07th week of 2014 patent applcation highlights part 65 |
Patent application number | Title | Published |
20140047504 | IMAGE PROCESSING APPARATUS THAT OPERATES ACCORDING TO SECURITY POLICIES, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM - An image processing apparatus which is capable of restraining operation that does not comply with security policies even in a case where security policies are changed through setting of user modes. The security policies are set in advance in the image processing apparatus. The image processing apparatus has a UI operation unit that enables operation on the image processing apparatus. When settings of the image processing apparatus are changed via the UI operation unit, it is verified whether or not the changed settings match the security policies. Operation of the image processing apparatus is restrained until it is verified that the changed settings match the security policies. | 2014-02-13 |
20140047505 | Automated Entity Verification - Some embodiments provide a verification system for automated verification of entities. The verification system automatedly verifies entities using a two part verification campaign. One part verifies that the entity is the true owner of the entity account to be verified. This verification step involves (1) the entity receiving a verification code at the entity account and returning the verification code to the verification system, (2) the entity associating an account that it has registered at a service provider to an account that the verification system has registered at the service provider, (3) both. Another part verifies the entity can respond to communications that are sent to methods of contact that have been previously verified as belonging to the entity. The verification system submits a first communication with a code using a verified method of contact. The verification system then monitors for a second communication to be returned with the code. | 2014-02-13 |
20140047506 | LICENCE MANAGEMENT SYSTEM, LICENSE MANAGEMENT METHOD, AND CLIENT DEVICE - At the time of license authentication for a PC software product, an inquiry about the license authentication date of an MFP software product included in a combined product is made to an MFP in which the MFP software is installed, and the license authentication date of the earlier date information is deemed as the start date of a maintenance contract. A license management method is provided in which if the PC software product is released within the term of the maintenance contract, the PC software product is made usable. | 2014-02-13 |
20140047507 | METHOD FOR PUBLICLY PROVIDING PROTECTED ELECTRONIC DOCUMENTS - The invention relates to a method for publicly providing protected electronic documents, wherein a first user, after a user authentication process, transmits a private electronic document from a data terminal via a communications network to a private storage medium of a data processing device and stores the document on said medium. Thereafter, an analysis and comparison module is activated, which analyzes and compares the private electronic document to the public electronic documents in a public storage medium, and when a second user accesses the private electronic document of the first user, a public electronic document from the public storage medium is provided by the authentication and access control module instead of the private electronic document. | 2014-02-13 |
20140047508 | MULTIPLE USER LOGIN DETECTION AND RESPONSE SYSTEM - A method is provided for controlling multiple access to a network service to prevent fraudulent use of the network service. The method includes identifying an account access counter for an account using identification information received from a user at a first device using a network, wherein the user is requesting access to a service provided at a second device, and further wherein the account access counter is the number of service access sessions active for the account; comparing the account access counter to a maximum account access number, wherein the maximum account access number defines a maximum number of service access sessions allowed for the account; and providing the user at the first device access to the service at the second device if the account access counter is less than the maximum account access number. | 2014-02-13 |
20140047509 | AUTHORIZING COMPUTING RESOURCE ACCESS BASED ON CALENDAR EVENTS IN A NETWORKED COMPUTING ENVIRONMENT - An approach for authorizing access to computing resources (e.g., electronic files) based on calendar events (e.g., meetings of a user) in a networked computing environment (e.g., a cloud computing environment) is provided. A portion/segment (e.g., private cloud) of the networked computing environment may be designated for storing at least one electronic file to be shared (e.g., as stored in a computer storage device associated with the portion). The portion of the networked computing environment may then be associated (e.g., graphically) with an electronic calendar entry (e.g., a meeting having a set of attendees). Based on the calendar entry, a set of users (e.g., the meeting attendees) authorized to access the at least one electronic file may be determined based on the electronic calendar entry. Thereafter, access (e.g., a related permissions) to the at least one electronic file may be authorized for the set of users. | 2014-02-13 |
20140047510 | WIRELESS MULTI-FACTOR AUTHENTICATION WITH CAPTIVE PORTALS - Systems and methods for device-agnostic, multi-factor network authentication are disclosed. In some embodiments, a wireless network connection can authenticate a device over secure authentication means with a certificate that confirms a device identity. After authenticating the device, a user can be prompted to provide credentials in a captive portal. The captive portal can be inaccessible to devices that have not already authenticated using a certificate. After providing approved credentials to the captive portal, the user can access the network. This embodiment and additional embodiments are readily integrated into private wireless networks and others. | 2014-02-13 |
20140047511 | NETWORK STORAGE SYSTEM AND METHOD THEREOF - A network storage system includes a user data storage area, a public storage area, and a processor. The user data storage area includes a number of private storage areas for storing private data of users. Each private storage area is designated for a registered account. The public storage area stores a plurality of identifiers (IDs) of the private storage areas and a plurality of deletion codes each of which corresponds to a registered account and comprises a deletion ID and a user ID. The processor identifies the code is a deletion code when one of the deletion IDs is contained in the code, determines the corresponding registered account of the identified deletion code according to the user ID, further determines the corresponding private storage area of the determined registered account, and deletes all the data stored in the determined private storage area. | 2014-02-13 |
20140047512 | SYSTEM AND METHOD FOR MONITORING ONLINE ACTIVITY ON ELECTRONIC DEVICES - A system and method of monitoring one or more electronic devices is disclosed which allows the application developer and the first user to collaborate to create monitoring filters to monitor and control the electronic device(s). The monitoring system is able to monitor. The monitoring system further includes a system which allows communication amongst the application developer, first user(s) and/or second user(s). | 2014-02-13 |
20140047513 | System and Method for Controlled Decentralized Authorization and Access for Electronic Records - A system and computer-implemented method for providing decentralized access to records. The method is performed on at least one computer system including at least one processor. The method includes the steps of: generating at least one reference for at least one record stored on a source system, the at least one reference comprising authorization information and a pointer to the at least one record; receiving, at the source system from a client system, a request to retrieve the at least one record from the source system, the request initiated using the at least one reference and including at least a portion of the at least one reference; authenticating or authorizing at least one of the client system and a user of the client system; and transmitting the at least one record from the source system to the client system. | 2014-02-13 |
20140047514 | ZONE MIGRATION IN NETWORK ACCESS - The present disclosure is directed to providing a network user the ability to travel between different zones or locations within a network environment, such as, for example, a hospitality location, without requiring a user to re-login to the new location, while requiring a user to re-login to other locations within the network environment. | 2014-02-13 |
20140047515 | Method and System for Realizing Presence Service, Presence Information Processing Device and Presentity Client - A method for processing presence information is disclosed. Presence information includes different values of a presence element, classes corresponding to the values and presentity information. Authentication configuration information of a presentity is obtained according to the presentity information. A right rule is obtained by resolving the authentication configuration information. The right rule includes a correlation configured by the presentity between a watcher identity and a class of a group that the watcher identity pertains to. A value of the presence element is sent to a corresponding watcher according to a correlation between the class corresponding to the value in the presence information and the class derived from the right rule obtained from the authentication configuration information. | 2014-02-13 |
20140047516 | CACHE SHARING OF ENTERPRISE DATA AMONG PEERS VIA AN ENTERPRISE SERVER - A method, system and computer program product for performing cache sharing of enterprise data among peer mobile devices. An enterprise server receives a request from a mobile device for enterprise data. Upon identifying peer mobile device(s) that store the requested enterprise data, the enterprise server selects one of these peer mobile devices to provide the requested enterprise data based on an algorithm. A message is sent to the selected peer mobile device from the enterprise server to provide the requested enterprise data to the requesting mobile device, where the message includes connection details as well as a key that uniquely identifies the requested enterprise data that is stored in a cache of the peer mobile device. In this manner, the enterprise data may be shared in a robust and transparent manner while at the same time providing the enterprise control over the dissemination of the enterprise data. | 2014-02-13 |
20140047517 | HYBRID NETWORK APPLICATION ARCHITECTURE - A hybrid-model network application includes a native component that provides user-level access to features of a networked computing device and a web client component that provides access to web services of a server. The network application causes the networked computing device to receive content from the server. The content includes user interface content to be rendered by the web client component and code content associated with the user interface content that uses a native function of the networked computing device. The content is displayed in a user interface by way of the web client component. A request, associated with the code content, is received from a user interacting with the user interface. The device handles the request for use of the native function by the native component. | 2014-02-13 |
20140047518 | Secure Portable Store for Security Skins and Authentication Information - A security component may be associated with a network-enabled application. The security component may access a secure store, which may include customization information, which may include one or more graphical user interface customizations defined by a user, and one or more instances of card information. The card information may specify how to authenticate a user's credentials to access a relying party (e.g., web site). The security component may initiate the display of an embedded region of a window drawn by the network-enabled application. At least a part of the appearance of the embedded region of the window may be defined according to the customization information and not by the relying party. The embedded region may provide a user interface for determining user authentication credentials. The customization information and the one or more instances of card information may not be accessible to the relying party. | 2014-02-13 |
20140047519 | Authentication using a Wireless Mobile Communication Device - An authentication scheme may be used to decide whether to permit access to a user account access to which is controlled by a network resource server. An initial portion of a password is received at a mobile communication device, and a remaining portion of the password is received at a password client installed in or otherwise coupled to the network resource server. The initial portion is communicated from the mobile communication device to the network resource server, where it is passed to the password client, which combines it and the remaining portion to produce a complete password. A value calculated by the password client from the complete password is sent to a password server, which generated the password and sent the initial portion and remaining portion. If the value matches a value calculated by the password server from the complete password in the same manner, authentication has succeeded. | 2014-02-13 |
20140047520 | TECHNIQUES FOR CREDENTIAL AUDITING - Techniques for credential auditing are provided. Histories for credentials are evaluated against a principal credential policy for a user and an enterprise credential policy for an enterprise as a whole. An audit trail is produced within a report for the histories. The report indicates whether compliance with the principal and enterprise credential policies occurred and if not at least one reason is provided as to why compliance was not met within the histories. | 2014-02-13 |
20140047521 | TECHNIQUES FOR CREDENTIAL AUDITING - Techniques for credential auditing are provided. Histories for credentials are evaluated against a principal credential policy for a user and an enterprise credential policy for an enterprise as a whole. An audit trail is produced within a report for the histories. The report indicates whether compliance with the principal and enterprise credential policies occurred and if not at least one reason is provided as to why compliance was not met within the histories. | 2014-02-13 |
20140047522 | REQUEST AUTHENTICATION TOKEN - An authentication mechanism for use in network-based services generates an authentication token. The authentication token is provided to a client device as part of the code comprising a content page. The content page code is received and loaded by a browser application at the client device. When the content page code is received and loaded by the browser application, the authentication token is loaded by the browser as well. Upon receiving subsequent input, the browser application may send a content request to the server. The content request includes the authentication token maintained by the browser application in the content page. A server may validate the authentication token provided in the request using version information and one or more master authentication tokens. | 2014-02-13 |
20140047523 | Browser Session Privacy Lock - Techniques are shown for executing a web browser on a client computing device and requesting access to applications available from a hosting server over a network in communication with the client device. The web browser stores authorization credentials for accessing designated applications available from the hosting server in a lockbox. A message received at the web browser provides instructions to lock all designated applications by rendering at least partially blanked-out or partially obscured visual displays for the designated applications, with no viewing of, access to, or operation on selected data within the designated applications permitted, while the locked designated applications remain logged-in. This Abstract is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. | 2014-02-13 |
20140047524 | CODE-BASED AUTHORIZATION OF MOBILE DEVICE - A system and method for authenticating mobile communications devices. The method comprises: generating a code corresponding to a user configured to be rendered on a rendering device to produce a rendered code, the rendered code being readable by a mobile communications device having a code reading device, the rendered code comprising a secret token; storing the secret token along with information identifying the user on a first storage device; providing the code to the user; receiving, at the authentication server, a setup message from the mobile device, the message includes a device identifier and the secret token; comparing the received secret token and the secret token stored on the first storage device; if the received secret token matches the secret token stored on the first storage device, storing, on a second storage device, information identifying the user and a trusted device value corresponding to the device identifier. | 2014-02-13 |
20140047525 | METHOD FOR ENTERING A PASSWORD AND COMPUTER PROGRAM (THEREFOR) - A method is provided for entering a password. The method includes: providing a display means which is coupled to a data processing means; displaying a timepiece with a first representation of a timepiece element on the display means, detecting a user input; and assigning an alphanumeric character of the password to the user input and the first representation of the timepiece element or a further representation of the timepiece element. In some instances, the first representation of the timepiece element is time dependent. | 2014-02-13 |
20140047526 | ELECTRONIC DEVICE AND METHOD FOR PROVIDING CLOUD COMPUTING SERVICES - In a method for providing cloud computing services using an electronic device, the electronic device connects to a cloud server through a network, and the cloud server connects to a cloud storage system. The electronic device includes a slave operating system (OS), a streamer agent, and a touch screen. The cloud server assigns an IP address and a security code to the electronic device using a hypervisor of the cloud server. The slave OS receives an account and a password inputted from a user operation interface, and verifies whether the account and password are valid according to the security code. The electronic device uploads data to the cloud server by the streamer agent, downloads data from the cloud storage system by the streamer agent, and displays the downloaded data on the touch screen and each display device that is wirelessly connected to the electronic device. | 2014-02-13 |
20140047527 | System and Method for Detecting and Preventing Automated Interaction Based on Detected Actions Performed by User to Solve a Proffered Puzzle - A system and method is provided to detect and prevent automated interaction. A server sends a puzzle to a client application of a client device. The puzzle is programmed and configured to enable a user to solve the puzzle with doing one or a series of maneuvers only using an input pointing means and by moving an Actor object displayed in the puzzle along an indicated path to a target location on the path. The server receives from the client application behavior data documenting the user's interactions with the Actor object in the course of trying to solve the puzzle, analyzes the received user behavior data, and decides whether the puzzle is solved and is solved by a human based on the analysis on the behavior data. The server sends to the client application an authentication token when the server decides that the puzzle is solved by a human. | 2014-02-13 |
20140047528 | IDENTITY MANAGEMENT ON A WIRELESS DEVICE - A wireless device may perform a local authentication to reduce the traffic on a network. The local authentication may be performed using a local web server and/or a local OpenID provider (OP) associated with the wireless device. The local web server and/or local OP may be implemented on a security module, such as a smartcard or a trusted execution environment for example. The local OP and/or local web server may be used to implement a provisioning phase to derive a session key, associated with a service provider, from an authentication between the wireless device and the network. The session key may be reusable for subsequent local authentications to locally authenticate a user of the wireless device to the service provider. | 2014-02-13 |
20140047529 | ENTERPRISE BIOMETRIC AUTHENTICATION SYSTEM - An enterprise biometric authentication system for use with a network of client computing devices, each client computing device executing an operating system with a biometric framework component including a client biometric service, a client engine adapter, a client engine wrapper, and a server subsystem further including a server database, a server storage adapter, a server engine adapter, and a server component. The client engine wrapper resides on a client computing device and is operable to intercept requests from the client biometric service to the client engine adapter and to transmit the requests. The server storage adapter may store and retrieve biometric templates from the server database. The server engine adapter may generate and compare biometric templates. The server component may receive the requests from the client engine wrapper, forward the requests to the server engine adapter, and transmit results of the requests to the client engine wrapper. | 2014-02-13 |
20140047530 | SYSTEM, METHOD AND APPARATUS FOR SELECTING CONTENT FROM WEB SOURCES AND POSTING CONTENT TO WEB LOGS - A method, system and apparatus for selecting, displaying, managing, tracking tagging and transferring access to specific content of Internet web pages and other sources, permitting the user or recipient to navigate quickly to a source of a content item in the custom selection, and posting content to web logs. A method and system of assisted content selection provides temporary borders around content items on mouseover; of Dynamic Content Display provides updating of selected content items; of Content Marks allows users to tag specific content items in web pages with a keyword or keywords, store a definition of the content item along with the keyword(s), and then search the stored definitions using search keywords; and a method of Multiple Clip Mode allows users to select specific content items from disparate source web pages and then tag, save, search, retrieve and print the selection. | 2014-02-13 |
20140047531 | System and Method for Controlling User's Access to Protected Resources Using Multi-Level Authentication - Disclosed are systems, methods and computer program products for multi-level user authentication. In one example, method includes detecting a plug-in token connected to a device that controls user access to a protected resource; identifying one or more authorized users associated with the detected token who are authorized to access the protected resource; authenticating whether a first user requesting accessing the protected resource is associated with the detected token and authorized to access the protected resource; detecting presence of one or more wireless transponders of one or more authorized users associated with the token, including at least a transponder of the first user; and providing access to the protected resource to the first user when the first user is authenticated as an authorized user associated with the detected token and the transponder of at least the first user is detected. | 2014-02-13 |
20140047532 | Secure Mobile Client with Assertions for Access to Service Provider Applications - A Software-as-a-Service (SaaS) access control application on a client device is configured with a certificate that identifies a user, and with configuration information for one or more SaaS applications to access, and including an IDP identifier for the SaaS application. The SaaS access control application includes software to be inserted into a network software stack of the client device and software configured to serve as an identity provider for assertions. A request, made by an application on the client device to a SaaS service provider identified by a Universal Resource Locator (URL) provided during configuration of the SaaS access control application, is intercepted within the network software stack of the client device. The SaaS access control application generates an assertion based on the certificate and configuration information. The requesting application is caused to make a request to the SaaS service provider with the assertion embedded in the request. | 2014-02-13 |
20140047533 | Method and System for Authentication-based Multi-user Online Video Game - The invention relates to a method, comprising: registering user groups to a video game server, and assigning video game identifiers for the user groups; authenticating a video game identifier and an authorization certificate input by a user; and registering the user to the video game server and the user groups if both the video game identifier and the authorization certificate are successfully authenticated. And a system, comprising: means for registering user groups to a video game server and assigning video game identifiers for the user groups; means for authenticating a video game identifier and an authorization certificate input by a user; and means for registering the user to the video game server and the user groups when both the video game identifier and the authorization certificate are successfully authenticated. | 2014-02-13 |
20140047534 | Filtering Network Packets in Multiple Forwarding Information Base Systems - In some implementations, a method for routing communication includes determining a binding interface for a communication session based on a forwarding information base (FIB) and a destination for the communication session. The communication session is from an application running on user equipment (UE), and the binding interface is included in a virtual private network (VPN) tunnel established through an Internet Protocol (IP) security (IPsec) interface. Whether to filter the communication session is determined based on which perimeter of the UE includes the binding interface and which perimeter of the UE includes the IPsec interface. | 2014-02-13 |
20140047535 | MULTIPLE APPLICATION CONTAINERIZATION IN A SINGLE CONTAINER - Described in an example embodiment herein is a Multiple Application Container. Various embodiments of the Multiple Application Container may include, but are not limited to: (1) managed intranet access via a dedicated Virtual Private Network (VPN) tunnel shared amongst applications within the container, (2) managed file/data encryption, (3) native look and feel applications for the base Operating System (OS), (4) isolation from any non-OS based services on the device, and/or (5) Mobile Device Management (MDM) based capabilities, such as policy enforcement. | 2014-02-13 |
20140047536 | ELECTRONIC DEVICE AND METHOD FOR PERFORMING USER AUTHENTICATION USING ACCESS POINT AND PERIPHERAL DEVICE - An electronic device and method for performing user authentication using at least one of an access point and a peripheral device are provided. The method includes determining whether an electronic device connects to at least one of a stored access point and a stored device within a predetermined time period; and requesting a predetermined user authentication when it is determined that the electronic device has not connected to the at least one of the stored access point and device within the predetermined time period. | 2014-02-13 |
20140047537 | ACCESSING CONTACT RECORDS IN A DEVICE WITH MULTIPLE OPERATION PERIMETERS - A method and apparatus for accessing contact records in an electronic device with multiple operation perimeters is provided. When accessing contact records from within one operation perimeter, only contact information accessible from that operation perimeter is retrieved. An option is provided to also access contact records of an alternative operation perimeter. If the alternative operation perimeter has a higher security level than the current operation perimeter, a password or other authorization may be required. The contact records may be accessed, for example, to find information for an outgoing communication, to identify information associated with an incoming communication, or to edit a contact record. | 2014-02-13 |
20140047538 | STATIC TAINTING ANASYSTEM AND METHOD FOR TAINT ANALYSIS OF COMPUTER PROGRAM CODELYSIS - A method is provided to infer taintedness in code expressions encoded in a computer readable device comprising: configuring a computer system to, store a representation of a computer program that is to be evaluated in non-transitory storage media; identify within the representation a pointer cast operation; determine whether an identified cast operation involves a cast from a pointer to a raw memory data type to a pointer to a structured data type; determine whether a structured data type casted to is associated with indicia of externalness; designating data addressed by that pointer as tainted; and determine whether data designated as tainted is consumed by an operation in the computer program that acts as a taintedness sink. | 2014-02-13 |
20140047539 | DETERMINING THE LIKELIHOOD OF TRAFFIC BEING LEGITIMATELY RECEIVED AT A PROXY SERVER IN A CLOUD-BASED PROXY SERVICE - Message(s) are received from each one of multiple proxy servers, which are anycasted to the same IP address, that indicate source IP addresses of packets that are received that are directed to that same IP address. These proxy servers receive the packets as result of domain(s) resolving to that same IP address, and a particular one of the proxy servers receives the packets as a result of an anycast protocol implementation selecting that proxy server. Based on these message(s) from each of the proxy servers, a determination of the likelihood of a packet having a particular source IP address being legitimately received at each of the proxy servers is determined A message is transmitted to each of the proxy servers that indicates which source IP addresses of packets are not likely to be legitimately received at that proxy server. | 2014-02-13 |
20140047540 | SENTINEL SYSTEM FOR AN ONLINE DEVICE - A Sentinel System For an Online Device (“SOD”) is disclosed that is capable of protecting a computing device from mining and tracking. | 2014-02-13 |
20140047541 | METHOD AND SYSTEM FOR PROTECTING A COMPUTER SYSTEM DURING BOOT OPERATION - A method for protecting a computer system from malicious network traffic is provided using a driver which inspects network packets. A security profile comprising packet inspection rules is compiled and stored on the computer system. During the startup or boot operation of an operating system, the driver loads the compiled security profile and inspects network packets using the inspection rules. | 2014-02-13 |
20140047542 | Mitigating a Denial-of-Service Attack in a Cloud-Based Proxy Service - A proxy server in a cloud-based proxy service receives a message that indicates that a domain, whose traffic passes through the proxy server, may be under a denial-of-service (DoS) attack. The proxy server enables a rule for the domain that specifies that future requests for resources at that domain are subject to at least initially passing a set of one or more challenges. In response to receiving a request for a resource of that domain from a visitor, the proxy server presents the set of challenges that, if not passed, are an indication that that the visitor is part of the DoS attack. If the set of challenges are passed, the request may be processed. If the set of challenges are not passed, the request may be dropped. | 2014-02-13 |
20140047543 | APPARATUS AND METHOD FOR DETECTING HTTP BOTNET BASED ON DENSITIES OF WEB TRANSACTIONS - An apparatus and method for detecting a Hyper Text Transfer Protocol (HTTP) botnet based on the densities of transactions. The apparatus includes a collection management unit, a web transaction classification unit, and a filtering unit. The collection management unit extracts metadata from HTTP request packets collected by a traffic collection sensor. The web transaction classification unit extracts web transactions by analyzing the metadata, and generates a gray list by arranging the extracted web transactions according to the frequency of access. The filtering unit detects an HTTP botnet by filtering the gray list based on a white list and a black list. | 2014-02-13 |
20140047544 | Server-Side Malware Detection and Classification - A server-side system that detects and classifies malware and other types of undesirable processes and events operating on network connected devices through the analysis of information collected from said network connected devices. The system receives information over a network connection and collects information that is identified as being anomalous. The collected information is analyzed by system process that can group data based on optimally suited cluster analysis methods. Upon clustering the information, the system can correlate an anomalous event to device status, interaction, and various elements that constitute environmental data in order to identify a pattern of behavior associated with a known or unknown strain of malware. The system further interprets the clustered information to extrapolate propagation characteristics of the strain of malware and determine a potential response action. | 2014-02-13 |
20140047545 | EXPERT SYSTEM FOR DETECTING SOFTWARE SECURITY THREATS - An instance of a vulnerability risk management (VRM) module and a vulnerability management expert decision system (VMEDS) module are instantiated in a cloud. The VMEDS module imports scan results from a VRM vulnerability database and saves them as vulnerabilities to be reviewed in a VMEDS database. The VMEDS module converts vulnerabilities into facts. The VMEDS module builds a rule set in the knowledge base to verify whether certain vulnerabilities are false positives. Rules related to a vulnerability are received in plain English from a web-based front-end application. The VMEDS module tests each rule against all of the facts using the Rete algorithm. The VMEDS module executes the action associated with the rule derived from the Rete algorithm. The VMEDS module stores the results associated with the executing of the action in the VMEDS database and forwards the results to the VRM module. | 2014-02-13 |
20140047546 | Method and System for Managing Computer System Vulnerabilities - A vulnerability risk management (VRM) module receives an indication of a VRM service to be provided from the end user. The VRM module extracts from the indication either external IP addresses or the web application URL and a list of assets of the enterprise computer system to be tested. The VRM module discovers the assets of the enterprise computer system. The VRM module receives a request for a vulnerability scan using a predefined scan configuration based on preferences of the end user and a specified date and time to conduct the scan. The VRM module reports and stores a preliminary list of potential vulnerabilities in the VRM vulnerability database. The preliminary list is fed to an expert system, which applies specific rule sets using an inference engine and a knowledge base to refine results stored in the VRM vulnerability database by removing extraneous information and false positives. | 2014-02-13 |
20140047547 | STEALTH NETWORK ATTACK MONITORING - A particular failed connection attempt initiated by a particular source asset in a network is identified and subsequent failed connection attempts initiated by the particular source asset in the network during a time period are tracked. A low frequency sequence of failed connection attempts involving the particular source asset is detected during the time period and the source asset is designated as a potential security risk based on the detected low frequency sequence of failed connection attempts. | 2014-02-13 |
20140047548 | Systems and Methods for Provisioning and Using Multiple Trusted Security Zones on an Electronic Device - A method of provisioning a subordinate trusted security zone in a processor having a trusted security zone. The method comprises receiving by a master trusted application executing in a master trusted security zone of the processor a request to provision a subordinate trusted security zone in the processor, wherein the request comprises a master trusted security zone key, wherein the request designates the subordinate trusted security zone, and wherein the request defines an independent key. The method further comprises provisioning by the master trusted application the subordinate trusted security zone to be accessible based on the independent key. | 2014-02-13 |
20140047549 | METHOD AND DEVICES FOR SELECTIVE RAM SCRAMBLING - A method for selectively scrambling data within a memory associated with a computing device based on data tagging. The computing device may define security domains that are protected. Data generated by an application may be packaged as a data bus transaction having tagging information describing the application and/or the data. The data bus transaction may be transmitted over a bus of the computing device to a memory, such as internal memory, where the computing device may compare the tagging information to stored information describing security domains. When the data is determined to be protected based on the tagging information, the computing device may perform scrambling operations on the data. In an aspect, the tagging information may describe a virtual machine used to execute various applications on a processor. In another aspect, the tagging information may define destination memory addresses or content protection bit values. | 2014-02-13 |
20140047550 | DISCRIMINATING DATA PROTECTION SYSTEM - A data protection system selectively deletes data from an electronic device when the device is reported as lost or stolen, or when another data protection triggering event occurs. Different data files may, for example, be treated differently depending on when such files were created. For example, data files that were created while the computing device was known to be in the owner's possession may be deleted, while data files created after the electronic device left the owner's possession may be left intact (since they may have been created by an innocent user). Data files created between these two points in time may be quarantined so that they later be restored, if appropriate. | 2014-02-13 |
20140047551 | PRIVACY FIREWALL - Embodiments of the invention relate to systems and methods for providing an anonymization engine. One embodiment of the present invention relates to a method comprising receiving a message directed at a recipient computer located outside a secure area by a privacy computer located within a secure area. The privacy computer may identify private information using a plurality of privacy rules and anonymize the message according to the plurality of privacy rules. Another embodiment may be directed to a method comprising receiving a request for sensitive data from a requesting computer. An anonymization computer may determine a sensitive data record associated with the request and may anonymize the sensitive data record by performing at least two of: removing unnecessary sensitive data entries from the sensitive data record, masking the sensitive data entries to maintain format, separating the sensitive data entries into associated data groupings, and de-contexting the data. | 2014-02-13 |
20140047552 | Methods, Systems, and Devices for Securing Content - Methods, systems, and devices secure content in memory. The content includes a lock that prohibits reading the content from memory until a date and time of expiration. However, early access to the content is available for a payment. | 2014-02-13 |
20140047553 | METHOD AND APPARATUS FOR DATA SECURITY READING - A method for data security reading includes steps of: receiving a hardware instruction; analyzing said hardware instruction; if said hardware instruction is a reading instruction, obtaining the source address in the reading instruction; searching a mapping bitmap and modifying the reading address in the reading instruction according to the data of the mapping bitmap, wherein the mapping bitmap is used to indicate whether the data stored in a local storage address is dumped to said security storage device; transmitting the modified reading instruction to a hardware layer. An apparatus for data security reading includes a receiving unit, an instruction analyzing unit, an instruction modifying unit and a transmitting unit. The Trojan horse or malicious tools cannot store or transmit the acquired information even if the secret information has been obtained, so that the data always exists in controllable security range. | 2014-02-13 |
20140047554 | APPARATUS CAPABLE OF EXECUTING ADJUSTING OPERATION, CONTROL METHOD FOR CONTROLLING ADJUSTING OPERATION OF APPARATUS, AND STORAGE MEDIUM - The apparatus includes a management unit configured to manage an access right that is assigned to each of a plurality of users, and a storage unit configured to store a plurality of scenarios including the adjusting operation of the apparatus and a first access level that is assigned to each of the scenarios. Furthermore, the apparatus determines whether or not a scenario can be executed with the access right given to a user, by comparing the access right of the user with the first access level stored in the storage unit, and displays, before the scenario is executed, at least one of the plurality of scenarios on a display unit such that the determination result can be displayed identifiably. | 2014-02-13 |
20140047555 | METHOD AND SYSTEM FOR SECURING A SOFTWARE PROGRAM - The invention relates to a method for securing an original software program using a secret, comprising the following steps consisting in: partitioning ( | 2014-02-13 |
20140047556 | SECURE REDACTED DOCUMENT ACCESS - Described are computer-based methods and apparatuses, including computer program products, for secure redacted document access. A viewing application for viewing documents is executed, the viewing application comprising standard code for the viewing application that can not process the container data type, and custom code configured to allow the viewing application to process a container data type. A container of the container data type is received from a remote computing device comprising a set of redacted documents corresponding to an original document, each redacted document having a level of redaction corresponding to a viewing location, and a header comprising encryption information for each redacted document in the set of redacted documents. The container is processed based on a location of the computing device and the custom code. | 2014-02-13 |
20140047557 | PROVIDING ACCESS OF DIGITAL CONTENTS TO ONLINE DRM USERS - The invention relates to a system and method providing access of one or more heterogeneous digital contents to at least one online Digital Rights Management (DRM) user by a DRM server. This invention involves receiving digital contents from the publishers and those digital contents are encrypted and user rights are granted to access the contents by the publisher. The DRM server stores the decryption information, user rights and user information in a repository. After authenticating the user who is connected with the DRM server through a DRM client, the DRM server sends a license to the DRM user which includes the decryption information and the user rights. The DRM client decrypts the contents based on the license information in the memory of the user's computer device and thus the content and the license are not locally stored. | 2014-02-13 |
20140047558 | SYSTEM AND METHOD FOR PROVIDING ACCESS OF DIGITAL CONTENTS TO OFFLINE DRM USERS - The invention relates to a system and method providing access of one or more heterogeneous digital contents to at least one offline Digital Rights Management (DRM) user by a DRM server. This invention involves establishing the trust relationship among the DRM server, DRM client, user's machine and the end user by means of digital certificate. The server generates protected digital content by means of using a standard encryption algorithm. The invention further involves determining whether a license for accessing the protected file is requested by the legitimate user, and if so, generating a license consisting the user rights and the protected decryption key to be downloaded by legitimate user. The DRM client decrypts the protected file using a decryption key of the license, and renders the content to the end user by calling the appropriate and customized viewer during consumption. | 2014-02-13 |
20140047559 | SYSTEMS AND METHODS FOR PROVIDING PRIVACY SETTINGS FOR APPLICATIONS ASSOCIATED WITH A USER PROFILE - Systems and methods for providing privacy settings for applications associated with a user profile are provided. Exemplary methods include receiving a request from a member of a web-based social network to install an application in association with a member profile, installing the requested application, providing privacy settings selections to control access to data associated with the installed application, receiving a privacy settings selection from the member, and displaying data associated with the application based on the privacy settings selection. | 2014-02-13 |
20140047560 | COMPUTERIZED METHOD AND SYSTEM FOR MANAGING SECURE MOBILE DEVICE CONTENT VIEWING IN A NETWORKED SECURE COLLABORATIVE EXCHANGE ENVIRONMENT - In embodiments of the present invention improved capabilities are described for securely viewing computer data content, such as documents, presentations, spreadsheets, emails, blog entries, texts, and the like, through a secure viewing facility, where the secure viewing facility utilizes a camera or other biometric sensor to monitor an authorized user's actions in the determination of whether the secure viewing facility will permit the computer data content to be viewed on the computer's display, and/or in the control of the viewing process itself. | 2014-02-13 |
20140047561 | ELECTRONIC APPARATUS, CONTROL METHOD FOR ELECTRONIC APPARATUS, AND PROGRAM - An electronic apparatus includes: a touch panel that, when touch operations are carried out in which one or a plurality of indicating means come into contact with or proximity to the touch panel, supplies touch information that indicates the positions of contact points at which the one or plurality of indicating means come into contact with or proximity to the touch panel; a storage unit that stores, as authentication data, the number of the contact points in the touch operations that is indicated by the touch information; and an authentication unit that, upon receiving the touch information after a request for user authentication, carries out user authentication based on a comparison of the number of the contact points that is indicated by the touch information and the authentication data stored in the storage unit. | 2014-02-13 |
20140047562 | SELECTIVE PROVISIONING OF ONLINE MEDIA CONTENT - Providing for client-selected user authentication in relation to accessing or acquiring online media content is described herein. In response to an access request transmitted by a client device, a server can determine a type of request employed by the client device and identify a type of media playback device associated with the client. Identification can be based on information specified within the access request, information derived from information pertaining to the access request, information derived from stored associations between access request and types of playback devices, or suitable combinations thereof. Once identified, promotional content or service(s) can be allocated to a subscriber account in response to the access request satisfying one or more criteria. In this manner, a service provider can facilitate client-selection of a mode of user authorization, while incentivizing a particular type of playback device for acquiring content from or generally interfacing with the service provider. | 2014-02-13 |
20140047563 | DATA RETENTION KILL FUNCTION - Various data protection techniques are provided. In one embodiment, a memory device is provided. The memory device may initiate a security measure upon occurrence of one or more triggering events. The one or more triggering events may include receipt of a command signal. Various additional methods, devices, and systems are also provided. | 2014-02-13 |
20140047564 | MANAGING CONTACT RECORDS IN A DEVICE WITH MULTIPLE OPERATION PERIMETERS - Management of contact records in an electronic device with multiple operation perimeters is provided. When creating a contact record from within one operation perimeter, an option is provided to save the contact record in storage resource accessible from within the current operating perimeter or in a storage resource accessible from within an alternative operation perimeter. If the alternative operation perimeter has a higher security level than the current operation perimeter, a password or other authorization may be required. | 2014-02-13 |
20140047565 | AUTHENTICATION REQUESTING APPARATUS, AUTHENTICATION PROCESSING APPARATUS, AND AUTHENTICATION EXECUTION METHOD BASED ON PHYSICALLY UNCLONABLE FUNCTION - An authentication requesting apparatus, an authentication processing apparatus and an authentication execution method based on a physically unclonable function (PUF) are provided. The authentication requesting apparatus includes a signal transmission and reception unit, a response generation unit, and an authentication request unit. The signal transmission and reception unit receives a first pilot signal from an authentication processing apparatus that processes authentication. The response generation unit generates a challenge value based on the first pilot signal, acquires an output value by inputting the challenge value into a PUF circuit, and generates a response value from the output value. The authentication request unit requests authentication by transmitting the response value to the authentication processing apparatus, receives authentication result information from the authentication processing apparatus, and determines whether authentication has been successful. | 2014-02-13 |
20140047566 | LICENSE MANAGEMENT PLATFORM APPARATUSES, METHODS AND SYSTEMS - The LICENSE MANAGEMENT PLATFORM APPARATUSES, METHODS AND SYSTEMS (“LMP”) transform content seed selections and recommendations via LMP components such as discovery and social influence into events and discovery of other contents for users and revenue for right-holders. In one embodiment, the LMP may detect a request to engage a universally resolvable media content (“URMC”) item. The LMP may obtain an expiration date for a URMC license token associated with the URMC item and may determining, based on the obtained expiration date, whether the license token is expired. The LMP may facilitate discarding of a license key associated with the expired license token and may deny the request to engage the URMC item with the associated expired license token. The LMP may provide a request for an updated token and requisite credentials for the updated token, obtain a response including an updated token and facilitate engaging of the requested URMC item with an associated valid updated token. | 2014-02-13 |
20140047567 | METHOD AND SYSTEM FOR SECURE CONFIGURATION OF AN ELECTRONIC DEVICE VIA AN RFID IC - Embodiments of an electronic device are disclosed. In one embodiment, the electronic device includes a circuit board, a central processing unit (CPU), an RFID IC, and a physically secure communications channel. The circuit board includes a radio frequency (RF) antenna, the CPU is connected to the circuit board and includes a CPU-to-RF identification (RFID) interface that does not support a digital security measure which requires asymmetric key cryptography, the CPU being enclosed within a package. The RFID IC is connected to the RF antenna and has an RFID-to-CPU interface that does not support a digital security measure which requires asymmetric key cryptography. The RFID IC also has non-volatile memory that stores configuration data for configuring the electronic device. The physically secure communications channel connects the CPU-to-RFID interface to the RFID-to-CPU interface and the physically secure communication channel is protected from physical access by a structural barrier. | 2014-02-13 |
20140047568 | METHOD FOR MONITORING A TAMPER PROTECTION AND MONITORING SYSTEM FOR A FIELD DEVICE HAVING TAMPER PROTECTION - The invention relates to a method for monitoring a tamper protection of a field device, comprising the steps of: checking whether manipulation of the field device has taken place; outputting a non-manipulation certificate in case a negative inspection result was determined; transferring the non-manipulation certificate; a registration device checking the non-manipulation certificate; the registration device determining an active status of the field device in case the non-manipulation certificate is valid; a monitoring device checking the field device by querying the status of the field device and transferring field device data to the monitoring device; the monitoring device accepting the field device data if the field device has an active status. The invention further relates to a monitoring system for a field device and a use. | 2014-02-13 |
20140047569 | Methods of Treating Disorders Associated with Protein Aggregation - The present invention relates to methods of treatment of clinical disorders associated with protein aggregation comprising administering, to a subject, an effective amount of an anti-protein aggregate (“APA”) compound selected from the group consisting of pimozide, fluphenazine (e.g., fluphenazine hydrochloride), tamoxifen (e.g., tamoxifen citrate), taxol, cantharidin, cantharidic acid, salts thereof and their structurally related compounds. It is based, at least in part, on the discovery that each of the aforelisted compounds were able to promote degradation of aggregated ATZ protein in a | 2014-02-13 |
20140047570 | ANIMAL MODEL OF HUMAN CANCER AND METHODS OF USE - The subject invention pertains to a non-human animal model of human cancer, methods of producing a non-human animal model of human cancer, methods of using a non-human animal model to propagate human cancer cells, methods of using a non-human animal model to study cancer, methods of using a non-human animal model to screen potential treatments for a subject's cancer, methods of using a non-human animal model for treating cancer in a subject (providing personalized therapy), methods of using a non-human animal model for identifying a biomarker of cancer treatment; and methods of using a non-human animal model for selecting cancer patients for a clinical trial. | 2014-02-13 |
20140047571 | Polypeptides Having Phytase Activity and Polynucleotides Encoding Same - The present invention relates to polypeptides having phytase activity. These polypeptides have an amino acid sequence which has at least 70% identity to either of three phytases derived from the bacterium | 2014-02-13 |
20140047572 | THROMBOPOIETIN MIMETICS FOR THE TREATMENT OF RADIATION OR CHEMICAL INDUCED BONE MARROW INJURY - Disclosed are transgenic non-human mammals, which useful for the screening of thrombopoietin mimetics, thrombopoietin receptor agonists, or thrombopoietin receptor antagonists active on the human thrombopoietin receptor. The transgenic non-human mammal has a genome that comprises a stably integrated transgene construct comprising a polynucleotide sequence encoding a humanized thrombopoietin receptor wherein said transgenic non-human mammal has a baseline blood platelet count corresponding to a physiological blood platelet count of a matched non-transgenic non-human mammal. The chimeric thrombopoietin receptor comprises either the transmembrane domain of a human thrombopoietin receptor or both the extracellular and transmembrane domains of a human thrombopoietin receptor operably coupled to a cytoplasmic domain of a non-human thrombopoietin receptor. | 2014-02-13 |
20140047573 | SALT TOLERANT LUCERNE | 2014-02-13 |
20140047574 | TOMATO HYBRID HNX12860544 - The invention provides seed and plants of tomato hybrid HNX12860544 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid HNX12860544 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2014-02-13 |
20140047575 | GARDEN BEAN VARIETY PV-803 - A novel garden bean variety, designated PV-803, is disclosed. The invention relates to the seeds of garden bean variety PV-803, to the plants of garden bean line PV-803 and to methods for producing a bean plant by crossing the variety PV-803 with itself or another bean line. The invention further relates to methods for producing a bean plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other garden bean lines derived from the variety PV-803. | 2014-02-13 |
20140047576 | Fungal Resistant Plants Expressing HCP4 - The present invention relates to a method of increasing resistance against fungal pathogens of the family Phacopsoraceae in plants and/or plant cells. This is achieved by increasing the expression of an HCP4 protein or fragment thereof in a plant, plant part and/or plant cell in comparison to wild type plants, wild type plant parts and/or wild type plant cells. Furthermore, the invention relates to transgenic plants, plant parts, and/or plant cells having an increased resistance against fungal pathogens, in particular, pathogens of the family Phacopsoraceae, and to recombinant expression vectors comprising a sequence that is identical or homologous to a sequence encoding an HCP4 protein. | 2014-02-13 |
20140047577 | Fungal Resistant Plants Expressing RLK2 - The present invention relates to a method of increasing resistance against fungal pathogens of the family Phacosporaceae in plants and/or plant cells. This is achieved by increasing the expression of an RLK2 protein or fragment thereof in a plant, plant part and/or plant cell in comparison to wild type plants, wild type plant parts and/or wild type plant cells. Furthermore, the invention relates to transgenic plants, plant parts, and/or plant cells having an increased resistance against fungal pathogens, in particular, pathogens of the family Phacopsoraceae, and to recombinant expression vectors comprising a sequence that is identical or homologous to a sequence encoding an RLK2 protein. | 2014-02-13 |
20140047578 | Fungal Resistant Plants Expressing HCP5 - The present invention relates to a method of increasing resistance against fungal pathogens of the family Phacosporaceae in plants and/or plant cells. This is achieved by increasing the expression of an HCP5 protein or fragment thereof in a plant, plant part and/or plant cell in comparison to wild type plants, wild type plant parts and/or wild type plant cells. Furthermore, the invention relates to transgenic plants, plant parts, and/or plant cells having an increased resistance against fungal pathogens, in particular, pathogens of the family Phacopsoraceae, and to recombinant expression vectors comprising a sequence that is identical or homologous to a sequence encoding an HCP5 protein. | 2014-02-13 |
20140047579 | Fungal Resistant Plants Expressing RLK1 - The present invention relates to a method of increasing resistance against fungal pathogens of the family Phacosporaceae in plants and/or plant cells. This is achieved by increasing the expression of an RLK1 protein or fragment thereof in a plant, plant part and/or plant cell in comparison to wild type plants, wild type plant parts and/or wild type plant cells. Furthermore, the invention relates to transgenic plants, plant parts, and/or plant cells having an increased resistance against fungal pathogens, in particular, pathogens of the family Phacopsoraceae, and to recombinant expression vectors comprising a sequence that is identical or homologous to a sequence encoding an RLK1 protein. | 2014-02-13 |
20140047580 | Methods and Compositions for Treating Conditions - The invention relates to compositions comprising of SEQ NO: 1-244, 248-249, and any homologs, analogs, and fragments thereof. Such compositions can be used to treat, prevent, and modulate pain, inflammation, and metabolic processes in various organisms including plants and animals. Such compositions can be formulated with an acceptable pharmaceutical excipient for administration to a human or a plant. The compositions can be administered topically or for systemic use. | 2014-02-13 |
20140047581 | CHIMERIC PROMOTERS CAPABLE OF MEDIATING GENE EXPRESSION IN PLANTS UPON PATHOGEN INFECTION AND USES THEREOF - Described are synthetic promoters capable of mediating gene expression in plants upon pathogen infection. Furthermore, recombinant genes and vectors comprising said chimeric promoters as well as host cells transformed with such chimeric promoters, recombinant genes, or vectors are provided. Additionally, diagnostic compositions and kits comprising such chimeric promoters, recombinant genes, vectors or cells are described. Provided are further methods for the identification of compounds being capable of activating or inhibiting genes that are specifically expressed in plants upon pathogen infection employing the above described means. Furthermore, transgenic plant cells, plant tissue, and plants containing the above-described chimeric promoters, recombinant genes, and vectors as well as the use of the aforementioned chimeric promoters, recombinant genes, vectors and/or compounds identified by the method of the invention in plant cell and tissue culture, plant breeding, and/or agriculture are described. | 2014-02-13 |
20140047582 | INTERFERING RNAs THAT PROMOTE ROOT GROWTH - siRNA, miRNA and amiRNA molecules having plant root growth promoting activity, compositions comprising the same, and uses thereof. | 2014-02-13 |
20140047583 | CENTROMERE SEQUENCES DERIVED FROM SUGAR CANE AND MINICHROMOSOMES COMPRISING THE SAME - The invention is generally related to sugar cane mini-chromosomes containing sugar cane centromere sequences. In addition, the invention provides for methods of generating sugar cane plants transformed with these sugar cane mini-chromosomes. Sugar cane mini-chromosomes with novel compositions and structures are used to transform sugar cane cells which are in turn used to generate sugar cane plants. Methods for generating sugar cane plants include methods for delivering the sugar cane mini-chromosomes into sugar cane cell to transform the cell, methods for selecting the transformed cell, and methods for isolating sugar cane plants transformed with the sugarcane mini-chromosome. | 2014-02-13 |
20140047584 | MONDO LETTUCE VARIETY - A new lettuce variety designated ‘Mondo’ is described. ‘Mondo’ is a romaine lettuce variety exhibiting stability and uniformity. | 2014-02-13 |
20140047585 | SCANNING PROBE MICROSCOPY CANTILEVER COMPRISING AN ELECTROMAGNETIC SENSOR - An apparatus and method directed to a scanning probe microscopy cantilever. The apparatus includes body and an electromagnetic sensor having a detectable electromagnetic property varying upon deformation of the body. The method includes scanning the surface of a material with the cantilever, such that the body of the cantilever undergoes deformations and detecting the electromagnetic property varying upon deformation of the body of the cantilever. | 2014-02-13 |
20140047586 | Shrub rose plant named 'Novarospop' - A new and distinct shrub rose plant is provided that abundantly and substantially continuously forms in clusters attractive double cup-shaped blossoms that initially are yellow and change to cream-white with maturity. The plant exhibits vigorous vegetation and a bushy and rounded growth habit. The foliage is dark green with a glossy upper surface. The blossoms commonly display a very light sweet scent. Good disease resistance is displayed, particularly with respect to Black Spot, Powdery Mildew, and Rust, during observations to date. The plant is well suited for growing as attractive ornamentation in the landscape. It grows well as a ground cover, in mass plantings, and when present in a container. | 2014-02-13 |
20140047587 | Shrub rose plant named 'Radcleome' - A new and distinct shrub rose plant is provided that abundantly forms in clusters attractive small single medium pink finishing to light pink blossoms that drop their petals well upon full maturity. The plant exhibits vigorous vegetation and an upright and bushy growth habit. The foliage is dark green with a semi-glossy finish on the upper surface. The disease resistance is excellent, particularly with respect to Black Spot, Powdery Mildew, and Rust. The plant is well suited for growing as attractive ornamentation in in the landscape as a hedge or mass planting. Alternatively, the plant can be grown in containers. | 2014-02-13 |
20140047588 | Blueberry plant named 'Drisblueseven' - A new and distinct variety of blueberry plant named ‘DrisBlueSeven’ particularly distinguished by having a very low chilling requirement, high productivity and very firm, large, sweet berries with intense blue color, is disclosed. | 2014-02-13 |
20140047589 | Blueberry plant named 'Drisbluesix' - A new and distinct variety of blueberry plant named ‘DrisBlueSix’ particularly distinguished by having a very low chilling requirement, very early harvest season with high fruit productivity, and firm, sweet berries with medium acidity, is disclosed. | 2014-02-13 |
20140047590 | Blueberry plant named 'DRISBLUEEIGHT' - A new and distinct variety of blueberry plant named ‘DrisBlueEight’ particularly distinguished by having a very low chilling requirement, small plant size with medium productivity and firm, tart berries with dark blue color, is disclosed. | 2014-02-13 |
20140047591 | 'B Thome Gala' - A new and distinct variety of Gala apple tree, Apple Tree named ‘B. Thome Gala,’ originating as a limb mutation of the | 2014-02-13 |
20140047592 | BLACKBERRY PLANT NAMED 'DRISBLACKFIVE' - This invention relates to a new and distinct variety of blackberry plant named ‘DrisBlackFive’, particularly characterized by improved storage life, large fruit, and excellent fruit flavor and appearance, is disclosed. | 2014-02-13 |
20140047593 | BLACKBERRY PLANT NAMED 'DRISBLACKFOUR' - This invention relates to a new and distinct variety of Blackberry plant named ‘DrisBlackFour’, particularly characterized by improved storage life, late flowering season, and excellent fruit flavor and appearance, is disclosed. | 2014-02-13 |
20140047594 | Raspberry plant named 'DRISRASPFIVE' - A new and distinct variety of raspberry plant named ‘DrisRaspFive’ particularly distinguished by having high yield, good flavor, and dark red berries, is disclosed. | 2014-02-13 |
20140047595 | Raspberry plant named 'Drisraspseven' - A new and distinct variety of raspberry plant named ‘DrisRaspSeven’ particularly distinguished by having a self-fruitful plant that bears large, bright red berries, is disclosed. | 2014-02-13 |
20140047596 | Raspberry plant named 'Drisraspsix' - A new and distinct variety of raspberry plant named ‘DrisRaspSix’ particularly distinguished by having high productivity, partially self-fruitful plants bearing medium sized, bright red berries, is disclosed. | 2014-02-13 |
20140047597 | Strawberry plant named 'ZAFIR' - A new and distinct variety of | 2014-02-13 |
20140047598 | Strawberry plant named 'MURANO' - A new and distinct variety of | 2014-02-13 |
20140047599 | CALADIUM PLANT NAMED 'UF-85-5' - A new and distinct cultivar of | 2014-02-13 |
20140047600 | Caladium Plant Named 'UF-172' - A new and distinct cultivar of | 2014-02-13 |
20140047601 | Caladium Plant Named 'UF-18-49' - A new and distinct cultivar of | 2014-02-13 |
20140047602 | Heuchera plant named 'Ginger Snap' - A new and distinct | 2014-02-13 |
20140047603 | Heuchera plant named 'Frost' - A new and distinct | 2014-02-13 |