10th week of 2010 patent applcation highlights part 59 |
Patent application number | Title | Published |
20100064314 | System and Method for Managing Storage Capacity on a Digital Video Recorder - An Internet protocol television system includes a server that records content on a set-top box, determines storage capacity utilization, and when utilization is greater than a threshold, prompts to select other content on the storage device to be deleted. | 2010-03-11 |
20100064315 | TELEVISION SYSTEM AND METHOD FOR PROVIDING COMPUTER NETWORK-BASED VIDEO - A television system and method for providing computer network-based video. Various aspects may, for example, comprise a television system and method for providing both standard television video combined with computer network-based video, serially and/or concurrently. Various aspects may also comprise a user interface system and method for interacting with a user regarding the presentation and/or control of computer network-based video. | 2010-03-11 |
20100064316 | METHOD FOR REDUCING CHANNEL CHANGE TIMES AND SYNCHRONIZING AUDIO/VIDEO CONTENT DURING CHANNEL CHANGE - A digital A/V apparatus provides reduced channel changes times and maintains synchronization between audio and video content during a channel change event. According to an exemplary embodiment, the digital A/V apparatus includes at least one signal receiver for receiving a first audio stream, a first video stream and a second video stream, wherein the first and second video streams represent the same program and the first video stream has at least one characteristic different from the second video stream; a first audio signal processor for processing the first audio stream to generate a first processed audio stream; a first video signal processor for processing the first video stream to generate a first processed video stream; a second video signal processor for processing the second video stream to generate a second processed video stream having a delay with respect to the first processed video stream; a first buffer for buffering the first processed audio stream to provide de-jittering; a renderer for rendering the first processed audio stream and the second processed video stream in response to a channel change command; a switch for switching from the second processed video stream to the first processed video stream after the renderer begins rendering the second processed video stream, and thereby causing the renderer to begin rendering the first processed video stream; and whereby synchronization between the first processed audio stream and the first processed video stream is maintained during a channel change event. | 2010-03-11 |
20100064317 | METHOD AND APPARATUS FOR PLAYING BACK A PROGRAM - This invention provides a method and apparatus for playing back a program, and the program is being broadcast. Firstly, receiving a request on the program being broadcast for playing back a section of the program in non-real-time mode from a subscriber; acquiring a corresponding internet address according to information in the broadcast signal of the program; and obtaining the section according to the internet address for playing back; and finally, playing back the section. The request includes one of the following commands: pause, fast winding, fast rewinding, rewinding, and playing back at designated non-real time point. During the broadcast of a program, the present invention obtaining a section of the program in a non-real time mode by acquiring an internet address corresponding to the program and in the stream media form. | 2010-03-11 |
20100064318 | ELECTRONIC DEVICE AND DISPLAY METHOD THEREOF - An electronic device provides an electronic program guide, viewable on a screen providing a plurality of display areas. The electronic program guide includes a plurality of first options, a main option, and a plurality of second options. When one of the first options is selected, first sub-options of the selected first option are displayed on a first display area, the first options are moved from the first to a second display area, and the main option is moved from the second to a third display area. When a second option is selected, second sub-options of the selected second option are displayed on the third display area, the second options are moved from the third to the second display area, and the main option is moved from the second to the first display area. | 2010-03-11 |
20100064319 | MULTIPLEX TRANSMISSION INTERFACE METHOD OF ELECTRONIC SERVICE GUIDE - The present invention discloses an electronic service guide multiplex transmission interface method comprising: Step S | 2010-03-11 |
20100064320 | Integrating data on program popularity into an on-screen program guide - A subscriber to a digital cable or satellite TV service generally has available to them an on-screen program guide. The program guide lists programming (e.g., TV shows) that are available to the subscriber for a certain upcoming time period, typically two weeks. The programming guide may sort the listings by channel and time, areas of interest, age appropriateness and/or MPAA or TV rating, free or additional cost, etc. In the embodiments of the present invention, the programming guide includes an ability to make a selection to see which TV shows are currently (or typically) most watched. In one embodiment, this information is presented as a simple “top 10” list by displaying the actual number of television sets having a set top box with an integrated internet protocol (IP) channel that are tuned to that program. In other embodiments, other web-based services (e.g., Nielsen Ratings) are accessed to determine the popularity of television shows. Results may be provided audibly and/or graphically on a subscriber's television display. | 2010-03-11 |
20100064321 | SYSTEM AND METHOD FOR PROCESSING ELECTRONIC PROGRAM GUIDE BASED ON REALLY SIMPLE SYNDICATION FEED - An RSS (really simple syndication) feed based EPG (electronic program guide) processing system includes: a plurality of user devices; a plurality of television program servers for providing EPG information of television channels via the Internet; and an EPG processing server for receiving a user's demand from a user device and for providing to the user device user-specific EPG information according to the user's demand. In the EPG processing system, a plurality of first RSS feeds, for interoperating with the television program servers via the Internet, are registered to the EPG processing server. The EPG processing server obtains and stores the EPG information of each television channel by using each of the first RSS feeds, generates the user-specific EPG information corresponding to the user's demand by searching for the stored EPG information according to the user's demand, and provides the user-specific EPG information to the user device. | 2010-03-11 |
20100064322 | APPARATUS, METHOD, AND PROGRAM FOR INFORMATION PROCESSING AND RECORDING MEDIUM FOR THE SAME - An information processing apparatus includes: transmission means for transmitting information on an input character to an information managing apparatus along with identification information identifying a process associated with a screen on which the character is input, the information being transmitted as a request for conversion of the input character; reception means for receiving information concerning candidates of words into which the input character can be converted, transmitted by the information managing apparatus in response to the request for conversion thus transmitted; display control means for controlling display of a list of conversion candidates for the input character included in the received information; and selection accepting means for accepting the selection of a result of conversion of the input character from the displayed list of conversion candidates. | 2010-03-11 |
20100064323 | DIGITAL BROADCASTING SYSTEM AND DATA PROCESSING METHOD - The present invention relates to a digital broadcasting system and a processing data method thereof. The present invention includes acquiring a first ensemble providing service guide information for mobile service data from a broadcast signal in which the mobile service data and main service data are multiplexed, acquiring, from the first ensemble, first program table information including information which indicates that the first ensemble provides service guide information for a second ensemble, and decoding the first program table information and acquiring service guide information for mobile service data included in the second ensemble by using the decoded first program table information. | 2010-03-11 |
20100064324 | DYNAMIC VIDEO SOURCE SELECTION - A Dynamic Video Source Selection (DVSS) component that can be implemented in a physical or virtual STB that is capable of presenting a high quality service and consistent navigational paradigm to the viewer, while detecting, selecting, and presenting the best quality programming possible based upon the current position of the viewer's device within the network. | 2010-03-11 |
20100064325 | Community-based recommendation engine - A community-based recommendation engine is provided. In one example embodiment, a system to provide community-based recommendation engine comprises a recommendation detector and a decision module. The recommendation detector is configured to receive, at a viewer's system, a recommendation for a content item from a contact of a viewer. The decision module may be configured to determine an action to be performed at the viewer's system, based on the recommendation and on one or more rules, accept the recommendation as an instruction to perform the action, and initiate the action at the viewer's system. | 2010-03-11 |
20100064326 | Band Rejection Filter Capable of Reducing Harmonics and Related Satellite Signal Receiver - A band rejection filter capable of reducing harmonics includes a first signal end, a second signal end, a high pass filter coupled between the first signal end and the second signal end for performing high pass filtering on signals transmitted between the first signal end and the second signal end, and a low pass filter coupled between the first signal end and the second signal end for performing low pass filtering on signals transmitted between the first signal end and the second signal end. The low pass filter includes a plurality of non-magnetic-core inductors coupled in a sequence between the first signal end and the second signal end, and a plurality of capacitors respectively coupled between an intersection of adjacent non-magnetic-core inductors of the plurality of non-magnetic-core inductors and a ground end. | 2010-03-11 |
20100064327 | AIRCRAFT COMMUNICATIONS SYSTEM WITH VIDEO FILE LIBRARY AND ASSOCIATED METHODS - A video file system for an aircraft carrying a person having a personal electronic device (PED) for displaying video files includes a ground-based video server and an aircraft-based video system. The ground-based video server stores video files, with each video file being updatable from an available status to an unavailable status. The aircraft-based video system copies video files from the ground-based video server while the aircraft is on the ground. A determination is made, via communications with the ground-based video server and while the aircraft is airborne, whether a given video file has been updated from the available status to the unavailable status. The PED is permitted to display the given video file if it has the available status, and is not permitted to display the given video file if it has the unavailable status. | 2010-03-11 |
20100064328 | Communication system and method - A media device comprising: a memory storing a communication client application; a processor, coupled to the memory and operable to execute the communication client application, wherein the client application is programmed so as when executed to allow a user to establish a call with one or more other users via a packet-based communication network; and a remote control unit comprising wireless communication means arranged to transmit data to the processor, a control means coupled to the wireless communication means and configured to control the wireless communication means, user input means coupled to the control means and arranged to receive input commands from the user and provide the input commands to the control means, and a microphone coupled to the control means and arranged to receive audio signals from a user, wherein, responsive to the control means receiving a command to establish a call from the user input means, the control means is arranged to activate the wireless communication means from a deactivated state, establish a wireless connection with the processor, and transmit data comprising audio signals from the microphone using the wireless communication means to the processor for transmission in a call over the packet-based communication network. | 2010-03-11 |
20100064329 | Communication system and method - A television receiver system and corresponding method, the television receiver system comprising: a television receiver for receiving broadcast television signals, signal processing apparatus operable to process the received television signals for output to a television screen, and a control device allowing a user to select a viewing activity by controlling the output to the television screen. The television receiver further comprises a memory storing a communication client application; and communications processing apparatus operable to execute the communication client application. The client application is programmed so as when executed to allow the user to establish bidirectional communications with one or more other users via a packet-based communication network, and to provide notifications to the user of incoming communication events from other users. The client application is further programmed to control the notifications of incoming communication events in dependence on the selection of viewing activity. | 2010-03-11 |
20100064330 | Bidirectional signal transmission apparatus and method - The present invention relates a bidirectional signal transmission apparatus and method, wherein said apparatus comprises a processor unit connected in signal communication with an Ethernet, an RF modulation/demodulation unit, and an RF frequency conversion unit connected in signal communication with a coaxial cable network. The data signal input from the Ethernet is modulated into standard IEEE802.11 signal by means of said signal processing unit and RF modulation/demodulation unit, and then down-converted from 2.4 GHz or 5.8 GHz standard IEEE802.11 signal to a range of 500 MHz to 2000 MHz, and preferably to a range of 900 MHz to 1200 MHz. The bidirectional transmission apparatus further includes a frequency band selector for selecting different frequency bands so as to broaden the bandwidth of the signal and a real broad band data transmission is accomplished. | 2010-03-11 |
20100064331 | Hybrid Premium Terrestrial Television Service - A method for the provision of a hybrid premium television platform using terrestrial broadcasting. The system allows for enhanced services to subscribers using a terrestrial broadcast signal. The enhanced services are similar to those enjoyed by more expensive providers such as cable and satellite television providers. | 2010-03-11 |
20100064332 | SYSTEMS AND METHODS FOR PRESENTING MEDIA CONTENT OBTAINED FROM MULTIPLE SOURCES - Systems and methods integrate media content provided by any number of different sources for presentation on a television or other external display. A network interface to a digital network and a display interface to the external display is provided. A processor is configured to receive the media content from each of the different sources via the network interface in a first format, to convert the media content a displayable format different from the first format for display on the external device, and to provide the media content in the displayable format to the display interface for presentation on the external display. | 2010-03-11 |
20100064333 | Communication system and method - A media appliance and corresponding method, the media appliance comprising a video signal source such as a TV receiver, and signal processing apparatus for generating a corresponding sequence of frames for output to a screen. The appliance comprises a client application programmed to capture one of the frames and use the captured frame to generate an image to represent a user in relation to bidirectional communications over a packet-based network. | 2010-03-11 |
20100064334 | Communication system and method - A method of transmitting video data comprising: establishing a bidirectional video channel between a first terminal and a second terminal in a packet-based communication network; beginning a live, face-to-face video call over the established channel by generating first video data from a video camera of the first terminal, transmitting the first video data to the second terminal for display on a screen of the second terminal, receiving second video data generated from a video camera of the second terminal, and displaying the second video data on a screen of the first terminal; generating third video data at the first terminal from a source other than the video camera of the first terminal; receiving a user selection at the first terminal; and in response to the user selection, transmitting the third video data to the second user over the established channel of the packet-based communication network. | 2010-03-11 |
20100064335 | VIRTUAL SET-TOP BOX - A virtual set-top box (vSTB) for executing a middleware component, designed originally for use with the physical STB, including emulating hardware capabilities of the physical STB to process IPTV content received over a connection for presenting the IPTV content on a display of the electronic device. | 2010-03-11 |
20100064336 | METHOD AND NETWORK DEVICE FOR IMPLEMENTING IPTV STREAMING SERVICE IN IMS - A method, a network device, and a terminal device for implementing an IPTV streaming service in an IMS are provided. The method for implementing the IPTV streaming service includes: receiving IPTV streaming service switching request information, where the IPTV streaming service switching request information is carried in a SIP signaling; determining information of a program that needs to be switched and information of a target terminal device according to the switching request information; and setting up a connection with the target terminal device through the SIP signaling, and sending IPTV media streams of the program to be switched onto the target terminal device through the connection. The provided method, network device, and terminal device implement switching of an IPTV streaming service. | 2010-03-11 |
20100064337 | SYSTEM AND METHOD FOR CENTRAL MANAGEMENT OF NETWORK AND STORAGE RESOURCES FOR A VIDEO SURVEILLANCE SYSTEM - System and method for central managing of network and storage resources by dynamically receiving over a network bit rate parameters related to video processing units of one or more edge devices and dynamically adjusting a bit rate of one of the processing units based on required bit rates of the processing units and bandwidth limitations of the network. The system and method may further include dynamically receiving storage parameters related to internal storage units of the edge devices and to external storage units coupled to the edge devices and instructing one of the edge devices where to store the video data based on the storage parameters and bandwidth limitations of the network. | 2010-03-11 |
20100064338 | BROADCAST MONITORING SYSTEM AND METHOD - A media play traffic system is disclosed. The media play traffic system includes at least one hub at least partially remote from at least two media play points, and a normalizer associated with the hub, wherein said normalizer normalizes data inputs for the at least two media play points, wherein the normalization enables importation of a media play list to, and subsequent media play of the imported media play list from, each of the media play points. | 2010-03-11 |
20100064339 | METHOD AND APPARATUS FOR MULTIPLE AUDIO OUTPUTS - A method for transmitting audio signals. The method of transmitting audio signals may include separately transmitting a video signal and an audio signal. Further, the method of transmitting audio signals may include transmitting a first video signal and a first audio signal to one component, transmitting a second video signal to the same component and separately transmitting a second audio signal to a second component. | 2010-03-11 |
20100064340 | SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO DATA THROUGH APPLICATION VIRTUALIZATION LAYERS - A computer-implemented method for controlling access to data is. A request to access data is received. A determination is made that an access-control policy of the data is satisfied. A virtualization layer is activated to allow access to the data after determining that the access-control policy is satisfied. Various other methods, systems, and computer-readable media are also disclosed. | 2010-03-11 |
20100064341 | System for Enforcing Security Policies on Mobile Communications Devices - A system for enforcing security policies on mobile communications devices is adapted to be used in a mobile communications network in operative association with a subscriber identity module. The system having a client-server architecture includes a server operated by a mobile communications network operator and a client resident on a mobile communications device on which security policies are to be enforced. The server is adapted to determine security policies to be applied on said mobile communications device, and to send thereto a security policy to be applied. The client is adapted to receive the security policy to be applied from the server, and to apply the received security policy. The server includes a server authentication function adapted to authenticate the security policy to be sent to the mobile communications device; the client is further adapted to assess authenticity of the security policy received from the server by exploiting a client authentication function resident on the subscriber identity module. | 2010-03-11 |
20100064342 | SECURITY MEASURE STATUS SELF-CHECKING SYSTEM - The present invention provides a security measure status self-checking system which can determine the measure status in a more simplified and effective manner by focusing on the information leakage measure in the security measures, managing the PC's security measure status and the user's take-out operation status in an integrated and unitary manner, and providing security policy samples. According to the present invention, the client computer collects security inventory information and operation log information and transmits the information to the server computer. Further, the server computer stores the security inventory information and the operation log information transmitted from the client computer and determines whether or not the information conforms to the security policy which has been set in advance. The check result is displayed on the server computer and when a policy violation is detected, the manager and the client are notified of that effect. | 2010-03-11 |
20100064343 | OPERATION SUPPORTING APPARATUS AND OPERATION SUPPORTING METHOD - There is provided an operation supporting technique by which an operation environment which is set in an apparatus for each user can be more easily reflected in another apparatus. An operation supporting apparatus includes an authentication section to authenticate a user by acquiring authentication information from a storage medium to store the authentication information used for user authentication and specific information about a location of setting information about setting contents of an operation environment of the user, a specific information acquisition section to acquire the specific information from the storage medium from which the authentication information is acquired, a setting information acquisition section to acquire, when the authentication section succeeds in the authentication of the user, the setting information by using the specific information acquired by the specific information acquisition section from the storage medium from which the authentication information of the user is acquired, and a setting reflection section to cause setting contents based on the setting information acquired by the setting information acquisition section to be reflected in the operation environment of the user. | 2010-03-11 |
20100064344 | Method and device for updating a key - A method for updating a key includes: assigning, by a network, a stipulated specific value to an authentication management field AMF and generating a corresponding authentication tuple, and sending corresponding parameters in the authentication tuple to the terminal when an authentication request is initiated to the terminal, and generating a new authentication key for use in the next authentication; generating, by the terminal, a new authentication key corresponding to the network for use in the next authentication, when the corresponding parameters are received and it is determined that the authentication for the network is passed and the authentication management field in the corresponding parameters is with the predetermined value. According to the method for updating the key according to the invention, the key may be updated conveniently without adding to or modifying the existing signaling resources or the authentication parameters, so that network security may be improved. | 2010-03-11 |
20100064345 | Continual Peer Authentication - A method for orchestrating peer authentication during a call (e.g., a telephone call, a conference call between three or more parties, an instant messaging [IM] chat session, etc.) is disclosed. In particular, a user is first authenticated in order to participate in a call (e.g., via entering a password, etc.), and subsequently during the call the user may be peer authenticated. In accordance with the illustrative embodiment, a user who participates in a call might be prompted to authenticate another user on the call based on particular events or user behavior during the call. | 2010-03-11 |
20100064346 | Method and Arrangement for Providing a Wireless Mesh Network - The invention relates to a method for providing a wireless local network, wherein stationary communication devices and mobile communication devices are connected in the manner of a mesh as the sub-network, which is particularly connected to an infrastructure network and configured such that it can exchange authentication messages with at least one communication device, which is particularly disposed in the infrastructure network and provides an authentication function. During an attempt to establish a first link by a first communication device connected to a communication device providing the authentication function to a second communication device connected to the communication device providing the authentication function, an authenticator role to be assigned as part of an authentication process is associated with the first and second communication devices, wherein at least one property correlating with the connection is analyzed for meeting a criterion. The invention further relates to an arrangement comprising means for carrying out the method. | 2010-03-11 |
20100064347 | METHODS AND SYSTEMS FOR PROTECT AGENTS USING DISTRIBUTED LIGHTWEIGHT FINGERPRINTS - The present invention provides methods and systems to protect an organization's secure information from unauthorized disclosure. The present system uses protect agents installed across various egress points (e.g., email server, user's computer, etc.) to monitor information disclosed by a user. The present system also provides the use of lightweight fingerprint databases (LFD) to maintain a database of fingerprints associated with the organization's secure data. In one embodiment, the LFD is stored locally at the site of each protect agent such that the organization's secure information can be protected even when a protect agent is disconnected from the network. Methods and systems to compress fingerprints to achieve the lightweight fingerprint databases are also provided. In one embodiment, a combined approach, utilizing both the local lightweight fingerprint database and a remote fingerprint server comprising registered fingerprints is used to achieve overall protection of the organization's secure information. | 2010-03-11 |
20100064348 | APPARATUS AND METHOD FOR MANAGING ACCESS AMONG DEVICES - Provided are an apparatus, system composed of apparatuses in a chassis, and a method for managing access among a plurality of devices accommodated in a chassis. Setting information by the user on access between a first management unit including at least one device of said plurality of devices and a second management unit including at least one device of said plurality of devices is accepted. The first attribute information is acquired designating at least any one of an instruction issuing function and an instruction receiving function among the functions of said first management unit and the second attribute information designating at least any one of the instruction issuing function and the instruction receiving function among the functions of said second management unit. A determination is made as to whether or not said setting information is consistent with a combination of said first attribute information and said second attribute information. Information is outputted based on a determination result of the determination. | 2010-03-11 |
20100064349 | SECURE TRANSMISSION AND EXCHANGE OF STANDARDIZED DATA - Standardized transmission of digital data with trusted and untrusted connections by translating non-native requests and or non-native responses to and from a normalized format or to a format needed for processing the request and or response configured in hub and spoke, star, direct, peer to peer or hybrid connections. Encryption is provided at multiple layers to establish non-repudiation for a security service that integrates external security applications into a single service. | 2010-03-11 |
20100064350 | Apparatus and Method for Secure Affinity Group Management - Disclosed is a method for security management in a station. In the method, a pre-registered credential is received. The pre-registered credential has been associated with a network group by a registration entity. The station is established as a member of the network group based on the received pre-registered credential thereby effecting access rights with other member stations participating in the network group. | 2010-03-11 |
20100064351 | Universal Plug and Play Extender - The present invention relates to a solution for providing access to services and media content located in a local area network, e.g. a home network, via a web interface controlled by a universal plug and play (UPnP) control point device. The UPnP device is arranged to discover the services and media content available in the local area network and present this on the web interface for access from a public area network. The UPnP device may further be arranged to authenticate the user in order to secure the content and services from unauthorized access. | 2010-03-11 |
20100064352 | MIXED ENCLAVE OPERATION IN A COMPUTER NETWORK - A method is disclosed for mixed enclave operation of a computer network with users employing a multi-level network security interface and users without any network security interface. Either the network security user selects or the network security interface automatically selects whether communications are permissible with other unsecured users. Where a mixed enclave operation is selected, the network security user identifies when communications are being undertaken with another secured user or a non-secured user. Communications with a non-secured user at a lower security level entail securing the data residing with the secured user from transmission back to the non-secured user. | 2010-03-11 |
20100064353 | User Mapping Mechanisms - In various embodiments, techniques can be provided for identifying a user or group of users who initiated network traffic. The user or group of users may be identified as an employee who can be found in corporate or organizational directory. In some embodiments, different authentication mechanisms may be used for various types of network traffic. For example, by proxying instant messaging (IM) communications, a proxy server can know which users are associated with what network traffic. In another example, transparent and non-transparent mechanisms may be provided to authenticate HTTP URL traffic. For other types of traffic, such as non-proxied IM, P2P, and spyware, an existing authentication cache or credential cache may be used to identify the user who generated the traffic. | 2010-03-11 |
20100064354 | MAIDSAFE.NET - This invention is a network that is defined by its novel approach to privacy, security and freedom for its users. Privacy by allowing access anonymously, security by encrypting and obfuscating resources and freedom by allowing users to anonymously and irrefutably be seen as genuine individuals on the network and to communicate with other users with total security and to securely access resources that are both their own and those that are shared by others with them. Further, this invention comprises a system of self healing data, secure messaging and a voting system to allow users to dictate the direction of development of the network, whereby adoption or denial of proposed add-ons to the network will be decided. System incompatibilities and security breaches on networks and the Internet are addressed by this invention where disparity and tangents of development have had an undue influence. The functional mechanisms that this invention provides will restore open communications and worry-free access in a manner that is very difficult to infect with viruses or cripple through denial of service attacks and spam messaging, plus, it will provide a foundation where vendor lock-in need not be an issue. | 2010-03-11 |
20100064355 | SEAMLESS CROSS-SITE USER AUTHENTICATION STATUS DETECTION AND AUTOMATIC LOGIN - A system and method for determining in a global network the user network authentication status as the user goes from site to site within the network is provided. Additionally, the system and method provides for transparent or implicit multi-site logon functionality, including automatic introduction from one site to the other using a baseline authentication agency ( | 2010-03-11 |
20100064356 | SYSTEM AND METHOD FOR DOUBLE-CAPTURE/DOUBLE-REDIRECT TO A DIFFERENT LOCATION - Embodiments disclosed herein provide a system, method, and computer program product for providing network access control for a shared network. One embodiment of a network access controller may intercept a request to access a network resource from a browser application running on a client device associated with an anonymous user and determine whether the network resource is in a set of network destinations in the shared network. If the network resource is in the set of network destinations, the network access controller may direct the browser application to the network resource. If the network resource is not in the set of network destinations, the network access controller may redirect the browser application to a pre-authentication capture destination in the shared network. From the pre-authentication capture destination the anonymous user is free to visit any of the set of network destinations in the shared network without authentication. | 2010-03-11 |
20100064357 | Business Processing System Combining Human Workflow, Distributed Events, And Automated Processes - Techniques are provided for designing, deploying, and executing mashups that integrate human workflows with automated processes. In an example embodiment, a system for executing mashups comprises a human interaction module, an event manager module, and a process orchestration module. The human interaction module is configured to receive user input while a human workflow included in a mashup is being executed, and to raise an event in response to the user input. The event manager module is configured to: receive the event from the human interaction module; based on the event, identify a particular automated process from one or more automated processes that are included in the mashup; and invoke the process orchestration module to execute the particular automated process based on the event. The process orchestration module is configured to execute the particular automated process in response to being invoked by the event manager module. | 2010-03-11 |
20100064358 | APPARATUS AND METHOD FOR MANAGING INFORMATION - A method and apparatus are provided for managing system identification information for workforce members such as employees, contractors and consultants that are affiliated with a business entity such as a corporation. The method and apparatus provide for the association of system identification information of a workforce member with each such workforce member in memory and further provides a review process of the same information by the relevant workforce member and one or more of the workforce member's supervisors. The review process allows each of the workforce member and the applicable supervisor(s) to confirm and, in some instances, reject the system identification information as being valid or not valid. The method and apparatus further maintains the review status of the workforce member and the applicable supervisor(s) and in one embodiment, provides for an audit of the same so that any discrepancies in the reviews are brought to light. | 2010-03-11 |
20100064359 | USER CREDENTIAL VERIFICATION INDICATION IN A VIRTUAL UNIVERSE - User credential verification indication in a virtual universe is disclosed. A method, system and program product are provided that include verifying a credential of the user of a first avatar in the virtual universe; and establishing a zone that causes an indication of the credential of the user of the first avatar to appear in response to an action being taken relative to the zone. | 2010-03-11 |
20100064360 | Token device that generates and displays one-time passwords and that couples to a computer for inputting or receiving data for generating and outputting one-time passwords and other functions - A token device that generates and displays one-time passwords and couples to a computer for inputting or receiving data for generating and outputting one-time passwords and performing other functions is provided. The token includes an interface for coupling to a computer. The token may also be coupled to any network that the computer may be connected to, when coupled to the computer. Data and information may be transmitted between the computer and token, and between the network and token, via the computer and interface. The data and information may include one-time password seeding, file transfer, authentication, configuration and programming of the token. The token must be seeded to generate and display one-time passwords. An original, or seed, value is loaded into the token. One-time passwords are subsequently generated or calculated, or both, from the seed value. Seeding of the token involving a counter, time, or time-related functions, may allow synchronization of the token with such functions. The token may support different authentication methods. | 2010-03-11 |
20100064361 | SECURELY ROAMING DIGITAL IDENTITIES - A cryptographic session key is utilized to maintain security of a digital identity. The session key is valid only for a limited period of time. Additional security is provided via a bimodal credential allowing different levels of access to the digital identify. An identity token contains pertinent information associated with the digital identity. The identity token is encrypted utilizing public-key cryptography. An identifier utilized to verify the validity of the digital identity is encrypted with the cryptographic session key. The encrypted identity token and the encrypted identifier are provided to a service for example. The service decrypts the encrypted identity token utilizing public key cryptography, and decrypts, with the cryptographic session key obtained from the identity token, the encrypted identifier. If the identifier is determined to be valid, the transaction proceeds normally. If the identifier is determined to be invalid, the transaction is halted. | 2010-03-11 |
20100064362 | SYSTEMS AND METHODS FOR VOIP NETWORK SECURITY - According to an aspect of the present invention there is provided a VoIP asset discovery system for discovering and identifying VoIP assets on a VoIP network, the asset discovery system comprising an IP address module for determining at least one IP address to discover, a port scanner for scanning VoIP specific ports of the received IP addresses, a service detection module for detecting a VoIP service at the received IP addresses. The asset discovery system further comprises a fingerprinting module for fingerprinting VoIP applications based on responses received to specific queries and a correlation module for correlating the information from the port scanner module, the service detection module, and the fingerprinting module to identify the instances of the discovered assets. | 2010-03-11 |
20100064363 | IMAGE PROCESSING APPARATUS, SCREEN SELECTION METHOD, AND SCREEN SELECTION PROGRAM EMBODIED ON COMPUTER READABLE MEDIUM - In order to improve operability by decreasing the number of times of switching between screens, an MFP includes an authentication portion which authenticates a user using authentication information input into one of first to third user I/Fs, a process executing portion which executes processes according to settings input, a first association data storing portion which stores first association data associating input data with the authenticated user, a second association data storing portion which stores second association data associating processes executed for the input data with the respective user I/Fs, and a determining portion which determines, in response to authentication by the authentication portion, a screen for the process associated by the second association data with one of the first to third user I/Fs that accepted the authentication information used for the authentication, if data associated with the authenticated user by the first association data is stored. | 2010-03-11 |
20100064364 | Method for Creating Multiple Virtualized Operating System Environments - A method of processing multiple workload using virtualized operating system environments. The creation of a new user in a global operating system may automatically cause the creation of a working partition (WPAR) instance. The user will be associated with the WPAR instance and a virtualized operating system environment will be created from the global operating system within the WPAR instance. Within the WPAR instance, the user may be assigned a root identification which enables the user to have root access privileges to perform operations or processes that may only be performed by a root user. The removal of a user from the system also results in the deletion of the associated WPAR. | 2010-03-11 |
20100064365 | METHOD FOR PASSWORD BASED AUTHENTICATION TRUST GENERATION AND AUTHORIZATION THEREOF - A method and system is provided to authorize a user to access in a service of higher trust level. The method includes the steps of defining first password, assigning a second password to a user, generating a value for each constituent of second password on operating an exclusivity relationship, calculating the score for the second password on summing the generating value, combining trust levels of multiple users to attain a higher trust level in aggregate, and obtaining access in a service if the aggregated trust level of users are equal to or more than the predetermined trust level of the service. The present technique provides flexibility of authenticating and authorizing a user to access in a service to perform desirable functions thereon. The present technique eliminates the requirement of tokens, pins, dongles etc while attaining a higher trust level to perform a task which belongs to a higher trust level. | 2010-03-11 |
20100064366 | Request processing in a distributed environment - A method for request processing in a distributed system includes obtaining event request information at a plurality of application servers, at least some of the event request information pertaining to a resource access request that is sent from a client terminal and that corresponds to a Uniform Resource Locator (URL) resource, transferring the event request information to an anti-attack server, determining, based at least in part on the at least some of the event request information, a total number of access requests to the URL resource made by the client terminal in a specified period of time, and determining, based at least on the total number of access request determined and a predefined access rule, whether an abnormal access request has been made by the client terminal. | 2010-03-11 |
20100064367 | INTRUSION DETECTION FOR COMPUTER PROGRAMS - A method of detecting intrusion in a computer program which has number of defined libraries and includes cross border instructions which cause execution to branch from a source library to a target library. The method comprises the step of determining whether execution of the program is in an area consistent with normal execution of the program, by checking whether the source library of a cross border instruction is the expected current execution library of the program. Each cross border instruction has a code stub identifying the source library, and when a legal cross border instruction is executed the target library becomes the current execution library. The method also checks that the target address of a cross border instruction is a legal address. In another arrangement, areas of the program are set so that a cross border instruction will generate page protection fault which is intercepted by the intrusion detection system so that the cross border instruction can be checked. | 2010-03-11 |
20100064368 | Systems, Methods, and Media for Outputting a Dataset Based Upon Anomaly Detection - Systems, methods, and media for outputting a dataset based upon anomaly detection are provided. In some embodiments, methods for outputting a dataset based upon anomaly detection: receive a training dataset having a plurality of n-grams, which plurality includes a first plurality of distinct training n-grams each being a first size; compute a first plurality of appearance frequencies, each for a corresponding one of the first plurality of distinct training n-grams; receive an input dataset including first input n-grams each being the first size; define a first window in the input dataset; identify as being first matching n-grams, the first input n-grams in the first window that correspond to the first plurality of distinct training n-grams; compute a first anomaly detection score for the input dataset using the first matching n-grams and the first plurality of appearance frequencies; and output the input dataset based on the first anomaly detection score. | 2010-03-11 |
20100064369 | METHODS, MEDIA, AND SYSTEMS FOR DETECTING ATTACK ON A DIGITAL PROCESSING DEVICE - Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program. | 2010-03-11 |
20100064370 | METHOD AND DEVICE FOR PROTECTION OF A MICROCIRCUIT AGAINST ATTACKS - The method of protection of a microcircuit against an attack includes:
| 2010-03-11 |
20100064371 | METHOD AND APPARATUS FOR PREVENTION OF TAMPERING, UNAUTHORIZED USE, AND UNAUTHORIZED EXTRACTION OF INFORMATION FROM MICRODEVICES - The present invention considers a method and an apparatus where a secure stand-alone microdevice or a microdevice as part of a larger processing device is arranged for prevention of tampering, unauthorized use, and unauthorized extraction of information from one or more information containing regions of the secured microdevice by controlled obliteration of the information in the information containing region. The method implements control protocols and hardware which monitor the conditions of secured microdevices and generate commands to trigger said controlled obliteration of information; establishes a local energy storage device which stores energy to be used to perform said controlled obliteration of information; establishes localized controlled release of the stored energy from the local energy storage device and at least partial deposition of the stored energy in the proximity of the information containing regions of the secured microdevices upon generation of a command to trigger said controlled obliteration of information; and maintains conditions for controlled release of the energy stored in the local energy storage upon generation of a command to trigger said controlled obliteration of information for the duration of time necessary to achieve desired controlled obliteration of said information. | 2010-03-11 |
20100064372 | METHODS AND SYSTEMS TO IMPLEMENT FINGERPRINT LOOKUPS ACROSS REMOTE AGENTS - The present invention provides methods and systems to protect an organization's secure information from unauthorized disclosure. The present system uses protect agents installed across various egress points (e.g., email server, user's computer, etc.) to monitor information disclosed by a user. The present system also provides the use of fingerprint servers to remotely maintain a database of fingerprints associated with the organization's secure data. In one embodiment, the protect agents transmit fingerprints associated with the user's information to the fingerprint server utilizing a local network or the public internet. The protect agents then receive a comparison analysis from the fingerprint servers and execute appropriate security action based on the analysis. In one embodiment, a combination of the local network and public internet is utilized to achieve remote agent lookups. | 2010-03-11 |
20100064373 | CLOAKING WITH FOOTPRINTS TO PROVIDE LOCATION PRIVACY PROTECTION IN LOCATION-BASED SERVICES - A method for using a location-based service while preserving anonymity includes receiving a location associated with a mobile node, receiving an anonymity level associated with the mobile node, computing a region containing the location of the mobile node and a number of footprints based on the anonymity level, wherein each of the footprints from a different user, and providing the region to a location-based service to thereby preserve anonymity of the mobile node. A method also allow a mobile device or its user to specify the anonymity level by selecting a public region consistent with a user's feelings towards desired privacy. | 2010-03-11 |
20100064374 | Launching Of Multiple Dashboard Sets That Each Correspond To Different Stages Of A Multi-Stage Medical Process - A robust window pane display system and method for coordinating window pane displays in the form of dashboards to assist nurses and doctors in the treatment of a medical patient based upon various medical situations. The window pane display system may be linked to a computer or computer network. The system may involve multiple dashboards for a multi-stage procedure or operation having discrete dashboards for each stage of the multi-stage procedure. A method for creating new dashboards for use in the window pane display system. | 2010-03-11 |
20100064375 | METHOD, SYSTEM AND APPARATUS FOR SECURE DATA EDITING - A system, method, and apparatus for secure data editing is disclosed. A data field receives focus to accept a data entry from a user. The user inputs a data entry into the data field via a user interface. A determination is made of whether a manual lock event, a change focus event, or a time out event has triggered based on the user's action or inaction with the user interface. Upon the triggering of a manual lock event, a change focus event, or a time out event, the data entry in the data field is obscured. The user interface may display a data entry with a validation character which provides a reference point within the data entry while the data entry is displayed and while the data entry is obscured. The system may allow a user to have a specified function set based on his user access level. | 2010-03-11 |
20100064376 | Mobile terminal, restricting system and method of accessing an information using the mobile terminal - The exemplary embodiment relates to a system and method for restricting the disclosure of information employing a mobile terminal, which restricts the disclosure of information using a mobile terminal. In an aspect, the exemplary embodiment provides a mobile terminal, including a short-range communication module performing the short-range communication channel, memory storing authorization information for allowing access to unaccessible information stored in the information device, and a controller transmitting the authorization information through the short-range communication module. | 2010-03-11 |
20100064377 | ACCESS RIGHTS FOR DIGITAL OBJECTS - A digital object for distribution from a provider to a content user and a method of distribution of such an object is disclosed. The digital object comprises content and a tag containing data that is derived algorithmically from the content and from a secret not known to the content user. The tag is constructed such that the content user can, upon receipt of a communication from a requestor purporting to have the authority of the provider, perform an exchange of information with the requestor, and by inspection of the exchanged information and of the tag, determine whether the requestor is in possession of the secret and choose to act upon or not act upon the communication accordingly. The tag may additionally include a value that defines an access category that specifies the extent to which the owner wishes the content to be distributed. A server from which an object has been delivered to a third party can send a message to the third party to request, amongst other things, that the access category be changed. The third party can use the tag in the object to verify the authority of the request. | 2010-03-11 |
20100064378 | METHOD AND APPARATUS FOR MANAGING DIGITAL RIGHTS MANAGEMENT MODULE - Provided are a method and apparatus for managing a digital rights management (DRM) module. A DRM module for removing a DRM scheme applied to a content selected from among contents, and the content being protected with the DRM scheme, are received. The content is used by using the DRM module, and then the DRM module is partially or completely removed. | 2010-03-11 |
20100064379 | Remote Diagnosis of Unauthorized Hardware Change - Aspects describe remotely diagnosing unauthorized hardware changes on a mobile device. The changes can be identified based on hardware component identification and/or based on behavior characteristics of the device. If an unauthorized change is detected, information relating to that change can be reported to a service provider. Further, actions associated with the authorized change can be automatically implemented or implemented after confirmation to proceed with the recommended action. | 2010-03-11 |
20100064380 | PLURIPOTENT CELLS FROM THE MAMMALIAN LATE EPIBLAST LAYER - This invention relates to the isolation and propagation of pluripotent cells isolated from the mammalian late epiblast layer, termed Epiblast Stem Cells' (EpiSCs). These cells are useful in a range of applications, including the generation of transgenic animal species. | 2010-03-11 |
20100064381 | Increased Phytosterol Content Through Overexpression of an Acyl-CoA Sterol Acyl-Transferase - The present invention relates to the use of genetic engineering to produce sterol esters. In certain embodiments, an isolated or recombinant nucleic acid molecule encoding a sterol acyltransferase is disclosed. In certain other embodiments, a cell transformed with the isolated or recombinant nucleic acid molecule encoding a sterol acyltransferase is disclosed. A process for producing sterol esters using the transformed cell is also disclosed. In a further embodiment, an isolated or recombinant sterol acyltransferase is disclosed. | 2010-03-11 |
20100064382 | PLANTS AND SEEDS OF SORGHUM LINE TX3361 - According to the invention, there is provided seed and plants of the | 2010-03-11 |
20100064383 | Novel gene encoding MYB transcription factor involved in proanthocyanidin synthesis - An isolated or recombinant MYB polypeptide having activity as a transcription factor in the synthesis of proanthocyanidins in plants, and nucleic acid molecule encoding same, wherein the polypeptide activates in the plants (a) promoters of the leucoanthocyanidin (LAR) and anthocyanidid reductase (ANR) genes, and (b) promoters of at least two of the genes of the general flavonoid pathway. Use of the polypeptide and nucleic acid molecule in regulating the biosynthesis and accumulation of proanthocyanidins in plants, such as in modifying pasture quality of legumes, is also disclosed. | 2010-03-11 |
20100064384 | METHOD FOR MODIFYING THE ATP/ADP RATIO IN CELLS - The invention relates to a method of modifying the ATP-ADP ratio in a cell, tissue, organ, microorganism or plant by altering the hemoprotein activity in the cell, and to the use of the method. | 2010-03-11 |
20100064385 | CROP GRAIN FILLING GENE GIF1 AND THE APPLICATIONS THEREOF - A novel crop grain filling gene (GIF1) and the applications thereof are presented in the invention. The GIF1 gene can be applied to control grain filling, enhance crop yield or quality, or improve disease resistance or storage stability of crop grains. A method for improving crops is also presented in the invention. The GIF1 gene shows valuable potentials in controlling crop yield, quality, storage, and resistance to diseases. | 2010-03-11 |
20100064386 | PLANTS HAVING ENHANCED YIELD-RELATED TRAITS AND A METHOD FOR MAKING THE SAME - The present invention relates generally to the field of molecular biology and concerns a method for enhancing various economically important yield-related traits in plants. More specifically, the present invention concerns a method for enhancing yield-related traits in plants by modulating expression in a plant of a nucleic acid encoding a Harpin-associated Factor G polypeptide (hereinafter termed HpaG”). The present invention also concerns plants having modulated expression of a nucleic acid encoding an HpaG polypeptide, which plants have enhanced yield-related traits relative to control plants. The invention also provides constructs comprising HpaG-encoding nucleic acids, useful in performing the methods of the invention. The present invention also provides a method for enhancing yield-related traits in plants relative to control plants, by modulating (preferably increasing) expression in a plant of a nucleic acid sequence encoding a SWITCH 2/SUCROSE NON-FERMENTING 2 (SWI2/SNF2) polypeptide. The present invention also concerns plants having modulated expression of a nucleic acid sequence encoding a SWI2/SNF2 polypeptide, which in plants have enhanced yield-related traits relative to control plants. The invention also provides constructs useful in performing the methods of the invention. | 2010-03-11 |
20100064387 | EPICATECHIN GLUCOSYLTRANSFERASE - The invention provides methods and compositions for the modulation of epicatechin glucosyltransferase activity in plants. Increased expression of epicatechin glucosides, and ultimately anthocyanins and proanthocyanidins, in plants may be used to increase the nutritional value of food plants for both human and animal consumption. Increased proanthocyanidin content also reduces the potential for bloat in animals fed certain forage plants low in condensed tannin content. | 2010-03-11 |
20100064388 | Use of Alanine Racemase Genes to Confer Nematode Resistance to Plants - The invention provides alanine racemase encoding polynucleotides, which are capable of conferring increased nematode resistance in a plant. Specifically, the invention relates to methods of producing transgenic plants with increased nematode resistance, expression vectors comprising polynucleotides encoding alanine racemase, and transgenic plants and seeds generated thereof. | 2010-03-11 |
20100064389 | Polynucleotides Encoding Truncated Sucrose Isomerase Polypeptides for Control of Parasitic Nematodes - The invention provides polynucleotides encoding N-terminal truncated forms of sucrose isomerase polypeptides which are capable of conferring increased nematode resistance in a plant. The invention also provides methods of producing transgenic plants with increased nematode resistance, seeds of such transgenic plants, and expression vectors, all of which comprise the polynucleotides of the invention. | 2010-03-11 |
20100064390 | SOYBEAN MTH1 PROMOTER AND ITS USE IN CONSTITUTIVE EXPRESSION OF TRANSGENIC GENES IN PLANTS - The promoter of a soybean metallothionein protein (MTH1) and fragments thereof and their use in promoting the expression of one or more heterologous nucleic acid fragments in a tissue-independent or constitutive manner in plants are described. | 2010-03-11 |
20100064391 | Methods and Means for Producing Starch Having at Least One Altered Characteristic - The invention provides a method for modifying a starch producing plant and a method for producing starch having at least one altered characteristic. The invention particularly provides a method for producing starch comprising introducing a nucleic acid comprising an amylosucrase encoding sequence functionally linked to a granule-targeting sequence and functionally linked to a promoter sequence active in a starch storage organ of said plant into suitable plant material of said plant and producing a plant from said material, further comprising allowing said plant to grow and harvesting starch from said plant. The invention further provides starch having an altered characteristic and plants and parts thereof and products comprising such starch. Furthermore, the invention provides fusion proteins and cells comprising a fusion protein. | 2010-03-11 |
20100064392 | NUCLEOTIDE SEQUENCES AND CORRESPONDING POLYPEPTIDES CONFERRING IMPROVED AGRICULTURAL AND/OR ORNAMENTAL CHARACTERISTICS TO PLANTS BY MODULATING ABSCISSION - Methods and materials for modulating abscission and/or inflorescence development time levels in plants are disclosed. For example, nucleic acids encoding abscission and/or inflorescence development time-modulating polypeptides are disclosed as well as methods for using such nucleic acids to transform plant cells. Also disclosed are plants having modulated abscission and/or inflorescence development time levels and plant products produced from plants having such levels. | 2010-03-11 |
20100064393 | Bacillus liceniformis chromosome - The present invention relates to an isolated polynucleotide of the complete chromosome of | 2010-03-11 |
20100064394 | Novel Hemipteran and Coleopteran Active Toxin Proteins From Bacillus Thuringiensis | 2010-03-11 |
20100064395 | Monolithic Comb Drive System and method for Large-Deflection Multi-Dof Microtransduction - A scanning probe microscope includes a plate moveable in an x-axis direction, a y-axis direction, and a z-axis direction, and a probe tip coupled to the plate. A plurality of actuators cooperate to move the probe tip with three degrees of freedom of movement. | 2010-03-11 |
20100064396 | SCANNING PROBE MICROSCOPE AND SAMPLE OBSERVING METHOD USING THE SAME - In a near-field scanning microscope using an aperture probe, the upper limit of the aperture formation is at most several ten nm in practice. In a near-field scanning microscope using a scatter probe, the resolution ability is limited to at most several ten nm because of the external illuminating light serving as background noise. Moreover, measurement reproducibility is seriously lowered by a damage or abrasion of a probe. Optical data and unevenness data of the surface of a sample can be measured at a nm-order resolution ability and a high reproducibility while damaging neither the probe nor the sample by fabricating a plasmon-enhanced near-field probe having a nm-order optical resolution ability by combining a nm-order cylindrical structure with nm-order microparticles and repeatedly moving the probe toward the sample and away therefrom at a low contact force at individual measurement points on the sample. | 2010-03-11 |
20100064397 | CONTROLLED ATOMIC FORCE MICROSCOPE - The invention relates to an atomic force microscope including a microtip placed on a flexible support connected to a microscope head facing a surface to be studied, which includes means for controlling the distance between the head and the surface for a given value and means for inhibiting vibration of the microtip. | 2010-03-11 |
20100064398 | Tamarillo plant named 'Sweeten' - A new and distinct tamarillo variety is described. The variety results from selection among a population of seedlings derived from hybridization among red, amber, and yellow-fruited tamarillo selections. This new variety is characterized by bright red skin color and sweet flavor. The new variety appears suitable for the fresh fruit market and has been named ‘Sweeten’. | 2010-03-11 |
20100064399 | STRAWBERRY PLANT NAMED 'SHAKED' - This invention relates to a new and distinct variety of strawberry plant named ‘Shaked’. ‘Shaked’ is primarily adapted to the climate and growing conditions of the Hod Hasharon, Sharon costal plain, Israel, and is primarily characterized by:
| 2010-03-11 |
20100064400 | STRAWBERRY PLANT CALLED 'ROTEM' - This invention relates to a new and distinct variety of strawberry plant named ‘Rotem’. ‘Rotem’ is primarily adapted to the climate and growing conditions of the Hod Hasharon, Sharon costal plain, Israel, and is primarily characterized by:
| 2010-03-11 |
20100064401 | Acer freemanii x rubrum named 'JSC Kingsone' - A new and distinct | 2010-03-11 |
20100064402 | HEUCHERELLA PLANT NAMED 'TAPESTRY' - A new and distinct | 2010-03-11 |
20100064403 | Tiarella plant named 'Mystic Mist' - A new and distinct hybrid of | 2010-03-11 |