32nd week of 2012 patent applcation highlights part 57 |
Patent application number | Title | Published |
20120204206 | SYSTEM AND METHOD FOR CONTROLLING ACCESS TO CONTENTS - The invention relates to a system and method for controlling access to contents. The system comprises a network for distributing encrypted content, a receiver ( | 2012-08-09 |
20120204207 | Linking to Video Information - A system enables dynamic linking between a variety of video formats including television broadcasts, web pages, and video displays which are stored on magnetic or optical media. Each frame of the video information is identified together with a plurality of locations within that frame. The locations selected by the user for example using a pointing device is then used to access associated information either within the system itself or on an external system. Thus, in some embodiments of the present invention, any item on a given frame may be linked initially or thereafter to other information within or without the particular system containing that information. | 2012-08-09 |
20120204208 | APPARATUS AND METHOD FOR ADVERTISING IN DIGITAL PHOTO FRAME - A novel digital photo frame is configured to display user-loaded photographs, moving pictures, and other personal data and corporate-paid advertisements which are dynamically updatable by an advertising data distribution center or another communications service provider, such as a cellular service provider. The invention also discloses a related, novel method of advertising in a digital photo frame with dynamically-updatable-ads, in which initial advertising fees for one or more dynamically-updateable ads at least partially pay for manufacturing costs of the digital photo frame for inexpensive distribution of the digital photo frame to a targeted consumer. | 2012-08-09 |
20120204209 | CONTENT PROCESSING DEVICE, TELEVISION RECEIVER, AND CONTENT PROCESSING METHOD - A content processing device ( | 2012-08-09 |
20120204210 | Methods and Systems for Enhancing Television Applications Using 3D Pointing - Systems and methods according to the present invention provide a control framework for organizing, selecting and launching media items including graphical user interfaces coupled with an optional 3D control device for collection of the basic control primitives of point, click, scroll, hover and zoom which permit for easy and rapid selection of media items, e.g., movies, songs etc., from large or small collections. The remote control maps natural hand movements and gestures into relevant commands while the graphical display uses images, zooming for increased/decreased levels of detail and continuity of GUI objects to provide easy organization, selection and navigation among the media items by a user. | 2012-08-09 |
20120204211 | PROGRAM GUIDE GENERATION APPARATUS, PROGRAM GUIDE GENERATION METHOD, AND PROGRAM GUIDE GENERATION PROGRAM - A program guide generation apparatus includes: a program-related information acquisition unit that acquires program-related information including information related to a start time of a broadcast program, information related to a broadcast duration length being the length of the duration of the broadcast of the broadcast program; a program display frame size calculation unit that calculates a time-base size obtained from the broadcast duration length and calculates an inside content size; a program guide generation unit that generates layout data of the program display frame in accordance with the time-base size calculated by the program display frame size calculation unit; and a display update unit that, upon a program display frame being selected by an operation input inputted via an input device, changes a size of the selected program display frame to the inside content size. | 2012-08-09 |
20120204212 | BROADCAST CONTENT REQUESTS - An apparatus comprising: a first transceiver for communicating with a set-top box via a first network corresponding to a short-range network; a second transceiver for communicating with a geostationary communication satellite in a second network, the first transceiver being configured to receive information corresponding to a request from said set-top box related to broadcast content, and said second transceiver being configured to transmit a message corresponding to said request to said geostationary communication satellite. The set-top box may comprise a receiver for receiving broadcast content; a transceiver for communicating data, through a short-range network, to a terminal, said terminal being in communication with a content management centre via a geostationary satellite; and an input interface for receiving instructions from a user, the input interface being configured to receive a user input associated with broadcast content, and the transceiver being configured to transmit said user input to said terminal for onward transmission to the content management centre. | 2012-08-09 |
20120204213 | WIRELESS THEATER SYSTEM - An approach for providing lossless raw video data wirelessly to a soundbar from a headunit to eliminate the multitude of wires that traditionally connect to a television in a home theater. | 2012-08-09 |
20120204214 | SYSTEM AND METHOD FOR PROVIDING VIDEO PROGRAM INFORMATION OR VIDEO PROGRAM CONTENT TO A USER - In a system for broadcasting video programs to a user including a display, a system and method for providing program information or a copy of at least a portion of a program to the user. In one embodiment, a controller receives an input signal representing a request for summary information concerning a program, the program having a beginning and the input signal generated at a time during the broadcast. The controller provides via the display a summary of the program from the program beginning to the input signal time in response to the input signal. A controller may alternatively monitor a period of time during which the display is tuned to a broadcast of a program, the period starting during the broadcast. The controller is used to provide via the display a copy of at least a portion of the program when the period exceeds a predetermined threshold time. | 2012-08-09 |
20120204215 | DIGITAL VIDEO RECORDER (DVR) METHODS AND APPARATUS - Digital video recorder (DVR) methods and apparatus are described. By combining DVR and on-demand functionality a large number of programs selected by a user can be made available to the DVR user and may be included in a single content availability list. The list may indicate whether the recording is available via an on-demand service or is locally recorded/stored content. When the user selects content for recording a check is automatically made to determine if the content is available via an on-demand server. If the content is available via an on-demand server the user is provided the opportunity to choose between the content being recorded by the DVR or being added to the recordings list but supplied via the on-demand server. In some embodiments the user may select the DVR to default to on-demand content supply as opposed to local recording when the content is available for on-demand delivery. | 2012-08-09 |
20120204216 | Home Gateway Expansion - As described herein, a gateway device may include one or more expansion ports to add functionality. The added functionality can be of any desired type, such as adding telephone call routing capabilities, or high-definition radio capabilities. The added functionality can include new wireless communication abilities, such as adding Bluetooth capability, and the combination may allow greater networked communication. | 2012-08-09 |
20120204217 | Streaming Digital Video between Video Devices Using a Cable Television System - Systems and methods are presented that permit an individual to share digital video between video devices using a cable television system. A first video device streams digital video to a cable headend, which transcodes it and stitches it with other video content, such as a menuing system. The headend then transmits the digital video to a second video device, such as a set top box, for display. The data stream may be controlled using a standard set top box remote control, and the system may be used without purchasing additional hardware or software, or configuring a wireless local area network. | 2012-08-09 |
20120204218 | SYSTEMS AND METHODS FOR RENDERING TEXT ONTO MOVING IMAGE CONTENT - A method for rendering text onto moving image content. The method comprises receiving a request to translate dialog associated with moving image content, transmitting an interface, transmitting a time-stamped transcription, and receiving a translation of the dialog. | 2012-08-09 |
20120204219 | METHOD AND SYSTEM FOR PROVIDING NETWORK SECURITY SERVICES IN A MULTI-TENANCY FORMAT - An approach is provided for performing cloud based computer network security services. Security policies are established for each of a number of subscribers. The subscribers are provided access to the security services via a common network cloud managed by the service provider. The security services are administered according to a multi-tenancy format, which enables the subscribers' data communications to be separately processed. The security services include network firewalling and filtering of content originating from or destined to one or more networks associated with the subscribers. | 2012-08-09 |
20120204220 | METHOD OF ANALYZING SECURITY RULESET AND SYSTEM THEREOF - There are provided a rule-set analyzer and a method of analyzing an ordered security rule-set comprising a plurality of rules comprising N≧1 extrinsic rule-fields. The method comprised: upon specifying an extrinsic space constituted by atomic elements corresponding to the values characterizing an extrinsic rule-field, partitioning said specified extrinsic space into two or more equivalence classes, wherein each atomic element in said extrinsic space belongs to one and only one equivalence class; mapping said equivalence classes over the rule-set; and generating a logically equivalent security rule-set, wherein respective rules comprise N−1 extrinsic rule-fields. | 2012-08-09 |
20120204221 | METHOD FOR MANAGING ACCESS TO PROTECTED RESOURCES IN A COMPUTER NETWORK, PHYSICAL ENTITIES AND COMPUTER PROGRAMS THEREFOR - A method carried out by a controller is disclosed. The method includes receiving (s | 2012-08-09 |
20120204222 | PRIVACY POLICY MANAGEMENT METHOD FOR A USER DEVICE - An arrangement for enabling users to set and modify privacy policies is described. User attributes and existing privacy policies are used to determine the similarity between users. On this basis, the nearest-neighbours to a particular user are determined. When a user is required or wishes to provide or modify a policy, the policies of those nearest neighbours are used to recommend a privacy policy to the user. | 2012-08-09 |
20120204223 | SYSTEM FOR MANAGING DIGITAL INTERACTIONS - A system for managing digital interactions comprising an identity module for creating an identity, wherein the identity includes a unique identifier associated with a first party and a plurality of proposed terms for a relationship with a second party; and a relationship module, in communication with the identity module, for receiving and evaluating the plurality of proposed terms, including accepting or rejecting the plurality of proposed terms and, if accepted, for allowing the first party to communicate with the second party in accordance with the plurality of proposed terms. | 2012-08-09 |
20120204224 | Method and Apparatus for a Control Plane to Manage Domain-Based Security and Mobility in an Information Centric Network - A networking system comprising a virtual group controller in an information centric network configured to enable mobility and security for a plurality of users groups of the information centric network, a plurality of user groups coupled to the virtual group controller and associated with the users, a plurality of agents that are each associated with one of the user groups, and a database for trusted service profile coupled to the virtual group controller, wherein the virtual group controller is configured to interact with the agents to enable mobility for the user groups using a server-less domain-based naming scheme. | 2012-08-09 |
20120204225 | ONLINE AUTHENTICATION USING AUDIO, IMAGE AND/OR VIDEO - Systems, methods, and computer program products for online authentication using audio, video and/or image data. In some examples, audio, video and/or image data of a user may be captured, and recognition may be performed on at least part of the captured data during an attempt to confirm that the user is who he/she is supposed to be. If the attempt is successful, a validation confirmation may be generated. In some cases of these examples, the validation confirmation or a part thereof may optionally be provided to a server during user authentication relating to a resource provided by the server. Additionally or alternatively, in some cases of these examples, at least part of the captured data may optionally be provided to the server during user authentication. Depending on the example, the server may or may not be a web server. | 2012-08-09 |
20120204226 | Method, Super Node-Core (SN-C) Node and System for Requesting and Storing Distributed Service Network (DSN) Authentication Information - A method, Super Node-Core (SN-C) node and Distributed Service Network (DSN) authentication system for requesting and storing DSN authentication information are provided, wherein the method for requesting the DSN authentication information includes: according to a user access request, judging whether a local SN-C node stores the authentication information of the user; when the local SN-C node stores the authentication information, initiating an authentication process directly; when the local SN-C node does not store the authentication information, requesting the authentication information from other SN-C nodes which store the authentication information of the user. The method, SN-C node and DSN authentication system for requesting and storing the DSN authentication information, by means of the distributed storage and authentication of the authentication information of the user, can acquire the authentication information from other SN-C nodes when a failure occurs in one of the SN-C nodes, and reduce the risk that a single authentication server is unable to perform the authentication and operation caused by the failure. | 2012-08-09 |
20120204227 | DATA BACKUP AND TRANSFER SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT - A backup system having a plurality of accounts for copying selected data between one or more account user computers and a system computer where an account user's computer connects to the system computer via the Internet. Selected data is copied between the account user's computer and the system computer including, documents, media files, and email in any file type or format. Additionally, the system is compatible with all types of computers, including personal data assistants and mobile telephones, and all types of operating systems. All of the software to operate the system is resident on the system computer with no hardware or software required on the account user computer beyond a conventional web browser. The system also includes a scheduler, a contacts manager, a reminder generator and file transfer system for third-party users. | 2012-08-09 |
20120204228 | METHODS FOR HOSTING DATA ON A GROUP OF NETWORKED HOSTS - A method for hosting data on an interoperable, related group of networked hosts organized in a tree structure including descendants associated with ancestors, each host independently accessible by network connected client computers, the method including hosting ancestor data on an ancestor host, including genus content related to a genus subject matter, hosting descendant data on a descendant host including species content related to subject matter defining a species within the genus subject matter. Some examples further include incorporating at least a portion of the species content into the ancestor data, connecting the ancestor host in data communication to a client computer via the computer network, and displaying an ancestor output incorporating a portion of the ancestor data Some examples may additionally or alternatively include allowing the user to access the ancestor user features on the ancestor host in response to entering user authentication data consistent with a descendant user records. | 2012-08-09 |
20120204229 | METHOD AND SYSTEM FOR AUTHENTICATING AN END USER - A method and associated system for authenticating an end user. A selected subset of root nodes of a set of root nodes in a server mask is received, the selected subset of root nodes having been selected by the end user. In response to the receiving of the selected subset of root nodes, the end user is authenticated by determining that the spatial location in the server mask of each root node of the selected subset of root nodes matches a spatial position of a corresponding root node of a server set of transparent root nodes in the server mask, wherein the server set of transparent root nodes are a result of a first random selection of root nodes from the set of root nodes in the server mask. | 2012-08-09 |
20120204230 | AUTHENTICATION OF AN END USER - A method and System for authenticating an end user. A first pattern of colored quadrilaterals is generated. A second pattern of multiple colored nodes that include a first subset of nodes is generated. The first and second patterns are sent to the end user. If a transparent credit card is overlaid by the end user on top of the second pattern, then a second subset of nodes in the credit card would match in color and location the first subset of nodes. The authenticity status of the end user is determined by determining whether each node of a third subset of nodes within the second subset of nodes (i) corresponds to a unique node of the multiple colored nodes and (ii) has a color that matches a specific color in one quadrilateral of the colored quadrilaterals. The determined authenticity status is sent to the end user via an output device. | 2012-08-09 |
20120204231 | USER IDENTITY MANAGEMENT FOR PERMITTING INTERWORKING OF A BOOTSTRAPPING ARCHITECTURE AND A SHARED IDENTITY SERVICE - A method, apparatus and computer program product are provided to facilitate authentication of a request, such as by a mobile terminal, while also supplying information about the user to a service, website, application or the like A method, apparatus and computer program product may provide for interworking a bootstrapping architecture, such as Generic Bootstrapping Architecture, and a shared identity service, such as OpenID architecture In this regard, a method, apparatus and computer program product may provide for a secure session with a service provider through Generic Bootstrapping Architecture while being able to supply the service provider with the user information and/or accessing a user account using OpenID architecture. | 2012-08-09 |
20120204232 | System And Method For Managing Usage Rights Of Software Applications - The present invention disclose a system for securing managing usage rights of plurality of software applications in plurality of client computers devices to be authorized by a server application. The system comprises the following components: at least one client hardware component operatively associated with at least one computer device, said hardware component including at least one control segment and at least one application segment, where the control segment include a processor, communication port, memory and the application segments are arranged to include usage rights information of plurality of software applications and a provider hardware component operatively associated with at least one server, said provider hardware component including at least one control segment and at least one application segment, wherein said control segment include a processor, communication port and a memory, where said application segments are arranged to include software application license information of plurality of clients. | 2012-08-09 |
20120204233 | SOCIAL NETWORK SYSTEM WITH ACCESS PROVISION MECHANISM AND METHOD OF OPERATION THEREOF - A method of operation of a social network system includes: receiving a service request for accessing a peripheral device revealed through a social graph of a social platform; determining a request type for matching the service request to a device service provided by the peripheral device; authorizing the device service through the social graph for accessing the peripheral device; and generating a service command based on the request type of the device service authorized for executing the device service for the peripheral device. | 2012-08-09 |
20120204234 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM STORING PROGRAM THEREOF - An information processing apparatus acquires, from a Web server, an operation screen for inputting authentication information, displays the acquired operation screen, and accepts authentication information input by a user. The apparatus then executes authentication processing using the accepted authentication information without transmitting the authentication information to the Web server, and authorizes, when the authentication succeeds, the user to use a function of itself. | 2012-08-09 |
20120204235 | Updating Resource Access Permissions in a Virtual Computing Environment - Methods, systems, and devices are described for updating resource access permissions in a virtual computing environment. In these methods, systems, and devices, a host computer system determines that a user associated with an existing session has moved from a first location associated with a first set of access permissions to a second location associated with a second set of access permissions. The second set of access permissions is applied at the host computer to the existing session based on the determination that the user has moved to the second location. The user is then allowed to access the existing session from the second location according to the second set of access permissions. | 2012-08-09 |
20120204236 | Systems and Methods for User Access Authentication Based on Network Access Point - Systems and methods of authenticating user access based on an access point to a secure data network include a secure data network having a plurality of a network access points serving as entry points for a user to access the secure data network using a user device. The user is associated with a user identity, each network access point with a network access point identity. The user uses a user device to send an access request, requesting access to the secure data network, to the network access point, which then sends an authentication request to an identity server. The identity server processes the authentication request, by validating the combination of the user identity and the network access point identity, and responds with an authentication response, granting or denying access, as communicated to the user device via an access response. | 2012-08-09 |
20120204237 | Host Device and Method for Accessing a Virtual File in a Storage Device by Bypassing a Cache in the Host Device - A host device is provided comprising an interface configured to communicate with a storage device having a public memory area and a private memory area, wherein the public memory area stores a virtual file that is associated with content stored in the private memory area. The host device also comprises a cache, a host application, and a server. The server is configured to receive a request for the virtual file from the host application, send a request to the storage device for the virtual file, receive the content associated with the virtual file from the private memory area of the storage device, wherein the content is received by bypassing the cache, generate a response to the request from the host application, the response including the content, and send the response to the host application. | 2012-08-09 |
20120204238 | Host Device and Method for Accessing a Virtual File in a Storage Device by Bypassing a Cache in the Host Device - A host device is provided comprising an interface configured to communicate with a storage device having a public memory area and a private memory area, wherein the public memory area stores a virtual file that is associated with content stored in the private memory area. The host device also comprises a cache, a host application, and a server. The server is configured to receive a request for the virtual file from the host application, send a request to the storage device for the virtual file, receive the content associated with the virtual file from the private memory area of the storage device, wherein the content is received by bypassing the cache, generate a response to the request from the host application, the response including the content, and send the response to the host application. | 2012-08-09 |
20120204239 | TERMINAL MANAGEMENT SYSTEM AND TERMINAL MANAGEMENT METHOD - A terminal management system and a terminal management method of the system determines whether to permit or prohibit the execution of a particular application software program in the information processing terminal in a space discriminated from an execution space of a general application software program on condition that a recording medium held by a member, and storing predetermined information is loaded on a general information processing terminal, and that the recording medium is authenticated in accordance with the predetermined information on a server side. | 2012-08-09 |
20120204240 | MULTI-APPLICATION MOBILE AUTHENTICATION DEVICE - (EN) The invention makes it possible to allow several applications to coexist in the same card; the implementation of the applications uses reading and writing of data by the reader in the same memory location. The invention is a method for exchanging data between a mobile authentication device | 2012-08-09 |
20120204241 | SECURE TUNNELING PLATFORM SYSTEM AND METHOD - A system and method and provided for receiving, by a wireless gateway device from a user computing device, a request for network access and is received via a first communication protocol. The request is formatted to comply with a second communication protocol that is different than the first communication protocol, and transmitted to at least one authentication computing device. The wireless gateway device receives a reply formatted to comply with the second communication protocol from the at least one authentication computing device that grants the request. The device formats the reply to comply with the first communication protocol, and transmits by the wireless gateway device, the formatted reply to the user computing device. A first communication pathway is established between the authentication computing device and the user computing device, and a request for access to at least one other computing device is received by the authentication device. The request is forwarded to the at least one other computing device, and a reply granting the request is received and forwarded to the user computing device the reply granting the request for access. An identification of at least one of the user computing device and the at least one other computing device, is stored in at least one database. | 2012-08-09 |
20120204242 | PROTECTING WEB AUTHENTICATION USING EXTERNAL MODULE - Systems, methods, computer program products, and networks for protecting web authentication. In some examples a system for protecting web authentication includes a web client and a validator which is external to the web client. In these examples, the validator is configured to enable at least one validation item which is provided to a web server during web user authentication to be protected from possible tampering by the web client. | 2012-08-09 |
20120204243 | SYSTEMS AND METHODS FOR NETWORK CURATION - Systems and methods for network curation are disclosed. In some embodiments, a method comprises scanning, by a mobile device, an area to identify a network device for accessing a network, receiving, by the mobile device, a network identifier associated with the network device, providing a curation indicator request to a curation server, the curation indicator request comprising the network identifier, receiving a curation indicator from the curation server, the curation indicator being retrieved, based on the network identifier, from a database of a plurality of curation indicators, the curation indicator associated with a likelihood of intent to publicly share the network by the network device, comparing the curation indicator to an access setting, the access setting indicating acceptability of network access based on the likelihood of intent to publicly share the network by the network device, and accessing the network via the network device based on the comparison. | 2012-08-09 |
20120204244 | AUTOMATED PASSWORD AUTHENTICATION - A system connected to an existing computer includes a unit for monitoring the screen and provides input, and a storage unit that stores data that pair screen buffer regions with authentication details. The system learns new pairs via user training and presents stored authentication details when the screen buffer matches a related stored region which is paired with a region of the screen. | 2012-08-09 |
20120204245 | SECURE AUTHENTICATION USING ONE-TIME PASSWORDS - Embodiments of the invention facilitate the use of a contactless memory token to automate log-on procedures to a remote access server using dynamic one-time passwords (OTPs). A series of workflow steps establishes the identity of the user and charges a token with a number of dynamic OTPs that can be subsequently verified using, for example, a Radius server sitting behind a VPN or SSL/VPN server. | 2012-08-09 |
20120204246 | ESTABLISHING A SECURE CHANNEL WITH A HUMAN USER - A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated. | 2012-08-09 |
20120204247 | SYSTEM AND METHOD FOR IMPROVING SECURITY OF USER ACCOUNT ACCESS - A system and method for providing access to a user account is provided, and in particular for improving the security to a user when entering access details, for example when logging on to Internet sites, networks, software and web applications. On one form, there is a system for providing access to a user account via an electronic device having a visual display screen, including communication means for issuing at least one security identifier to the user, said security identifier including one or more characters chosen from a predetermined character set; a database for storing said at least one security identifier and said predetermined character set; a processor for providing an access interface on said visual display screen for said user to input said security identifier, wherein said access interface includes a graphical display character set which includes at least the characters comprising the security identifier; and for comparing said security identifier entered by said user on the graphical display character set to the security identifier stored in said database, and for comparing said security identifier entered to a predetermined security identifier stored in said database, and if comparison is successful, providing access to said user account. | 2012-08-09 |
20120204248 | PROVISIONER FOR SINGLE SIGN-ON AND NON-SINGLE SIGN-ON SITES, APPLICATIONS, SYSTEMS, AND SESSIONS - A method including receiving an access request to a provisioning system; determining whether to grant access based on receipt of one or more user credentials; determining a level of access to the provisioning system based on user role information, when the one or more user credentials are valid; receiving configuration information by the provisioning system that permits a user to configure an automated sign-on system for single sign-on sites, non-single sign-on sites, mainframe sessions and applications, systems, and user device applications; and configuring the automated sign-on system based on the received configuration information. | 2012-08-09 |
20120204249 | TOOLBAR FOR SINGLE SIGN-ON AND NON-SINGLE SIGN-ON SITES, APPLICATIONS, SYSTEMS, AND SESSIONS - A method including receiving a request to connect to a single sign-on site, a non-single sign-on site, a system, a mainframe, or to use a mainframe or user device application; determining, by a toolbar of a user device, whether a user is authorized to connect to, initiate, or use the single sign-on site, the non-single sign-on site, the system, the mainframe, the mainframe or user device application; selecting, by the toolbar, one or more user credentials to allow the user to connect to, initiate, or use the single sign-on site, the non-single sign-on site, the system, the mainframe, the mainframe or the user device application when it is determined that the user is authorized; and signing-on, by the toolbar, to the single sign-on site, the non-single sign-on site, the system, the mainframe, the mainframe or user device application based on the one or more user credentials. | 2012-08-09 |
20120204250 | Securing Unrusted Content For Collaborative Documents - A method and an apparatus that configure a sandbox document for secure presentation of a block of data stored in the sandbox document in response to an editing request from a client are described. A presentable content corresponding to a document may be sent to the client for editing. The document and the sandbox document may be separately addressable by separate paths of separate domains. The editing request may include the block of data to update the presentable content of the document. The updated presentable content may include a hyperlink to the sandbox document. The edited document and the sandbox document may allow secure presentation of the block of data within the updated presentable content of the edited document without a need to filter the block of data. | 2012-08-09 |
20120204251 | METHOD AND SYSTEM FOR PROVIDING CLOUD BASED NETWORK SECURITY SERVICES - An approach is provided for performing cloud based computer network security services. Data traffic from a plurality of networks corresponding to a plurality of subscribers are received. Data traffic is routed to a security platform over a communication path to one or more service aggregators to process the data traffic according to one or more security services performed by the security platform. The security services are provided as a managed service by a service provider. The processed data are received from the one or more service aggregators, and routed to the corresponding one of the networks. | 2012-08-09 |
20120204252 | SYSTEM AND METHOD FOR ENABLING VPN-LESS SESSION SETUP FOR CONNECTING MOBILE DATA DEVICES TO AN ENTERPRISE DATA NETWORK - A mobile application gateway configured to interconnect mobile communication devices on a cellular network with an enterprise network is provided. The mobile application gateway includes a voice and data signaling gateway configured to provide routing functionalities, service functionalities and admission control. A gateway GPRS support node (GGSN) is configured to establish a secure data session between one or more of the mobile communication devices and the enterprise network by establishing a GPRS tunneling protocol (GTP) tunnel between a carrier-hosted serving GPRS support node (SGSN) and the GGSN. | 2012-08-09 |
20120204253 | METHOD AND APPARATUS FOR EXCHANGING DATA BETWEEN A USER EQUIPMENT AND A CORE NETWORK VIA A SECURITY GATEWAY - The present invention concern a methods and an apparatus for exchanging data between a user equipment and a core network via a security gateway. The invention concerns the establishment of an inactive pair of tunnel mode security associations between the UE and the security gateway, as well as the application of the pair of security associations when the UE detects attachment to or need to attach to an untrusted access network. | 2012-08-09 |
20120204254 | METHOD AND APPARATUS FOR MANAGING SECURITY STATE TRANSITIONS - A method and apparatus for managing security state transitions within a device is provided herein. During operation a security token will indicate whether or not a device is operating in a secured or unsecured state. The security token controls whether or not image validation will take place and if access to security critical resources is allowed. When a switch to a non secure state is made, the security token will be eliminated and blocked from recreation in the non-secure state, thus preventing non-secure code from spoofing a secure state indication. In the non-secure state, image validation is bypassed and the non-secure code is allowed to execute. Once a switch back to a secure state takes place, the secure token is recreated and all images on the device are analyzed to determine if they are approved. | 2012-08-09 |
20120204255 | MOBILE PLATFORM SECURITY APPARATUS AND METHOD - A mobile platform security apparatus and method is provided. The apparatus may perform a security setting by generating a first authentication key, a second authentication key, and a third authentication key for each function called by an application program. The apparatus may store the first authentication key and an identifier for identifying the application program in a first storage unit, the second authentication key and the identifier in a secret domain of a second storage unit, and register the third authentication key and the identifier as a function parameter in the application program. Subsequently, if the function is called by the application program, the apparatus may determine values for the first authentication key, the second authentication key, and the third authentication key corresponding to the called function, and may perform authentication processing using the three authentication key values. | 2012-08-09 |
20120204256 | Method for Inputting Usernames and Passwords to Access or Use Different Assets - A method for imputing different usernames and passwords using an input device with a display to use different protected assets that requires the inputting of a preselected username into a username enter box and the inputting of a preselected password into a password entry box immediately prior to use. The method includes the steps of designating two or more username keys on said input device, each said username key being assigned with a unique letter or number located on said input device and to a unique username made of a plurality of alpha-number characters, designating two or more password keys on the input device each being assigned with a letter or number located on said input device and to a unique password made of a plurality of alpha-number characters. Next the protected asset is then accessed and the username key and keyword key assigned to the asset is imputed. | 2012-08-09 |
20120204257 | DETECTING FRAUD USING TOUCHSCREEN INTERACTION BEHAVIOR - A processor can receive data indicative of interactions between a user and a touchscreen-equipped electronic device. The processor can compare a behavior pattern in the received data and a behavior pattern in previously stored data contained within a user profile for a human. The processor can generate a score indicative of a likelihood that the behavior pattern in the received data matches the behavior pattern in the previously stored data. Responsive to the generated score being below a threshold, the processor can generate an indication of a possible fraudulent action due to the user having a high likelihood of not being the human. | 2012-08-09 |
20120204258 | PASSWORD INPUT METHOD BASED ON TOUCH SCREEN - Disclosed is a password input method based on a touch screen, including the steps of displaying at least one background scene, generating trace data from a user's touch on the touch screen while the background scene is being displayed, comparing the trace data to password trace data preliminarily stored, and successfully terminating a password admission process if the trace data is identical to the password trace data. In entering a password by a user, even without preparing an additional input unit such as a keypad or keyboard and other similar fixed pictures (by software), this method enables a user to freely select and set a background scene in various types as well as variously forming a touch operation with his own password for admission, providing both security and input convenience of password keys. | 2012-08-09 |
20120204259 | BIOMETRIC AUTHENTICATION APPARATUS - The present invention provides a biometric authentication apparatus capable of evaluating during operation with a scenario the same as during scenario evaluation. A layered structure is employed, with a BSP, a framework including an input-output section and a DB, and an application. The BSP includes a device control section that controls the device, a registration code generating section that generates a registered code from biometric data acquired by the device and stores the registered code in the DB, a matching code generating section that generates a matching code from the biometric data acquired by the device, and a one-to-one matching section that matches the matching code against a registered code read from the DB. The framework includes a registration section that performs registration processing by sending instructions to the device control section and the registration code generating section, and a matching section that performs matching processing by sending instructions to the device control section, the matching code generating section and the one-to-one matching section. | 2012-08-09 |
20120204260 | Controlling access to sensitive data based on changes in information classification - A Data Loss Prevention (DLP) system includes an automated method for tracking changes to a security classification (e.g., content category) associated with an artifact to determine whether an attempt is being made to subvert a DLP policy. The method exploits the basic principle that, depending on context, the classification of a particular artifact, or a change to an existing classification, may indicate an attempt to subvert the policy. According to the method, an artifact classification state machine is implemented within a DLP system. For each policy-defined content category on each artifact, the machine identifies a content category change that may be of interest, as defined by policy. When a change in a classification has occurred, an artifact notification event (or, more generally, a notification of the change in classification) is issued. | 2012-08-09 |
20120204261 | SYSTEM AND METHOD FOR UNIFIED COMMUNICATIONS THREAT MANAGEMENT (UCTM) FOR CONVERGED VOICE, VIDEO AND MULTI-MEDIA OVER IP FLOWS - A method and system for unified communications threat management (UCTM) for converged voice and video over IP is disclosed. A computer-implemented method for threat management receives an incoming packet. The incoming packet is broken into sub-packets and fed to a plurality of packet processing engines. Each packet processing engine inspects the sub-packets and annotate the sub-packets with meta-data. The annotated sub-packets are combined and processed by a plurality of application engine to generate a processed packet. The processed packet is classified and stored in a database. | 2012-08-09 |
20120204262 | METHOD FOR TRACKING MACHINES ON A NETWORK USING MULTIVARIABLE FINGERPRINTING OF PASSIVELY AVAILABLE INFORMATION - A method for tracking machines on a network of computers includes determining one or more assertions to be monitored by a first web site which is coupled to a network of computers. The method monitors traffic flowing to the web site through the network of computers and identifies the one or more assertions from the traffic coupled to the network of computers to determine a malicious host coupled to the network of computers. The method includes associating a first IP address and first hardware finger print to the assertions of the malicious host and storing information associated with the malicious host in one or more memories of a database. The method also includes identifying an unknown host from a second web site, determining a second IP address and second hardware finger print with the unknown host, and determining if the unknown host is the malicious host. | 2012-08-09 |
20120204263 | METHOD AND APPARATUS FOR PREVENTING DOS ATTACKS ON TRUNK INTERFACES - A method of protecting a data network from denial of service (DOS) attacks is described. The method may use various network tools to selectively block or disable portions of a data trunk experiencing a DOS attack, thereby preventing the DOS attack from reaching at least some resources on the network. In one embodiment, a network switch identifies a virtual LAN (VLAN) carrying suspect data on a data trunk. The network switch then adjusts a spanning tree for the network so that one or more ports on the compromised VLAN are blocked or disabled, while non-compromised VLANs are allowed to continue carrying data. Other approaches are also presented for avoiding the loss of valid data when a network blocks one or more VLANs or other portions of a network in response to a DOS attack or other intrusion. | 2012-08-09 |
20120204264 | METHOD, APPARATUS AND SYSTEM FOR DETECTING BOTNET - A method, an apparatus, and a system for detecting Botnet are disclosed. The method for detecting Botnet includes: obtaining an address information about a control host in a Bot sample by using an auto breakout environment; sending a query request message to a traffic analysis device to obtain an address information of a Bot host connected with the control host, in which the query request message carries the address information about the control host; and receiving a query response message returned by the traffic analysis device, in which the query response message carries the address information of the Bot host connected with the control host. The method for detecting Botnet can obtain the Botnet information in real time and construct a topology of the Botnet. | 2012-08-09 |
20120204265 | Systems and Methods For Message Threat Management - The present invention is directed to systems and methods for detecting unsolicited and threatening communications and communicating threat information related thereto. Threat information is received from one or more sources; such sources can include external security databases and threat information data from one or more application and/or network layer security systems. The received threat information is reduced into a canonical form. Features arc extracted from the reduced threat information; these features in conjunction with configuration data such as goals are used to produce rules, in some embodiments, these rules are tested against one or more sets of test data and compared against the same or different goals; if one or more tests fail, the rules are refined until the tests succeed within ah acceptable margin of error. The hues are then propagated to one or more application layer security systems. | 2012-08-09 |
20120204266 | METHOD FOR PROVIDING AN ANTI-MALWARE SERVICE - The present invention relates to a method for providing an anti-malware service based on a server, wherein at least one server manages ‘local malware information’ associated with a predetermined region, and the server generates ‘malware component information’ for a device, on the basis of the ‘local malware information’ if the device is located in the predetermined region, and the server transmits the ‘malware component information’ to the device. Thus, the method of the present invention permits minimum data traffic to be transceived during malware DB update performed in the device so as to prevent waste of communication resources, permits the device to effectively use a limited resource, and effectively deals with malwares generated from areas of the world. | 2012-08-09 |
20120204267 | ADAPTIVE CONFIGURATION MANAGEMENT SYSTEM - An automated configuration management system (ACMS) oversees resources of a virtualized ecosystem by establishing a baseline configuration (including, e.g., security controls) for the resources; and, repeatedly, monitoring and collecting data from the resources, analyzing the data collected, making recommendations concerning configuration changes for the resources of the virtualized ecosystem based on the analysis, and either adopting and implementing the recommendations or not, wherein new states of the virtualized ecosystem and reactions to recommended changes are observed and applied in the form of new recommendations, and/or as adjustments to the baseline. The recommendations may be implemented automatically or only upon review by an administrator before being implemented or not. The various data may be analyzed according to benchmarks established for security and compliance criteria of the resources of the virtualized ecosystem, for example static/pre-defined or dynamically derived benchmarks/best practices. | 2012-08-09 |
20120204268 | METHOD AND APPARATUS FOR PROTECTING INFORMATION BASED ON DATA CARD - The present invention discloses a method and apparatus for protecting information based on a data card, and the method comprises: selecting information which needs to be hidden in a terminal device; and storing said information which needs to be hidden in a hidden partition of the data card. The present invention makes attackers not perceive the existence of the information and increases the security of the information in the data card, so as to protect the user's private information better. | 2012-08-09 |
20120204269 | SECURE AUTOMATED FEATURE LICENSE UPDATE SYSTEM AND METHODS - A method for providing a secure automated feature license update is disclosed. This method may be performed at a central license server. A license template including features for enablement on a device is generated. The license template is sent to an authorized user. A license update request is received from an entity. An updated license is generated by the central license server. A response is sent to the entity. | 2012-08-09 |
20120204270 | LICENSE RECONCILIATION FOR ONLINE SERVICES - A user interface that allows for efficient resolution of license conflicts. The user interface includes a license conflict discovery mechanism that automatically discovers whether a license conflict exists for a license. Upon determining a subset of available resolution methods that are suitable for the administrator right corresponding to the user of the user interface, the user interface provides a resolution prompt. The resolution prompt prompts the user of the user interface to resolve the license conflict using any one of the available subset of resolution methods. The types of the offered resolution methods offered by the user interface differ according to the administration rights of the user. | 2012-08-09 |
20120204271 | METHOD AND APPARATUS FOR CONTROLLING ACCESS RESTRICTIONS FOR MEDIA PLAYBACK - A method and apparatus for controlling access restrictions for media resource playback may include defining a user-specific content control profile authorizing one or more classes of content to be delivered to a client device, generating a media resource request identifying a first media resource associated with a first class of content and one or more attributes of the content control profile, determining whether the first class of content has been authorized for delivery to the client device based at least in part upon the one or more attributes of the content control profile, and delivering the first media resource to the client device if the first class of content has been authorized for delivery to the client device. | 2012-08-09 |
20120204272 | METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR PUBLISHING PUBLIC CONTENT AND PRIVATE CONTENT ASSOCIATED WITH THE PUBLIC CONTENT - A publishing method is disclosed, which process enables a publisher to publish in a simple and easy manner a set of content that includes both public content and private content. In some embodiments, this advantageous solution is achieved by implementing a multi-step publishing process. In one step, the publisher publishes a feed that contains: ( | 2012-08-09 |
20120204273 | COMPOSITIONS RELATING TO A PHOSPHOPROTEIN AND METHODS OF USE - The invention provides methods and compositions for identifying agents that modulates 138-kDa C2 domain-containing phosphoprotein (CDP138) activity or phosphorylation levels both in vivo and in vitro. Also provided are methods and compositions to prolong the survival of neuronal cells, to ameliorate or prevent a condition associated with release of insulin from insulin producing cells and insulin-stimulated glucose metabolism, to inhibiting proliferation of a cancer cell and to inducing cell cycle arrest of a cancer cell. | 2012-08-09 |
20120204274 | BITRANSGENIC MURINE MODEL FOR STUDYING MYELOPOIESIS, IMMUNITY AND TUMORIGENESIS - A myeloid-specific c-fms-rtTA/(TetO) | 2012-08-09 |
20120204275 | APOE IMMUNOTHERAPY - The present invention provides antibodies that preferentially bind to an ApoE(1-272) fragment relative to ApoE(1-299). These antibodies serve to reduce the toxicity of this fragment and find use in treatment and prophylaxis of a variety of neurological diseases. | 2012-08-09 |
20120204276 | METHODS RELATED TO A MUTATION IN COMPLEMENT FACTOR H-RELATED PROTEIN 5 IN PATIENTS WITH GLOMERULONEPHRITIS - The invention relates to methods of regulating complement. In particular, the inventors have identified a relationship between a particular gene, CFHR5, and irregularities in complement regulation. The invention provides a method for diagnosing a complement related disease, comprising identifying a mutation in the CFHR5 gene in a sample obtained from a subject. | 2012-08-09 |
20120204277 | Non-Aggregating Fluorescent Proteins and Methods for Using the Same - Nucleic acid compositions encoding non-aggregating chromo/fluoroproteins and mutants thereof, as well as the proteins encoded by the same, are provided. The proteins of interest are polypeptides that are non-aggregating colored and/or fluorescent proteins, where the non-aggregating feature arises from the modulation of residues in the N-terminus of the protein and the chromo and/or fluorescent feature arises from the interaction of two or more residues of the protein. Also provided are fragments of the subject nucleic acids and the peptides encoded thereby, as well as antibodies to the subject proteins and transgenic cells and organisms. The subject protein and nucleic acid compositions find use in a variety of different applications. Finally, kits for use in such applications, e.g., that include the subject nucleic acid compositions, are provided. | 2012-08-09 |
20120204278 | ANIMAL MODELS AND THERAPEUTIC MOLECULES - The invention discloses methods for the generation of chimaeric human—non-human antibodies and chimaeric antibody chains, antibodies and antibody chains so produced, and derivatives thereof including fully humanised antibodies; compositions comprising said antibodies, antibody chains and derivatives, as well as cells, non-human mammals and vectors, suitable for use in said methods. | 2012-08-09 |
20120204279 | POLYNUCLEOTIDE DERIVED FROM NOVEL HEPATITIS C VIRUS STRAIN AND USE THEREOF - A polynucleotide encoding the amino acid shown in SEQ ID NO:2 or SEQ ID NO: 5, or encoding an amino acid sequence having not less than 98% identity thereto; preferably a polynucleotide comprising replacement of the amino acid corresponding to glutamic acid at position 1202 of SEQ ID NO:2 (position 177 of SEQ ID NO:5) with glycine, replacement of the amino acid corresponding to glutamic acid at position 1056 (position 31 of SEQ ID NO:5) with valine, and replacement of the amino acid corresponding to alanine at position 2199 (position 1174 of SEQ ID NO:5) with threonine. | 2012-08-09 |
20120204280 | DRG11-RESPONSIVE (DRAGON) GENE FAMILY - This invention features methods and compositions useful for treating and diagnosing diseases of the nervous system, retina, skin, muscle, joint, and cartilage using a Dragon family protein. Protein and nucleic acid sequences of human, murine, zebrafish, and | 2012-08-09 |
20120204281 | DRG11-RESPONSIVE (DRAGON) GENE FAMILY - This invention features methods and compositions useful for treating and diagnosing diseases of the nervous system, retina, skin, muscle, joint, and cartilage using a Dragon family protein. Protein and nucleic acid sequences of human, murine, zebrafish, and | 2012-08-09 |
20120204282 | METHODS AND COMPOSITIONS FOR TREATING OCCULAR DISORDERS - Disclosed herein are methods and compositions for treating ocular disorders. | 2012-08-09 |
20120204283 | Spearmint Plant Mentha spicata L. Denominated KI-MsEM0042 - A new and distinct cultivar of | 2012-08-09 |
20120204284 | TOMATO FRUIT HAVING INCREASED FIRMNESS - This invention relates to a tomato fruit with significantly increased firmness due to the presence of at least one genetic element (or quantitative trait loci; QTLs) in the cultivated plant producing said tomato fruit, compared to fruit from a control tomato plant which does not have said genetic element(s). A cultivated tomato plant producing tomato fruit with significantly increased fruit firmness and a method for detecting QTLs linked to significantly increased fruit firmness are also provided. | 2012-08-09 |
20120204285 | Rice Cultivar Designated 'CL261' - Hybrids and derived cultivars of the rice cultivar designated ‘CL261’ are disclosed. The invention relates to hybrid rice seeds and plants produced by crossing the cultivar ‘CL261’ with another rice cultivar. The invention further relates to other derivatives of the rice cultivar ‘CL261.’ | 2012-08-09 |
20120204286 | HO/LL CANOLA WITH RESISTANCE TO CLUBROOT DISEASE - This disclosure concerns a plant of the genus, | 2012-08-09 |
20120204287 | VIRAL BASED TRANSIENT-EXPRESSION VECTOR SYSTEM THAT ALLOWS MULTIPLE APPLICATIONS - Disclosed herein are viral vectors suitable for transfection into woody trees for purposes of delivering and expressing beneficial genes. Specifically exemplified herein are vectors for transfecting citrus trees. The vectors allow for the expression of useful proteins, such as those that can protect the tree from disease. Specifically exemplified herein are methods of transfecting woody trees that allow multiple applications of vectors while avoiding superinfection exclusion. | 2012-08-09 |
20120204288 | DROUGHT TOLERANT PLANTS AND RELATED CONSTRUCTS AND METHODS INVOLVING GENES ENCODING SELF-INCOMPATIBILITY PROTEIN RELATED POLYPEPTIDES - Isolated polynucleotides and polypeptides and recombinant DNA constructs useful for conferring drought tolerance, compositions (such as plants or seeds) comprising these recombinant DNA constructs, and methods utilizing these recombinant DNA constructs. The recombinant DNA construct comprises a polynucleotide operably linked to a promoter that is functional in a plant, wherein said polynucleotide encodes an SIPR polypeptide. | 2012-08-09 |
20120204289 | Manipulation of flavonoid biosynthetic pathway - The present invention relates to a method of identifying a gene encoding a polypeptide or polypeptide isoform which is substantially more active in either a proanthocyanidin (PA) or anthocyanin (ANT) pathway of a plant, said method including providing material from said plant; and an oligonucleotide probe capable of hybridizing with RNA from a gene encoding a polypeptide which is active in a flavonoid biosynthetic pathway; extracting RNA from said plant material; hybridizing the oligonucleotide probe with the RNA to generate an expression profile; measuring PA and/or ANT levels in said plant material to generate a metabolic profile; comparing said expression profile with said metabolite profile to identify said gene encoding a polypeptide or polypeptide isoform which is substantially active in either a PA or ANT pathway. | 2012-08-09 |
20120204290 | AGRONOMICALLY ELITE LETTUCE WITH QUANTITATIVE BREMIA LACTUCA RESISTANCE - The invention provides compositions and methods relating to the separation of quantitative Downy Mildew resistance traits from linked but undesirable agronomic traits. The invention further provides plants, plant parts, and seeds comprising such Downy Mildew Resistance traits, which do not comprise alleles specifying undesirable agronomic traits that are genetically linked to the resistance traits. | 2012-08-09 |
20120204291 | STRESS TOLERANT PLANTS - The invention relates to methods for increasing stress tolerance in plants by expressing a nucleic acid encoding a FId polypeptide and a nucleic acid sequence encoding a FNR polypeptide in a plant. | 2012-08-09 |
20120204292 | STRESS RESISTANT PLANTS - Stress tolerance in plants and plant cells is achieved by using nucleotide sequences encoding enzymes involved in the NAD salvage synthesis pathway and/or the NAD de novo synthesis pathway from fungal or yeast like organisms other than | 2012-08-09 |
20120204293 | GLYPHOSATE TOLERANT ALFALFA EVENTS AND METHODS FOR DETECTION THEREOF - The present invention provides for alfalfa events J-101 and J-163 and DNA molecules unique to these events. The invention also provides methods for detecting the presence of these DNA molecules in a plant sample. | 2012-08-09 |
20120204294 | Method for Seed Devitalization - The invention provides a method for devitalizing plant seed, the method comprising the steps of hydrating a viable whole plant seed and freezing the hydrated whole plant seed. The invention further provides a collection of devitalized whole plant seed wherein the integrity of genomic DNA and protein within the devitalized plant seed is preserved. | 2012-08-09 |
20120204295 | FAST-SCANNING SPM SCANNER AND METHOD OF OPERATING SAME - A high-bandwidth SPM tip scanner includes an objective that is vertically movable within the scan head to increase the depth of focus for the sensing light beam. Movable optics also are preferably provided to permit targeting of the sensing light beam on the SPM's probe and to permit the sensing light beam to track the probe during scanning. The targeting and tracking permit the impingement of a small sensing light beam spot on the probe under direct visual inspection of focused illumination beam of an optical microscope integrated into the SPM and, as a result, permits the use of a relatively small cantilever with a commensurately small resonant frequency. Images can be scanned on large samples having a largest dimension exceeding 7 mm with a resolution of less than 1 Angstrom and while scanning at rates exceeding 30 Hz. | 2012-08-09 |
20120204296 | Multiple modulation heterodyne infrared spectroscopy - A heterodyne detection technique for highly localized IR spectroscopy based on an AFM. A pulsed IR source illuminates a sample and causes contact resonance of an AFM probe, which is a function of localized absorption. The probe is operated in intermittent contact mode and is therefore oscillated at a resonance frequency. A secondary oscillation is mixed in to the probe oscillation such that the sum of the secondary oscillation and the IR source pulse frequency is near another harmonic of the probe. A mixing effect causes measurable probe response at the other harmonic allowing data to be taken away from the pulse frequency, resulting in background effect rejection and improved spatial resolution. | 2012-08-09 |
20120204297 | Scanning Probe Microscope and Method of Observing Sample Using the Same - Optical information and topographic information of the surface of a sample are measured at a nanometer-order resolution and with high reproducibility without damaging a probe and the sample by combining a nanometer-order cylindrical structure with a nanometer-order microstructure to form a plasmon intensifying near-field probe having a nanometer-order optical resolution and by repeating approach/retreat of the probe to/from each measurement point on the sample at a low contact force. | 2012-08-09 |
20120204298 | Apple tree rootstock named 'G.890' - The present invention relates to a new and distinct variety of apple tree rootstock named ‘G.890.’ The ‘G.890’ apple tree rootstock is a dwarfing rootstock that is resistant to fire blight ( | 2012-08-09 |
20120204299 | Apple tree rootstock named 'G210' - A new and distinct variety of apple tree rootstock | 2012-08-09 |
20120204300 | Variety of thunbergia plant named 'NEBTHU 007' - ‘NEBTHU 007’ is a new variety of | 2012-08-09 |
20120204301 | Gerbera Plant Named 'UFGE 4141' | 2012-08-09 |
20120204302 | Gerbera plant named 'UFGE 7014' | 2012-08-09 |