29th week of 2012 patent applcation highlights part 58 |
Patent application number | Title | Published |
20120185889 | POST PROCESSING VIDEO TO IDENTIFY INTERESTS BASED ON CLUSTERED USER INTERACTIONS - Methods and systems for post-processing video to identify interests based on clustered user interactions are provided. A client application program running on a set-top box is provided to enable a user to interactively select a point of interest within video content being played via the set-top box. The selected points of interest of multiple users is aggregated, and clusters of the points of interest are determined. Objects associated with the clusters are determined by analyzing video segments containing the clustered points of interest. Messages related to the objects are created and sent to the relevant users that indicated selection of points of interest which correlate to the objects. | 2012-07-19 |
20120185890 | SYNCHRONIZED VIDEO PRESENTATION - A video control device is disclosed. The video control device includes a communication interface for receiving user inputs and for communicating data to users, a memory for storing information communicated with the users and a plurality of video programs and a processor for processing the inputs received by the communication interface and for streaming video to the users via the communication interface. The communication interface receives a code from a user and from at least one of a plurality of invitees that received the code from the user. The processor streams a video program corresponding to the code simultaneously to the user and to invitees submitting the code and disables navigation functions of user controls for the invitees submitting the code. | 2012-07-19 |
20120185891 | Image Recognition of Content - Techniques are described to employ image recognition techniques to content. In an implementation, one or more images are identified in content using a signature derived from the one or more images. Metadata associated with the content is then supplemented based on the identified one or more images. | 2012-07-19 |
20120185892 | SYSTEM AND METHOD FOR MANAGING MULTIPLE CONTENT CHANNELS AND ENGAGEMENT SCORING - A system and method for managing multiple content channels and engagement scoring are disclosed. A particular embodiment includes providing, by use of a data processor, a user interface to enable a user to specify a plurality of channels of interest, the user interface further enabling the user to provide authentication credentials for each channel of the plurality of channels of interest; using the authentication credentials to automatically collect channel data from each of the plurality of channels of interest, the channel data including posts data, subscriber data, and subscriber activity data from each channel; augmenting the channel data with data collected from other content sources; processing the augmented channel data to produce an engagement score, the engagement score representing a degree to which a plurality of subscribers are involved in subscriber activity at the plurality of channels of interest; and presenting at least a portion of the processed augmented channel data and the engagement score to the user in one or more reports. | 2012-07-19 |
20120185893 | TELEVISION DECODING UNIT WITH MULTIPLE WIRELESS ACCESS MODULES - The present invention proposes a system comprising a television decoding unit and a plurality of access modules, said access modules comprising wireless communication means with the television decoding unit, a memory comprising an identification of said module, said television decoding unit comprising means for detecting the presence and to receive the identification of an access module, means to apply a filter on events displayed on the television unit, said filter being defined with pre-defined filter category attached to the identification, and means to record the events consumption while the access module is detected by the television unit. | 2012-07-19 |
20120185894 | Method and System for Order Relationship Authentication, and Mobile Multimedia Broadcasting-Conditional Access System - A method for order relationship authentication, including: a visited mobile multimedia broadcasting-conditional access system (MMB-CAS) acquiring operation and management information from a corresponding business operating support system (BOSS); the visited MMB-CAS receiving a request message for accessing service key from a user and triggering order relationship authentication; the visited MMB-CAS requesting the home MMB-CAS to perform order relationship authentication on the user; and the visited MMB-CAS receiving an order relationship authentication result of the user fed back from the home MMB-CAS, and performing corresponding processing. The present invention also provides an order relationship authentication system and a Mobile Multimedia Broadcasting-Conditional Access System. By the present invention, the amount of data synchronized between MMB-CASs is reduced and the overall performance and reliability of the system is improved. | 2012-07-19 |
20120185895 | Method and Apparatus for Inserting Advertisements in Content - In accordance with some embodiments, advertisements may be inserted into ongoing content using predefined break points within that content. For example, the break points may be defined by times within the content and specify advantageous situations for the interruption of the ongoing content and the insertion of commercials. In some embodiments, conditions may be placed on the activities which may occur during the playback of commercials, including the disabling of fast forwarding. In addition, commercials may be automatically inserted in the predetermined content break point based on user provided criteria. In some embodiments, the user criteria may be applicable generally to all assets and, in other cases, the user criteria may be specific to a particular asset, but, in both cases, in some embodiments, the advertisements may be populated within the content automatically. | 2012-07-19 |
20120185896 | SYSTEM, MOBILE TERMINAL AND METHOD FOR DISPLAYING OBJECT INFORMATION IN REAL TIME - A system, mobile terminal and a method for displaying object information corresponding to an image object in real time are described in this disclosure. The system includes: a TV to transmit an image frame and supplementary data for the image frame, the supplementary data including the object information; and a mobile terminal to receive the image frame and the supplementary data, and to display the object information in real time based on a position of the object displayed on the TV. | 2012-07-19 |
20120185897 | METHODS AND APPARATUS FOR CENTRALIZED AND DECENTRALIZED EMERGENCY ALERT MESSAGING - Apparatus and methods for providing emergency alert system (EAS) data to subscribers of a content-based network for multiple locations including via mobile devices. In one embodiment, the apparatus comprises a server performing real-time receipt and encapsulation of the EAS data, transport of the EAS data to client devices over an IP or other packet-switched network, and use of applications running on the client devices to decode and display the EAS data. In one variant, a centralized EAS (CEAS) entity is used to aggregate and distribute EAS messages to video registration servers (VRS), which use stored client device data and user preferences to map delivery of relevant EAMs over the IP network. In another variant, instant messaging (IM) infrastructure is used to deliver and display at least portion of the EAS data via a separate transport process. | 2012-07-19 |
20120185898 | METHOD FOR USING BANNER ADVERTISEMENTS DURING COMMERCIAL BREAKS - A method, non-transitory computer readable media, and Apparatus is provided for viewing a second content item while a first content item plays an advertisement. When the first content item is changed to a second content item on a display, a window region displays an advertising item related to the advertisement. The advertising item in the window region is modified when the advertisement has ended, alerting the user the advertisement is over. In another embodiment, the advertisement comprises a first and second commercial played in succession, and the advertising item in the window region comprises a first and second product item. In this embodiment, the window region displays the first product item when the first commercial is played in the advertisement, and the second product item when the second commercial plays in the advertisement. | 2012-07-19 |
20120185899 | METHODS AND APPARATUS FOR REVENUE-OPTIMIZED DELIVERY OF CONTENT IN A NETWORK - Methods and apparatus for optimizing the distribution and delivery of multimedia or other content within a content-based network. In one embodiment, the network comprises a broadcast switched cable television network, which utilizes a Network optimization controller (NOC) that processes subscriber program viewing requests to identify options available to fulfill the request (including, e.g., the creation of one or more “microcasts” specifically targeting one or more users), and evaluate these options to determine one that optimizes network operation. The NOC performs these decisions by considering various parameters including network resource availability, type of CPE, subscriber's targeted advertisement profile, and business rules programmed by operator of the network. Business methods based on such network optimization are also described. | 2012-07-19 |
20120185900 | METHOD AND SYSTEM FOR SELECTIVELY VIEWING BROADCAST CHANNEL IN PARTICULAR PLACE - A method and system for selectively viewing a broadcast channel in a particular place is provided. A method of selectively viewing a broadcast channel in a particular place includes: receiving image information associated with different locations of the particular place from a plurality of imaging devices; receiving sound information associated with the particular place from at least one of the plurality of imaging devices; multi-channelizing the image information and the sound information to generate a frame that includes the image information and the sound information; and transmitting the generated frame to a user terminal. | 2012-07-19 |
20120185901 | ACCESS TO INTERNET DATA THROUGH A TELEVISION SYSTEM - A television system provides access to Internet data simultaneously with a displayed television program. Data units including data address sites available through a networked computer system such as the Internet are embedded in a television signal along with a television program. Information representing the data address site, such as an icon or descriptive text, is displayed simultaneously with the television program on the television. If the user selects the data address site, a data retrieval terminal in two-way communication with the network and associated with the television establishes a connection with the network and requests the data corresponding to the selected data address site. The retrieved information is then formatted for display. | 2012-07-19 |
20120185902 | Programmable, Interactive Content Viewing on a Mobile Video Application - Promotional content provided by content providers is distributed to mobile devices to be displayed with designated videos on mobile devices. The promotional content is received from a content provider, e.g., via an API and associated with a video, group of videos or channel available from a video hosting server. The promotional content meets certain specifications set by the video hosting server. A mobile device requests promotional content for a selected video and the video hosting server provides any available promotional content to the mobile device. The promotional content is displayed with the selected video as designated by the content provider. Activation of the promotional content in some embodiments results in an action being invoked on the mobile device, such as loading of a uniform resource identifier. In some cases, the promotional content is cached by the mobile device for later use. | 2012-07-19 |
20120185903 | CONTENT TRANSMISSION APPARATUS AND CONTENT DISPLAY SYSTEM - A content transmission apparatus includes a communication module configured to carry out wireless communication with a partner apparatus, a detection module configured to detect a motion of the content transmission apparatus, and a transmission control module configured to control the communication module to transmit content to the partner apparatus and to transmit correction information corresponding to the motion of the content transmission apparatus detected by the detection module during transmission of the content to the partner apparatus. | 2012-07-19 |
20120185904 | METHOD AND APPARATUS FOR MANAGING ACCESS PLANS - A system that incorporates teachings of the present disclosure may include, for example, wirelessly receiving adjustment information from a mobile communication device, wirelessly receiving a request for video content from the mobile communication device, generating multiple versions of the video content, wirelessly transmitting a second version to the mobile communication device for presentation on the display device according to the adjustment of the access plan, and transmitting a first version to the mobile communication device for presentation on the display device and ceasing transmitting the second version responsive to a determination of an undesired condition associated with the presentation of the second version on the display device. Other embodiments are disclosed. | 2012-07-19 |
20120185905 | Content Overlay System - A system for associating overlay content with video programming and for allowing viewers of video programming to view the associated overlay content during playback of the video program, and methods for operation of video equipment, associated display devices and network servers to provide overlay content are disclosed. The overlay content is associated with specific passages of the video program while the content itself may be asynchronous or synchronized to the frames of the video programming. Users are able to identify what content is available and to determine how it will be played and on what devices. | 2012-07-19 |
20120185906 | Scalable Video Controls Bandwidth Allocation to Data Services - An amount of bandwidth is allocated to a transport of content information as data via a data connection before initiating the transport. The content information is encoded in a layered coding scheme using a base layer and at least one enhancement layer. First it is determined if the data connection is in use for a further transport of further content information as further data via the data connection. Then one or more further attributes are determined of the further transport. Then, a number of the one or more enhancement layers of the content information are determined for the transport under control of a pre-determined policy depending on the one or more further attributes of the further transport. | 2012-07-19 |
20120185907 | APPARATUS AND METHOD FOR TRANSMITTING MULTIMEDIA FRAME IN BROADCAST SYSTEM - An apparatus and a method for transmitting a multimedia frame through a heterogeneous network in a broadcast system supporting a multimedia service based on an interne protocol are provided. The method includes generating header information including a frame identifier distinguishing a multimedia frame and information measuring a quality of a connection service between network layers and end-to-end network capabilities, and combining the header information and multimedia data to configure the multimedia frame. | 2012-07-19 |
20120185908 | LOCAL AREA NETWORK FOR DISTRIBUTING DATA COMMUNICATION, SENSING AND CONTROL SIGNALS - A network for carrying out control, sensing and data communications, composed of a plurality of nodes. Each node may be connected to a payload, which includes sensors, actuators and DTE's. The network is formed using a plurality of independent communication links, each based on electrically-conducting communication media composed of at least two conductors and interconnecting two nodes, in a point-to-point configuration. During network operation, nodes can be dynamically configured as either data-generating nodes, wherein data is generated and transmitted into the network, or as receiver/repeater/router nodes, wherein received data is repeated from a receiver port to all output ports. | 2012-07-19 |
20120185909 | RELAY APPARATUS FOR TRANSMITTING ANCILLARY DATA FOR A TERRESTRIAL DIGITAL TELEVISION BROADCAST, AND METHOD FOR SAME - The present invention relates to a relay apparatus for transmitting ancillary data and to a method for same, and particularly, to a relay apparatus for transmitting ancillary data for a terrestrial digital television broadcast and to a method for same. The apparatus according to one embodiment of the present invention comprises: a relay apparatus for relaying a digital broadcast (DTV) signal containing ancillary data; a receiving and processing unit for receiving the ancillary data and DTV signal via a receiving antenna, down-converting the received signal into an intermediate frequency (IF) signal, and demodulating the IF signal; an equalizing unit for removing noise and a multipath signal from the signal output from the receiving and processing unit, and outputting the resulting signal; an ancillary data extraction unit for extracting the ancillary data from the signal output from the equalizing unit, and outputting the extracted ancillary data; an adder for adding the output from the ancillary data extraction unit to the DTV signal output from the equalization unit; and a transmitting and processing unit for modulating the output from the adder, up-converting the modulated output into a transmitting RF band, amplifying the transmitting power, and transmitting the amplified power via a transmitting antenna. | 2012-07-19 |
20120185910 | METHOD AND APPARATUS FOR ADJUSTING CONTEXT-BASED FACTORS FOR SELECTING A SECURITY POLICY - An approach is provided for selecting a security policy. A security policy manager determines one or more factors for adjusting a safety score associated with a device. The safety score is based, at least in part, on a context associated with the device. The security policy manager then processes and/or facilitates a processing of the one or more factors and the safety score to calculate an adjusted safety score, and determines to select a security policy based, at least in part, on the adjusted safety score. | 2012-07-19 |
20120185911 | MLWEB: A MULTILEVEL WEB APPLICATION FRAMEWORK - A method of transferring data from a server via a web application by receiving a request from a user operating in a disparate security domain for data on a data store. Generating a labeled view of the data requested from the data store, wherein the label-data relationship can be trusted at a level commensurate to the trust level of the operating system. Next, determining if the data is authorized by a security policy with a policy design engine; and then transmitting the data to the user if the data is authorized. Data can also be transferred by receiving a data flow from the user for writing to the data store. Next, the data flow can be inspected for disallowed content, and a determination is made if the data flow is authorized. If the data flow is authorized, mediating the data flow between the user and the data store with a trusted monitor. | 2012-07-19 |
20120185912 | SYSTEM AND METHOD FOR GRANTING AUTHORIZATION OF APPLICATION IN WIRELESS COMMUNICATION SYSTEM - A system and a method for grant authorization of an application in a wireless communication system. A method for being assigned authorization of an application in a mobile station includes when an application is installed, transmitting permission request information for at least one authorization required by the application, to a server; when receiving a response message from the server, identifying authorization assigned to the application in the response message; and controlling the application using the assigned authorization. | 2012-07-19 |
20120185913 | SYSTEM AND METHOD FOR A CLOUD COMPUTING ABSTRACTION LAYER WITH SECURITY ZONE FACILITIES - In embodiments of the present invention improved capabilities are described for a virtualization environment adapted for development and deployment of at least one software workload, the virtualization environment having a metamodel framework that allows the association of a policy to the software workload upon development of the workload that is applied upon deployment of the software workload. This allows a developer to define a security zone and to apply at least one type of security policy with respect to the security zone including the type of security zone policy in the metamodel framework such that the type of security zone policy can be associated with the software workload upon development of the software workload, and if the type of security zone policy is associated with the software workload, automatically applying the security policy to the software workload when the software workload is deployed within the security zone. | 2012-07-19 |
20120185914 | IMPLEMENTING NETWORK TRAFFIC MANAGEMENT FOR VIRTUAL AND PHYSICAL MACHINES - A virtualization framework provides security between multiple virtual machines with respect to network communications between the virtual machines and between the virtual machines and a physical network coupled to the underlying physical computer platform. The virtualization framework includes a network interface controller driver that provides an interface to the platform network interface controller and supports execution of a plurality of virtual machines. Each virtual machine includes a virtual network interface controller that provides a network communications path between the virtual machines and to the network interface controller driver. Each virtual network interface controller further contains a programmable network packet filter that controls the selective transfer of network packets with respect to a corresponding virtual machine. | 2012-07-19 |
20120185915 | SECURE ENTERPRISE NETWORK - A method and system enables transparent authentication and transparent policy enforcement in a fabric of a network. In an exemplary embodiment thereof, a packet stream sent from a network host to a network resource is received at a security system. The security system identifies an authentication exchange packet in the packet stream and determines, using the authentication exchange packet and a directory service, a user identity associated with the packet stream and whether the identified user has authorization to access the network resource. A network policy is created that defines whether the user has access to the network resource. | 2012-07-19 |
20120185916 | APPARATUS AND METHOD FOR STATISICAL USER AUTHENTICATION USING INCREMENTAL USER BEHAVIOR - Provided are an apparatus and method for statistical user identification that improves a user's convenience while ensuring security. The apparatus may store a confidence value that statistically represents whether a user is identified as a user that has permission to use a terminal, based on a user event that occurs when the user manipulates the terminal. The apparatus may determine whether to execute a user requested application by comparing the confidence value of the user with a reference value that is defined for the requested application. | 2012-07-19 |
20120185917 | SECURITY EXTENSIONS USING AT LEAST A PORTION OF LAYER 2 INFORMATION OR BITS IN THE PLACE OF LAYER 2 INFORMATION - Information applied to a packet at an ingress port of a network may be used for enhancing security. The information applied to a packet may be “context information” which replaces at least some bits of layer | 2012-07-19 |
20120185918 | PROVISIONING OF E-MAIL SETTINGS FOR A MOBILE TERMINAL - Method and apparatus for provisioning an e-mail service to a mobile terminal in an e-mail system that uses e-mail addresses comprising a domain part. The apparatus maintains a list of good setting parameter sets versus e-mail domain parts. It receives an e-mail address and user authentication information from a user and compares the domain part of the received address with domain parts in the list of good parameter sets. If a match is found, e-mail service is provisioned with the matching parameter set. If no match is found, the apparatus requests and receives further parameters from the user, including an e-mail server address, and provisions the e-mail service with the further parameters. If the provisioning with the further parameters is successful, the domain part and the further parameters are used to generate a new setting parameter set in the list of good setting parameter sets. | 2012-07-19 |
20120185919 | METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR OPERATING A COMMUNICATIONS NETWORK WITH ENHANCED SECURITY - A communications system includes a plurality of patch panels having a plurality of connector ports connected to individual communication channels, a switch that provides access to multiple networks via one or more switch ports, a system manager that controls interconnections between the patch panels and the switch, and a plurality of patch cords configured to selectively interconnect patch panel connector ports. The system manager is configured to receive a request to connect an individual communication channel to a specific network, to identify which patch panel connector ports are required to be patched together via one or more patch cords in order to establish a circuit to the requested network, and to enable a switch port to activate the circuit. The system manager is configured to monitor connectivity of a circuit and to park a switch port associated with the circuit in response to detecting a change in circuit connectivity. | 2012-07-19 |
20120185920 | SERIALIZED AUTHENTICATION AND AUTHORIZATION SERVICES - Requests for User Services on networked computers running on different platforms with different Authentication, Authorization and Auditing (AAA) Security Systems are processed through an AAA Services Manager Server and Web Services Servers. The AAA Services Manager Server communicates requests for User Services to Web Services Servers using corresponding URL Web addresses. Web Services correspond to their respective Authentication Security Systems and Authorization Security Systems through which User Services may be obtained. The Web Services Servers act to access, for User validation, the respective Authentication Security Systems and Authorization Security Systems according to their individual languages and computing platform requirements. | 2012-07-19 |
20120185921 | METHOD AND SYSTEM FOR PROVIDING PERMISSION-BASED ACCESS TO SENSITIVE INFORMATION - A method provides for permission-based access to personal information over a communication network. The method includes entering specified owner personal information in an owner terminal, by an owner, to establish a secure owner profile, which is stored in an owner database. The method also includes entering specified user personal information in a user terminal, by a user, to establish a secure user profile, which is stored in a user database. The method further includes entering a user request in the user terminal requesting permission to receive a designated piece of the owner personal information from the secure owner profile. A server determines whether to approve the user request; and provides permission to use the designated piece of the owner personal information to the user over the communication network after the user request is approved by the server. | 2012-07-19 |
20120185922 | Multimedia Management for Enterprises - The embodiments herein disclose a unified method of managing multimedia content in an enterprise using a system that is responsible for streaming, efficient storage, archival, analytics, authentication, creating, editing, sharing, broadcast, and encoding of the content. A unified multimedia appliance is provided within an enterprise cloud, and can provide a single interface for all users across multiple locations within an enterprise. The unified multimedia appliance provides a single appliance or software solution for managing multimedia needs of an enterprise. The appliance provides the convenience of a public cloud based service, but with enhanced security and control over the media content being used and distributed within the enterprise. This appliance could be hosted either inside the enterprise datacenter (private cloud) or could be hosted in the public cloud. | 2012-07-19 |
20120185923 | DATA COMMUNICATION APPARATUS, DATA COMMUNICATION METHOD, DATA COMMUNICATION PROGRAM, AND STORAGE MEDIUM STORING THE PROGRAM - A data communication apparatus which is capable of preventing reception of undesired data by a destination without increasing the load on a network, etc. Data and a destination thereof are input. A sender ID related to a sender who sends the input data is input. The input data is sent to the input destination. A sender ID for data transmission to the input destination is permitted is stored as a permission ID. The input sender ID is collated with the stored permission ID. Whether to permit data transmission is determined according to the collation result. | 2012-07-19 |
20120185924 | RECORD CREATION FOR RESOLUTION OF APPLICATION IDENTIFIER TO CONNECTIVITY IDENTIFIER - A method of creating a DNS record in a DNS is provided. The method includes receiving one of an allocation record or information for obtaining the allocation record from a wireless device. The allocation record includes an expression. In addition, the method includes creating a DNS record for the expression. Furthermore, the method includes associating the DNS record with a credential. | 2012-07-19 |
20120185925 | Systems and Methods for Generating and Validating Configuration Files for Computing Devices - Systems and methods are provided for real-time automated generating and validating configuration files for provisioning computing devices. For example, method for provisioning a computing device includes receiving a user request to configure a computing device to access a service, generating a device configuration file to enable access to the service, validating the configuration file before deploying the configuration file to the computing device by testing configuration settings of the configuration file against the service for which the configuration file is generated to access, and deploying the configuration file to the computing device when the configuration file is deemed valid. | 2012-07-19 |
20120185926 | Directory Driven Mailbox Migrations - An example method for migrating communication data from a source server to a target server includes obtaining, using a computing device, a set of credentials to access the source server, and accessing the source server using the set of credentials. The method also includes requesting, automatically by the computing device, a directory structure associated with communication data from the source server, populating, by the computing device, the target server using the directory structure, requesting the communication data from the source server, and populating the target server with the communication data. | 2012-07-19 |
20120185927 | Service Activation in a Passive Optical Network (PON) - An Optical Line Terminal ( | 2012-07-19 |
20120185928 | DEVICE REGISTRATION SYSTEM, DEVICE REGISTRATION SERVER, DEVICE REGISTRATION METHOD, DEVICE REGISTRATION PROGRAM, STORAGE MEDIUM, AND TERMINAL DEVICE - In a device registration system, user authentication and device authentication of a CE device are executed in a single session, and the user and the CE device are associated with each other if these authentications succeed. The CE device obtains information for user authentication from an IC card and portable memory, and sends the information and device authentication information to a device registration unit. The device registration unit sends the information for the user authentication to a user authentication unit, and the device authentication information to a device authentication unit. The user authentication unit executes a user authentication process and sends information of the user to the device registration unit if authentication succeeds. The device authentication unit executes a device authentication process and sends information of the device to the device registration unit if authentication succeeds. The device registration unit associates user information and device information with each other. | 2012-07-19 |
20120185929 | INCORPORATING NETWORK CONNECTION SECURITY LEVELS INTO FIREWALL RULES - Embodiments of the present invention are directed to establishing and/or implementing firewall rules that may employ parameters based on connection security levels for a connection between devices. A firewall may thus provide greater granularity of security and integrate more closely with other security methods to provide better overall security with fewer conflicts. | 2012-07-19 |
20120185930 | DOMAINS BASED SECURITY FOR CLUSTERS - Domains can be used to secure resources of a cluster. An administrator can configure a node of a cluster as a member of a particular domain. Membership in a cluster can be restricted to nodes that are members of the particular domain. When a node generates a cluster message, a kernel process or operating system process of the node will indicate the domain(s) of the node in the cluster message. The cluster message can be a command message to read or write to a storage resource of the cluster. When the cluster storage resource node or node that controls the storage resource receives the command message, the node will examine the command message to ensure the message indicates a domain that aligns with the cluster. If the proper domain is indicated in the command message, then the command message is processed. Otherwise, the command message is denied. | 2012-07-19 |
20120185931 | APPARATUS, METHOD, AND COMPUTER PROGRAM PRODUCT FOR ACCESS CONTROL TO A MOBILE TERMINAL - An apparatus, computer program product, and method are disclosed for access control to a mobile terminal. A use end event is generated indicating an end of use of a mobile terminal. Acceleration of the mobile terminal is binarized by the mobile terminal after the use end event is generated to one of a first value indicating a stationary state and a second value indicating a moving state. A use start event is generated indicating a start of use of the mobile terminal. A movement preparation period is measured from a time at which the use end event is generated to a time at which a transition from the first value to the second value occurs. Use authentication is requested in response to the use start event and in response to the movement preparation period exceeding a first threshold. | 2012-07-19 |
20120185932 | Sensing and Secure Processing - A first and second apparatuses, first and second computer programs and first and second methods are provided. The first apparatus comprises: an interface; and a secure processor configured to control the interface to provide a request, to the second apparatus, requesting information from one or more sensors of the second apparatus. The request may be a data structure comprising an element having one of a multiplicity of predetermined configurations, each configuration identifying at least one of a plurality of sensors. The second apparatus comprises: a further interface; one or more sensors; and a processor configured to receive via the further interface the request, from the secure processor of first apparatus, requesting information from at least one sensor identified in the request. The processor is configured to process the request, to determine whether the second apparatus comprises the at least one sensor identified in the request. | 2012-07-19 |
20120185933 | USER ACCOUNT FOR SYSTEM PROTECTION OR RECOVERY - In one embodiment, a data processing system includes a guest account that is configured to assist in the protection and recovery of the data processing system when it is lost or stolen. In one embodiment, the guest account can allow Internet access and can include a web browser to allow the guest, who might be a thief, to use the system to browse the Internet. While such use occurs, the system can perform actions specified by an authorized user of the system, and such actions can include determining a location of the system and transmitting the location to the authorized user, erasing data on the system, displaying a message, capturing an image, etc. | 2012-07-19 |
20120185934 | METHOD AND APPARATUS FOR INPUTTING PASSWORD IN ELECTRONIC DEVICE - A method inputs a password in an electronic apparatus. In the method, whether an authentication number input request corresponding to a password exists is determined. When the authentication number input request exists, a screen for requiring input of an authentication query number and a corresponding authentication number is displayed. Whether the input authentication number and the input authentication query number match with each other is determined. When they match with each other, relevant approval screen or a relevant function is entered. Since a specific authentication number with respect to a specific authentication query number among a plurality of authentication query numbers is used with a general number or character in a combined manner, a password may be kept safe even when exposed and so use convenience is provided. | 2012-07-19 |
20120185935 | IMPLEMENTING AUTOMATIC ACCESS CONTROL LIST VALIDATION USING AUTOMATIC CATEGORIZATION OF UNSTRUCTURED TEXT - A method, system and computer program product are provided for implementing automatic access control list validation using automatic categorization of unstructured text. Automatic categorization of unstructured text is performed on a plurality of documents of an access control list for determining an average term vector. Each of the documents is scored against the average term vector to identify a dissimilar document, flagged as a possible security risk. Automatic categorization of unstructured text is performed on user information of a plurality of members of a candidate access control list for determining a typical term vector. A similarity score is determined by user information and the typical term vector, members of an access control list that are dissimilar from other members of the access control list are identified. | 2012-07-19 |
20120185936 | Systems and Methods for Detecting Fraud Associated with Systems Application Processing - Systems and methods for detecting fraud associated with systems application processing are provided. An example method may include: for each of at least a subset of multiple application services, receiving an audit log message indicating a respective point in an execution path associated with execution of the application services; and prior to executing an application service endpoint of the application services, analyzing the received audit log messages to determine whether the execution path satisfies at least one predefined expected execution path. | 2012-07-19 |
20120185937 | SYSTEM AND METHOD FOR SELECTIVELY STORING WEB OBJECTS IN A CACHE MEMORY BASED ON POLICY DECISIONS - A system and method for selectively storing one or more web objects in a memory is disclosed. A server response is received at a network traffic management device, wherein the server response is associated with a client request sent from a client device and includes at least one web object. The server response is analyzed using a security module of the network traffic management device which determines if the at least a portion of the server response contains suspicious content in relation to one or more defined policy parameters handled by the security module. An instruction is sent from the security module to a cache module of the network traffic management device upon determining that the at least a portion of the server response contains suspicious information, wherein the cache module does not store the at least one web object upon receiving the instruction. | 2012-07-19 |
20120185938 | DETECTING AND DEFENDING AGAINST MAN-IN-THE-MIDDLE ATTACKS - A system, method and program product for defending against man in the middle (MITM) attacks directed at a target server. A system is provided that includes an activity recording system that records an incoming IP address, userid, and time of each session occurring with the target server; an activity analysis system that identifies suspect IP addresses by determining if an unacceptable number of sessions are occurring from a single incoming IP address during a predefined time period; and a countermeasure system for taking action against suspect IP addresses. | 2012-07-19 |
20120185939 | Malware detection - A computer-implemented method of scanning a plurality of files stored in a memory of a computer for malware. The computer includes a processor. The method includes, for each respective file of said plurality of files in said memory determining, using said processor, whether a relationship between the respective file and stored data satisfies a predetermined criterion. The stored data indicates one or more files determined not to contain malware and for which data associated with each of said one or more files has a predetermined characteristic. If the relationship satisfies the predetermined criterion, the respective file is processed according to said first processing method and if said relationship does not satisfy said predetermined criterion, the respective file is processed according to said second processing method. | 2012-07-19 |
20120185940 | COMPUTER SYSTEM AND METHOD FOR SCANNING COMPUTER VIRUS - According to the present invention, a timeout caused by executing a virus scan is avoided. A computer system has a first computer, a second computer coupled to the first computer, and a storage system coupled to the first computer and the second computer. The first computer receives a request to write data, writes the requested data in the storage system, and sends a virus scan request of the written data to the second computer. The second computer receives the virus scan request from the first computer, reads the written data out of the storage system, and partially executes a virus scan of the read data. After the partial virus scan of the read data is finished, the first computer sends a response to the received write request. After the first computer sends the response, the second computer executes the remainder of the virus scan of the read data. | 2012-07-19 |
20120185941 | Multi-Network Virus Immunization - An apparatus, device, methods, computer program product, and system are described that determine a virus associated with a communications network, and distribute an anti-viral agent onto the communications network using a bypass network, the bypass network configured to provide transmission of the anti-viral agent with at least one of a higher transmission speed, a higher transmission reliability, a higher transmission security, and/or a physically-separate transmission path, relative to transmission of the virus on the communications network. | 2012-07-19 |
20120185942 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PRESENTING AN INDICIA OF RISK ASSOCIATED WITH SEARCH RESULTS WITHIN A GRAPHICAL USER INTERFACE - A system, method, and computer program product comprise presenting a plurality of search results within a graphical user interface. Further, an indicia of risk associated with the search results is presented, in real-time, within the graphical user interface. | 2012-07-19 |
20120185943 | CLASSIFICATION OF CODE CONSTRUCTS USING STRING ANALYSIS - A code construct in a computer-based software application is classified by seeding an analysis of an instruction code set of a computer-based software application with a seed for a seeding variable within the instruction code set, wherein the seed is an abstract value representation, performing the analysis to a fixed point, thereby producing a fixed point solution, selecting an invariant from the fixed point solution, wherein the invariant represents at least one value pointed to by a classification variable in a code construct within the instruction code set, and classifying the code construct with a classification that is applicable to the invariant in accordance with an application criterion. | 2012-07-19 |
20120185944 | METHODS AND SYSTEMS FOR PROVIDING RECOMMENDATIONS TO ADDRESS SECURITY VULNERABILITIES IN A NETWORK OF COMPUTING SYSTEMS - A solution recommendation (SR) tool can receive vulnerabilities identified by a vulnerability scanner and/or penetration testing tool. The SR tool can determine various approaches for remediating or mitigating the identified vulnerabilities, and can prioritize the various approaches based on the efficiency of the various approaches in remediating or mitigating the identified vulnerabilities. The SR tool can recommend one or more of the prioritized approaches based on constraints such as cost, effectiveness, complexity, and the like. Once the one or more of the prioritized approaches are selected, the SR tool can recommend the one or more prioritized approaches to third-party experts for evaluation. | 2012-07-19 |
20120185945 | SYSTEM AND METHOD OF MANAGING NETWORK SECURITY RISKS - A security risk management system comprises a vulnerability database, an asset database, a local threat intelligence database and a threat correlation module. The vulnerability database comprises data about security vulnerabilities of assets on a network gathered using active or passive vulnerability assessment techniques. The asset database comprises data concerning attributes of each asset. The threat correlation module receives threat intelligence alerts that identify attributes and vulnerabilities associated with security threats that affect classes of assets. The threat correlation module compares asset attributes and vulnerabilities with threat attributes and vulnerabilities and displays a list of assets that are affected by a particular threat. The list can be sorted according to a calculated risk score, allowing an administrator to prioritize preventive action and respond first to threats that affect higher risk assets. The security risk management system provides tools for performing preventive action and for tracking the success of preventive action. | 2012-07-19 |
20120185946 | SECURE COMPUTING IN MULTI-TENANT DATA CENTERS - This document describes techniques and apparatuses for secure computing in multi-tenant data centers. These techniques permit a client to delegate computation of a function to multiple physical computing devices without the client's information being vulnerable to exposure. The techniques prevent discovery of the client's information by a malicious entity even if that entity is a co-tenant on many of the same physical computing devices as the client. | 2012-07-19 |
20120185947 | TRIGGERING A PRIVATE BROWSING FUNCTION OF A WEB BROWSER APPLICATION PROGRAM - A private browsing function of a web browser application program may be triggered for a browser by a browser or by a URL provider. Upon receipt of the URI by a web browser, the URI is inspected for the presence of a private browsing indicator. When the URI is found to contain a private browsing indicator, operation of the private browsing function for the web browser application program is triggered. | 2012-07-19 |
20120185948 | SYSTEMS AND METHODS FOR THE PREVENTION OF UNAUTHORIZED USE AND MANIPULATION OF DIGITAL CONTENT - A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the originally intended purpose and license model of the digital content. The invention combines a number of techniques that in whole, or in part, serve to protect such content from unauthorized modification, reconstructive engineering, or monitoring by third parties. This is accomplished by means of methods which protect against subversion by specific tools operating on specific platforms as well as general tools operating on general platforms. Specific time domain attacks are identified, code modification can be identified and reversed, and virtual and emulated systems are identified. In addition, identification of in-circuit emulator tools (both software and hardware), debuggers, and security threats to running programs can be achieved. | 2012-07-19 |
20120185949 | TRIGGERING A PRIVATE BROWSING FUNCTION OF A WEB BROWSER APPLICATION PROGRAM - A private browsing function of a web browser application program may be triggered for a browser by a browser or by a URL provider. Upon receipt of the URI by a web browser, the URI is inspected for the presence of a private browsing indicator. When the URI is found to contain a private browsing indicator, operation of the private browsing function for the web browser application program is triggered. | 2012-07-19 |
20120185950 | METHOD, ACCESS NODE, AND SYSTEM FOR OBTAINING DATA - The present invention discloses a method, an access node, and a system for obtaining data. The method includes: receiving a data obtaining request sent by a client and obtaining an authentication result of multilevel authentication performed on the data obtaining request; when the authentication result of the data obtaining request is successful, obtaining data to be obtained corresponding to the data obtaining request and sending the data to be obtained to the client, or, obtaining information about a content storage node to which the data to be obtained corresponding to the data obtaining request belongs and sending the information about the content storage node to the client. The embodiments of the present invention may ensure security of data obtaining, avoid a single-point failure or bottleneck, and reduce the cost when data is obtained from a data storage platform. | 2012-07-19 |
20120185951 | METHOD AND APPARATUS FOR MEDICAL INFORMATION ENCRYPTION - Provided is an apparatus, system and method for protecting medical output to be stored on a portable computer-readable medium. Access to the medical output is restricted and a key is established to grant access to the medical output stored on the portable computer-readable medium. An identifier is assigned to the portable computer-readable medium and stored on both the portable computer-readable medium and a computer memory. The medical output is stored on the portable computer-readable memory, and access to the medical output on the portable computer-readable medium is restricted, requiring the key for accessing and viewing the medical output. The key is also stored in the computer memory and a relationship associating the identifier with the key is established to enable identification of the key with knowledge of the identifier. A security utility and a medical presentation utility can also be stored on the portable computer-readable medium. The security utility and medical presentation utility can be executable by the user computer to grant access to, and present the medical output on the portable computer-readable medium to the intended recipient in response to entry of the key. | 2012-07-19 |
20120185952 | CONTEXT AWARE DATA PROTECTION - A method, for context aware data protection is provided. Information about an access context is received in a data processing system. A resource affected by the access context is identified. The identification of the resource may include deriving knowledge about resource by making an inference from a portion of contents of the resource that the access context affects the resource, making an inference that the access context affects a second resource thereby inferring that the resource has to be modified, determining that the access context is relevant to the resource, or a combination thereof. The resource is received. A policy that is applicable to the access context is identified. A part of the resource to modify according to the policy is determined. The part is modified according to the policy and the access context to form a modified resource. The modified resource is transmitted. | 2012-07-19 |
20120185953 | METHOD AND SYSTEM FOR DESIGNATING AND HANDLING CONFIDENTIAL MEMORY ALLOCATIONS - Embodiments of the present invention provide methods and systems for designating and handling confidential memory allocations of virtual memory. In particular, the operating system provides a memory allocation flag that applications may use to indicate any arbitrary area of physical memory marked with this flag may contain confidential data and should be handled accordingly. The operating system also ensures that memory allocated with this flag can be placed in physical memory. When freeing up memory, the operating system protects any data in the memory allocated with this flag. For example, the operating system may prevent the confidential memory from being swapped out to storage or from being accessible to other applications, such as debuggers. Alternatively, the operating system may encrypt any data in the confidential memory before it is swapped out to storage. | 2012-07-19 |
20120185954 | Mutant Receptors and Their Use in a Nuclear Receptor-Based Inducible Gene Expression - This invention relates to the field of biotechnology or genetic engineering. Specifically, this invention relates to the field of gene expression. More specifically, this invention relates to novel substitution mutant receptors and their use in a nuclear receptor-based inducible gene expression system and methods of modulating the expression of a gene in a host cell for applications such as gene therapy, large scale production of proteins and antibodies, cell-based high throughput screening assays, functional genomics and regulation of traits in transgenic organisms. | 2012-07-19 |
20120185955 | HEDGEHOG INHIBITOR ASSAY - The present invention relates to the field of Hedgehog signalling, and more specifically to a cell-based assay system and methods for identifying inhibitors and/or antagonists of specific cellular events in said signalling pathway. The present invention hereby proposes a novel approach for identifying inhibitors and/or antagonists downstream of the signalling components Smoothened and Patched, e.g. at the Gli-level. The assay comprises cells lacking a functional Sufu protein, which according to the invention is a protein component of emerging importance in the Hedgehog signalling pathway. | 2012-07-19 |
20120185956 | GLOBAL NAV1.7 KNOCKOUT MICE AND USES - A viable global Na | 2012-07-19 |
20120185957 | PEPPER HYBRID PX11334879 - The invention provides seed and plants of pepper hybrid PX11334879 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of pepper hybrid PX11334879 and the parent lines thereof, and to methods for producing a pepper plant produced by crossing such plants with themselves or with another pepper plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2012-07-19 |
20120185958 | Introgression of Festuca mairei Drought Tolerant Genome into Lolium Perenne Plants - The present inventions relate to compositions and methods for providing drought resistant grass plants comprising | 2012-07-19 |
20120185959 | GENE REGULATING NUMBER OF PRIMARY PANICLE BRANCHES AND USE THEREOF - Isolation and identification of a gene associated with the number of primary panicle branches in a plant, and use of the gene. A gene encoding a protein having the amino acid sequence set forth in SEQ ID NO:2 is isolated as a gene associated with the number of primary panicle branches in a plant. By using the gene, it is possible to readily create a plant which has a large number of primary panicle branches and a large number of grains. | 2012-07-19 |
20120185960 | NOVEL BRASSICA PLANTS RESISTANT TO DISEASE - The present invention relates to novel | 2012-07-19 |
20120185961 | METHODS AND COMPOSITIONS FOR PRODUCING ALUMINUM TOLERANT ALFALFA - The invention relates to alfalfa plants and lines having aluminum tolerance. The invention also relates to parts of alfalfa plants from lines having aluminum tolerance, including seeds capable of growing aluminum tolerant alfalfa plants. Methods for the use and breeding of aluminum tolerant alfalfa plants are also provided. | 2012-07-19 |
20120185962 | PLANTS OF THE GENUS DIPLOTAXIS HAVING CYTOPLASMIC MALE STERILITY - The present invention concerns plants, seeds and cells of the genus | 2012-07-19 |
20120185963 | Nucleic Acid Molecules and Their Use in Plant Sterility - The present invention provides a method for disrupting pollen development in a plant, the method comprising inhibiting the expression of an endogenous nucleic acid molecule which is, under normal conditions, detectably expressed in anther tissue of a plant during pollen formation, and which codes for a protein belonging to the MYB class of DNA binding transcription factors. Particularly, the nucleic acid molecule whose expression is blocked encodes MYB 32 or MYB 103. The invention also provides nucleic acid molecules for use in the method, use of the method in producing male sterile plants and transgenic plants produced in accordance with the method. | 2012-07-19 |
20120185964 | METHODS AND COMPOSITIONS FOR STRESS TOLERANCE IN PLANTS - We characterise a plant transcription factor and disclose its use in modifying plant responses to stress conditions, including freezing, drought, salinity and pathogen invasion. Microarray analyses were performed indicating that such tolerance occurs via the increase of antifreeze proteins localized in the cellular apoplast which inhibit the growth of large extracellular ice crystals. We also disclose the use of such proteins. | 2012-07-19 |
20120185965 | Regulatory Nucleic Acid Molecules for Enhancing Seed-Specific Gene Expression in Plants Promoting Enhanced Polyunsaturated Fatty Acid Synthesis - The invention in principle pertains to the field of recombinant manufacture of fatty acids. It provides novel nucleic acid molecules comprising nucleic acid sequences encoding fatty acid desaturases, elongases, acyltransferases, terminator sequences and high expressing seed-specific promoters operatively linked to the said nucleic acid sequences wherein nucleic acid expression enhancing nucleic acids (NEENAs) are functionally linked to said promoters. | 2012-07-19 |
20120185966 | FRUCTAN BIOSYNTHETIC ENZYMES - This invention relates to isolated nucleic acid fragments encoding fructosyltransferases. More specifically, this invention relates to polynucleotides encoding 1-FFTs, 6-SFTs, or 1-SSTs. The invention also relates to the construction of a recombinant DNA constructs encoding all or a portion of the fructosyltransferases, in sense or antisense orientation, wherein expression of the recombinant DNA construct results in production of altered levels of the fructosyltransferases in a transformed host cell. | 2012-07-19 |
20120185967 | INTRODUCING DNA INTO PLANT CELLS - The present invention provides means and methods for simple and efficient introduction of foreign genetic material into the plant cell. Particularly, the present invention combines seed priming and virus-based DNA constructs for efficient introduction of heterologous DNA into plants. | 2012-07-19 |
20120185968 | PLANTS OVEREXPRESSING SEQUENCES THAT PROMOTE WOOD PRODUCTION - Polynucleotides encoding polypeptides that increase the secondary growth of plants were identified. Introduction of the polynucleotides into plants produces plants having altered characteristics, such as increased secondary growth, increased phloem production, increased xylem production, increased number of internodes, and/or increased stem diameter. Expression of the polynucleotides in plants in the antisense orientation may produce plants that have decreased secondary growth, decreased phloem production, decreased xylem production, decreased numbers of internodes, and/or decreased stem diameter. | 2012-07-19 |
20120185969 | STACKING OF TRANSLATIONAL ENHANCER ELEMENTS TO INCREASE POLYPEPTIDE EXPRESSION IN PLANTS - Compositions and methods for increasing expression of a polypeptide of interest in a plant or plant part thereof are provided. Compositions of the invention are polynucleotide constructs comprising (a) at least one translational enhancer element derived from a virus tandemly stacked with at least one translational enhancer element derived from a cellular gene, and (b) an operably linked polynucleotide encoding a polypeptide of interest. Expression cassettes, vectors, and transgenic plants and plant parts comprising these polynucleotide constructs are also provided. Methods for increasing expression of a polypeptide of interest in a plant or plant part thereof utilizing the polynucleotide constructs and expression cassettes of the invention are also provided. | 2012-07-19 |
20120185970 | POLYPEPTIDES HAVING CELLULOLYTIC ENHANCING ACTIVITY AND POLYNUCLEOTIDES ENCODING SAME - The present invention relates to isolated polypeptides having cellulolytic enhancing activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides. | 2012-07-19 |
20120185971 | POLYPEPTIDES HAVING CELLULOLYTIC ENHANCING ACTIVITY AND POLYNUCLEOTIDES ENCODING SAME - The present invention relates to isolated polypeptides having cellulolytic enhancing activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides. | 2012-07-19 |
20120185972 | PESTICIDAL MIXTURES - The present invention relates to synergistic mixtures comprising, as active components, chlorfenapyr as insecticidal compound I and a fungicidal compound II selected from the group of azoxystrobin, coumethoxystrobin, coumoxystrobin, dimoxystrobin, enestroburin, fluoxastrobin, kresoxim-methyl, metominostrobin, orysastrobin, pico-xystrobin, pyraclostrobin, pyrametostrobin, pyraoxystrobin, pyribencarb, trifloxysstrobin, 2-(ortho-((2,5-dimethylphenyl-oxymethylen)phenyl)-3-methoxy-acrylic acid methyl ester, 2-(2-(3-(2,6-dichlorophenyl)-1-methyl-allylideneaminooxymethyl)-phenyl)-2-methoxyimino-N-methyl-acetamide. | 2012-07-19 |
20120185973 | CORN EVENT MIR604 - A novel transgenic corn event designated MIR604, is disclosed. The invention relates to DNA sequences of the recombinant constructs inserted into the corn genome and of genomic sequences flanking the insertion site that resulted in the MIR604 event. The invention further relates to assays for detecting the presence of the DNA sequences of MIR604, to corn plants and corn seeds comprising the genotype of MIR604 and to methods for producing a corn plant by crossing a corn plant comprising the MIR604 genotype with itself or another corn variety | 2012-07-19 |
20120185974 | Xenorhabdus SP. Genome Sequences and Uses Thereof - The present invention relates to a nucleic acid sequence from | 2012-07-19 |
20120185975 | GLYCOSYLTRANSFERASE PROMOTER - A glycosyltransferase promoter and a recombinant nucleic acid, plant cell and transgenic plant containing thereof are provided. The promoter includes a nucleotide sequence as set forth in any one of SEQ ID NOs: 1˜7, a fragment having at least 10 contiguous bases of any one of SEQ ID NOs: 1˜7 or a combination thereof, or a nucleotide sequence having 90% or more identity to the nucleotide sequence as set forth in any one of SEQ ID NOs: 1˜7. | 2012-07-19 |
20120185976 | ALUMINIUM TOLERANT BARLEY - The present invention relates to barley plants comprising an exogenous nucleic acid molecule which confers upon the plants enhanced tolerance to aluminium relative to isogenic plants which do not contain the exogenous nucleic acid. Also provided are methods of producing barley plants with enhanced tolerance to aluminium. | 2012-07-19 |
20120185977 | TIP-MOUNTED NANOWIRE LIGHT SOURCE INSTRUMENTATION - A scanning probe microscopy instrument includes a cantilevered tip that has a nanowire light emitting diode (LED). | 2012-07-19 |
20120185978 | Pear tree named 'PREM 109' - A new and distinct pear tree named ‘PremP109’ is disclosed. The new pear is notable for its attractive appearance, superb texture, improved flavor and long shelf life. | 2012-07-19 |
20120185979 | Clematis Plant Named 'Beautiful Bride' - A new and distinct variety of | 2012-07-19 |
20120185980 | Nepeta plant named 'Purple Haze' - A new and distinct form of | 2012-07-19 |
20120185981 | Poinsettia plant named 'NPCW11190' - A new poinsettia plant named ‘NPCW | 2012-07-19 |
20120185982 | PETUNIA PLANT NAMED 'PDBVI35-0' - A new and distinct | 2012-07-19 |
20120185983 | PETUNIA PLANT NAMED 'PBLRE32-0' - A new and distinct | 2012-07-19 |
20120185984 | Petunia plant named 'PDBZ934-0' - A new and distinct | 2012-07-19 |
20120185985 | Heuchera plant named 'Blackberry Crisp' - A new and distinct | 2012-07-19 |
20120185986 | Heuchera plant named 'Cherry Cola' - A new and distinct | 2012-07-19 |
20120185987 | SEDUM PLANT NAMED 'BIRTHDAY PARTY' - A new and distinct hybrid of | 2012-07-19 |