18th week of 2011 patent applcation highlights part 78 |
Patent application number | Title | Published |
20110107393 | Enforcing a File Protection Policy by a Storage Device - A file attribute, which is called herein “enforcement bit”, is used for each file that is stored in a storage device. If the protection particulars associated with a stored file are allowed to be changed, the enforcement bit is set to a first value, and if the protection particulars or properties are not to be changed, the enforcement bit is set to a second value. When the storage device is connected to a host device, the storage device provides to the host device protection particulars and an enforcement bit, which collectively form a “file protection policy”, for each stored file in response to a file system read command that the host device issues, in order to notify the host device of files in the storage device whose protection particulars are allowed to be changed freely, and of files whose protection particulars are not allowed to be changed by unauthorized users or devices. | 2011-05-05 |
20110107394 | AUTHENTICATION METHODS AND DEVICES - Embodiments of the device have a plurality of authentication slots for authenticating users, a port configured to receive an authentication request from a user, a memory, a queue maintained in the memory, and a processing engine configured to monitor the port and the authentication slots such that if an authentication request from a user is received and no authentication slots are available, an identifier associated with the user is enqueued on the queue, and wherein if one of the authentication slots is or becomes available and the queue is not empty, an identifier is dequeued from the queue and the associated user is authenticated using one of the available authentication slots. | 2011-05-05 |
20110107395 | METHOD AND APPARATUS FOR PROVIDING A FAST AND SECURE BOOT PROCESS - An apparatus for providing a fast and secure boot process may include at least one processor and at least one memory including computer program code. The at least one memory and the computer program code may be configured to, with the at least one processor, cause the apparatus to perform at least performing a first security check on critical security software during a boot sequence of a device, powering down or resetting the device in response to failure of the first security check, performing a second security check on at least a first portion of general critical software in response to the first security check passing, enabling operation of the device with respect to general critical software that passes the second security check, and disabling functionality associated with general critical software that fails the second security check. | 2011-05-05 |
20110107396 | AUTHENTICATION METHOD, INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM - An information processing apparatus acquires user name information contained in user authentication information transmitted from an authentication server. Then, the information processing apparatus describes the acquired user name information according to a predetermined format which the printer driver can refer to, and stores it in a storage area which the printer driver can refer to. The printer driver, if the user name information is stored in the storage area, and the user name information satisfies a condition described in the format, transmits the user name information added to the print data to a printer apparatus. | 2011-05-05 |
20110107397 | System, Method and Computer Program Product for Securing Legal Documents - A system, method and computer program product for securing legal documents includes connecting to a server for exchanging at least one document with a contracting party. Identities of contracting parties and ownership of the at least one document are authenticated by the server. The at least one document is exchanged with the contracting party for conducting a business transaction. The at least one document is communicated through the server and content of the at least one document is stored as read-only in a secured data bank along with at least a date and time of the exchange and locations and identities of contracting parties engaged in the business transaction. | 2011-05-05 |
20110107398 | SYSTEM AND METHOD FOR TRANSPARENT ACCESS AND MANAGEMENT OF USER ACCESSIBLE CLOUD ASSETS - System and method for enabling user access of cloud assets are described. In one embodiment, a method comprises authenticating a user to a system comprising a cloud computing environment in which a plurality of cloud assets are hosted; assembling a deployment associated with the authenticated user in accordance with a policy, the deployment comprising designated ones of the cloud assets; and providing a secure mechanism by which the designated ones of the cloud assets comprising the deployment are accessible by the authenticated user. | 2011-05-05 |
20110107399 | AUTHENTICATION TECHNIQUES - Techniques for authenticating clients of differing capabilities in an efficient manner. Two or more authentication techniques, including one preferred authentication technique, are initiated to run in parallel to authenticate a client. Upon determining that the client can support the preferred authentication technique, the preferred technique is used to authenticate the client and the other authentication techniques are aborted. If it is determined that the client cannot support the preferred authentication technique, then one of the other authentication techniques is used to authenticate the client. In this manner, based upon the capabilities of the client, an appropriate authentication technique is used to authenticate the client in an efficient manner. | 2011-05-05 |
20110107400 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR RECOVERING A PASSWORD USING USER-SELECTED THIRD PARTY AUTHORIZATION - A password recovery technique for access to a system includes receiving a request from a first party to recover the first party's password to access the system, receiving a selection of a second party from the first party, sending a message to the second party requesting that the second party authorize the request to recover the first party's password, receiving authorization from the second party for the request to recover the first party's password, and resetting the first party's password responsive to receiving authorization from the second party. | 2011-05-05 |
20110107401 | ESTABLISHING TRUST RELATIONSHIPS BETWEEN COMPUTER SYSTEMS - An offline trust system establishes a trust relationship between a trust authority computer system and a target computer system without relying on an active network connection between the computer systems. The offline trust system separates the trust establishment operation into a provisioning phase and a configuration phase. The provisioning phase can be performed entirely on the trust authority, while the configuration phase can be performed entirely on the target computer system requesting trust. The two phases can be performed at different times and do not assume any connection between the two computer systems. An administrator may perform the provisioning phase for many target computer systems at the same time. Thus, the offline trust system provides a way to establish trust between computer systems that is more reliable and less prone to failure. | 2011-05-05 |
20110107402 | CLIENT SERVER SYSTEM, CLIENT APPARATUS AND SERVER APPARATUS DISPLAYING CONTENTS OF PROVIDED SERVICES - A client server system allowing easy selection of a provided service is provided. In the client server system, a server apparatus includes: an HDD storing a service ID and a user ID indicating a user who is logged in to the service in association with each other; a control unit searching for a service logged in by the user who is logged in to the MFP based on the information stored in the HDD, in response to an inquiry from MFP; and an LAN I/F transmitting the result of search by the control unit to the MFP. The MFP is adapted to include: an operation panel; an inquiry function of a control unit for inquiring of the server about the logged-in service; an LAN I/F receiving the result of search; and a display control function of the control unit, causing the operation panel to display an image indicating the logged-in service, based on the received result of search. | 2011-05-05 |
20110107403 | COMMUNICATION SYSTEM, SERVER APPARATUS, INFORMATION COMMUNICATION METHOD, AND PROGRAM - A communication system includes a terminal, a first server apparatus that manages the movement of the terminal, and a second server apparatus that performs authentication of the terminal. The first server apparatus uses AAA protocol to transmit a first message that includes a pseudo-NAI of the terminal to the second server apparatus. The second server apparatus both records the pseudo-NAI and true-NAI of the NAI of the terminal in association with each other and records maintenance function execution necessity information indicating whether a maintenance function must be executed for the terminal in association with the true-NAI of the terminal, and upon reception of the first message from the first server apparatus, uses AAA protocol to transmit a second message that contains the maintenance function execution necessity information that was placed in correspondence with the pseudo-NAI that was contained in the first message to the first server apparatus. | 2011-05-05 |
20110107404 | PROTECTED PREMISES NETWORK APPARATUS AND METHODS - Apparatus and methods for enabling protected premises networking capabilities. In one embodiment, the premises network is a Multimedia over Coaxial Alliance (MoCA) network, and is secured by a requirement that devices use a password or key to access the network. The password may be given only to authorized devices. Information regarding a device may be utilized to associate the device with a particular premises network, and provide a password to authorized devices. The password is unique to the premises in one variant by being derived from a subscriber account. At least one of the devices requesting access to the premises network may comprise a gateway device. A home network utilizing existing coaxial cable in the premises is created between a plurality of authorized devices each receiving the password. | 2011-05-05 |
20110107405 | METHOD FOR THE TEMPORARY PERSONALIZATION OF A COMMUNICATION DEVICE - The invention relates to a method for the temporary personalization of a communication device ( | 2011-05-05 |
20110107406 | SYSTEMS AND METHODS TO SECURE A VIRTUAL APPLIANCE - The present disclosure relates to systems and methods for providing secure support to virtual appliances delivered to customer sites without passwords or enabled ports for service. A virtual appliance may be established on a first device. The virtual appliance may comprise a self-contained virtual machine with a pre-installed operating system and may be established with no root password enabled and a remote access port disabled. An administration tool may receive from a requestor a request to enable maintenance for the virtual appliance. The administration tool may generate, responsive to the request, a random password. The administration tool may enable, responsive to the request, the remote access port. The virtual appliance may wait for a connection to the remote access port for a predetermined period of time. The administration tool may transmit the random password to a service of a second device remote to the first device. | 2011-05-05 |
20110107407 | NEW METHOD FOR SECURE SITE AND USER AUTHENTICATION - The present invention provides a new method of site and user authentication. This is achieved by creating a pop-up window on the user's PC that is in communication with a security server, and where this communication channel is separate from the communication between the user's browser and whichever web site they are at. A legitimate web site embeds code in the web page which communicates to the security server from the user's desktop. The security server checks the legitimacy of the'web site and then signals both the web page on the user's browser, as well as the pop-up window to which it has a separate channel. The security server also sends a random image to both the pop-up window and the browser. If user authentication is requested by the web site the user is first authenticated by the security server for instance by out of band authentication. Then the security server computes a one time password based on a secret it shares with the web site and sends it to the pop up window. The user copies this one time password into their browser which sends it to the web site, which can re-compute the one time password to authenticate the user. | 2011-05-05 |
20110107408 | METHOD AND DEVICE FOR SECURING DATA TRANSFERS - The method for securing data transfers comprises: A transmission of a document from a document sender to a least one document recipient, by implementing at least one step of processing of said document, by implementing at least one step of processing of said document, for at least one said step of processing of the document, a step of measuring a probative value of said processing step, a step of aggregating the probative values of the steps of processing of said transmission to provide a measure of the overall probative value of said document transmission, and a step of association of said overall probative value with said transmission of said document. | 2011-05-05 |
20110107409 | Single Sign On For a Remote User Session - A user accesses a remote session, the connection to which is managed by a connection broker, according to a single sign-on (SSO) process. The SSO process includes the user entering his or her credentials and being authenticated to the connection broker. In addition to user authentication, the SSO process includes connection broker authentication to confirm that the connection broker is trustworthy. When the connection broker is authenticated, the user credentials are transmitted to the connection broker in a secure manner and the connection broker forwards them onto a machine hosting the remote session so that the user can be logged into the remote session without entering his or her credentials again. | 2011-05-05 |
20110107410 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR CONTROLLING SERVER ACCESS USING AN AUTHENTICATION SERVER - An access request message is received at an authentication server computer, the access request message identifying an address of an access requesting client device. The authentication server authenticates the access request message and transmits an access authorization message from the authentication server computer to a blocking device that controls access to the protected server computer, the access authorization message identifying the address of the access requesting client device. Access to the protected server computer via the blocking device is controlled responsive to the access authorization message. | 2011-05-05 |
20110107411 | SYSTEM AND METHOD FOR IMPLEMENTING A SECURE WEB APPLICATION ENTITLEMENT SERVICE - System and method for implementing a secure web application entitlement service are described. One embodiment of the system comprises a plurality of entitlement point records each comprising a unique identifier associated therewith such that each of the enforcement point records can be associated with an enforcement point within an application; an identity service (“IS”) configured to provide a first token for enabling a user to access the application; an access gateway configured to provide a second token, the second token including a list of at least a portion of the unique identifiers; an entitlement server (“ES”) configured to receive an entitlement request from the application, the entitlement request including the second token, the ES further configured to associate the entitlement request with a user-authenticated session in the IS; and a policy decision point (“PDP”) configured to receive the list of at least a portion of the unique identifiers and to render a decision on the entitlement request based at least in part on policy information associated with ones of the enforcement point records identified by the unique identifiers of the list and attribute information from the IS; wherein subsequent to the rendering of a decision by the PDP, the decision is communicated to the application. | 2011-05-05 |
20110107412 | APPARATUS FOR DETECTING AND FILTERING DDOS ATTACK BASED ON REQUEST URI TYPE - Provided is an apparatus for detecting and responding to a DDoS attack. The apparatus includes: a receiver unit configured to receive an HTTP request from a client terminal having a predetermined IP address; a data measuring unit configured to compute a number of a pre-defined URI in the received HTTP request by IP for a predetermined measuring time period; a DDoS discrimination unit configured to compare the computed number of the pre-defined URI with a pre-defined threshold and configured to detect an access of the client terminal with the IP address as the DDoS attack when the number of the pre-defined URI is greater than the threshold; and a blocking unit configured to block the access of the client terminal when the DDoS discrimination unit detects the DDoS attack. | 2011-05-05 |
20110107413 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING A VIRTUAL PRIVATE GATEWAY BETWEEN USER DEVICES AND VARIOUS NETWORKS - A communication network is operated by receiving traffic from a user device at a gateway device associated with a gateway service provider, which manages gateways to both secure and insecure networks. The gateway uses security policies to determine if traffic is destined to the secure or insecure network and applies appropriate policies which cause the traffic to be routed, dropped, or analyzed. | 2011-05-05 |
20110107414 | System and Method for Location Assisted Virtual Private Networks - A system and method for location assisted virtual private networks (VPNs). Users can create location uncertainty by logging into a VPN server that geographically remote from the present location. Geographic information provided by a VPN client along with or in combination with identification information can be used to resolve such location uncertainty. An accurate indication of the location of a VPN client can be used for operations, administration, maintenance, and provisioning purposes. | 2011-05-05 |
20110107415 | PORTABLE COMPUTING DEVICE AND HEADSET INTERFACE - A method of authenticating the interoperability of a headset and a device, as well as a headset and a device, is provided. The method includes, in a headset, monitoring at least one input for a verification signal, and, in response to failing to detect the verification signal within a predetermined period of time, selectively disabling a speaker and/or microphone of the headset. An alternative method includes, in a device, detecting a coupling of a headset to the device, transmitting a verification signal to the headset, and receiving, from the headset, at least one of a serial number associated with the headset, an identification of a user of the headset, a security certificate, or a voice translation template associated with the user. | 2011-05-05 |
20110107416 | PORTABLE DEVICE HAVING BIOMETRICS-BASED AUTHENTICATION CAPABILITIES - Apparatus and method for implementing biometrics-based authentication. In a preferred embodiment, the present invention is embodied in a portable device. Specifically, in one embodiment, the portable device includes a microprocessor, a non-volatile memory coupled thereto, and a biometrics-based authentication module controlled by the microprocessor. Preferably, the biometrics technology used is fingerprint authentication technology. The authentication module is capable of registering a fingerprint upon first use of the portable device, storing an encoded version of the fingerprint in the non-volatile memory. Subsequently, the authentication module can read a person's fingerprint and reliably determine whether the fingerprint matches the registered fingerprint stored in the non-volatile memory. If a match is found, access to information in the non-volatile memory is granted to that person; otherwise, access is denied. Embodiments of the present invention thus provide a highly convenient, secured and reliable method and system for user authentication and access control which was not achievable in prior art password-based authentication approaches. | 2011-05-05 |
20110107417 | Detecting AP MAC Spoofing - Detecting access point MAC spoofing in a wireless digital network. A sensor in a wireless digital network learns the MAC address and operating channel for at least one access point. If the sensor detects frames being sent to a MAC address on a channel other than the channel associated with that MAC address, then the access point associated with the MAC address is being spoofed. These frames may be association frames, or data frames. If the sensor is running as part of an access point the sensor also knows what clients are associated with the access point. If the sensor detects frames indicating association, such as data frames, sent to its MAC address, but the client is not associated with the access point, then the access point is being spoofed. Similarly, if the sensor receives frames on a channel other than that associated with the access point and receives traffic for the access point's MAC address, the access point is being spoofed. The sensor may be a separate device on the wireless network, or may be functionality included in one or more access points on the network. | 2011-05-05 |
20110107418 | DETECTING ANOMALIES IN ACCESS CONTROL LISTS - An access control anomaly detection system and method to detect potential anomalies in access control permissions and report those potential anomalies in real time to an administrator for possible action. Embodiments of the system and method input access control lists and semantic groups (or any dataset having binary matrices) to perform automated anomaly detection. This input is processed in three broad phases. First, policy statements are extracted from the access control lists. Next, object-level anomaly detection is performed using thresholds by categorizing outliers in the policies discovered in the first phase as potential anomalies. This object-level anomaly detection can yield object-level security anomalies and object-level accessibility anomalies. Group-level anomaly detection is performed in the third phase by using semantic groups and user sets extracted in first phase to find maximal overlaps using group mapping. This group-level anomaly detection can yield group-level security anomalies and group-level accessibility anomalies. | 2011-05-05 |
20110107419 | SYSTEMS AND METHODS FOR IMPROVED IDENTIFICATION AND ANALYSIS OF THREATS TO A COMPUTING SYSTEM - A security tool can access a tagging tool and the history generated by the tagging tool in order to identify potential threats and analyze the identified threats. When a potential threat is detected or an actual threat is identified, the security tool can request the history of actions from the tagging tool corresponding to the threat. The security tool can compare the potential or actual threat with the history of any action recorded by the tagging tool in order to classify a potential threat as an actual threat or determine the source or cause of an actual threat. | 2011-05-05 |
20110107420 | LOCATOR CODING IN A COMMUNICATIONS NETWORKS - A method for use in interconnected communications networks, comprising negotiating a locally unique interface identifier between a network entity and a network such that the locally unique interface identifier differs from any interface identifier used by either of the network entity and the network; and using the locally unique interface identifier to identify an egress interface from the network entity to the network, and using the locally unique interface identifier to identify an egress interface from the network to the network entity. By using a common locally unique interface identifier between networks and network entities on a path between a source or destination network entity and a core network, a globally unique locator for the source or destination network entity can be constructed by concatenating elements derived from a plurality of negotiated common local interface identifiers between networks and network entities on the path. | 2011-05-05 |
20110107421 | METHOD AND APPARATUS FOR PROVIDING FRAUD DETECTION USING CONNECTION FREQUENCY THRESHOLDS - An approach provides detection of unauthorized use of data services. A determination is made as to whether connections supporting remote access to a data network are completed. The number of completed connections associated with a selected attribute is tracked over a time period. It is then determined whether the number of completed connections satisfies a connection frequency threshold. A fraud alert is generated if the connection frequency threshold is satisfied. | 2011-05-05 |
20110107422 | EMAIL WORM DETECTION METHODS AND DEVICES - Embodiments of the invention provide a network device for detecting email worms having a port for receiving packets and a processing engine configured to inspect packets received on the port, wherein if a predetermined number of packets sent from a client represent DNS queries, the client is identified as being infected. | 2011-05-05 |
20110107423 | PROVIDING AUTHENTICATED ANTI-VIRUS AGENTS A DIRECT ACCESS TO SCAN MEMORY - A computer platform may support anti-virus agents that may be provided access to directly scan the memory. The computer platform may comprise a platform control hub, which may comprise a manageability engine and a virtualizer engine, wherein the manageability engine may allow the anti-virus agents to be downloaded to a platform hardware space that is isolated from an operating system. The manageability engine may authenticate the anti-virus agents and provide an access for the anti-virus agents to directly scan a memory or a storage device coupled to the platform hardware. | 2011-05-05 |
20110107424 | Rollback Feature - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for rolling back protection processes. In one aspect, a method includes determining that a file is a malicious file, storing a duplicate of the file in a quarantine area, performing one or more protection processes on the file, if the determination that the file is a malicious file is a false positive determination, restoring the file by a pre-boot rollback process to a state prior to the one or more protection processes performed on the file, and booting the computer with the restored file, and if the determination that the file is a malicious file is not a false positive determination, not restoring the file to a state prior to the one or more protection processes performed on the file, and booting the computer. | 2011-05-05 |
20110107425 | APPARATUS AND METHOD FOR PERFORMING VIRUS SCAN IN PORTABLE TERMINAL - An apparatus and method are provided in which, in order to avoid a situation where a vaccine installed in a portable terminal is damaged by a virus and thus a virus scan process cannot be normally performed, when the portable terminal operates as a removable disk or when an external memory is placed in the portable terminal, whether the vaccine installed in the portable terminal is damaged is determined to recover the damaged vaccine, and a version of the vaccine installed in the portable terminal is determined to update the vaccine to the latest version. The apparatus includes a memory divided into a storage area and a backup area to install a vaccine in the storage area and to back up the vaccine in the backup area. | 2011-05-05 |
20110107426 | COMPUTING SYSTEM USING SINGLE OPERATING SYSTEM TO PROVIDE NORMAL SECURITY SERVICES AND HIGH SECURITY SERVICES, AND METHODS THEREOF - A method of providing normal security services and high security services with a single operating system in a computing system is disclosed. A secure thread is only accessible while the computing system is in a high security environment, and relates to one of the high security services. A pseudo normal thread is to be executed while the computing system in a normal security environment, and it works as a temporary of the secure thread, and is forwarded to a thread ordering service to gain access to resources of the computing system. When the pseudo normal thread gains access to the computing system resources, the computing system is changed to the high security environment to execute the secure thread. | 2011-05-05 |
20110107427 | Obfuscating reception of communique affiliated with a source entity in response to receiving information indicating reception of the communique - A computationally implemented method includes, but is not limited to: receiving communiqué reception information that indicates reception of a communiqué that is affiliated with a source entity and that is directed to an end user; and presenting, in response to receiving the communiqué reception information and in lieu of presenting direct indication of reception of the communiqué, a covert indicator that covertly indicates reception of the communiqué, the presenting of the covert indicator being in accordance with one or more conditional directives of the end user to conditionally obfuscate the reception of the communiqué affiliated with the source entity. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 2011-05-05 |
20110107428 | METHOD AND SYSTEM FOR ENABLING TRANSMISSION OF A PROTECTED DOCUMENT FROM AN ELECTRONIC DEVICE TO A HOST DEVICE - A method and a system for enabling transmission of a protected document from an electronic device to a host device are provided. The method includes: establishing a connection with between the electronic device by and the host device to communicate with the electronic device using a document viewer protocol; receiving a request by the electronic device from the host device for performing at least one operation on the protected document, wherein the protection of the protected document is specific to the electronic device; decoding the protected document by the electronic device on receiving the request; arranging the decoded protected document in accordance with the received request and the document viewer protocol; and transmitting the arranged protected document to the host device via a transport medium using the document viewer protocol. | 2011-05-05 |
20110107429 | SYSTEM AND METHOD FOR MANAGING ACCESSIBILITY TO REAL OR VIRTUAL OBJECTS IN DIFFERENT LOCATIONS - A system (S), dedicated to managing accessibility to objects in different locations (L | 2011-05-05 |
20110107430 | UPDATING AN OPERATING SYSTEM OF A COMPUTER SYSTEM - The present invention provides a processor-implemented method and system of updating an operating system of a computer system, where the operating system is subject to a system lockdown that does not allow changes to a list of approved executables of the operating system and that does not allow changes to a base system configuration of the operating system. In an exemplary embodiment, the method and system include, (1) identifying at least one trusted updater process in the operating system and (2) allowing the trusted updater process to make at least one change to the list of approved executables. In an exemplary embodiment, the method and system include, (1) identifying at least one trusted updater process in the operating system and (2) allowing the trusted updater process to make at least one change to the base system configuration. | 2011-05-05 |
20110107431 | METHOD AND APPARATUS FOR PROTECTING AN EMBEDDED CONTENT OBJECT - An approach is provided for protecting an embedded content object. A content object binding manager receives a request, from a user, for a content object. In response to the request, the binding manager causes, at least in part, actions that result in transmission of the content object including an unassociated binding key to the user. The user may embed the content object in a displayable medium. The binding manager then detects a first access of the content object in the displayable medium at a host and binds the content object to the host using the unassociated binding key in response to the detection. | 2011-05-05 |
20110107432 | COMPUTER READABLE MEDIUM STORING INFORMATION PROCESSING PROGRAM, INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING SYSTEM - A computer readable medium storing a program causing a computer to execute a process for information processing includes: reading, from a storage unit, setting information used in processing performed by an apparatus and prohibited matter information including at least a setting to avoid a prohibited matter at setting in the apparatus; and extracting a setting to avoid the prohibited matter changeable regarding at least a part of restricted setting information in the setting information read at the reading step, and making a setting not to perform the extracted setting. | 2011-05-05 |
20110107433 | System and Method for Creating and Marketing Authentic Virtual Memorabilia - An advertising engine, system and method of using is described. The engine includes at least one vault including a plurality of media assets, a recommendation engine that matches at least one media asset from the vault with at least one requested creative, a delivery engine that integrates the requested creative with the matched media assets from the vault, and a management engine that regulates and/or tracks ones of the at least one media asset. | 2011-05-05 |
20110107434 | PRIVACY THROUGH ARTIFICIAL CONTEXTUAL DATA GENERATION - Embodiments of the present disclosure provide a method and system for protecting privacy by generating artificial contextual data. The system collects real contextual data related to a user. The system then generates artificial contextual data, based on the collected real contextual data. The system also groups the generated contextual data into one or more groups. Each group of contextual data corresponds to a persona that can be presented as the user's persona. Subsequently, the system transmits the generated contextual data to an entity, thereby allowing the user to obscure the real contextual data related to the user. | 2011-05-05 |
20110107435 | STORAGE MEDIUM HAVING INFORMATION PROCESSING PROGRAM STORED THEREIN, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING SYSTEM - An information processing apparatus displays, on a display device, personal information including person-identifying information based on which a person can be identified and non-person-identifying information based on which a person cannot be identified. First, the information processing apparatus determines whether or not authentication of a user has succeeded based on an input by the user and authentication information stored in storage means of the information processing apparatus. Then, the information processing apparatus prohibits display of the person-identifying information of the personal information stored in the storage means when it is determined that authentication has failed. | 2011-05-05 |
20110107436 | APPARATUS AND METHODS FOR DEVICE AUTHORIZATION IN A PREMISES NETWORK - Apparatus and methods for enabling protected premises networking capabilities. In one embodiment, a white list of devices authorized to access a premises network and a black list of device not authorized to access a premises network are utilized. The black and white lists may be stored at a database in communication with an authorization manager or may be stored at the manager itself. When a client device is connected to a premise, the manager determines, based on the premises and/or device identity, whether the device is entitled to access. The authorization manager makes this determination based on whether the device is on the white or black list. If the device is on neither list, the manager may add the device to the white list upon appropriate verification. The manager may also facilitate removal of a device from the white list to the black list upon request or automatically. | 2011-05-05 |
20110107437 | SYSTEM FOR PROVIDING MOBILE DATA SECURITY - A system transfers applications and datasets (files) from a server to a client device and assigns to each file a lease key that will expire at a specified time. A file cannot be accessed unless its lease key is validated. Upon expiration of a lease key, the client device will connect to the server to determine if the lease key may be renewed. If the lease key may be renewed, a new lease key is created and access to the associated application or dataset is restored. If the lease key may not be renewed, the file may be deleted or rendered inaccessible. If rendered inaccessible, the file may be restored in the future without having to re-transmit it from the server to the client device. The server may also revoke a lease key before it expires. | 2011-05-05 |
20110107438 | SYSTEM AND METHOD FOR ALLOWING COPYING OR DISTRIBUTION OF A COPY PROTECTED SIGNAL - A copy protection system and method for allowing copying or distribution of a copy protected signal is disclosed. One embodiment includes an apparatus and method for receiving a content signal via a WiFi communications channel, the content signal including a control signal; and using a modifying circuit coupled with the WiFi communications channel to generate an analog copy protection signal based on the control signal, the control signal causing the modifying circuit to add or delete the analog copy protection signal to or from the content signal. | 2011-05-05 |
20110107439 | DIAGNOSTIC OF PRE-SYMPTOMATIC METABOLIC SYNDROME - The invention relates to a method for diagnosing pre-symptomatic metabolic syndrome in a subject, wherein said method comprises determining the expression level of a gene represented by a sequence selected from the group consisting of SEQ ID NO: 1-18 in a subject. The invention described target genes for preventing or stopping further progress of metabolic syndrome into clinical disease states. | 2011-05-05 |
20110107440 | SKIN CANCER ASSOCIATED MICRORNAS - This invention relates to the finding that skin cancers, such as squamous cell carcinoma and basal cell carcinoma, are characterized by changes in the expression of specific microRNA molecules (miRNAs). These miRNAs may therefore be useful as biomarkers for skin cancers as well as therapeutic targets. Methods of diagnosis and treatment of skin cancers are provided, as well as methods of screening for therapeutic compounds. | 2011-05-05 |
20110107441 | ANIMALS WITH REDUCED BODY FAT AND INCREASED BONE DENSITY - Methods for identifying animals as having reduced body fat and increased bone density are provided herein. Also provided herein are methods for generating animals having reduced body fat and increased bone density. The methods provided herein are based on the effect of TLR4, MD-2, and CD14 activity on body fat and bone density. | 2011-05-05 |
20110107443 | NOVEL PROTEIN TRANSDUCTION DOMAINS DERIVED FROM SECRETORY LEUKOCYTE PROTEASE INHIBITOR - This invention relates to novel protein transduction domains (PTDs) derived from secretory leukocyte protease inhibitor (SLPI). SLPI-derived PTDs are able to deliver cargo moieties in vivo and in vitro into the cytoplasm and nucleus of a host cell. The invention also relates to a transduction complex comprising one or more SLPI-derived PTDs linked or fused to one or more cargo moieties, which may comprise, for example, proteins, nucleic acids, lipids, carbohydrates, small molecules and other chemical compounds. The invention also relates to the manufacture of SLPI-derived PTDs, complexes comprising them; compositions comprising SLPI-derived PTDs or complexes; and utilization of SLPI-derived PTDs or complexes comprising them for therapeutic, diagnostic and research methods involving delivery of heterologous molecules across cellular membranes, and especially, across nuclear membranes. | 2011-05-05 |
20110107444 | NOVEL POLY(ADP-RIBOSE) POLYMERASE GENES - The invention relates to poly(ADP-ribose)polymerase (PARP) homologs which have an amino acid sequence which has
| 2011-05-05 |
20110107445 | Efficient Insertion of DNA Into Embryonic Stem Cells - The present invention relates, in general, to a method for introducing a heterologous replacement gene sequence into a host embryonic stem cell to replace an endogenous host gene target sequence. In particular, the invention relates to a method for inserting large pieces of DNA into embryonic stem cells with improved efficiency, by first deleting the endogenous host gene target sequence, and subsequently utilising two proximally positioned site-specific recombinase target (RT) sites to insert a heterologous replacement gene sequence into the host chromosome. | 2011-05-05 |
20110107446 | METHODS AND COMPOSITIONS FOR PLANT PEST CONTROL - The present invention is directed to controlling nematode infestation. The invention discloses methods and compositions for use in controlling nematode infestation by providing recombinant DNA molecules to the cells of a plant in order to achieve a reduction in nematode infestation. The invention is also directed to methods for making transgenic plants that express the recombinant DNA molecule for use in protecting plants from nematode infestation. | 2011-05-05 |
20110107447 | Soybean Cultivar S080192 - A soybean cultivar designated S080192 is disclosed. The invention relates to the seeds of soybean cultivar S080192, to the plants of soybean S080192, to plant parts of soybean cultivar S080192, and to methods for producing a soybean plant produced by crossing soybean cultivar S080192 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S080192, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S080192, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S080192 with another soybean cultivar. | 2011-05-05 |
20110107448 | Soybean Cultivar S080191 - A soybean cultivar designated S080191 is disclosed. The invention relates to the seeds of soybean cultivar S080191, to the plants of soybean S080191, to plant parts of soybean cultivar S080191, and to methods for producing a soybean plant produced by crossing soybean cultivar S080191 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S080191, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S080191, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S080191 with another soybean cultivar. | 2011-05-05 |
20110107449 | Soybean Cultivar S080190 - A soybean cultivar designated S080190 is disclosed. The invention relates to the seeds of soybean cultivar S080190, to the plants of soybean S080190, to plant parts of soybean cultivar S080190, and to methods for producing a soybean plant produced by crossing soybean cultivar S080190 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S080190, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S080190, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S080190 with another soybean cultivar. | 2011-05-05 |
20110107450 | Soybean Cultivar S080193 - A soybean cultivar designated S080193 is disclosed. The invention relates to the seeds of soybean cultivar S080193, to the plants of soybean S080193, to plant parts of soybean cultivar S080193, and to methods for producing a soybean plant produced by crossing soybean cultivar S080193 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S080193, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S080193, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S080193 with another soybean cultivar. | 2011-05-05 |
20110107451 | Soybean Cultivar S080119 - A soybean cultivar designated S080119 is disclosed. The invention relates to the seeds of soybean cultivar S080119, to the plants of soybean S080119, to plant parts of soybean cultivar S080119, and to methods for producing a soybean plant produced by crossing soybean cultivar S080119 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S080119, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S080119, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S080119 with another soybean cultivar. | 2011-05-05 |
20110107452 | PLANTS AND SEEDS OF HYBRID CORN VARIETY CH958300 - According to the invention, there is provided seed and plants of the hybrid corn variety designated CH958300. The invention thus relates to the plants, seeds and tissue cultures of the variety CH958300, and to methods for producing a corn plant produced by crossing a corn plant of variety CH958300 with itself or with another corn plant, such as a plant of another variety. The invention further relates to genetic complements of plants of variety CH958300. | 2011-05-05 |
20110107453 | GENETIC LOCI ASSOCIATED WITH RESISTANCE TO TROPICAL RUST IN MAIZE - The invention relates to methods and compositions for identifying maize plants that have increased or decreased resistance to tropical rust. The methods use molecular markers to identify and select plants with increased resistance to tropical rust or to identify and counter-select plants with decreased resistance to tropical rust. Maize plants generated by the methods of the invention are also a feature of the invention. Also of interest are methods used to correlate allelic variation with a trait of interest. | 2011-05-05 |
20110107454 | Method for Preparing a Genetically Modified Grass Having Infertileness - A method is provided for preparing infertility-induced, genetically modified grass. It comprises a) exposing a flower of genetically modified grass to a physical mutagen; (b) culturing the genetically modified grass exposed to the physical mutagen to produce seeds thereof; and (c) culturing the seeds to select an infertility-induced species. | 2011-05-05 |
20110107455 | Novel Selectable Marker Genes - The subject invention relates to a novel gene referred to herein as DSM-2. This gene was identified in | 2011-05-05 |
20110107456 | REPRODUCTIVE ABLATION CONSTRUCTS - The present invention relates to the regulation of reproductive development, particularly to the genetic ablation of reproductive tissues in angiosperm and gymnosperm species. Reproductive-preferred promoters, regulatory elements, and cytotoxic nucleotide sequences are disclosed herein, as are constructs and methods for genetic ablation. | 2011-05-05 |
20110107457 | METHOD FOR PRODUCING A TRANSGENIC PLANT CELL, A PLANT OR A PART THEREOF WITH INCREASED RESISTANCE TO PLANT DISEASE - The invention relates to the control of pathogens. Disclosed herein are methods of producing transgenic plants with increased pathogen resistance, expression vectors comprising polynucleotides encoding for functional proteins, and transgenic plants and seeds generated thereof. | 2011-05-05 |
20110107458 | SOMATIC OVULE SPECIFIC PROMOTER AND METHODS OF USE - Compositions and methods for regulating expression of heterologous nucleotide sequences in a plant are provided. Compositions include nucleotide sequences for an | 2011-05-05 |
20110107459 | GENES AND METHODS FOR INCREASING DISEASE RESISTANCE IN PLANTS - The present invention relates to the regulation of the natural defense system of plants through the introduction of foreign/native genes into plant cells, preferably into their genomes. More specifically, the methods relate to increasing citrus plant disease resistance by over-expressing genes involved in the innate plant defense system. | 2011-05-05 |
20110107460 | NUCLEOTIDE SEQUENCES MEDIATING PLANT MALE FERTILITY AND METHOD OF USING SAME - Nucleotide sequences mediating male fertility in plants are described, with DNA molecule and amino acid sequences set forth. Promoter sequences and their essential regions are also identified. The nucleotide sequences are useful in mediating male fertility in plants. In one such method, the homozygous recessive condition of male sterility causing alleles is maintained after crossing with a second plant, where the second plant contains a restoring transgene construct having a nucleotide sequence which reverses the homozygous condition. The restoring sequence is linked with a hemizygous sequence encoding a product inhibiting formation or function of male gametes. The maintainer plant produces only viable male gametes which do not contain the restoring transgene construct. Increase of the maintainer plant is also provided by self-fertilization, and selection for seed or plants which contain the construct. | 2011-05-05 |
20110107461 | CLONING OF NOVEL GENE SEQUENCES EXPRESSED AND REPRESSED DURING WINTER DORMANCY IN THE APICAL BUDS OF TEA - The present invention relates to cloning of novel gene sequences expressed and repressed during winter dormancy in the apical buds of | 2011-05-05 |
20110107462 | GENES FOR PROMOTING PLANT GROWTH AND USE THEREOF - The invention relates to genes for promoting rapid growth of plant, characterized in genes that are Banana ABC transporter MhPDR1 or MhPDR2 genes, wherein the transporters have amino acid sequences depicted in SEQ ID No: 1 and SEQ ID No: 3, respectively, and the genes have nucleotide sequences depicted in SEQ ID No: 2 and SEQ ID No: 4, respectively. The invention provides further applications of the banana transporter MhPDR1 or MhPDR2 genes, characterized in that the over-expression of the genes in a plant can promote rapid growth of the plant. In addition, the present invention provides a transgenic plant or partial organ, tissue or cells thereof containing the genes or derivatives thereof; as well as provides further a method for promoting rapid growth of a plant. | 2011-05-05 |
20110107463 | TRANSGENIC PLANT CAPABLE OF FLOWERING AT LOW LIGHT INTENSITY - The invention provides a method for producing a flowering plant which can flower at a low light intensity. Specifically, the invention relates to a transgenic plant which can flower in a low light environment; a method for producing the same; a method for inducing the same to flower; and so on. More specifically, the invention relates to a transgenic plant which is engineered so as to flower in a low light environment (e.g., indoors) by introducing a FT gene thereinto; a method for producing the same; a method for inducing the same to flower; and so on. | 2011-05-05 |
20110107464 | Plants Having Enhanced Yield-Related Traits and a Method for Making the Same - The present invention relates generally to the field of molecular biology and concerns a method for enhancing various plant yield-related traits by modulating expression in a plant of a nucleic acid encoding a RHL1 (Root Hairless 1). The present invention also concerns plants having modulated expression of a nucleic acid encoding a RHL1, which plants have enhanced various plant yield-related relative to corresponding wild type plants or other control plants. The invention also provides constructs useful in the methods of the invention. | 2011-05-05 |
20110107465 | Plants Having Enhanced Yield-Related Traits and a Method for Making the Same by Overexpressing a Polynucleotide Encoding a TFL1-Like Protein - The present invention relates generally to the field of molecular biology and concerns a method for enhancing various yield-related traits by modulating expression in a plant of a nucleic acid encoding a TFL1 Like (Terminal Flower Like 1) polypeptide. The present invention also concerns plants having modulated expression of a nucleic acid encoding a TFL1 Like polypeptide, which plants have enhanced yield-related traits relative to corresponding wild type plants or other control plants. The invention also provided hitherto unknown TFL1-Like encoding nucleic acids, and constructs comprising the same, useful in performing the methods of the invention. | 2011-05-05 |
20110107466 | VIRUS VECTOR AND USE THEREOF - It is intended to provide a polynucleotide comprising a viral base sequence, the viral base sequence containing: a first base sequence encoding a viral replication protein, and a second base sequence encoding a viral movement protein, the second base sequence being located downstream of the first base sequence and having a linking site for linking with an exogenous base sequence encoding a polypeptide to be expressed, the linking site being located downstream of the second base sequence, the second base sequence being obtained by modifying with a base sequence in a native sequence derived from a virus by insertion, substitution, or addition. By using this, a vector containing a viral base sequence is constructed, and a protein is efficiently produced without worsening growth of a host cell containing the vector. | 2011-05-05 |
20110107467 | POLYSACCHARIDE SYNTHASES (H) - The present invention relates generally to polysaccharide synthases. More particularly, the present invention relates to (1,3;1,4)-β- | 2011-05-05 |
20110107468 | Plant Regulatory Elements and Uses Thereof - The present invention provides novel regulatory elements for use in plants. The present invention also provides DNA constructs containing these novel regulatory elements; transgenic cells, plants, and seeds containing these novel regulatory elements; and methods for preparing and using the same. | 2011-05-05 |
20110107469 | NOVEL PROTEIN, A GENE ENCODING THEREFOR AND A METHOD OF USING THE SAME - An object of the present invention is to search and identify novel antifungal proteins capable of inhibiting the growth of plant pathogenic microorganisms including | 2011-05-05 |
20110107470 | PRECISE BREEDING - LOW ACRYLAMIDE FOODS - The present invention relates to a new plant breeding process. The process improves the agronomic performance of crop plants by using genetic material that is also used in classical breeding. Instead of sexually recombining entire genomes at random, as is done in classical breeding, specific genetic elements are rearranged in vitro and inserted back into individual plant cells. Plants obtained through this new plant breeding process do not contain foreign nucleic acid but only contain nucleic acid from the plant species selected for transformation or plants that are sexually compatible with the selected plant species. Plants developed through this new plant breeding process are provided. In particular, potato plants displaying improved tuber storage and health characteristics are provided. | 2011-05-05 |
20110107471 | SCANNING PROBE MICROSCOPE HAVING SUPPORT STAGE INCORPORATING A KINEMATIC FLEXURE ARRANGEMENT - A scanning probe microscope (SPM) has a piezoelectric actuator-based tube scanner to which a probe is attached and which is moveable in three planes by the application of a voltage to the piezoelectric tube. A set of flexures flex with the displacement of the tube and strain gauges attached to the flexures measure the flex of the flexures to provide feedback as to the displacement of the tube during the scanning of an object. The strain gauges and flexures form a kinematic sensing frame or arrangement in which a single constraint is provided for each degree of freedom and in which the constraints are at least substantially orthogonal to one another. | 2011-05-05 |
20110107472 | SENSOR FOR QUANTITATIVE MEASUREMENT OF ELECTROMECHANICAL PROPERTIES AND MICROSTRUCTURE OF NANO-MATERIALS AND METHOD FOR MAKING THE SAME - A sensor for quantitative test electromechanical properties and microstructure of nano-materials and a manufacturing method for the sensor are provided. The sensor comprises a suspended structure, pressure-sensitive resistor cantilevers, support beams, bimetallic strip and other components. When the bimetallic strip produces bending deformation, one of the pressure-sensitive resistor cantilevers is actuated and then stretches the low-dimensional nano-materials which drive the other pressure-sensitive resistor cantilever to bend. Through signal changes are outputted by the Wheatstone bridge, the variable stresses of low-dimensional nano-materials are obtained. Meanwhile, the variable strains of low-dimensional nano-materials are obtained by the horizontal displacements between two cantilevers, so the stress-strain curves of low-dimensional nano-materials are worked out. When the low-dimensional nano-materials are measured in the power state, the voltage-current curves are also obtained. In addition, by the help of high resolution imaging system in the transmission electron microscopy, the mechanical-electrical-microstructure relationship of the nano-materials can be recorded in situ and in atomic lattice resolution. | 2011-05-05 |
20110107473 | DIAMOND-LIKE CARBON COATED NANOPROBES - Diamond-like carbon (DLC) coated nanoprobes and methods for fabricating such nanoprobes are provided. The nanoprobes provide hard, wear-resistant, low friction probes for use in such applications as atomic force microscopy, nanomachining, nanotribology, metrology and nanolithography. The diamond-like carbon coatings include a carbon implantation layer which increases adhesion of a deposited DLC layer to an underlying nanoprobe tip. | 2011-05-05 |
20110107474 | Olive Tree Named 'SEPOKA' - A new and distinct | 2011-05-05 |
20110107475 | Olive Tree Named 'ASKAL' - A new and distinct | 2011-05-05 |
20110107476 | Olive Tree Named 'KADESHON' - A new and distinct | 2011-05-05 |
20110107477 | Olive Tree Named 'MASEPO' - A new and distinct | 2011-05-05 |
20110107478 | Almond tree, 'Supariel' - A new and distinct variety of almond tree is described and which is somewhat similar to the ‘Nonpareil’ almond tree (non-patented), but which is distinguishable therefrom by producing a larger sized kernel of high quality and having a sweet flavor when compared to the with ‘Nonpareil’ almond tree (non-patented). | 2011-05-05 |
20110107479 | PLUM TREE NAMED 'SUPLUMFORTY' - A new and distinct plum tree variety, | 2011-05-05 |
20110107480 | PLUM TREE NAMED 'SUPLUMTHIRTYNINE' - A new and distinct plum tree variety, | 2011-05-05 |
20110107481 | Mandarin plant named 'Merbeingold 2350' - ‘Merbeingold 2350’ is a new Australian variety of mandarin. It was selected from the progeny obtained following a controlled pollination of ‘Imperial’ mandarinבEllendale’ tangor in 1984. It was selected because it is strongly parthenocarpic and is capable of yielding seedless fruits, which are sweet, juicy and easy-to-peel. Fruit maturity is mid season in the Murray Valley of Australia. The rind of Merbeingold is thin, orange-to-orange red, strong yet easily peeled. Its fruits can be snap picked, eliminating a need to clip. Internally, the flesh of ‘Merbeingold 2350’ is attractive, orange in colour and juicy with a good sugar/acid balance. | 2011-05-05 |
20110107482 | Strawberry plant named 'DrisStrawFourteen' - This invention relates to a new and distinct cultivar of strawberry plant named ‘DrisStrawFourteen’. The new cultivar is primarily characterized by a medium density plant with medium vigor, medium-sized fruit having a large hollow center, and a partially everbearing habit, is disclosed. | 2011-05-05 |
20110107483 | Strawberry plant named 'BARAK' - This invention relates to a new and distinct variety of strawberry plant named ‘BARAK’. This new strawberry plant named ‘BARAK’ is primarily adapted to the climate and growing conditions of the Sharon coastal plain, at 32° latitude, located in Israel, and is primarily characterized by high quality fruit with an attractive brilliant appearance, regular consistent conical shape, high total soluble solids, long shelf-life and fruit appearing out of the canopy facilitating harvest. | 2011-05-05 |
20110107484 | Cactaceae Plant named "Gail Glazier" - A plant variety of the Cactaceae family, | 2011-05-05 |
20110107485 | LOBELIA PLANT NAMED 'FRIED GREEN TOMATOES' - A new and distinct | 2011-05-05 |
20110107486 | TIARELLA PLANT NAMED 'WISSAHICKON' - A new and distinct | 2011-05-05 |
20110107487 | TIARELLA PLANT NAMED 'OCTORARO' - A new and distinct | 2011-05-05 |
20110107488 | TIARELLA PLANT NAMED 'SUSQUEHANNA' - A new and distinct | 2011-05-05 |
20110107489 | TIARELLA PLANT NAMED 'DELAWARE' - A new and distinct | 2011-05-05 |
20110107490 | TIARELLA PLANT NAMED 'LEHIGH' - A new and distinct | 2011-05-05 |