Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


14th week of 2012 patent applcation highlights part 53
Patent application numberTitlePublished
20120084847Secure Provisioning of Resources in Cloud Infrastructure - Provisioning resources in public cloud infrastructure to perform at least part of electronic design automation (EDA) tasks on the public cloud infrastructure. The provisioning of resources is handled by a cloud provisioning system that is generally operated and maintained by an EDA tool developer using a provisioning credential. After the resources are provisioned, the cloud provisioning system places user key on the provisioned resources. Once the user key is placed on the provisioned resources, the cloud provisioning system has only limited access or no access to the provisioned resources. Instead, a user client device takes over the control of the provisioned resources by using a user's access credential. The provisioning credential is retained by the EDA tool developer and is not released to the user. Similarly, the access credential is retained by the user and not released to the EDA tool developer. In this way, the EDA tool developer can retain control of the resources deployed for the EDA tasks while ensuring that the user's information associated with the EDA tasks is secure.2012-04-05
20120084848SERVER AND SERVICE PROVIDING METHOD THEREOF - A service providing method of a server is provided. The method includes registering a service hub according to a service request; setting a service hub program corresponding to the service hub; receiving a request for the service hub program from a user terminal device belonging to an organization associated with the service hub; providing the service hub program to the user terminal device; and providing an application program corresponding to the user terminal device and the service hub program to the user terminal device.2012-04-05
20120084849DEVICE AND METHOD FOR SECURE ACCESS TO A REMOTE SERVER - The device and method described herein relates to the field of computer security and, specifically, to the field of protecting confidential personal information which enables encrypted access to the remote server. A device and a method for securing confidential user information and secure exchanges of such information with the servers that host the services is provided. The device and method are based on personalising a smartcard containing the information. The chip card, connected to the user terminal, has a connection enabling the terminal to appear as a standalone host of the user's local network. An encrypted connection is then established directly between the chip card and the server hosting the service for the transmission of confidential data. The data, stored on the chip card, are then exchanged with the server via the encrypted connection. The data are never accessible in plain text on the user terminal.2012-04-05
20120084850TRUSTWORTHY DEVICE CLAIMS FOR ENTERPRISE APPLICATIONS - Embodiments of the invention enable a client device to procure trustworthy device claims describing one or more attributes of the client device, have those device claims included in a data structure having a format suitable for processing by an application, and use the data structure which includes the device claims in connection with a request to access the application. The application may use the device claims to drive any of numerous types of application functionality, such as security-related and/or other functionality.2012-04-05
20120084851TRUSTWORTHY DEVICE CLAIMS AS A SERVICE - Embodiments of the invention make the issuance of trustworthy device claims available to client devices as a service, so that a client device to which device claims are issues may use the device claims in relation to an attempt to access a network application. The service may conduct an assessment of the device's characteristics and/or state, characterize the results of this assessment in device claims, and issue the device claims to the device. The service may be accessible to a client device from outside administrative boundaries of an entity that makes a network application accessible, and thus may be useful to entities making network applications accessible in business-to-consumer (B2C) and business-to-business (B2B) topologies, such as over the publicly accessible Internet.2012-04-05
20120084852Walled Garden System for Providing Access to One or More Websites that Incorporate Content from Other websites and Method Thereof - A cleared sites list includes one or more hostname descriptors. A firewall includes rules associated with a cleared IP list including cleared IP addresses, and permits transfer of a cleared HTTP request from a user device to a cleared destination IP address that matches one of the cleared IP addresses. A controller examines a non-cleared HTTP request from the user device to a non-cleared destination IP address that does not match one of the cleared IP addresses, and acts as a transparent proxy between the user device and the non-cleared destination IP address when a destination host header of the non-cleared HTTP request matches a hostname descriptor of the cleared sites list. The controller further acts as a transparent proxy between the user device and the non-cleared destination IP address when a referrer header of the non-cleared HTTP request matches a hostname descriptor of the cleared sites list.2012-04-05
20120084853INFORMATION PROCESSING APPARATUS AND METHOD FOR RESTRICTING ACCESS TO INFORMATION PROCESSING APPARATUS - An information processing apparatus includes: a body casing; a first connector provided in the body casing; a setting module; and a security module. The setting module is configured to set a security level to be applied to the information processing apparatus based on a type of a device connected to the first connector. The security module is configured to restrict access to the information processing apparatus according to the set security level.2012-04-05
20120084854HARDWARE-BASED HUMAN PRESENCE DETECTION - A method, system, and computer program product containing instructions to provide hardware-based human presence detection. Rather than rely upon software to display a CAPTCHA image, hardware in the form of a sprite engine of a graphics device is used to write a random text string directly to the display device, overlaying the user interface provided by software. Because the sprite engine is isolated from a host operating system for the system, the random text string cannot be captured and processed by software robots running under the host operating system.2012-04-05
20120084855SECURE PIN RESET PROCESS - A secure password/Personal Identification Number (PIN) reset process is disclosed. The process involves replacing a transportation password/PIN of a terminal with a user-specific password/PIN. During the replacement, the user-specific password/PIN is bound with a token. The token can then be used to securely reset the password/PIN of the terminal back to the transportation password/PIN if the user-specific password/PIN is forgotten or compromised.2012-04-05
20120084856GATHERING, STORING AND USING REPUTATION INFORMATION - A method and a system for collecting and maintaining historical party reputation data and for using the historical party reputation data to calculate an access decision rating and recalculating the access decision rating when the historical party reputation data has changed has a reputation updater for updating a reputation when a party's reputation has changed, a reputation storer for storing the party's reputation, an access decision rating maker for making a rating on a party's access abilities based upon the party's reputation and reputation history storage for storing a party's reputation having access decision rating storage for storing previous and present access decision storage ratings.2012-04-05
20120084857DEVICE SECURITY SYSTEM - A computer-implemented method may include identifying a security event condition associated with a device. One or more security rules may be identified for execution based on the device and the identified security event condition, wherein the one or more security rules define security related actions to be performed upon occurrence of the security event condition. The security related actions may be initiated by at least one processor on the device to secure the device from unauthorized use.2012-04-05
20120084858SYSTEM AND METHOD FOR DETECTION OF ABERRANT NETWORK BEHAVIOR BY CLIENTS OF A NETWORK ACCESS GATEWAY - Embodiments of systems and methods for detecting aberrant network behavior are disclosed. One embodiment comprises a network interface over which network communications are received from a client. These network communications can then be analyzed to determine if aberrant network behavior is occurring with respect to the client.2012-04-05
20120084859REALTIME MULTIPLE ENGINE SELECTION AND COMBINING - Architecture that selects a classification engine based on the expertise of the engine to process a given entity (e.g., a file). Selection of an engine is based on a probability that the engine will detect an unknown entity classification using properties of the entity. One or more of the highest ranked engines are activated in order to achieve the desired performance. A statistical, performance-light module is employed to skip or select several performance-demanding processes. Methods and algorithms are utilized for learning based on matching the best classification engine(s) to detect the entity class based on the entity properties. A user selection option is provided for specifying a maximum number of ranked, classification engines to consider for each state of the machine. A user can also select the minimum probability of detection for a specific entity (e.g., unknown file). The best classifications are re-evaluated over time as the classification engines are updated.2012-04-05
20120084860SYSTEM AND METHOD FOR DETECTION OF DOMAIN-FLUX BOTNETS AND THE LIKE - In one embodiment, a method for detecting malicious software agents, such as domain-flux botnets. The method applies a co-clustering algorithm on a domain-name query failure graph, to generate a hierarchical grouping of hosts based on similarities between domain names queried by those hosts, and divides that hierarchical structure into candidate clusters based on percentages of failed queries having at least first- and second-level domain names in common, thereby identifying hosts having correlated queries as possibly being infected with malicious software agents. A linking algorithm is used to correlate the co-clustering results generated at different time periods to differentiate actual domain-flux bots from other domain-name failure anomalies by identifying candidate clusters that persist for relatively long periods of time. Persistent candidate clusters are analyzed to identify which clusters have malicious software agents, based on a freshness metric that characterizes whether the candidate clusters continually generate failed queries having new domain names.2012-04-05
20120084861METHODS AND SYSTEMS THAT SELECTIVELY RESURRECT BLOCKED COMMUNICATIONS BETWEEN DEVICES - Data communications between devices are selectively blocked and resurrected based on error notifications. Data communications from one or more source devices to one or more intended destination devices are selectively blocked based on content of the data communications. The blocked data communications are stored in a database. A blocked data communication is retrieved from the database in response to an error notification from one of the source devices and/or from one of the destination devices. The retrieved data communication is then sent to the intended destination device.2012-04-05
20120084862Detecting Malicious Use of Computer Resources by Tasks Running on a Computer System - A method, apparatus, and computer program product for identifying malware is disclosed. The method identifies processes in a running process list on a host computer system. The method identifies ports assigned to the processes in the running process list on the host computer system. The method determines whether any one of ports that is currently in use in the host computer system is not assigned to any of the processes in the running process list. The method then makes a record that a hidden, running process is present as a characteristic of an attack in response to a determination that one of the ports is currently in use but is not assigned to any of the processes in the running process list in the host computer system.2012-04-05
20120084863METHOD AND SYSTEM FOR IDENTIFYING COMPROMISED NODES - The invention relates to a method for identifying compromised nodes in a ZigBee network comprising a general trust center, divided in at least two security domains, each security domain corresponding to a spatial or temporal area, and being associated with a different root keying material, and each node being identified by an identifier, the method comprising: upon detection of a node (U2012-04-05
20120084864SYSTEM AND METHOD FOR A MOBILE CROSS-PLATFORM SOFTWARE SYSTEM - The present invention is a system and method for creating, developing and testing cross-platform software for mobile communications devices. The invention enables mobile device software that must be highly-integrated with the operating system on which it runs to be implemented in a cross-platform manner. Security software for mobile devices is a prime beneficiary of the present invention, as a substantial proportion of its functionality is identical between different platforms yet integrated very specifically into each platform it supports. The cross-platform system includes a core platform-independent component, a platform-specific component, and an abstraction layer component, each of which may communicate with each other using a common defined API. The present invention enables the platform-independent component to be completely re-used between platforms and allows the platform-specific and abstraction components to contain minimal amounts of code on each platform.2012-04-05
20120084865False Alarm Detection For Malware Scanning - A method of scanning files for malware on a computer system. The method includes receiving a file to be scanned in the system, and using at least one malware scanning engine to determine whether or not the file possesses properties that are indicative of malware. If it is determined that the file does possess properties that are indicative of malware, then at least one cleanliness scanning engine is used to determine whether or not the file possesses properties that are indicative of a clean file. If it is determined that the file possesses properties that are indicative of a clean file, then a false alarm is signalled.2012-04-05
20120084866METHODS, SYSTEMS, AND MEDIA FOR MEASURING COMPUTER SECURITY - Methods, systems, and media for measuring computer security are provided. In accordance with some embodiments, methods for measuring computer security are provided, the methods comprising: making at least one of decoys and non-threatening access violations accessible to a first user using a computer programmed to do so; maintaining statistics on security violations and non-violations of the first user using a computer programmed to do so; and presenting the statistics on a display.2012-04-05
20120084867METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR ASSESSING INFORMATION SECURITY - Methods and systems to assess information security based on based on a combination of user-responses to computer-selected queries and results of a testing/diagnostic application. Users may be interviewed based on areas of expertise. Information security assessment may be performed with respect to domains of an enterprise, the results of which may be rolled-up to assess information security across the enterprise. A system may include application-specific questions and vulnerabilities, industry specific questions and vulnerabilities, a repository of expert knowledge, and/or working aids. A system may include an inference engine, which may include a logic-based inference engine, a knowledge-based inference engine, and/or an artificial intelligence inference engine. A system may include an application-specific tool to configure the system to assess security of information handled by a third party application program.2012-04-05
20120084868LOCATING DOCUMENTS FOR PROVIDING DATA LEAKAGE PREVENTION WITHIN AN INFORMATION SECURITY MANAGEMENT SYSTEM - A method for locating documents has a step of, on each entity of the plurality of document-storing entities, calculating a respective fingerprint for each document of the documents stored on the entity, a step of transferring the calculated fingerprints by the entities to a data localization server having a fingerprint database for storing the transferred fingerprints, and a step of, at the data localization server, locating copies of a specimen document by calculating a fingerprint of the specimen document and comparing the calculated fingerprint of the specimen document with the fingerprints stored in the fingerprint database.2012-04-05
20120084869CLAIMS-AWARE ROLE-BASED ACCESS CONTROL - The formulation of a security token that specifies role information corresponding to one or more roles of a requesting entity that is to request an action to be performed on a resource. The formulation begins by accessing one or more claims, each having an expression regarding the requesting entity. The expression for at least one of the claims is evaluated to thereby assign the requesting entity to one or more identities. The identities are then used determine role information to include in a role-based security token that may be submitted to the computing system that manages the resources.2012-04-05
20120084870APPARATUS AND METHOD FOR EMBEDDING AND EXTRACTING INFORMATION IN ANALOG SIGNALS USING DISTRIBUTED SIGNAL FEATURES AND REPLICA MODULATION - Apparatus and methods are provided for embedding or embedding digital data into an analog host or cover signal. A distributed signal feature of the cover signal in a particular domain (time, frequency or space) is calculated and compared with a set of predefined quantization values corresponding to an information symbol to be encoded. The amount of change required to modify the signal feature to the determined target quantization value is calculated and the cover signal is modified accordingly to so change the feature value over a predefined interval. Information symbols are extracted by the opposite process. In one embodiment, the predefined value is a short term auto correlation value of the cover signal.2012-04-05
20120084871NPC1L1 ORTHOLOGUES - The present invention provides, in part, NPC1L1 from various species. Methods of using the NPC1L1 polypeptides and polynucleotide set forth herein, e.g., in screening assays, are also set forth.2012-04-05
20120084872METHODS FOR PRODUCING MICRORNAS - The invention relates to recombinant vectors for inducible and/or tissue specific expression of double-stranded RNA molecules that interfere with the expression of a target gene. In certain embodiments, the invention relates to the use of Tet (tetracycline)-responsive RNA Polymerase II (Pol II) promoters (e.g., TetON or TetOFF) to direct inducible knockdown in certain cells of an integrated or an endogenous gene, such as p53. The invention also relates to a method for producing transgenic animals (e.g., mice) expressing inducible (such as tetracycline-regulated), reversible, and/or tissue-specific double-stranded RNA molecules that interfere with the expression of a target gene.2012-04-05
20120084873SEX-DETERMINATION AND METHODS OF SPECIFYING SAME - The present invention relates generally to the field of sex determination of animals. Provided are methods and agents to manipulate sex determination, particularly in avian animals such as chickens, through a male chromosome-linked testis (sex) regulatory gene. Expression or activity of the DMRT1 gene or protein is modulated to produce animals with displaying a phenotype sex that differs from their genotype.2012-04-05
20120084874Soybean Cultivar 2293921658 - A soybean cultivar designated 2293921658 is disclosed. The invention relates to the seeds of soybean cultivar 2293921658, to the plants of soybean 2293921658, to plant parts of soybean cultivar 2293921658, and to methods for producing a soybean plant produced by crossing soybean cultivar 2293921658 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety 2293921658, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 2293921658, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar 2293921658 with another soybean cultivar.2012-04-05
20120084875Soybean Cultivar 2472221658 - A soybean cultivar designated 2472221658 is disclosed. The invention relates to the seeds of soybean cultivar 2472221658, to the plants of soybean 2472221658, to plant parts of soybean cultivar 2472221658, and to methods for producing a soybean plant produced by crossing soybean cultivar 2472221658 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety 2472221658, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 2472221658, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar 2472221658 with another soybean cultivar.2012-04-05
20120084876Soybean Cultivar 2484721658 - A soybean cultivar designated 2484721658 is disclosed. The invention relates to the seeds of soybean cultivar 2484721658, to the plants of soybean 2484721658, to plant parts of soybean cultivar 2484721658, and to methods for producing a soybean plant produced by crossing soybean cultivar 2484721658 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety 2484721658, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 2484721658, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar 2484721658 with another soybean cultivar.2012-04-05
20120084877Soybean Cultivar 2522121658 - A soybean cultivar designated 2522121658 is disclosed. The invention relates to the seeds of soybean cultivar 2522121658, to the plants of soybean 2522121658, to plant parts of soybean cultivar 2522121658, and to methods for producing a soybean plant produced by crossing soybean cultivar 2522121658 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety 2522121658, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 2522121658, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar 2522121658 with another soybean cultivar.2012-04-05
20120084878Soybean Cultivar 2306521658 - A soybean cultivar designated 2306521658 is disclosed. The invention relates to the seeds of soybean cultivar 2306521658, to the plants of soybean 2306521658, to plant parts of soybean cultivar 2306521658, and to methods for producing a soybean plant produced by crossing soybean cultivar 2306521658 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety 2306521658, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 2306521658, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar 2306521658 with another soybean cultivar.2012-04-05
20120084879Molecular Markers Associated With Yellow Flash In Glyphosate Tolerant Soybeans - The present invention provides methods and compositions for the identification and selection of loci modulating phenotypic expression of a herbicide tolerance trait in plant breeding. In addition, methods are provided for screening germplasm entries for the performance and expression of this trait.2012-04-05
20120084880CONTROL OF GENE EXPRESSION IN PLANTS - The invention provides the isolated promoter polynucleotide sequence of SEQ ID NO: 1 from perennial ryegrass (2012-04-05
20120084881DROUGHT TOLERANT PLANTS - The present invention relates to the field of transgenic and non-transgenic plants with novel phenotypes. Provided are SlPP2C1 proteins and nucleic acid sequences encoding these, which are useful in conferring novel phenotypes to plants, especially drought tolerance.2012-04-05
20120084882NEMATODE-RESISTANT TRANSGENIC PLANTS - The present invention provides expression vectors encoding double stranded RNAs that target certain plant genes required for maintenance of parasitic nematode infection, nematode-resistant transgenic plants that express such double-stranded RNAs, and methods associated therewith. The targeted plant gene is a GLABRA-like gene, a homeodomain-like gene, a trehalose-6-phosphate phosphatase-like gene, an unknown gene having at least 80% homology to SEQ ID NO:16, a ringH2 finger-like gene, a zinc finger-like gene, or a MIOX-like gene.2012-04-05
20120084884STABLY TRANSFORMED FERNS AND RELATED METHODS - Methods that provide for stable transformation of fern spores and/or protonemata by 2012-04-05
20120084885Promoter, promoter control elements, and combinations, and uses thereof - The present invention provides DNA molecules that constitute fragments of the genome of a plant, and polypeptides encoded thereby. The DNA molecules are useful for specifying a gene product in cells, either as a promoter or as a protein coding sequence or as an UTR or as a 3′ termination sequence, and are also useful in controlling the behavior of a gene in the chromosome, in controlling the expression of a gene or as tools for genetic mapping, recognizing or isolating identical or related DNA fragments, or identification of a particular individual organism, or for clustering of a group of organisms with a common trait. One of ordinary skill in the art, having this data, can obtain cloned DNA fragments, synthetic DNA fragments or polypeptides constituting desired sequences by recombinant methodology known in the art or described herein2012-04-05
20120084886MICROBIAL PROCESS AND COMPOSITION FOR AGRICULTURAL USE - Microbial compositions comprising at least two components are disclosed. The first component comprises HYTa which is a consortium of microbes derived from fertile soils and commercial sources. The second component comprises at least one of chitin, chitosan, glucosamine and amino acids. The various microbes in HYTa are capable of fixing nitrogen, digesting proteins and other biopolymers such as chitin and chitosan, providing protection against plant pathogens and supplementing the microbial flora of soil. Also disclosed are processes where the aforementioned microbial compositions are used to treat soil, seeds, seedlings and/or plant foliage alone or in combination with chitin, chitosan, glucosamine and/or amino acids.2012-04-05
20120084887METHOD AND COMPOSITION FOR INCREASING PLANT SURVIVAL & VIABILITY UNDER COLD STORAGE, OR DARK AND COLD STORAGE CONDITIONS - Unique fusion genes are disclosed which are useful for transforming a wide range of plants, and when used in tandem, result in a significant alteration of the plant phenotype with respect to tolerance to the stress from prolonged storage under either dark or cold conditions, or a combination of cold and dark conditions. The gene constructs include (1) a cold-regulated gene (COR152012-04-05
20120084888CAST PELLETS FOR PLANTING SEEDS - A multi-plant product and a method of producing a container of plants are described. Cast pellets containing plant seeds selected for their seed germination timing are planted in a container with a vegetative cutting. The cutting can be selected for having root initiation timing synchronized with the seed germination timing of the plant seeds in the cast pellet. The seed germination timing of the plant seeds can be modified by selecting the volume of the cast pellet.2012-04-05
20120084889Novel Fatty Acid Elongation Components and Uses Thereof - The invention provides isolated nucleic acid molecules which encodes a novel fatty acid nECR. The invention also provides recombinant expression vectors containing nECR nucleic acid molecules, host cells into which the expression vectors have been introduced, and methods for large-scale production of long chain polyunsaturated fatty acids (LCPUFAs), e.g., ARA, EPA and DHA.2012-04-05
20120084890REGULATORY SEQUENCES FOR EXPRESSING GENE PRODUCTS IN PLANT REPRODUCTIVE TISSUE - Expression cassettes causing specific regulatory control of transgene expression in plants, wherein the expression cassettes include regulatory sequences from the MADS gene family for expression of recombinant gene products in the reproductive tissue of plants for the purpose of generating abiotic stress tolerant plants.2012-04-05
20120084891Hybrid tea rose plant named 'MEIGRILEGA' - A new and distinct Hybrid Tea rose plant is provided that abundantly and substantially continuously forms attractive fully double magenta blossoms that are lavender-pink on the reverse. The blossom configuration is somewhat formal and displays well when cut and placed in a vase. The plant exhibits vigorous vegetation and an upright and bushy growth habit. The foliage is ornamental dark green with a glossy finish. A sweet fragrance is provided by the blossoms. The plant is well suited for growing as attractive ornamentation in parks and gardens.2012-04-05
20120084892Lantana plant named 'Sunny Side Up' - A new and distinct cultivar of 2012-04-05
20120084893Sweetpotato plant named 'Bonita' - A new variety of sweetpotato identified as ‘Bonita’ is disclosed as having disease resistance to both southern root-knot nematode and soil rot, a white flesh, a high dry matter content, and high yield characteristics.2012-04-05
20120084894Dahlia plant named 'Lomdahbrs' - A new and distinct 2012-04-05
20120084895Ficinia plant named 'Frosty' - A new and distinct 2012-04-05
Website © 2025 Advameg, Inc.