffling method for autogamous plants, including producing individuals having the following three traits in a tight coupling linkage by a gene engineering technique selected from a transgenic technique and a gene targeting technique: 1) dominant male sterility, 2) chemical tolerance and 3) lethality inducible by activating an inducible promoter, selecting, from progeny of the individuals, male-sterile individuals by means of the chemical tolerance described in 2) and male-fertile individuals by means of the lethality described in 3), arranging the male-sterile individuals and the male-fertile individuals close together in flowering periods thereof, so that the male-sterile individuals are crossed with the male-fertile individuals, harvesting seeds from the male-sterile individuals, and repeating outcrossing using the seeds from generation to generation. | 2014-04-10 |
20140101789 | Plants Tolerant To Abiotic Stress - The present invention provides genetically modified plants having increased tolerance to environmental abiotic stress, particularly to salt stress and water stress (drought). The tolerant genetically modified plants of the invention include transgenic plants overexpressing at least one inositol polyphosphate 5-phosphatase selected from 5TPase7 5TPase9 and plants having altered expression of the Endonuclease/Exonuclease/Phosphatase (EEP) protein ZEEP1. | 2014-04-10 |
20140101790 | QTLs ASSOCIATED WITH AND METHODS FOR IDENTIFYING WHOLE PLANT FIELD RESISTANCE TO SCLEROTINIA - Markers associated with | 2014-04-10 |
20140101791 | Resistance Genes - The present invention relates to polynucleotides encoding adult plant pathogen resistance proteins. Also provided are transgenic plants expressing these polynucleotides to enhance the resistance of the plants to pathogens. | 2014-04-10 |
20140101792 | PLASTID TRANFORMATION UTILIZING ENDOGENOUS REGULATORY ELEMENTS - Disclosed herein are vectors, plants and methods of transforming plants to increase translation efficiency. Specifically disclosed are methods of implementing a regulatory element endogenous to a target plant species and operatively associating said regulatory element with a heterologous gene of interest. Examples of regulatory sequences are disclosed including 5′ UTR sequences of chloroplast genes, such as a psbA gene. | 2014-04-10 |
20140101793 | Polypeptides Having Beta-Glucosidase Activity, Beta-Xylosidase Activity, or Beta-Glucosidase Activity and Beta-Xylosidase Activity And Polynucleotides Encoding Same - The present invention relates to isolated polypeptides having beta-glucosidase activity, beta-xylosidase activity, or beta-glucosidase and beta-xylosidase activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides. | 2014-04-10 |
20140101794 | POCONO LETTUCE VARIETY - A new lettuce variety designated ‘Pocono’ is described. ‘Pocono’ is an iceberg lettuce variety exhibiting stability and uniformity. | 2014-04-10 |
20140101795 | Shrub rose plant named "Spropom' - A new and distinct variety of shrub rose plant is provided which forms in abundance on a substantially continuous basis attractive semi-double blossoms that are lavender with red coloration toward the center of the petals. The blossom size is large for the size of the plant. The vegetation is vigorous and strong and the growth habit is upright and bushy. Attractive ornamental glossy medium green foliage is formed. The plant is particularly well suited for growing in a Western landscape. Distinctive ornamentation is provided. | 2014-04-10 |
20140101796 | Shrub Rose Plant Named 'Spromel' - A new and distinct variety of shrub rose plant is provided which forms in abundance on a substantially continuous basis attractive semi-double blossoms that are orange to apricot with red coloration toward the center of the blossoms. The vegetation is vigorous and strong and the growth habit is upright and bushy. Attractive ornamental glossy dark green foliage is formed. The plant is particularly well suited for growing in a Western landscape. Distinctive ornamentation is provided. | 2014-04-10 |
20140101797 | Grapevine 'IFG Fourteen' - This invention is a new and distinct grapevine variety named ‘IFG Fourteen’ which is characterized by producing small round bright red berries having very crisp texture with a very strong muscat flavor and which ripens in midseason. | 2014-04-10 |
20140101798 | Boxwood Plant Named 'Little Missy' - A new and distinct Boxwood plant of unknown parentage is provided that originated as a chance seedling and/or mutation while growing among a block of vegetatively propagated | 2014-04-10 |
20140101799 | Azalea plant named 'RLH1-15P3' - A new and distinct cultivar of Azalea plant named ‘RLH1-15P3’, characterized by its compact, upright to outwardly spreading and rounded plant habit; freely basal branching habit; dense and bushy appearance; vigorous growth habit and rapid growth rate; evergreen, persistent dark green-colored leaves that do not abscise during the winter; freely flowering habit with remontant flowering during the spring, summer and autumn; large, non-persistent single flowers that are white in color greenish white-colored central spots and speckles; and excellent garden performance and temperature tolerance. | 2014-04-10 |
20140101800 | Azalea plant named 'RLH1-13P11' - A new and distinct cultivar of Azalea plant named ‘RLH1-13P11’, characterized by its compact, upright to outwardly spreading and mounding plant habit; freely basal branching habit; dense and bushy appearance; vigorous growth habit and rapid growth rate; evergreen, persistent dark green-colored leaves that do not abscise during the winter; freely flowering habit with remontant flowering during the spring, summer and autumn; large, non-persistent single flowers that are purple in color with dark red purple-colored central spots and speckles; and excellent garden performance and temperature tolerance. | 2014-04-10 |
20140101801 | Azalea plant named 'RLH1-7P14' - A new and distinct cultivar of Azalea plant named ‘RLH1-7P14’, characterized by its compact, upright to outwardly spreading and rounded plant habit; freely basal branching habit; dense and bushy appearance; vigorous growth habit and rapid growth rate; evergreen, persistent dark green-colored leaves that do not abscise during the winter; freely flowering habit with remontant flowering during the spring, summer and autumn; large, non-persistent single flowers that are light red purple in color with darker red purple-colored central spots and speckles; excellent garden performance and temperature tolerance. | 2014-04-10 |
20140101802 | Azalea plant named 'RLH1-5P1' - A new and distinct cultivar of Azalea plant named ‘RLH1-5P1’, characterized by its compact, upright to low spreading and mounding plant habit; freely basal branching habit; dense and bushy appearance; vigorous growth habit and rapid growth rate; evergreen, persistent dark green-colored leaves that do not abscise during the winter; freely flowering habit with remontant flowering during the spring, summer and autumn; large, non-persistent hose-in-hose flowers that are light red purple in color with darker red purple-colored central spots and speckles; excellent garden performance and temperature tolerance. | 2014-04-10 |
20140101803 | Azalea Plant Named 'RLH1-12P0' - A new and distinct cultivar of Azalea plant named ‘RLH1-12P0’, characterized by its compact, upright to outwardly spreading and mounding plant habit; freely basal branching habit; dense and bushy appearance; vigorous growth habit and rapid growth rate; evergreen, persistent dark green-colored leaves that do not abscise during the winter; freely flowering habit with remontant flowering during the spring, summer and autumn; large, non-persistent single flowers that are light pink in color with red purple-colored central spots and speckles; and excellent garden performance and temperature tolerance. | 2014-04-10 |
20140101804 | Azalea plant named RLH1-14P14' - A new and distinct cultivar of Azalea plant named ‘RLH1-14P14’, characterized by its compact, upright to outwardly spreading and rounded plant habit; freely basal branching habit; dense and bushy appearance; vigorous growth habit and rapid growth rate; evergreen, persistent dark green-colored leaves that do not abscise during the winter; freely flowering habit with remontant flowering during the spring, summer and autumn; large, non-persistent single flowers that are dark red purple in color with darker red purple-colored central spots and speckles and excellent garden performance and temperature tolerance. | 2014-04-10 |
20140101805 | Azalea Plant Named 'RLH1-10P18' - A new and distinct cultivar of Azalea plant named ‘RLH1-10P18’, characterized by its compact, upright to outwardly spreading and mounding plant habit; freely basal branching habit; dense and bushy appearance; vigorous growth habit and rapid growth rate; evergreen, persistent dark green-colored leaves that do not abscise during the winter; freely flowering habit with remontant flowering during the spring, summer and autumn; large, non-persistent semi-double to double flowers that are dark red in color with darker red-colored central spots and speckles; and excellent garden performance and temperature tolerance. | 2014-04-10 |
20140101806 | Azalea Plant Named 'RLH1-8P1' - A new and distinct cultivar of Azalea plant named ‘RLH1-8P1’, characterized by its compact, upright to somewhat outwardly spreading and rounded plant habit; freely basal branching habit; dense and bushy appearance; vigorous growth habit and rapid growth rate; evergreen, persistent dark green-colored leaves that do not abscise during the winter; freely flowering habit with remontant flowering during the spring, summer and autumn; large, non-persistent semi-double hose-in-hose flowers that are red in color with darker red-colored central spots and speckles; and excellent garden performance and temperature tolerance. | 2014-04-10 |
20140101807 | Azalea Plant Named 'RLH1-6P4' - A new and distinct cultivar of Azalea plant named ‘RLH1-6P4’, characterized by its compact, upright to outwardly spreading and mounding plant habit; freely basal branching habit; dense and bushy appearance; vigorous growth habit and rapid growth rate; evergreen, persistent dark green-colored leaves that do not abscise during the winter; freely flowering habit with remontant flowering during the spring, summer and autumn; large, non-persistent double hose-in-hose flowers that are bright red in color with darker red-colored central spots and speckles; and excellent garden performance and temperature tolerance. | 2014-04-10 |
20140101808 | Mutant allele of watercress - The present invention relates to a new and distinct variety of watercress plant, and its plant parts, including the mutation of an allele of watercress designated “BWRW”, which results in watercress plants with red-pigmented leaves and/or stems. The red-green variety is distinguished from green watercress varieties, in particular with its red pigmentation ranging from dark purple, dark red to pink leaves and stems; intermediate-sized stem diameter ranging from 3.5 mm to 5.5 mm, which is commercially acceptable for both fresh and cooked consumption; a nutritional antioxidant capacity of at least 2.27 times greater than compared standard U.S. and U.K. green watercress varieties; and expanded harvesting seasons, with suitability to be grown in the United States year-round. | 2014-04-10 |
20140101809 | Gervillea juniperina plant named 'H22' - ‘H22’ is a distinctive variety of | 2014-04-10 |