01st week of 2009 patent applcation highlights part 73 |
Patent application number | Title | Published |
20090007214 | COMMERICAL FREE STATUS FOR MEDIA CONTENT RECORDING SYSTEMS AND METHODS - An exemplary system includes a content processing subsystem configured to record at least a subset of a media content program, the media content program including at least one commercial segment. The content processing subsystem is further configured to provide a commercial free status indicator to an output device for presentation to a user when a sufficient sub-portion of the media content program has been recorded to enable commercial free playback of the media content program. | 2009-01-01 |
20090007215 | Method and Apparatus for Delivering Programming Code Objects to Set-Top Terminals and the Like - A set top box is provided that includes an RF front-end for receiving programming content over a distribution communication network. A processor is operatively associated with the RF front-end and a storage device is operatively associated with the processor. An interface is provided for establishing communication with an external device. In response to a signal received from the distribution network over the RF front-front identifying at least one programming object to be downloaded thereto, the processor is configured to locate and receive the programming object from the external device through the interface. | 2009-01-01 |
20090007216 | System and method of delivering video content - A method of delivering video content is disclosed that includes receiving a request at a video content gifting server from a first set-top box device. The request indicates a selection to purchase video content for a second subscriber associated with a second set-top box device. The method also includes sending notification information to the second set-top box device. The notification information indicates that the video content has been purchased for the second subscriber. Further, the method includes receiving viewing preferences data at the video content gifting server from the second set-top box device. The viewing preferences data indicates a particular time that the second subscriber is to receive the video content. Additionally, the method includes sending video content download data to a particular network entity. The video content download data includes instructions to send the video content to the second set-top box device at the particular time. | 2009-01-01 |
20090007217 | COMPUTER SYSTEM FOR AUTHENTICATING A COMPUTING DEVICE - A computer architecture for enterprise device applications provides a real-time, bi-directional communication layer for device communication. An identity-based communications layer provides for secure, end-to-end telemetry and control communications by enabling mutual authentication and encryption between the devices and the enterprise. A unique identity is assigned to each device, user and application to provide security services. A communications session is established between two devices using an authentication service that authenticates the device that is initiating the establishment of the communications session with another device. After authenticating the initiating device, the authentication service provides to the initiating device the network address of the other device and an authentication credential for use in the communications session between the initiating device and the other device. | 2009-01-01 |
20090007218 | Switched-Based Network Security - Traffic sent from a network endpoint is redirected and the network endpoint is tested for compliance with a security policy. If the network endpoint is in compliance with the security policy, an access policy is generated to allow the network endpoint to access the network without any traffic redirection. | 2009-01-01 |
20090007219 | Determining a merged security policy for a computer system - Embodiments of the invention described herein are directed to a mechanism for determining whether at least one operation will be effective in view of at least one security policy. In exemplary implementations, determining whether at least one operation will be effective in view of at least one security policy may comprise determining a merged security policy for a computer system by merging security policies for the computer system from two or more sources. The security policies may be security policies set by a user and/or an administrator of the computer system, may be security policies of a computer network to which the computer system is connected, or may be security policies of one or more other computer systems that are above the computer system in a computer network hierarchy. | 2009-01-01 |
20090007220 | THEFT OF SERVICE ARCHITECTURAL INTEGRITY VALIDATION TOOLS FOR SESSION INITIATION PROTOCOL (SIP)-BASED SYSTEMS - A device prevents theft of service attacks on a Session Initiation Protocol (SIP)-based device using an identity assurance protection mechanism, a multiple end-points protection mechanism, and an intrusion detecting protection mechanism. | 2009-01-01 |
20090007221 | Generation and use of digital contents - Provided are the generation and the use of user generated contents (UGC) to which a creative commons license (CCL) is applied. In a method of generating digital contents, a user interface window including a clause for managing digital contents copyright information and displaying the user interface window is generated, and digital contents including copyright information selected from the displayed user interface window is generated. | 2009-01-01 |
20090007222 | APPARATUS AND METHOD FOR MANAGING DIGITAL RIGHTS MANAGEMENT CONTENTS IN PORTABLE TERMINAL - Provided is an apparatus and method for managing Digital Rights Management (DRM) contents in a portable terminal. The method includes when a license of the DRM content is consumed, changing license information, which is stored in an external memory, on the DRM content; storing information relating to changed data of the external memory into an internal memory; determining whether the changed license information stored in the external memory has changed by using the information stored in the internal memory when the DRM content is used; and determining whether the DRM content is available according to whether the changed license information has changed. | 2009-01-01 |
20090007223 | METHOD AND SYSTEM FOR RUN-TIME DYNAMIC AND INTERACTIVE IDENTIFICATION OF SOFTWARE AUTHORIZATION REQUIREMENTS AND PRIVILEGED CODE LOCATIONS, AND FOR VALIDATION OF OTHER SOFTWARE PROGRAM ANALYSIS RESULTS - A system, method and computer program product for identifying security authorizations and privileged-code requirements; for validating analyses performed using static analyses; for automatically evaluating existing security policies; for detecting problems in code; in a run-time execution environment in which a software program is executing. The method comprises: implementing reflection objects for identifying program points in the executing program where authorization failures have occurred in response to the program's attempted access of resources requiring authorization; displaying instances of identified program points via a user interface, the identified instances being user selectable; for a selected program point, determining authorization and privileged-code requirements for the access restricted resources in real-time; and, enabling a user to select, via the user interface, whether a required authorization should be granted, wherein local system, fine-grained access of resources requiring authorizations is provided. | 2009-01-01 |
20090007224 | INFORMATION PROCESSING APPARATUS, INFORMATION MANAGEMENT METHOD, AND STORAGE MEDIUM THEREFOR - An image forming apparatus capable of flexibly setting a security policy for a modified file. A client terminal generates a print job added with a new security policy for a second file generated from a first file, and delivers the print job added with the new security policy to the image forming apparatus. The image forming apparatus generates intermediate data based on the print job delivered from the client terminal, and causes a second policy server to register the security policy. The second policy server registers the security policy, while items of the security policy being appropriately assigned to the first and second policy servers. The second policy server generates an encryption key. The image forming apparatus encrypts the intermediate data using the encryption key, and stores the encrypted intermediate data. | 2009-01-01 |
20090007225 | METHOD AND APPARATUS FOR ENSURING SECURITY OF REMOTE USER INTERFACE SESSION USING OUT-OF-BAND COMMUNICATION - A method and apparatus for ensuring security of a session. In the method, a first client selects a user interface related to a process in need of security from among user interfaces related to predetermined contents provided from a first server, and a first client or a second client communicates directly with a second server operated by a contents provider to perform the process in need of security and notifies the first server of the performing result. Thus, it is not required to transmit/receive security information via the first server. | 2009-01-01 |
20090007226 | Communications Apparatus and Control Method Therefor - When exchanging communication parameter setting information on a wireless network, a communications apparatus selects between a first operation mode in which communications parameter information is exchanged with a specific communications apparatus and a second operation mode in which communications parameter information is exchanged with an unspecified number of communications apparatus. Depending on the selected operation mode, the communications apparatus control security upon holding the communications parameter information exchanged with the specific communications apparatus and the communications parameter information exchanged with the unspecified number of communications apparatus. | 2009-01-01 |
20090007227 | SYSTEM AND METHOD OF DATA COGNITION INCORPORATING AUTONOMOUS SECURITY PROTECTION - Autonomous embedded data cognition enables data to perform real-time environmental configuration control, self-manage, perform analyses, determine its current situation, and evaluate behavior to respond accordingly. When created, security measures, and access controls are selected. Highly sensitive data can be extracted and substituted with creator label and/or functional representation. Data-to-data reasoning and analysis can be performed. The processing method comprises autonomous monitoring for a state change and analyzing the current user to determine if the instantiation should exist. If affirmed, the cognition engine automatically configures the computational environment in which it resides. If denied, environmental behavior is further analyzed for security problems or an erroneous situation. If detected, the creator is alerted and provided with incident information enabling remote creator control of the data. Cognitive data can decide to self-destruct mitigating risk of undesirable instantiations. Intelligent Agents, a comprehensive data structure, and intelligent document means are leveraged for implementation. | 2009-01-01 |
20090007228 | MANAGING HIERARCHICALLY ORGANIZED SUBSCRIBER PROFILES - Apparatus are provided for managing hierarchically organized subscriber profiles. According to one embodiment, a router includes a subscriber manager, a database and a virtual interface. The subscriber manager is operable to receive a connection request from a subscriber of a service provider. The database has stored therein hierarchically organized profile identifiers, including multiple lower-level profile identifiers, which explicitly define subscriber services, and multiple first-level profile identifiers, which define service contexts representing combinations of services available to subscribers when connected to the service provider by (i) explicitly defining the subscriber services or (ii) referring to one or more of the plurality of lower-level profile identifiers. The virtual interface defines a subscriber connection between the router and the subscriber and is created and configured responsive to the connection request based on a first-level profile identifier that is associated with the subscriber. | 2009-01-01 |
20090007229 | TIME-BASED METHOD FOR AUTHORIZING ACCESS TO RESOURCES - Upon receiving a request for access to a resource, a current clock value is determined. Based on information including the resource, the identity of the user requesting the access, and the current clock value, the system identifies applicable access controls. If the applicable access controls indicate that the user can be granted access to the resource at the current time, the request is granted. Otherwise, the request is denied. | 2009-01-01 |
20090007230 | RADIO-TYPE INTERFACE FOR TUNING INTO CONTENT ASSOCIATED WITH PROJECTS - A user can receive content relating to a common topic, such as a project, through a radio-type interface. A frequency or other indicator associated with the project can be selected on a user device. The common topic can be presented to the user, based on the selected frequency and/or an authentication. Presented information can also be provided in a common format requested by the user or as a function of the rendering device. The common format can be facilitated by a conversion component that can change information from a first format to at least a second format. The information can also be presented in more than one format. | 2009-01-01 |
20090007231 | Secured systems and methods for tracking and management of logistical processes - A method is provided for providing access to data relating to a plurality of processes associated with a supply chain network. The method may include identifying a user from a plurality of users. The method may also include identifying data from a plurality of data, wherein the identified data includes a subset of the plurality of data. The method may further include providing the user with access to the identified data. Providing the user with access to the identified data may include defining a user profile by establishing at least one permission associated with the identified data. The established permission may allow the user to access the identified data, and the user profile may be based on one of employee characteristics, work assignments, or geographical locations. | 2009-01-01 |
20090007232 | Information processing system and information processing apparatus - A disclosed information processing system includes an authentication information acquisition unit that acquires first authentication information and second authentication information different from the first authentication information. An authentication reference information storage unit stores first authentication reference information for authentication of the first authentication information and second authentication reference information for authentication of the second authentication information. A first authentication determination unit determines success or failure of first authentication using the first authentication information and the first authentication reference information. A second authentication determination unit determines success or failure of second authentication using the second authentication information and the second authentication reference information. An authentication information control unit stores the second authentication reference information and the first authentication information in the authentication reference information storage unit so as to correspond to each other when the first and second authentications are successful. | 2009-01-01 |
20090007233 | System and methods for defending against root - A method is disclosed for securing sensitive material on a computer system comprising a network of computers from unauthorized access by a root level user of the computer system, the method including the steps of: limiting access to the sensitive material to one or more authorized users; controlling the operation of one or more system functions to prevent unauthorized access to the sensitive material. | 2009-01-01 |
20090007234 | COMPUTER SYSTEM FOR AUTHENTICATING A COMPUTING DEVICE - A computer architecture for enterprise device applications provides a real-time, bi-directional communication layer for device communication. An identity-based communications layer provides for secure, end-to-end telemetry and control communications by enabling mutual authentication and encryption between the devices and the enterprise. A unique identity is assigned to each device, user and application to provide security services. A communications session is established between two devices using an authentication service that authenticates the device that is initiating the establishment of the communications session with another device. After authenticating the initiating device, the authentication service provides to the initiating device the network address of the other device and an authentication credential for use in the communications session between the initiating device and the other device. | 2009-01-01 |
20090007235 | Course development program - The present invention is directed to a method of operating a knowledge capture program. The knowledge capture program has the steps of starting the knowledge capture program wherein a user can access content that is either existing content or creating new content. Once the content has been selected then a source subject matter can be selected and displayed, and then captured and incorporated into the content. The source subject matter can be edited and saved into the content. The content can then be retrieved and played in a desired mode of learning. | 2009-01-01 |
20090007236 | System And Method For Using A Communication Lease To Open A Communication Channel - A system and method for using a communication lease to open a communication channel is provided. An initiation terminal transmits a channel initiation request for access to a resource manager through a target terminal. Evaluation of a communication lease controlling access to the resource manager is awaited. Approval of the channel initiation request is received upon the successful evaluation of the communication lease. A communication channel is opened between the initiation terminal and the target terminal upon receipt of the approval. | 2009-01-01 |
20090007237 | METHOD AND SYSTEM FOR PROVIDING ONLINE RECORDS - A method is provided for providing a user with the ability to access and collect records associated with the user in a secure and private manner. The method includes assigning a phone number to the user for private fax and voice communications from service providers, associating access information with the user for the user to use to access a web site, receiving a private fax communication comprising a record associated with the user for which the user has requested and given permission to the service provider to send to the phone number, converting the private fax communications into an image file format, storing the record encoded in the image file format, and providing the user with access to the web site using the access information and providing on the web site an interface to the records of the user for the user to access the record. | 2009-01-01 |
20090007238 | Method and Apparatus for Management and Updating of Distributed User Databases - The invention includes a method and apparatus for authenticating a visiting node in a wireless network. A method includes receiving a request to transfer a user database of a visiting node, obtaining the visiting node user database from the visiting node in response to a determination to update a master user database to include the visiting node user database, and merging the visiting node user database with the master user database. The request to transfer the visiting node user database is received, from the visiting node, at a primary authentication node of the network. The visiting node user database includes entries for users associated with the visiting node. The master user database includes entries for users associated with nodes authenticated by the primary authentication node of the network. | 2009-01-01 |
20090007239 | Mobile IP Bulk Registration Revocation - Techniques for Mobile IP bulk registration revocation are described herein. According to one embodiment, a first mobile agent of a mobile IP network sends a registration revocation message to a second mobile agent of the mobile IP network. The registration revocation message includes information identifying multiple home IP addresses of multiple mobile nodes whose registrations are to be revoked. In response to the registration revocation, the second mobile agent terminates bindings of services associated with multiple mobile nodes identified by the multiple home IP addresses and sends an acknowledgement message to the first mobile agent. Other methods and apparatuses are also described. | 2009-01-01 |
20090007240 | Systems and methods for conditional access and digital rights management - Conditional access (CA) and digital rights management (DRM) in digital media delivery, processing, and storage systems. Methods and apparatuses are provided for managing digital rights under the protection of multiple CA and/or DRM systems. Some embodiments provide secure and robust methods for bridging multiple DRM systems in the digital media content distribution and playback systems. The present invention simplifies content repurposing, after it has been bridged to a secondary DRM system, but still under the control of the original DRM system. | 2009-01-01 |
20090007241 | SECURE CONTENT DELIVERY SYSTEM - A secure streaming content delivery system provides a plurality of content servers connected to a network that host customer content that can be cached and/or stored, e.g., images, video, text, and/or software. The content servers respond to requests for customer content from users. The invention load balances user requests for cached customer content to the appropriate content server. A user makes a request to a customer's server/authorization server for delivery of the customer's content. The authorization server checks if the user is authorized to view the requested content. If the user is authorized, then the authorization server generates a hash value using the authorization server's secret key, the current time, a time-to-live value, and any other information that the customer has configured, and embeds it into the URL which is passed to the user. A content server receives a URL request from the user for customer content cached on the content server. The request is verified by the content server creating its own hash value using the customer server's secret key, the current time, a time-to-live value, and any other related information configured for the customer. If the hash value from the URL matches the content server's generated hash value, then the user's request is valid and within the expiration time period and the content server delivers the requested content to the user. | 2009-01-01 |
20090007242 | Access Control System and Method - Certain embodiments of the invention relate to an access control system defining one or more compartments and providing rules, which are applied to the compartment(s), to control access to network services by entities that are associated with a said compartment, the rules comprising at least a first kind of rule for controlling access to network services that use dynamically-assigned communications ports. | 2009-01-01 |
20090007243 | METHOD FOR RENDERING PASSWORD THEFT INEFFECTIVE - A method for rendering a login theft ineffective includes detecting a submission of a first login request from the user's client to a Web site; redirecting the first login request to the traffic processor for copying at least one of the user supplied login fields; forwarding the first login request from the traffic processor to the site; requesting replacements of at least one of the user supplied login fields from the site; and replacing the at least one of user supplied login fields with at least one new corresponding login field(s) in the site. | 2009-01-01 |
20090007244 | METHOD AND SYSTEM FOR NOTIFICATION AND REQUEST PROCESSING - Embodiments of a method and system for notification and request processing are disclosed. A service request for a second application may be received from a first application. Authorization of the first application to send the service request to the second application through a user communication client may be verified. A provider communication identifier of the second application may be identified. The service request may be provided from the user communication client to a provider communication client associated with the provider communication identifier. | 2009-01-01 |
20090007245 | SYSTEM AND METHOD FOR CONTROLLED CONTENT ACCESS ON MOBILE DEVICES - A new approach enables a carrier, a validated user or a parent/guardian of the user to effectively moderate content displayed one a mobile device and navigates the web without the need to input URL addresses through the use of an integrated instant messenger/web browser operating on the mobile device. First, the identity of the user is validated when he/she is initiating access to instant messaging and/or web browsing. In the case where the user is an under-aged child, the identity of the user can be validated by his/her parent or legal guardian or principal of the school the child is attending. Once validated, the user can access and select from a set of websites that have been pre-selected or pre-approved for the user by the carrier, user, and in some cases parent or guardian of the user for easy and secure web browsing by the user on the mobile device. | 2009-01-01 |
20090007246 | SECURITY BASED NETWORK ACCESS SELECTION - A method and wireless device select a set of secure network connections ( | 2009-01-01 |
20090007247 | DOMAIN ID SERVICE - The subject disclosure pertains to a domain identification system, comprising a principal that has a key and a mnemonically meaningless identifier, the mnemonically meaningless identifier is used to identify the component in a networked environment. The mnemonically meaningless identifier can be bound to the public key by a binding. The component may be part of a neighborhood of components, and each member component knows the members' binding. | 2009-01-01 |
20090007248 | Single sign-on system and method - A single sign-on (SSO) provider establishes a system by which users authenticate once per session with the provider, then can access multiple sites that require credentials without manually supplying or remembering those other credentials. A browser plug-in on the user's terminal accesses the SSO provider's resources and retrieves relevant credentials for the user's session. The SSO provider contracts with a third-party administrator (TPA) of medical and/or insurance benefits, and provides SSO accounts individuals served by the TPA (usually employees of the TPA's clients). These accounts may be pre-loaded with links to (and even credentials for logging into) network-accessible resources relating to the individuals' insurance and/or medical care. Additional links and credentials might be preloaded based on the goodwill of the SSO provider or affiliate contracts, and the individuals might be enabled to add further links and credentials. | 2009-01-01 |
20090007249 | SYSTEM AND METHOD FOR SELECTIVE AUTHENTICATION WHEN ACQUIRING A ROLE - A system, method, and program product is provided that provides authentication on a per-role basis in a Role-Based Access Control (RBAC) environment. When a user attempts to acquire a role, the improved RBAC system determines whether (a) no authentication is required (e.g., for a non-sensitive role such as accessing a company's product catalog), (b) a user-based authentication (e.g., password) is required, or (c) a role-based authentication (e.g., role-specific password is required). | 2009-01-01 |
20090007250 | Client authentication distributor - The claimed method and system provides a client authentication distributor component (CAD) that handles multiple client application requests for authentication to a common authentication provider. In one embodiment, only a single user sign on process may be required after which the CAD manages future authentication processes on behalf of the user without the user requiring to provide credentials. | 2009-01-01 |
20090007251 | Host firewall integration with edge traversal technology - A host firewall can determine and consider whether unsolicited traffic is inbound from beyond the edge of the network and allow or block such traffic based at least in part upon this characteristic. In one implementation, an edge traversal parameter can be set on a host firewall rule, which typically includes other parameters such as port, protocol, etc. If the unsolicited traffic received via an edge traversal interface matches a host firewall rule that has the edge traversal criterion, then the firewall does not block the traffic. On the other hand, if the unsolicited traffic received via an edge traversal interface fails to satisfy the edge traversal criterion on any firewall rule, then the firewall blocks the traffic. | 2009-01-01 |
20090007252 | System and Method for Implementing Proxy-Based Auto-Completion on a Network - A system and method for implementing forward proxy based auto-completion on a network, wherein the network includes a data center, at least one forward proxy, and a collection of clients coupled to the at least one forward proxy. The data center marks at least one input field in an application as relevant for auto-completion. In response to detecting a first client accessing the at least one input field in the application to input at least one data entry, the forward proxy parses the at least one data entry entered into the at least one input field. The forward proxy ranks by frequency of entry the at least one data entry entered into the at least one input field. In response to detecting a second client accessing the at least one input field in the application to input at least one data entry, the forward proxy performs auto-completion on the at least one input field, wherein the auto-completion includes displaying a collection of past data entries in an order of the ranking to facilitate completion of the at least one input field. | 2009-01-01 |
20090007253 | FILTERING TECHNIQUE FOR PROCESSING SECURITY MEASURES IN WEB SERVICE MESSAGES - A message gateway apparatus is provided for use in a web service system to process a message containing a request for a destination web service application, in which the message includes a plurality of events within a structured document conforming to a web service protocol and each event of the plurality of events has a name and a content thereof. The message gateway apparatus comprises a message parsing module configured to sequentially identify the events of the plurality of events of the message, an input object creation module configured to sequentially extract the events of the plurality of events from the message parsing module, and a message filtering module configured to sequentially access the events of the plurality of events as the events are extracted from the message parsing module by the input object creation module to analyze the name of each event and perform security processing on the content of each event for which the corresponding name indicates that security measures have been applied according to a security protocol. The input object creation module is configured to construct an input object including input parameters for the destination web service application based on the message. The input object creation module constructing the input object by adding a representation of each event of the plurality of events to the input object after each event is accessed by the message filtering module. | 2009-01-01 |
20090007254 | RESTRICTING COMMUNICATION SERVICE - In response to a command to start restrictions on a communication service of a computer, the communication service is restricted by a countermeasures apparatus which replaces the communication address of a second computer, which has been stored in a first computer, with the communication address of the countermeasures apparatus, and replaces a communication address of the first computer, which has been stored in the second computer, with the communication address of the countermeasures apparatus. Accordingly, the countermeasures apparatus acquires a packet from the first computer to the second computer and determines whether or not this acquired packet is to be transmitted to the second computer. | 2009-01-01 |
20090007255 | System and Method for a Web Based Teleservice for Updating Machine Software - A system and method for maintaining a machine control program includes a machine controller including a machine program stored on computer media and configured to control a machine. A router is coupled to the machine controller. A server is coupled to the router to establish communications between the machine controller and an entity that provides source file updates or changes to the machine program such that the server hosts application software needed to compile the source file updates or changes wherein compiled source files are accessible by the machine controller over a secure link to the server. | 2009-01-01 |
20090007256 | Using a trusted entity to drive security decisions - An arrangement is provided for programmatically responding to a privilege request on behalf of a user by pre-configuring a trusted entity with a list of processes requiring elevated user credentials and a set of user's credentials having such privilege. The trusted entity determines if a requested process is included in the list of processes, and responds to the privilege requests generated by the kernel of the operating system for such processes, eliminating the need for the user to manually authenticate using some type of input mechanism. | 2009-01-01 |
20090007257 | SYSTEM, METHOD, SERVER, CLIENT TERMINAL, PROGRAM FOR BIOMETRIC AUTHENTICATION - The present invention provides a biometric authentication system including: a parameter manage server having a user parameter generating portion for generating a user parameter using a user ID transmitted from a client terminal, a master key and a temporary parameter; the client terminal having an input unit by which a user ID provided in advance for a user is input, a biological information sensor which acquires biological information of a user, a feature extracting portion which extracts feature from the biological information acquired by the biological information sensor and a transforming portion which transforms the feature using the user parameter generated by the parameter manage server to generate transformation feature; and an authentication server having a matching portion which matches the transformation feature transmitted from the client terminal against a template stored in advance in the storing portion. | 2009-01-01 |
20090007258 | Secure Access to Information Associated With a Value Item - Privacy of information is protected by a method of securing access to information associated with a value item, the method including comparing a security signature and a stored profile, and permitting access to the information associated with the value item if the security signature matches the stored profile. The value item may be a machine readable document or other item of high value. The associated information may be stored in an electronic storage medium attached to the value item, or may be stored in an external database, or both. Permitting access to the associated information may include generating an access code unique to the associated information and to the value item. | 2009-01-01 |
20090007259 | Restricting Access to Information - Technologies are presented herein for restricting access to information. According to various embodiments described herein, an authorization device is provided that includes functionality for detecting other proximately located authorization devices. When an authorization device detects another proximately located authorization device, authorization data stored in the detected device is retrieved. The retrieved authorization data is compared to stored authorization data and a determination is made as to whether a person associated with the detected device is authorized to receive information. The authorization device provides an indication as to whether the person is authorized to receive information. The authorization device may also provide an indication of the particular information that the person is authorized to receive. The authorization device may also be utilized to ensure that only authorized individuals participate in a meeting and that each participant is authorized to receive the information that is the subject of the meeting. | 2009-01-01 |
20090007260 | Security Synchronization Services - As a result of the inability to assign security in multiple applications at one time, there is an opportunity to tie the disparate security systems together. Security synchronization services is a method and apparatus that uses roles to provide a common administration experience for all applications that use it and fits better for new applications. | 2009-01-01 |
20090007261 | RECEIVING DATA IN A DATA STORE IN A SERVER COMPUTER SYSTEM - The present invention provides a method and system of receiving data in a data store in a server computer system. In an exemplary embodiment, the method and system include (1) receiving client authentication information of a client computer system, (2) receiving a data signature of the data from the client computer system, and (3) attempting to locate in the data store at least one data chunk with a stored data signature equal to the received data signature. | 2009-01-01 |
20090007262 | COMPUTER READABLE MEDIUM FOR RESOLVING PERMISSION FOR ROLE ACTIVATION OPERATORS - A computer-readable storage medium storing instructions executable by a processor for resolving permissions using role activation operators to evaluate permissions assigned to a user in a role context inheritance hierarchy. The stored instructions comprise several steps: a step of retrieving a plurality of activated roles within a role context that match roles assigned to a user, wherein one or more permissions in the role context inherit from one or more permissions in a parent role context in a role context permission inheritance hierarchy; a step of determining an aggregate permission for each of the plurality of activated roles, wherein a role activation operator determines how an activated role is evaluated; a step of processing the aggregate permissions for the plurality of activated roles; and a step of resolving a final permission for the user. | 2009-01-01 |
20090007263 | Method and Apparatus for Combining Traffic Analysis and Monitoring Center in Lawful Interception - A method and apparatus for integrating intercepted information with information obtained from an at least one data retention source, the method comprising receiving intercepted information from an interception source, receiving information from a data retention source, and analyzing the information received from the data retention source, in association with the intercepted information. The intercepted information can comprise meta data related to the intercepted communications, and/or the contents of the communication themselves. This enables a user such as a law enforcement agency to reveal possibly indirect connections between target entities s wherein the connections involve non-target entities. The method and apparatus combine interception and content analysis methodologies with traffic analysis techniques. | 2009-01-01 |
20090007264 | SECURITY SYSTEM WITH COMPLIANCE CHECKING AND REMEDIATION - A security system is provided for use with computer systems. In various embodiments, the security system can analyze the state of security of one or more computer systems to determine whether the computer systems comply with expressed security policies and to remediate the computer systems so that they conform with the expressed security policies. In various embodiments, the security system can receive compliance documents, determine whether one or more computer systems comply with portions of security policies specified in the compliance documents, and take actions specified in the compliance documents to cause the computer systems to comply with the specified security policies. The security system may provide a common, unified programming interface that applications or tools can employ to verify or enforce security policies. | 2009-01-01 |
20090007265 | Defending Against Denial Of Service Attacks - In various embodiments, a server may be provided. The server may respond to a request for a service, from a processing device, with a challenge. The challenge may include a partial key for a memory-intensive operation, a number of iterations of the memory-intensive operation to perform, and a result of performing the number of iterations of the memory-intensive operation. Upon receiving the challenge, the processing device may choose a complete key consistent with the partial key and may produce a proposed result by performing the memory-intensive operation for the number of iterations. When the proposed result matches the result included in the challenge, the processing device may send a challenge answer, including the chosen complete key, to the server. Upon receiving a correct challenge answer from the processing device, the server may access the requested service and may return a result of the access to the processing device. | 2009-01-01 |
20090007266 | Adaptive Defense System Against Network Attacks - A system and method according to the invention provide an efficient resource allocation when receiving connection requests from different servers for data transfer and the efficient resource allocation is achieved by identifying and assigning a quality factor to each originating server. When an originating server presents an abusive behavior, it may be assigned to a state that has a low quality factor, thus receiving little resource from the system. | 2009-01-01 |
20090007267 | METHOD AND SYSTEM FOR TRACKING AUTHORSHIP OF CONTENT IN DATA - According to one aspect of the invention, iterative local alignment is employed to process two versions of a text and to identify novel contributions and their positions in the newer text version. In one embodiment, the new or target version of the text is aligned to the old or reference version of the text in an iterative process. The iterative process produces a local alignment of both text versions, which is optimal according to the selected parameters. In another embodiment, aligned substrings are removed from the texts and the iterative process is continued until no more aligned substrings can be obtained. In one example, authorship may be transferred from every aligned substring of the reference text version to the corresponding substring of the target text version. In another example, authorship for unaligned substrings of the target text version may be assigned to the author of the target text version. In one embodiment, unaligned substrings of the reference text version can be identified as deleted by the author of the target text version. In another embodiment, deleted substrings can be stored latently and can be considered in subsequent alignments. In another aspect of the invention, the method and system for tracking authorship of content in data may be employed in collaborative text editing systems or in word processing applications to identify and track the contributions of individual authors. | 2009-01-01 |
20090007268 | Tracking computer infections - A technique is disclosed for tracking a virus. For each of at least a subset of received network packets it is determined whether the packet comprises an open packet. Information usable to determine a sender of the packet in the event the a virus associated with a network transmission with which the packet is associated is determined to have been received is copied from each packet determined to be an open packet, but not from at least a subset of packets not determined to be open packets. | 2009-01-01 |
20090007269 | USING IMPORTED DATA FROM SECURITY TOOLS - A device may create a new project that includes criteria, import findings from a group of different network security tools into the new project based on the criteria, normalize the imported findings, and store the normalized findings. | 2009-01-01 |
20090007270 | SYSTEM AND METHOD FOR SIMULATING COMPUTER NETWORK ATTACKS - The present invention provides a system and method for providing computer network attack simulation. The method includes the steps of: receiving a network configuration and setup description; simulating the network configuration based on the received network configuration; receiving at least one confirmed vulnerability of at least one computer, machine, or network device in the simulated network; receiving a method for compromising the confirmed vulnerability of the at least one computer, machine, or network device; and virtually installing a network agent on the at least one computer, machine, or network device, wherein the network agent allows a penetration tester to execute arbitrary operating system calls on the at least one computer, machine, or network device. | 2009-01-01 |
20090007271 | Identifying attributes of aggregated data - A method for identifying a portion of aggregated software security data is described. The method includes accessing aggregated data associated with software vulnerabilities retrieved from a plurality of on-line sources. The method further includes searching a portion of the aggregated data for an exact match to a particular attribute of the data and searching the portion of the aggregated data for one or more partial matches associated with the particular attribute. The method also includes associating the portion of the data with the particular attribute based on the exact match of one or more of the partial matches. | 2009-01-01 |
20090007272 | Identifying data associated with security issue attributes - A method for identifying data related to a software security issue is provided. The method includes accessing a software security issue and determining one or more attributes associated with the software security issue. The method also includes accessing aggregated software security data retrieved from a plurality of on-line sources and searching the aggregated software security data for the attributes associated with the security issue. The method further includes associating a portion of the aggregated data with the security issue based on matching the attributes associated with the security issue with contents of the portion of the aggregated data. | 2009-01-01 |
20090007273 | METHOD AND SYSTEM FOR PREVENTING COPYING OF INFORMATION FROM PREVIEWS OF WEBPAGES - A copy prohibition method and system is disclosed, which can provide a preview page with copy prohibition means inserted thereinto, so as to prohibit a copy of information displayed on the preview page, the method comprising receiving a selection request for a preview page of a predetermined webpage from a user; inserting copy prohibition means into the preview page; and providing the preview page with the copy prohibition means inserted thereinto to the user. When providing the preview page to the user, the user is notified that the corresponding preview page has the copy prohibition function. Thus, the user becomes easily aware of that the copy is prohibited in the corresponding preview page. | 2009-01-01 |
20090007274 | Rights Engine Including Access Rights Enforcement - A location indicator indicative of a network address where a content item is located or a content item can be received from a rights holder. An indication of access rights, in a computer-readable, canonicalized format, to be associated with the content item is received from the rights holder. The content item or the location indicator is stored in association with the indication of access rights. A searchable repository can be provided to the content consumer. The searchable repository can be utilized by the content consumer to access the content item according to search parameters that comprise the indication of access rights associated with the content item. Transaction and content consumption events may be tracked to facilitate various functions, such as dynamic pricing models, access rights enforcement, and revenue tracking. | 2009-01-01 |
20090007275 | Method and Apparatus for Protecting SIMLock Information in an Electronic Device - The teachings herein present a method and apparatus for protecting usage restriction data that governs usage of an electronic device. A cryptographic circuit supports secure and non-secure accesses. When non-securely accessed, it is operable only to verify the stored usage restriction data, and, when securely accessed, it is operable to generate a new message authentication code for changed usage restriction data, for subsequent authentication of that data. The usage restriction data may be stored in non-secure memory and may include static and dynamic parts. One or more embodiments include a secure circuit indicating whether the device has been initialized. The cryptographic circuit outputs a message authentication code for the static part using a permanent device key from the secure circuit, only if the device has not been initialized, and outputs a message authentication code for the dynamic part as needed to support authorized changes to the dynamic part. | 2009-01-01 |
20090007276 | System for making it ineffective to tamper with a software application by nullifying or removing calls to a license manager because the application can be run without a call to the license manager - Many software applications are protected from illegal or unauthorized use by the use of a License Manager. All installations of the application are required to obtain a license from the License Manager to run. Software pirates routinely circumvent this copy protection by disabling the call to the license manager or change the code of the application so it seems to have passed the license verification. The present invention makes such efforts ineffective. The installed application cannot run, unless the call to the License Manager is made, since important code and data has been extracted from the installation and must be delivered by the License Manager. Obviously, if the call to the License Manager is disabled or manipulated, the extracted code and data will not be delivered to the installed application and it will not run. | 2009-01-01 |
20090007277 | System and Method for Automatically Hiding Sensitive Information Obtainable from a Process Table - The present invention provides a system and method for automatically hiding sensitive information, obtainable from a process table, from other processes that should not access the sensitive information. The system and method include a sensitive command attribute table that is used by a system administrator to designate the commands and command attributes that will typically be associated with sensitive information. The sensitive command attribute table is used when a command is entered that requests information from the process table to be displayed or output. In response, a search of the process table entries is made to determine if a command and/or its attribute in the process table matches an entry in the sensitive command attribute table. If so, the command, its attributes, and/or its attribute values are blanked from the output of the process table information. | 2009-01-01 |
20090007278 | PRIVACY PROTECTION DEVICE, PRIVACY PROTECTION METHOD, AND RECORDING MEDIUM RECORDED WITH PRIVACY PROTECTION PROGRAM - A privacy protection device acquires provider location information and browser location information indicating the current location of a browser terminal used by a browser who intends to browse the content. The privacy protection device stores determination data for determining whether to mask privacy information included in the content. The privacy protection device determines whether to mask the privacy information by comparing the distance, which is calculated based on the current location of the provider terminal indicated by the provider location information and the current location of the browser terminal indicated by the browser location information, to the determination data stored in the determination data storage part. Finally, the privacy protection device edits the privacy information included in the content so that the privacy information is concealed from the browser when the privacy masking determination part determines to mask the privacy information. | 2009-01-01 |
20090007279 | Rights enforcement of unencrypted content - In accordance with one or more aspects of the rights enforcement of unencrypted content, a nameplate associated with unencrypted content is generated. The nameplate includes an identifier of the unencrypted content and an identifier of an authorized user of the unencrypted content. The nameplate is sent to a device of the authorized user for rights enforcement of the unencrypted content on the device. In accordance with one or more other aspects of the rights enforcement of unencrypted content, a nameplate for unencrypted content to be played back on a device is obtained. The nameplate includes an identifier of the unencrypted content and an identifier of an authorized user of the unencrypted content. The device presents, during playback of the unencrypted content on the device, the identifier of the authorized user of the unencrypted content. | 2009-01-01 |
20090007280 | Ange gene in atopy - The present invention relates to isolated nucleic acid sequences of ANGE, CLLD8 and CLLD7 or sequences complementary or substantially homologous thereto or fragments thereof. Also provided are sequences comprising hybrid nucleic acid sequences from two or more of the genes. Also provided are nucleic acid expression vectors, polypeptides, antibodies to the polypeptides, host cells, non-human transgenic animals and pharmaceutical compositions and agents. Also provided is the use of the nucleic acid sequence and/or protein in medicine and research, methods for diagnosing or determining predisposition to disease or severity of disease, methods for preventing or treating disease, and kits for use in the methods and the use of the nucleic acid sequence and protein in treating or preventing IgE mediated diseases and non-atopic asthma, and in screens for identifying new agents for use in the methods. | 2009-01-01 |
20090007281 | Animal Model for Assessing Copd-Related Diseases - Methods of diagnosis, markers, and screening techniques and animal models for assessing the severity and/or progression or regression of chronic obstructive pulmonary disease (COPD) and COPD-related diseases are disclosed. | 2009-01-01 |
20090007282 | METHOD FOR MODIFYING CHROMOSOMES - The present invention relates to a method for producing a modified foreign chromosome(s) or a fragment(s) thereof, which comprises the steps of: (a) preparing a microcell comprising a foreign chromosome(s) or a fragment(s) thereof, and transferring said foreign chromosome(s) or a fragment(s) into a cell with high homologous recombination efficiency through its fusion with said microcell; (b) in said cell with high homologous recombination efficiency, inserting a targeting vector by homologous recombination into a desired site of said foreign chromosome(s) or a fragment(s) thereof, and/or a desired site of a chromosome(s) derived from said cell with high homologous recombination efficiency, thereby marking said desired site; and (c) in said cell with high homologous recombination efficiency, causing deletion and/or translocation to occur at the marked site of said foreign chromosome(s) or a fragment(s) thereof. | 2009-01-01 |
20090007283 | Transgenic Rodents Selectively Expressing Human B1 Bradykinin Receptor Protein - Non-human transgenic animals, such as transgenic mice, are generated which incorporate the a non-native form of the bradykinin B1 receptor gene against a null phenotype for the native form of the bradykinin B1 receptor. An exemplified portion of the invention disclosed a transgenic mouse wherein a targeting construct containing a transgene encoding the human B1 bradykinin receptor gene is inserted downstream of and operatively linked to the native mice bradykinin B1 promoter. This targeting construct also contains a fluxed neomycin resistance gene. The resulting transgenic animals are “humanized” for the bradykinin B1 receptor and are effectively on a null background for native, functional B1 receptor activity. These animals may be crossed with a Cre-deleter strain to generate transgenic offspring which absent of the floxed marker gene. The transgenic animals described herein provide for a model to The transgenic mice of the present invention provide for an animal model enabling the analysis of compounds that are selective for the human B1 bradykinin receptor, relative to the rodent (e.g., rat or mouse) B1 bradykinin receptor. | 2009-01-01 |
20090007284 | TRANSGENIC ORGANISM - A method of producing a transgenic cell comprising introducing into a cell a non-primate lentiviral expression vector comprising a nucleotide of interest (NOI). Also described is a method of producing a transgenic cell comprising introducing into a cell a lentiviral expression vector comprising a NOI capable of generating an antisense oligonucleotide, a ribozyme, an siRNA, a short hairpin RNA, a micro-RNA or a group 1 intron. Also described is a viral vector comprising a first nucleotide sequence, wherein said first nucleotide sequence comprises: (a) a second nucleotide sequence comprising an aptazyme; and (b) a third nucleotide sequence capable of generating a polynucleotide; wherein (a) and (b) are operably linked and wherein the aptazyme is activatable to cleave a transcript of the first nucleotide sequence such that said polynucleotide is generated. | 2009-01-01 |
20090007285 | METHODS FOR CORRECTING MITOTIC SPINDLE DEFECTS AND OPTIMIZING PREIMPLANTATION EMBRYONIC DEVELOPMENTAL RATES ASSOCIATED WITH SOMATIC CELL NUCLEAR TRANSFER IN ANIMALS - The present invention is directed to various methodologies to make NT a practical procedure for animals, specifically, primates including human and non-human primates. Furthermore, the methods and molecular components provided by the present invention provide a practical means for producing embryos with desired characteristics. In a specific embodiment, the methodology of the present invention comprises introducing nuclei having desired characteristics along with one or more molecular components into an enucleated egg, thus creating a nuclear transfer construct, culturing the egg to produce a viable embryo, transferring the embryo to the oviducts of a female, and producing a cloned animal. | 2009-01-01 |
20090007286 | SOYBEAN VARIETY D4311702 - The invention relates to the soybean variety designated D4311702. Provided by the invention are the seeds, plants and derivatives of the soybean variety D4311702. Also provided by the invention are tissue cultures of the soybean variety D4311702 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety D4311702 with itself or another soybean variety and plants produced by such methods. | 2009-01-01 |
20090007287 | SOYBEAN VARIETY D4483789 - The invention relates to the soybean variety designated D4483789. Provided by the invention are the seeds, plants and derivatives of the soybean variety D4483789. Also provided by the invention are tissue cultures of the soybean variety D4483789 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety D4483789 with itself or another soybean variety and plants produced by such methods. | 2009-01-01 |
20090007288 | SOYBEAN VARIETY D4328762 - The invention relates to the soybean variety designated D4328762. Provided by the invention are the seeds, plants and derivatives of the soybean variety D4328762. Also provided by the invention are tissue cultures of the soybean variety D4328762 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety D4328762 with itself or another soybean variety and plants produced by such methods. | 2009-01-01 |
20090007289 | SOYBEAN VARIETY D4523081 - The invention relates to the soybean variety designated D4523081. Provided by the invention are the seeds, plants and derivatives of the soybean variety D4523081. Also provided by the invention are tissue cultures of the soybean variety D4523081 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety D4523081 with itself or another soybean variety and plants produced by such methods. | 2009-01-01 |
20090007290 | SOYBEAN VARIETY D4210110 - The invention relates to the soybean variety designated D4210110. Provided by the invention are the seeds, plants and derivatives of the soybean variety D4210110. Also provided by the invention are tissue cultures of the soybean variety D4210110 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety D4210110 with itself or another soybean variety and plants produced by such methods. | 2009-01-01 |
20090007291 | Melon Having High Percent Soluble Solids and Improved Firmness - Honeydew melon having high percent soluble solids and improved firmness is disclosed. The invention relates to the seeds of honeydew melons SSC 112, SSC 135, SSC 118, 10217-3, 10233-1, 11466, 10888, 10288-1, and 11876-1, to the plants of honeydew melons SSC 112, SSC 135, SSC 118, 10217-3, 10233-1, 11466, 10888, 10288-1, and 11876-1, and to methods for producing a honeydew melon plant, either inbred or hybrid, by crossing each of the melons SSC 112, SSC 135, SSC 118, 10217-3, 10233-1, 11466, 10888, 10288-1, and 11876-1 with itself or another honeydew melon cultivar. The invention further relates to methods for producing a honeydew melon plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other honeydew melon cultivars derived from the melons SSC 112, SSC 135, SSC 118, 10217-3, 10233-1, 11466, 10888, 10288-1, and 11876-1. | 2009-01-01 |
20090007292 | CORN INBREDS LIKE FAR045 AND HYBRIDS THEREOF - A maize inbred line having the characteristics selected from those of FAR045, including plant parts, tissue, and pigments of the inbred is disclosed. | 2009-01-01 |
20090007293 | Broccoli plants tolerant to hollow/split stem disorder - The invention provides broccoli seed and plants that combine high yield and quality with tolerance to hollow/split stem disorder. The invention further provides seed and plants of the broccoli lines designated BRM53-3915 and BRM53-3916 and progeny produced with at least one of these plants as a parent. The invention also relates to the plants, seeds and tissue cultures of hybrid broccoli variety RX05951180. | 2009-01-01 |
20090007294 | Genetic Engineering of Male Sterility in Plants - Disclosed herein are methods of achieving male sterility in plants. Specifically exemplified herein is the transformation of the plastid genome with a vector expressing the phaA gene. Expression of the phaA gene in plastids results in plants that do not exhibit pleiotropic effects with the exception of male sterility. Also disclosed are stably transformed plants and cells, as well as example vectors for expressing the phaA gene in plastids. | 2009-01-01 |
20090007295 | Method for Increasing Seed Size - A method is provided for increasing the weight of plant seed, which comprises preparing a genetically modified plant in which gibberellin content has been manipulated in the seed of the plant. | 2009-01-01 |
20090007296 | Transcription Factor Stress-Related Proteins and Methods of Use in Plants - A transgenic plant transformed by a transcription factor stress-related protein (TFSRP) coding nucleic acid, wherein expression of the nucleic acid sequence in the plant results in increased tolerance to environmental stress as compared to a wild type variety of the plant. Also provided are agricultural products, including seeds, produced by the transgenic plants. Also provided are isolated TFSRP, and isolated nucleic acid coding TFSRP, and vectors and host cells containing the latter. Further provided are methods of producing transgenic plants expressing TFSRP, methods of increasing expression of other genes of interest using the TFSRP, methods of identifying novel TFSRP, and methods of modifying the expression of TFSRP in plants. | 2009-01-01 |
20090007297 | Fructan Biosynthetic Enzymes - This invention relates to isolated nucleic acid fragments encoding fructosyltransferases. More specifically, this invention relates to polynucleotides encoding 1-FFTs, 6-SFTs, or 1-SSTs. The invention also relates to the construction of a recombinant DNA constructs encoding all or a portion of the fructosyltransferases, in sense or antisense orientation, wherein expression of the recombinant DNA construct results in production of altered levels of the fructosyltransferases in a transformed host cell. | 2009-01-01 |
20090007298 | Taxus Transformation Transformed Cells, and Related Compositions and Methods - Reported herein are methods for obtaining stably transformed callus in | 2009-01-01 |
20090007299 | FORAGE BERMUDAGRASS CULTIVAR - “Goodwell” is a hybrid forage bermudagrass. It has larger stems and wider leaves, and produces a more dense sod compared to “hay type” varieties. The stem size and leaf width is much greater compared to “grazing type” varieties while the sod density is somewhat less compared to the grazing type varieties. | 2009-01-01 |
20090007300 | SYNTHETIC ZINC FINGER PROTEIN ENCODING SEQUENCES AND METHODS OF PRODUCING THE SAME - The invention relates to the field of plant and agricultural technology. More specifically, the invention relates to the use of zinc finger proteins and fusions of said proteins to regulate gene expression and metabolic pathways in plants. | 2009-01-01 |
20090007301 | Plant Promoters, Terminators, Genes, Vectors and Related Transformed Plants - The invention provides novel regulatory polynucleotide sequences useful in plant genetic engineering applications, e.g., polynucleotides having transcriptional promoter or terminator activity, are provided. The invention also provides novel gene and polypeptide sequences, for example, genes corresponding to pineapple carotenoid biosynthesis proteins, e.g., carotenoid isomerase (ISO), phytoene synthase (PSY) and lycopene β-cyclase (LYC), which find use in producing plants with improved traits, e.g., improved nutritional value. In addition, related nucleic acids, e.g., vectors, and transformed plants that include one or more of these polynucleotides or polypeptides are also provided, as are related methods for producing such compositions. | 2009-01-01 |
20090007302 | SEED-PREFERRED REGULATORY ELEMENT - The present invention provides compositions and methods for regulating expression of nucleotide sequences of interest in a plant. Compositions are novel nucleotide sequences for a seed-preferred promoter and terminator associated with the maize embryo abundant protein 2 coding region. A method for expressing a nucleotide sequence of interest in a plant using the regulatory sequence disclosed herein is provided. | 2009-01-01 |
20090007303 | Methods for increasing germination vigor by early singulation of conifer somatic embryos - In one aspect, a method is provided for increasing germination vigor of conifer somatic embryos produced in vitro. The method comprises (a) singulating a plurality of individual immature conifer somatic embryos from a first culture of embryos after a first incubation period in a first development media; and (b) contacting the plurality of singulated immature conifer somatic embryos with a second development media for a second incubation period. | 2009-01-01 |
20090007304 | Hybrid tea rose plant named 'JACeleco' - Hybrid tea rose plant having flowers with large flower size; compact, well-branched plant with glossy, dark green foliage; resistant to rust and powdery mildew and ability to own root from softwood cuttings. | 2009-01-01 |
20090007305 | Apple tree named 'PLFOG99' - ‘PLFOG99’ is a new and distinct apple tree notable for its compact tree type, spur bearing habit, and early maturity as compared to ‘Cripps Pink’ and other known cultivars. | 2009-01-01 |
20090007306 | Hydrangea plant named 'RENHY' - A new cultivar of | 2009-01-01 |