37th week of 2008 patent applcation highlights part 66 |
Patent application number | Title | Published |
20080222708 | IMPLEMENTING ACCESS CONTROL FOR QUERIES TO A CONTENT MANAGEMENT SYSTEM - A system to generate an SQL sub-expression that implement access control rules stored in a library server. The SQL sub-expression is then merged with the SQL passed from an application program interface (API). The access control checking mechanism is implemented on the server side of the content management system. In this client/server environment, the query SQL statement is built in two layers: the API (client) layer and the server layer. The API sends the query string to the underlying stored procedure. The stored procedure then generates the access control logic based on the configuration parameters of the library server. This access control logic is dynamically added to the query string sent by the API. The stored procedure prepares, builds and executes this new query string as a dynamic SQL statement. | 2008-09-11 |
20080222709 | Method for verification via information processing - Identification servers are small, perhaps embedded, systems that can be used as subsystems of a tracking and verification system. An identification server can obtain identification data when a trigger, called an identification event, occurs. The identification server can store the identification data in a database module with a key. The identification server can send a message containing the identification data or the key to a set of subscribing clients. Subscribing clients, such as a central database or a graphical user interface, are clients that subscribe to receive messages from the identification server. An identification server can trigger off of an identification message sent by another identification server. | 2008-09-11 |
20080222710 | SIMPLIFIED ELECTRONIC MESSAGING SYSTEM - A simplified messaging system is provided. In various embodiments, the simplified messaging system receives a selection of an image representing an identification for a user that the user previously provided, receives a selection of multiple images representing a password for the user that the user previously selected, and logs the user into an electronic messaging system based on the selected images. In various embodiments, the simplified messaging system comprises a mail transport server that receives and forwards electronic messages, a mail registration server comprising an images component that stores images associated with user identifications and user passwords, and a mail client that receives a selection of an image identifying a user and multiple images associated with a password of the user, and logs the user into an electronic messaging system when the images are selected. | 2008-09-11 |
20080222711 | Method and Apparatus to Create Trust Domains Based on Proximity - Devices and methods use close range communication links, e.g., near field communication (NFC) links, to authenticate communication devices to one another to create or join a new device to a trust domain. Once two devices establish a close range communication peer-to-peer link the devices exchange credential information that provide an infrastructure for the trust domain. Medium or long range wireless or wired network communication links can then be used for secure and trusted communications. Proximity limits of the close range communication P2P link enables mutual trust to be presumed among devices, providing added security to the process of extending a trust domain and reducing the need for security and authentication signaling. Embodiments provide a variety of methods for extending credential infrastructure among devices. Embodiments further enable simple to use virtual cables that can provide secure point-to-point communications that are configured merely by touching two communication devices together. | 2008-09-11 |
20080222712 | User-Browser Interaction Analysis Authentication System - Systems, methods and media for authenticating a user based on user-browser interaction are disclosed. Embodiments of a method may include, during an e-commerce session with a user, receiving a request for an action from the user and determining whether the requested action requires additional authentication. Embodiments may also include requesting analysis of user-browser interaction for the session, receiving a pattern matching score for the session, and performing an action based on the pattern matching score and the requested action. The pattern matching score may provide an indication of a comparison between the user's interaction with a browser during the session and a user-browser interaction profile for the user. The performed action may include completing an e-commerce transaction, accessing or modifying information, changing a password, requesting additional information, denying the requested action, or other action. Further embodiments may provide for authenticating the user with a first-level authentication. | 2008-09-11 |
20080222713 | SYSTEM AND METHOD FOR AUTHENICATION TO AN APPLICATION - Authenticating a first user in a protected network to an application in a DMZ network shared simultaneously with a second user in an unprotected network. The first user supplies a userID and a password to a first server within the protected network for authentication for the application. The first server checks authentication of the first user based on the userID and password. If the first user is authentic, the first server forwards to the application an authentication key for the first user and a selection by the first user pertaining to the application. The application checks authentication of the key, and if authentic, complies with the selection by the first user. The second user supplies another userID and another password to the application. If the other userID and other password are authentic, the application complies with a selection made by the second user pertaining to the application. | 2008-09-11 |
20080222714 | System and method for authentication upon network attachment - An information processing system for remote access computing comprising a network access server and a local authentication server is augmented with the capability for forwarding authentication requests by tunneling interactions between the requesting client and an identity provider. | 2008-09-11 |
20080222715 | Enhanced Personal Firewall for Dynamic Computing Environments - An enhanced personal firewall system having an inter-firewall connection listener which binds to a specified communications port and listens for inbound and/or outbound connection requests; and an inter-firewall controller which establishes a trusted communications through a local firewall and a remote firewall by exchanging public keys, a signed trusted computer firewall request, and using the keys to determine if a local key storage indicates previous authorization to trusted communications. If not, then a user of the targeted resource is notified and prompted to authorize the access. If so, then the firewall rules protecting the targeted resource are modified, even if temporarily, to allow the requesting firewall to have trusted access. | 2008-09-11 |
20080222716 | COMMUNICATION SYSTEM, IPsec TUNNEL TERMINATION DEVICE, AND IPsec TUNNEL COMMUNICATION CONTINUATION METHOD USED FOR THEM - A control unit of a connection destination device assigns a connection destination device address to a virtual line unit. In response to an instruction from the control unit, the virtual line unit sets a line as an active line to be used for communication and, to make it appear to an external device that the connection destination device address is assigned to the line, notifies a preceding-stage device that the line has the connection destination device address. Thereafter, the line is used to establish, communicate, or disconnect an IPsec tunnel from a connection source device to the connection destination device. | 2008-09-11 |
20080222717 | Detecting Anomalous Network Application Behavior - System and Method for detecting anomalous network application behavior. Network traffic between at least one client and one or more servers may be monitored. The client and the one or more servers may communicate using one or more application protocols. The network traffic may be analyzed at the application-protocol level to determine anomalous network application behavior. Analyzing the network traffic may include determining, for one or more communications involving the client, if the client has previously stored or received an identifier corresponding to the one or more communications. If no such identifier has been observed in a previous communication, then the one or more communications involving the client may be determined to be anomalous. A network monitoring device may perform one or more of the network monitoring, the information extraction, or the information analysis. | 2008-09-11 |
20080222718 | Secure operating system loader - In one embodiment a computing device comprises a processor, a memory module coupled to the process and comprising logic instructions stored in a computer readable medium which, when executed, configure the processor to initiate boot operations in a computing device, present an authentication challenge when authentication is required to boot the computing device, continue boot operations in response to a successful response to the authentication challenge, and invoke an error routine in response to an unsuccessful response to the authentication challenge. | 2008-09-11 |
20080222719 | Fine-Grained Authorization by Traversing Generational Relationships - Methods, systems, and media are disclosed for determining access rights to a resource managed by an application. One embodiment includes receiving a request by the application, wherein the request comprises an action a user seeks to perform on the resource, and locating, based on the request, the resource in both a containment relationship graph and in a structure having groupings of resources, wherein the groupings comprise a grouping having the resource. Further, the embodiment includes traversing a vertex of the containment relationship graph, wherein the vertex comprises a generational resource of the resource, and reading an authorization table associated with a grouping having the generational resource in the groupings. Further still, the embodiment includes determining whether to grant the access rights for performing the action on the resource. | 2008-09-11 |
20080222720 | Financial and similar indentification cards and methods relating thereto - Apparatuses forming portable identification cards and associated methods are described. A preferred apparatus includes an input device adapted for a consumer to enter authentication data, a memory for storing reference data, a processor configured to compare the authentication data entered by the consumer to the reference data stored in the memory to determine whether the authentication data entered by the consumer is valid authentication data, an indicator for informing a merchant when the processor has determined that the consumer has entered valid authentication data, and a power source adapted to supply power to the processor and the indicator. Other features are also disclosed. | 2008-09-11 |
20080222721 | DIGITAL MULTIPLE APPARATUS - Authentication data is read when a digital multiple apparatus main body starts, it is authenticated whether the authentication data read is regular authentication data, a printing operation is permitted if the authentication data read is the regular authentication data, and print data is printed with information on at least the authentication data and date and time information of printing added to the print data. | 2008-09-11 |
20080222722 | Method and Apparatus for Sequential Authentication Using One or More Error Rates Characterizing Each Security Challenge - Methods and apparatus are provided for sequential authentication of a user that employ one or mole error rates characterizing each security challenge. According to one aspect of the invention, a user is challenged with at least one knowledge challenge to obtain an intermediate authentication result; and the user challenges continue until a cumulative authentication result satisfies one or more criteria. The intermediate authentication result is based, for example, on one or more of false accept and false reject error probabilities for each knowledge challenge. A false accept error probability describes a probability of a different user answering the knowledge challenge correctly. A false reject error probability describes a probability of a genuine user not answering the knowledge challenge correctly. The false accept and false reject error probabilities can be adapted based on field data or known information about a given challenge. | 2008-09-11 |
20080222723 | MONITORING AND CONTROLLING APPLICATIONS EXECUTING IN A COMPUTING NODE - A method and system for monitoring and controlling applications executing on computing nodes of a computing system. A status request process, one or more control processes, an untrusted application and one other application are executed on a computing node. The status request process receives and processes requests for the statuses of the untrusted and the other application. A first control process controls the execution of the untrusted application. A second control process controls the execution of the other application. The execution of the untrusted application terminates based on a failure of the untrusted application. A capability of the status request process to receive and process the requests for statuses, and a capability of the second control process to control the execution of the other application are preserved in response to the termination of the untrusted application. | 2008-09-11 |
20080222724 | PREVENTION OF DENIAL OF SERVICE (DoS) ATTACKS ON SESSION INITIATION PROTOCOL (SIP)-BASED SYSTEMS USING RETURN ROUTABILITY CHECK FILTERING - A device receives an attack on a Session Initiation Protocol (SIP)-based device, determines a type of the attack, and applies, based on the determined type of the attack, a return routability check filter to the attack. | 2008-09-11 |
20080222725 | GRAPH STRUCTURES AND WEB SPAM DETECTION - A SPAM detection system is provided. The system includes a graph clustering component to analyze web data. A link analysis component can be associated with the graph clustering component to facilitate SPAM detection in accordance with the web data. | 2008-09-11 |
20080222726 | NEIGHBORHOOD CLUSTERING FOR WEB SPAM DETECTION - A SPAM detection system is provided. The system includes a graph clustering component to analyze web data. A link analysis component can be associated with the graph clustering component to facilitate SPAM detection in accordance with the web data. | 2008-09-11 |
20080222727 | SYSTEMS AND METHODS FOR PREVENTING INTRUSION AT A WEB HOST - A web host intrusion prevention system includes a filter engine [ | 2008-09-11 |
20080222728 | Methods and interfaces for executable code analysis - Described are methods of a server and for processing an email message. Also described are user interfaces. A user may forward unopened email message and/or URLs to a service provider for analysis of whether the unopened email message or URL is configured to download executable code. The service provider may operate with a server. The server may determine if executable code is present in the email message and/or is downloadable via a website. The executable code may be determined to be malicious. It is also described that after a service provider has determined whether the email message and/or the URL is configured to download malicious executable code, the user can receive an indication to that effect from the server. | 2008-09-11 |
20080222729 | Containment of Unknown and Polymorphic Fast Spreading Worms - A worm containment system comprising a host computing machine, a virtual machine running under the control of a virtual machine monitor, a worm detector, a diverter and a buffer. The host computing machine has a host operating system and host application(s). The virtual machine has a clone of the host operating system and a clone of the host application(s). The worm detector is configured to monitor the virtual machine traffic for signs of worm propagation. The splitter is configured to duplicate packets intended for the host computing machine into diverted packets and buffered packets. The diverter is configured to route the diverted packets to the virtual machine. The buffer is configured to store the buffered packets and then forward the buffered packets to the host operating system on indication from the worm detector that no worm propagation behavior was detected. | 2008-09-11 |
20080222730 | Network service monitoring - Network devices, systems, and methods are described that perform network service monitoring. One method includes examining a number of packets received by a first network device to determine whether a protocol of a packet corresponds to a given network service, forwarding an event to a second network device in response to a determination that the protocol of the packet corresponds to the network service, determining whether the network service is an authorized service by comparing the network service to a list of network services, and executing a remedial action in response to a determination that the network service is an unauthorized service. | 2008-09-11 |
20080222731 | Network security modeling system and method - A network security modeling system which simulates a network and analyzes security vulnerabilities of the network. The system includes a simulator which includes a network vulnerabilities database and a network configuration module having network configuration data. The simulator determines vulnerabilities of the simulated network based on the network configuration data and the vulnerabilities database. | 2008-09-11 |
20080222732 | Computer manufacturer and software installation detection - Detailed herein is a technology which, among other things, allows the manufacturer of a computer system to be identified. In one approach to the technology, a method of determining the manufacturer of a computer is described. The method involves accessing a collection of manufacturer identification code information. The method also involves reading a specific manufacturer identification code from the computer. The method calls for comparing the specific manufacturer identification code with the collection of manufacturer identification code information, to determine the manufacturer of the computer. | 2008-09-11 |
20080222733 | Anti-pirate memory card - An anti-pirate memory card is provided for preventing unauthorized reproduction, wherein the addresses of all bad blocks of each memory unit of the memory card are recorded during manufacturing process, and are converted into an identification code by a secret algorithm, and finally the identification code is written into a control chip and the memory unit. The memory card is effective in preventing software capture and hardware capture. | 2008-09-11 |
20080222734 | Security System with Extraction, Reconstruction and Secure Recovery and Storage of Data - The method for securing data includes establishing a group of security sensitive items, filtering data and extracting and separating the security items from remainder data. The filtered data are separately stored (locally on a PC or on another computer in a LAN or WAN or on the Internet.) A map may be generated. The filter and/or map may be destroyed or stored. The data input, extracted data and remainder data may be deleted from the originating computer. Encryption may be utilized to enhance security (including transfers of data, filter and map). Reconstruction of the data is permitted only in the presence of a predetermined security clearance. A plurality of security clearances may be used to enable a corresponding plurality of partial, reconstructed views of the plaintext (omitting higher security words). | 2008-09-11 |
20080222735 | METHODS AND COMPUTER PROGRAM PRODUCTS FOR SECURING DISPLAY OF MESSAGE CONTENT - The shortcomings of the prior art are overcome and additional advantages are provided by securing display of sensitive messages to prevent third parties from viewing sensitive content. For one or more incoming messages designated as sensitive, substitute content to be displayed in place of sensitive content is received from a message recipient. Alternatively or additionally, an indicia to be displayed with any incoming message designated as sensitive is received from the message recipient. A message having sensitive content is designated as sensitive by a sender, a recipient, or an intermediate system. Upon receipt of a message designated as sensitive, a message window is displayed that includes substitute content different from the sensitive content. The substitute content includes an indicia that the sensitive content is not displayed. | 2008-09-11 |
20080222736 | Scrambling HTML to prevent CSRF attacks and transactional crimeware attacks - The present invention relates to a method for preventing an unauthorized activity including a transaction in a web site comprising the steps of: (a) receiving a response containing at least one HTML page, from said site, by the traffic processor; (b) modifying said response by obfuscating said at least one HTML page of said response; (c) storing de-obfuscation information in a transaction table; (d) forwarding the modified response from said traffic processor to the client's browser; (e) redirecting a request from said browser to the traffic processor, by the redirector; (f) checking said request for an unauthorized command; (g) de-obfuscating said request using the stored information in said transaction table; and (h) forwarding the modified request to said site. | 2008-09-11 |
20080222737 | Apparatus for and a method of copy-protecting a content carrying recording medium - Recording data has content data and navigation control data to enable a legitimate player to navigate the content data. The recording data has a content data set and a spurious data set that is difficult to distinguish from the content data set but will ignored by a legitimate player. The content data is associated with the content data set and the spurious data set. The spurious data set may be associated with control data that inhibit playing or correct playing of the content data. A ghost structure such as a ghost video title set my be provided by causing information in at least one of the video title set information, video manager information and the volume information file structure to reference a non-existent video title set or not reference an existing video title set. The recording medium may be an optical disc such as a DVD or its precursors. | 2008-09-11 |
20080222738 | Transgenic Non-Human Animal for Use in Research Models for Studying Parkinson's Disease - The invention relates to a transgenic mouse model with deficient respiratory chain function in dopamine (DA) neurons. By suppressing or deleting the mitochondrial transcription factor A (Tfam) in DA neurons, a mouse model is obtained, which reproduces key pathophysiological features of Parkinson's disease (PD), i.e., slow progressive loss of DA terminals in striatum and loss of DA neurons in substantia nigra pars compacta; alpha-synuclein immunoreactivity including intracellular inclusions similar to Lewy bodies in affected areas prior to and during cell loss; progressive movement disorder associated with abnormal gait, tremor and rigid limbs. The mouse model can be used to develop pharmacological, gene therapy or cell therapy treatments for PD. | 2008-09-11 |
20080222739 | Therapeutic Clostridium difficile antibody compositions | 2008-09-11 |
20080222740 | Polypeptides Having Phytase Activity And Polynucleotides Encoding Same - The present invention relates to polypeptides having phytase activity. These polypeptides have an amino acid sequence which has at least 70% identity to either of three phytases derived from the bacterium | 2008-09-11 |
20080222741 | Expression Profile Of Prostate Cancer - The present invention relates to compositions and methods for cancer diagnostics, including but not limited to, cancer markers. In particular, the present invention provides gene expression profiles associated with prostate cancers. Genes identified as cancer markers using the methods of the present invention find use in the diagnosis and characterization of prostate cancer. In addition, the genes provide targets for cancer drug screens and therapeutic applications. | 2008-09-11 |
20080222742 | Expression Elements - The invention relates to improved genetic elements providing high levels of expression of operably-linked genes in a variety of tissues. In particular, fragments of unmethylated, CpG islands of less than 2 kb are shown to provide enhanced transgene expression and have advantages in terms of vector construction and cloning capacity. | 2008-09-11 |
20080222743 | RNA interference and disease resistance in avians - The invention relates to transgenic avians whose genome contains nucleotide sequences which encode therapeutic polynucleotides that correspond to one or more certain sequences in the genome of an avian pathogen. | 2008-09-11 |
20080222744 | In vivo transfection in avians - The present invention provides for methods of producing transgenic avians which may include delivering a heterologous nucleic acid to oviduct tissue of an avian wherein the nucleic acid enters a cell of the oviduct tissue and is expressed. | 2008-09-11 |
20080222745 | Colcemid-Treatment of Oocytes to enhance Nuclear Transfer Cloning - Disclosed herein are methods of generating a recipient cytoplast for nuclear cloning with improved developmental capacity. These methods involve the in vitro maturation of an oocyte from a non-human mammal to the pre-MII stage and treatment of the oocyte with a microtubule-inhibiting agent prior to enucleation. The oocyte used to generate the recipient cytoplast can be obtained from a pre-adult or adult non-human mammal. The methods further provide for utilizing the generated recipient cytoplast for nuclear transfer, such as deriving a nuclear transfer embryo or offspring. | 2008-09-11 |
20080222746 | Cotton variety FM 9058F - The cotton variety FM 9058F is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and cotton lint as well as to hybrid cotton plants and seeds obtained by repeatedly crossing plants of variety FM 9058F with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of FM 9058F and to plants of FM 9058F reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from FM 9058F. | 2008-09-11 |
20080222747 | Cotton variety FM 9060F - The cotton variety FM 9060F is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and cotton lint as well as to hybrid cotton plants and seeds obtained by repeatedly crossing plants of variety FM 9060F with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of FM 9060F and to plants of FM 9060F reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from FM 9060F. | 2008-09-11 |
20080222748 | Cotton variety FM 9068F - The cotton variety FM 9068F is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and cotton lint as well as to hybrid cotton plants and seeds obtained by repeatedly crossing plants of variety FM 9068F with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of FM 9068F and to plants of FM 9068F reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from FM 9068F | 2008-09-11 |
20080222749 | Cotton variety FM 9063B2F - The cotton variety FM 9063B2F is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and cotton lint as well as to hybrid cotton plants and seeds obtained by repeatedly crossing plants of variety FM 9063B2F with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of FM 9063B2F and to plants of FM 9063B2F reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from FM 9063B2F. | 2008-09-11 |
20080222750 | NONVIRAL VECTORS FOR DELIVERING POLYNUCLEOTIDES TO PLANTS - Methods and compositions for delivering polynucleotides are provided. One embodiment provides a non-viral vector comprising a recombinant polynucleotide-binding protein comprising a protein transduction domain operably linked to a targeting signal. Methods for modifying the genome of non-nuclear organelles are also provided. | 2008-09-11 |
20080222751 | Process for converting storage reserves of dicotyledonous seeds into compositions comprising one or more gene products - The present invention is related to a process based on a source-sink principle, for producing products of interest from crushed or uncrushed germinating dicotyledonous seeds comprising an expression system, which is induced or can be induced during germination. The product is either a seed derived composition comprising one or more gene products. Alternatively, it is a product of interest obtained by placing the composition in contact with a substrate, containing a substance capable of being transformed by the seed derived composition as such, dried or in down-stream processed form. | 2008-09-11 |
20080222752 | Methods for Enhancing Expression of Secondary Cell Wall Cellulose Synthases in Plants - Described are methods for making transgenic plants capable of expressing secondary cell wall cellulose synthases and methods of enhancing expression of secondary cell wall cellulose synthases in plants. Also described are plants produced by the methods. Plants comprising at least three exogenous polynucleotides encoding secondary cell wall cellulose synthases are also provided. | 2008-09-11 |
20080222753 | Manipulation of Ammonium Transporters (AMTS) to Improve Nitrogen Use Efficiency in Higher Plants - The present invention provides polynucleotides and related polypeptides of the protein AMT. The invention provides genomic sequence for the AMT gene. AMT is responsible for controlling nitrogen utilization efficiency in plants. | 2008-09-11 |
20080222754 | Methods of Modulating Glucosinolate Production in Plants - The present invention relates to methods for modulating glucosinolate production in plants, specifically by modulating CYP83A1 expression. The present invention also relates to transgenic plants that over-express and underexpress CYP83A1. | 2008-09-11 |
20080222755 | Method for modifying plant morphology, biochemistry and physiology - The present invention provides nucleotide sequences and corresponding amino acid sequences for plant cytokinin oxidase proteins. In addition, vectors, host cells, and transgenic plants comprising such sequences as well as methods for stimulating root growth and/or enhancing the formation of lateral or adventitious roots and/or altering root geotropism using such sequences are provided by the present invention. Also provided by the present invention are methods for altering various plant phenotypes including delaying onset to flowering, increasing leaf thickness, reducing vessel size, inducing parthenocarpy, increasing branching, increasing seed size and/or weight, embryo size and/or weight, and cotyledon size and/or weight using cytokinin oxidase proteins and/or nucleic acid molecules encoding cytokinin oxidase. | 2008-09-11 |
20080222756 | NUCLEIC ACID CONSTRUCTS AND METHODS FOR PRODUCING ALTERED SEED OIL COMPOSITIONS - The present invention is in the field of plant genetics and provides recombinant nucleic acid molecules, constructs, and other agents associated with the coordinate manipulation of multiple genes in the fatty acid synthesis pathway. In particular, the agents of the present invention are associated with the simultaneous enhanced expression of certain genes in the fatty acid synthesis pathway and suppressed expression of certain other genes in the same pathway. Also provided are plants incorporating such agents, and in particular plants incorporating such constructs where the plants exhibit altered seed oil compositions. | 2008-09-11 |
20080222757 | GROUND COVER ROSE PLANT NAMED 'NOA168098F' - A new and distinct variety for Ground Cover Rose plant is provided which forms in sprays attractive long-lasting red-purple blossoms which are lacking in fragrance with yellow pollen and reproductive organs commonly being visible at the center and which commonly display very good heat resistance and color stability upon aging. The new variety exhibits a dense, compact, and spreading growth habit. The foliage is green and very glossy on the upper surface and contrasts well with the red-purple blossom coloration. The surfaces of leaves commonly are somewhat curled and partially closed. The blossom petals commonly detach cleanly upon full maturity. The plant propagates well from cuttings and by budding. Excellent resistance to Blackspot, Powdery Mildew, Downey Mildew, and Rust are displayed, and the plant is particularly well suited for growing as an ornamental ground cover in the landscape. | 2008-09-11 |
20080222758 | Miniature rose plant 'PACfiftysix' - A new miniature rose plant which has abundant, white colored flowers and attractive foliage. The variety successfully propagates from softwood cuttings and is suitable for year round production in commercial glass houses as a flowering pot plant. This new and distinct variety has shown to be uniform and stable in the resulting generations from asexual propagation. | 2008-09-11 |
20080222759 | Miniature rose plant 'PACtwenty' - A new miniature rose plant which has abundant, pink colored flowers and attractive foliage. The variety successfully propagates from softwood cuttings and is suitable for year round production in commercial glass houses as a flowering pot plant. This new and distinct variety has shown to be uniform and stable in the resulting generations from asexual propagation. | 2008-09-11 |
20080222760 | Lomandra hystrix plant named 'LHCOM' - ‘LHCOM’ is a distinctive variety of | 2008-09-11 |
20080222761 | Regal Pelargonium named '99-247-1' - A new and distinct regal | 2008-09-11 |
20080222762 | Campanula plant named 'PKMF02' - A new and distinct cultivar of | 2008-09-11 |