35th week of 2014 patent applcation highlights part 78 |
Patent application number | Title | Published |
20140245408 | BIOMETRIC APPROACH TO TRACK CREDENTIALS OF ANONYMOUS USER OF A MOBILE DEVICE - A system includes one or more mobile devices and a shared server. Each of the one or more mobile devices is associated with a unique identification tag and configured to send biometric information about anonymous users to a shared server space. The shared server provides the shared server space. The shared server is generally configured to store biometric information about a plurality of anonymous users associated with the unique identification tag of each of the one or more mobile devices. In response to a query about a lost or stolen mobile device, the shared server is enabled to track credentials of anonymous users associated with the unique identification tag of the lost or stolen mobile device. | 2014-08-28 |
20140245409 | Extension of the Attributes of a Credential Request - In order to issue a security credential, a client of a system is configured to send a credential request in order to have a credential issuer prepare a security credential. The credential request is received by a credential attribute intermediary connected between the client and the credential issuer. At least one attribute of the requesting client is ascertained by the credential attribute intermediary. The at least one attribute ascertained by the credential attribute intermediary is confirmed to the credential issuer. The security credential is issued by the credential issuer based on the credential request received by the credential attribute intermediary and based on the at least one attribute confirmed by the credential attribute intermediary. | 2014-08-28 |
20140245410 | METHOD AND SYSTEM FOR AUTHENTICATING A NETWORK NODE IN A UAM-BASED WLAN NETWORK - The invention relates to a method and system for authenticating a mobile network node in a Wireless Local Area Network, wherein the mobile network node requests access to the WLAN at an access point. Within a closed first network region, before authentication all network protocol layers up to the Layer 3 protocol layer (L3) are set up. An authenticator based on Extensible Authentication Protocol (EAP) is generated on the Web server as captive portal and the Layer 3 protocol layer between the authenticator and the mobile network node comprising an EAP peer is extended bidirectionally by means of a defined bit sequence. In case of an access request, the Web server transmits an authentication stimulus to the mobile node by encoding an EAP message request and transmitting it in the Layer 3 protocol layer by means of the defined bit sequence. The mobile node decodes the EAP message request and transmits, in the Layer 3 protocol layer, by means of the defined bit sequence, an encoded EAP response message to the authenticator, the EAP response message comprises authentication data of the mobile network node. The Web server decodes the EAP response message from the bit sequence, transmits it to an AAA server including an EAP server by means of an authentication inquiry. On the basis of an authentication response by the AAA Server, access is enabled to a second network region for use by the mobile network node by means of a Network Access Server. | 2014-08-28 |
20140245411 | METHOD AND APPARATUS FOR PROVIDING ACCOUNT-LESS ACCESS VIA AN ACCOUNT CONNECTOR PLATFORM - An approach is provided for account-less access via an account connector platform. The account connector platform determines a request from at least one client for a user login to at least one of a plurality of accounts associated with a user. The plurality of accounts is associated with an account connector platform and the request includes, at least in part, one or more credentials for the least one of the plurality of user accounts. The account connector platform causes, at least in part, an association of an account connector token with the user, the at least one of the plurality of accounts, or a combination thereof based, at least in part, on an authentication of the one or more credentials. The account connector platform then determines to authenticate the at least one client to provide another user login to at least another one of the plurality of accounts is based, at least in part, on the account connector token. | 2014-08-28 |
20140245412 | LINKING CREDENTIALS IN A TRUST MECHANISM - A system is described in which a user is able to generate multiple credentials, each of which includes one or more anchor attributes. Since all credentials contain the anchor attribute(s), the user can offer credentials to a relying party even if he has lost his original secret key. In this way, if a user loses a private key used to sign a credential, then he can use a credential signed by a different private key and still have that credential accepted at a relying party that knows the first credential. Furthermore, the invention enables a user to distribute his identity over multiple identity management systems. | 2014-08-28 |
20140245413 | IMAGE FORMING SYSTEM, IMAGE FORMING APPARATUS, AND RECORDING MEDIUM - In an image forming apparatus, a section managing unit acquires section information and usage restriction information from the server apparatus after succession of the user authentication on a login user and registers a temporal section based on the acquired section information and the acquired usage restriction information as a section within the image forming apparatus. The UI control unit removes logout prohibition to the login user before completion of a job of the login user performed by the image forming apparatus, and the usage restriction managing unit continues to perform usage restriction management of the temporal section for the job until the job is completed even after the login user performs a logout operation. | 2014-08-28 |
20140245414 | DEVICE, INFORMATION PROCESSING SYSTEM AND CONTROL METHOD - A device includes a first obtaining unit configured to obtain first identification information for use in user authentication from an authentication device; a second obtaining unit configured to obtain second identification information entered by a user; an authenticating unit configured to perform authentication to determine whether the user is an authorized user by comparing the first identification information with the second identification information; and a sharing unit configured to permit both an authentication-type application program that performs user authentication and a non-authentication-type application program that does not perform user authentication to access the authentication device when an authentication result obtained by the authenticating unit indicates that the user is an authorized user. | 2014-08-28 |
20140245415 | Method and system for implementing directional publishing of information, and computer storage medium - It is described a method for implementing directional publishing of information, which includes: it is selected, for a client device or a browser which supports display of dynamic pictures, release information to be published based on a location of a current verification picture and a page topic associated with the location, current verification information being supposed to be input from the client device or the browser; and it is selected a picture corresponding to the selected release information, the selected picture and the verification picture are processed to obtain a dynamic picture, and the obtained dynamic picture is displayed in an area for verification. Also it is provided a system for implementing directional publishing of information and a computer storage medium. With the described method and system, a verification code can be used to implement directional publishing of information, thereby increasing the utilization rate of the validate code. | 2014-08-28 |
20140245416 | System and Method for Associating a Universal User Identification and a Domain Specific User Identification - There is presented a system and method for associating a domain transcendent identification (ID) of a user and a domain specific ID of the user, the system comprising an ID association server accessible by a plurality of secure domains over a network. The system also includes an ID associator application that when executed by ID association server is configured to receive a domain specific ID that associates the user to the secure domain, enter the domain specific ID in a domain transcendent ID record created for the user, generate a unique data associated with the domain transcendent ID record and identify a network location for submission of the unique data, send the unique data and the network location to the user, and associate the domain transcendent ID and the domain specific ID. | 2014-08-28 |
20140245417 | CENTRALIZED SECURE MANAGEMENT METHOD OF THIRD-PARTY APPLICATION, SYSTEM AND CORRESPONDING COMMUNICATION SYSTEM - A technique is provided for performing a centralized secure management on a third-party application. The technique includes receiving, by the centralized secure management system, an identity, an authentication credential and an access grant of the third-party application sent by the third-party application in a distinguishable manner. The centralized secure management system forwards the identity and the access grant to an Authorization Server after successfully authenticating the third-party application. The Authorization Server issues an access token for accessing protected resources to the third-party application through the centralized secure management system when the access grant is valid. | 2014-08-28 |
20140245418 | AUTOMATIC SIGN IN OF A USER AT MULTIPLE ENDPOINTS - The present disclosure is directed to methods and systems for user registration, where a user is logged in to a first device in communication with a server, including: receiving an anonymous registration of a second device comprising a token, where the second device is in communication with the server; receiving a credential of the user and the token; finding the second device using the token; and registering the user on the second device using the credential. | 2014-08-28 |
20140245419 | Methods and Systems for Accessing Account Information Electronically - Methods and systems for accessing customer account information involve, for example, binding a computing device with a customer's profile via one or more attributes of the computing device and an encrypted token stored on the computing device and thereafter receiving an authentication request consisting at least in part of the computing device attributes and the encrypted token stored on the computing device. A determination is made as to whether or not entry of a customer credential was received within a pre-determined preceding interval of time, and predefined customer account information is displayed on the computing device without requiring entry of the customer credential when a determination is made that entry of the customer credential was received within the pre-determined preceding interval of time. | 2014-08-28 |
20140245420 | WEB TICKET BASED UPON A SYMMETRIC KEY USABLE FOR USER AUTHENTICATION - Described herein are various aspects pertaining to a web ticket that is used in connection with authenticating a user. The web ticket is generated through use of a symmetric key, and is less than two hundred bytes in size. A ticket issuer executing on a first computing device generates the web ticket responsive to receiving authentication data from a client computing device, and transmits the web ticket to such client computing device. The client computing device includes the web ticket in requests for data transmitted to a second server computing device that is in communication with the ticket issuer. The second server computing device includes a validator that validates the web ticket using the symmetric key, which is shared between the first server and the second server. | 2014-08-28 |
20140245421 | IP REFLECTION - IP reflection comprising double static NAT (network address translation) is disclosed. In some embodiments, a packet having a public IP address is received at a protecting network. The public IP address of the packet is translated to a corresponding protected IP address associated with a protected network, and the packet is forwarded to the protected network for servicing. The protected IP address of a response to the packet from the protected network is translated back to the public IP address at the protected network before sending. | 2014-08-28 |
20140245422 | SYSTEM AND METHOD FOR NETWORK VIRTUALIZATION AND SECURITY USING COMPUTER SYSTEMS AND SOFTWARE - Methods and systems are provided for network security. In one embodiment, the method involves receiving a data packet (e.g., from a firewall). The method also involves running an inspection of the received data packet within a virtual network, the virtual network duplicating at least a portion (e.g., servers(s) and/or application(s)) of a protected network. The method further involves sending the inspected data packet, or portion and/or modified version thereof, to the protected network, in response to the data packet passing the inspection within the virtual network. The method also involves blocking passage of the data packet to the protected network, in response to the data packet failing the inspection. | 2014-08-28 |
20140245423 | Peripheral Firewall System for Application Protection in Cloud Computing Environments - User input including an application profile is received. The profile specifies a first server group, a second server group, and computing flows between the first and second server groups. User input identifying at least the first server group to include in a cloud chamber is received. Internet Protocol (IP) addresses assigned to virtual machines provisioned into the first and second server groups are obtained. Based on the computing flows specified in the application profile and the IP addresses assigned to the virtual machines, a set of firewall rules are generated for each virtual machine in the cloud chamber. | 2014-08-28 |
20140245424 | DISTRIBUTED SYSTEM AND METHOD FOR TRACKING AND BLOCKING MALICIOUS INTERNET HOSTS - Disclosed are systems and methods to perform coordinated blocking of source addresses, such as an Internet Protocol (IP) addresses, across a plurality of network appliances (e.g., gateways). In one disclosed embodiment the method and system temporarily alter a configuration of one or more network appliances (based on user defined configuration parameters) to allow communication from a “blocked” IP address for a period of time. A network appliance can then “receive” an email and perform analysis and provide results of the analysis to a reputation service. Thereby, the temporarily allowed communication can be used to learn information about a threat which would not have been available if all communication from that IP address had actually been blocked at the network appliance. | 2014-08-28 |
20140245425 | CONFIGURABLE-QUALITY RANDOM DATA SERVICE - Methods and apparatus for a configurable-quality random data service are disclosed. A method includes implementing programmatic interfaces enabling a determination of respective characteristics of random data to be delivered to one or more clients of a random data service of a provider network. The method includes implementing security protocols for transmission of random data to the clients, including a protocol for transmission of random data to trusted clients at devices within the provider network. The method further includes obtaining, on behalf of a particular client and in accordance with the determined characteristics, random data from one or more servers of the provider network, and initiating a transmission of the random data directed to a destination associated with the particular client. | 2014-08-28 |
20140245426 | METHOD AND APPARATUS FOR PROVIDING SECURITY IN AN INTRANET NETWORK - A method and an apparatus for providing security in an intranet network are disclosed. For example, the method receives a packet at a customer edge router, and applies an inbound access control list by the customer edge router to the packet if the packet is destined to a server in a protected server group, wherein said protected server group identifies one or more servers within the intranet network to be protected. The method applies an outbound access control list by the customer edge router to the packet if the packet is from a server in the protected server group. | 2014-08-28 |
20140245427 | STORAGE SYSTEM IN WHICH FICTITIOUS INFORMATION IS PREVENTED - According to one embodiment, a storage system includes a host device and a secure storage. The host device and the secure storage produce a bus key which is shared only by the host device and the secure storage by authentication processing, and which is used for encoding processing. The host device produces a message authentication code including a message which can be stored in the secure storage based on the bus key, and sends the produced message authentication code to the secure storage. The secure storage stores the message included in the message authentication code in accordance with instructions of the host device. The host device verifies whether the message stored in the secure storage is intended contents. | 2014-08-28 |
20140245428 | COMPUTER AND CONTROL METHOD THEREOF - A computer and a control method thereof are disclosed. The computer comprises a processor, a chipset, a near field communication (NFC) module and a coprocessor. The chipset is coupled to the processor. The NFC module reads a current user identification (UID) from the NFC card when the NFC card is close to the NFC module. The coprocessor stores a default UID, and verifies whether the current UID is the same as the default UID. The coprocessor controls the chipset to execute a power-on sequence when the current UID is the same as the default UID. | 2014-08-28 |
20140245429 | VISUALLY REPRESENTING AND MANAGING ACCESS CONTROL OF RESOURCES - An approach is provided for controlling access to a resource. Visual representations of the resource and an entity are included in a display. A movement in the display of the entity representation to a position proximate to a boundary of the resource representation is detected. An attribute assigned to the entity representation is determined to not satisfy an access control requirement assigned to the resource representation. The entity is not permitted to access the resource based on the attribute not satisfying the access control requirement. Based on the entity not being permitted to access the resource, a visual cue is presented that indicates the entity representation is prevented from moving in the display across, and being placed within, the boundary of the resource representation. | 2014-08-28 |
20140245430 | REGULATING ACCESS TO AND PROTECTING PORTIONS OF APPLICATIONS OF VIRTUAL MACHINES - Embodiments of apparatus, computer-implemented methods, systems, and computer-readable media are described herein for a virtual machine manager, wherein the virtual machine manager is configured to selectively employ different views with different permissions to map guest physical memory of a virtual machine of the apparatus to host physical memory of the apparatus, to regulate access to and protect different portions of an application of the virtual machine that resides in different portions of the physical memory. Other embodiments may be described and/or claimed. | 2014-08-28 |
20140245431 | GUI-Based Authentication for a Computing System - Machines, systems and methods for providing an authentication challenge are provided. The method comprises analyzing data stored in a computing system equipped with a graphical user interface (GUI), wherein the data stored is related to identity and relationships among items that have a profile; and based on the analysis, issuing a challenge to authenticate access to one or more content or services available by way of the computing system, in response to a user interaction with the computing system, wherein the response to the challenge is known to a user who has personal knowledge of the identity and relationships among the items with a profile, and wherein the user successfully authenticates against the challenge by interacting with visual presentations of the items by placing the items in an order that indicates a correct relationship between at least two or more of the items. | 2014-08-28 |
20140245432 | ELECTRONIC DEVICE AND UNLOCKING METHOD THEREOF - An electronic device includes a touch screen. When the electronic device wakes up and works in a locked state, a notification interface including a predetermined unlocking area is displayed on the touch screen. A user pattern formed by at least two fingers of a user located within the predetermined unlocking area is detected. The electronic device is unlocked if the user pattern matches a predetermined unlocking pattern. | 2014-08-28 |
20140245433 | PASSWORD AUTHENTICATION - A method and apparatus for password authentication. The password authentication method, includes: generating a group of sequential candidate characters according to a user's operations to a keyboard, at least one key on the keyboard being associated with at least two characters, wherein the user's single operation of any one key results in characters associated with that key being selected as candidate characters with the same ranking; and authenticating whether a character string formed by the sequential candidate characters matches the password of the user. The password authentication apparatus for accomplishing the same. | 2014-08-28 |
20140245434 | INPUT DEVICE FOR INPUTTING PASSWORD OR THE LIKE AND MOBILE TELEPHONE HAVING THE INPUT DEVICE - A contact sensor capable of inputting a character by tracing a character with user's finger is arranged in a region of a ten-key unit of a mobile telephone. When registering a password to release a key lock, a user traces a shape of a line, a character, a number, or other symbol on the contact sensor with his/her finger so that the shape is inputted and stored in a memory, thereby completing registration of a password. When releasing the key lock, the user traces the registered shape on the contact sensor with his/her finger so that the key lock is released. The input is easy. Even if the password input operation is observed by a third person, the password will not be easily known to the third person. | 2014-08-28 |
20140245435 | OUT-OF-BAND IP TRACEBACK USING IP PACKETS - A method and system for tracing interne protocol packets is disclosed. One aspect of the method involves generating traceback packets containing information relating to their origin, destination, and encountered devices. The generated traceback packets can differ depending on the network configuration and Internet traffic scenarios. Another aspect involves analyzing incoming Internet traffic and generating traceback packets based on the performed analysis. Another aspect involves discovering a denial-of-service attack. Another aspect involves modifying operational parameters in response to the attack. One aspect of the system involves traceback servers, which can collect and provide traceback information to the public or on a private network. Another aspect involves the dissemination of traceback information to interested and/or authorized parties. | 2014-08-28 |
20140245436 | METHOD AND SYSTEM FOR DETECTING AND RESPONDING TO ATTACKING NETWORKS - A system and method for detecting a first network of compromised computers in a second network of computers, comprising: collecting Domain Name System (DNS) data for the second network; examining the collected data relative to DNS data from known comprised and/or uncompromised computers in the second network; and determining the existence of the first network and/or the identity of compromised computers in the second network based on the examination. | 2014-08-28 |
20140245437 | SANDBOXED EXECUTION OF PLUG-INS - A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP. Moreover, the architecture is highly scalable, stateless, and low administration architecture for the execution of the plug-ins, which can be scaled by adding/removing additional sandbox servers on-the-fly without prior configuration. | 2014-08-28 |
20140245438 | DOWNLOAD RESOURCE PROVIDING METHOD AND DEVICE - Disclosed are download resource providing method and device, wherein the method comprises: detecting security of an original resource to be downloaded by a user; if the original resource is detected to be insecure, querying a secure download resource matching the user's download requirement; and providing the user with link information of the secure download resource. The technical solution of the present invention ensures that the provided alternative resource is secure, meanwhile avoids consumption of the system resource and network bandwidth due to repeated searching and downloading operations of the user. | 2014-08-28 |
20140245439 | Systems and Methods for Detection and Suppression of Abnormal Conditions Within a Networked Environment - Systems and methods are provided for handling a malicious computer-related security event that occurs at central network access points of the Internet involving networks of autonomous and different internet service providers. A system includes a non-signature based security event detection software system operating on a first computer connected to a first network of a first internet service provider, where the non-signature based security event detection software system detects the security event by examining runtime state of the first computer. A security event management software system operates on a processor-based platform and has access to security event detection results generated by the non-signature based security event detection software system. | 2014-08-28 |
20140245440 | Software Inspection System - A method for software inspection analyzes a body of computer code to assess whether the body of computer code contains malware. Various embodiments extract the executable elements of the body of computer code and modify those elements using rules defining the format of instructions for the programming language in which the computer code was written, and using rules defined from the security specification of that programming language, to produce a model of the body of computer code. The method then analyzes the model using a model checking system, which determines whether any of the language rules have been violated, in which case the method flags the computer code as potentially including malware. | 2014-08-28 |
20140245441 | APPARATUS FOR ANALYZING VULNERABILITY OF WIRELESS LOCAL AREA NETWORK - Disclosed herein is an apparatus for analyzing the vulnerability of a wireless local area network (LAN). The apparatus includes a collection unit, an analysis unit, and an attack unit. The collection unit collects packets transmitted and received in a wireless LAN service. The analysis unit analyzes the state of a network using the collected packets. The attack unit makes a wireless attack against an attack target using the state of the network, and controls the mode switching of a device driver based on an operating mode. | 2014-08-28 |
20140245442 | DEVICE-SPECIFIC CONTENT DELIVERY - Devices of an individual's device-sphere recognize risky or undesirable behavior requested by devices outside of the device-sphere and allow the user to prevent the behavior. The user's decision is stored and used to protect all devices of the user's device-sphere from similar risky behavior from the outside devices. If the choice is made for all devices of the user's device-sphere, the choice is broadcast to other devices of the user's device-sphere such that other devices can benefit from the choice made by the user. | 2014-08-28 |
20140245443 | Cyber Defense Systems And Methods - Cyber defense systems and methods protect an enterprise system formed of a plurality of networked components. Connectivity and relationship information indicative of connectivity and behavior of the components are collected. A relationship graph is created based upon the connectivity data and the relationship data, wherein nodes of the relationship graph represent the components and edges of the graph represent connectivity and relationships. At least part of the relationship graph is stored to form a chronology. The relationship graph and the chronology are analyzed to predict connectivity and relationship changes within the enterprise system, and a first anomaly is identified when the current connectivity and relationships do not match the prediction | 2014-08-28 |
20140245444 | Memory Introspection Engine for Integrity Protection of Virtual Machines - Described systems and methods allow protecting a computer system from malware, such as viruses and rootkits. In some embodiments, a hypervisor configures a hardware virtualization platform hosting a set of operating systems (OS). A memory introspection engine executing at the processor privilege level of the hypervisor dynamically identifies each OS, and uses an protection priming module to change the way memory is allocated to a target software object by the memory allocation function native to the respective OS. In some embodiments, the change affects only target objects requiring malware protection, and comprises enforcing that memory pages containing data of the target object are reserved exclusively for the respective object. The memory introspection engine then write-protects the respective memory pages. | 2014-08-28 |
20140245445 | Preventing Propagation Of Hardware Viruses In A Computing System - Preventing propagation of hardware viruses in a computing system, including: determining, by a hardware virus detection module, whether an empty connector in the computing system is damaged, wherein the empty connector is blocked from receiving an attachable computing device by a bumper; determining, by the hardware virus detection module, whether a connector for the attachable computing device is damaged; and responsive to determining that the empty connector is not damaged and that the connector for the attachable computing device is not damaged, moving the bumper such that the empty connector is not blocked from receiving the attachable computing device. | 2014-08-28 |
20140245446 | PERFORMING SECURITY OPERATIONS USING BINARY TRANSLATION - In an embodiment, a processor includes a binary translation engine to receive a code segment, to generate a binary translation of the code segment, and to store the binary translation in a translation cache, where the binary translation includes at least one policy check routine to be executed during execution of the binary translation on behalf of a security agent. Other embodiments are described and claimed. | 2014-08-28 |
20140245447 | METHOD, DEVICE AND SYSTEM FOR TROJAN HORSE INTERCEPTION - A method, a device and a system for Trojan horse interception are provided. The method includes: intercepting input information from a user, and determining whether the input information is identical to saved information to be protected; and sending a warning prompt, when the input information is identical to the saved information to be protected and it is determined that an input target object of the input information is not a legitimate object. According to the above scheme, all the input information can be intercepted, and a warning is sent if the input information is identical to the saved information to be protected and the input target object of the input information is not legitimate; the above scheme is not limited to monitor a certain input target object, and thus has increased applicability. | 2014-08-28 |
20140245448 | APPARATUS AND METHOD FOR ANALYZING PERMISSION OF APPLICATION FOR MOBILE DEVICES AND DETECTING RISK - An apparatus for analyzing a permission of an application for a mobile device, the apparatus comprising: an executable file acquisition unit; a file extraction module; and an execution permission analyzing module configured to detect a security risk which can be caused by the permission on the basis of the permission described in the extracted file, wherein the information related to the permission of the application comprises: information on permission that is declared in the application, permission that the application uses and a function that uses the permission of the application. | 2014-08-28 |
20140245449 | SYSTEM, METHOD, AND SOFTWARE FOR CYBER THREAT ANALYSIS - According to certain embodiments, a cyber threat analysis system generates a network model of a network infrastructure that is used by an organization, assigns a weighting value to each of a plurality of network elements of the network infrastructure according to a relative importance of the each network element to the organization, and generates an attack vector according to a determined vulnerability of the network infrastructure. The attack vector represents one or more illicit actions that may be performed to compromise the network infrastructure. The system may simulate, using a network modeling tool, the attack vector on the network model to determine one or more resulting ramifications of one or more of the plurality of network elements due to the attack vector, and determine a criticality level of the attack vector according to the weighting value of the one or more network elements. | 2014-08-28 |
20140245450 | SYSTEM AND METHOD FOR PATCHING A DEVICE THROUGH EXPLOITATION - A system and method that includes identifying a vulnerability in a computing device; accessing a vulnerability exploitation mapped to the identified vulnerability; at the computing device, executing the vulnerability exploitation and entering an operating mode of escalated privileges; and while in the operating mode of escalated privileges, updating the system with a vulnerability resolution. | 2014-08-28 |
20140245451 | SYSTEM AND METHOD FOR MANAGING INDUSTRIAL PROCESSES - At least some aspects and embodiments disclosed herein provide for a highly configurable dashboard interface through which a PCL or other automatic control device provides information regarding industrial processes managed by the automatic control device or information regarding the automatic control device, itself. In at least one embodiment, the dashboard interface is the first interface displayed when a user logs into an automatic control device. | 2014-08-28 |
20140245452 | RESPONDING TO A POSSIBLE PRIVACY LEAK - When a user is about to perform a “communicative act” (e.g., to send an e-mail or to post to a social-networking site), the proposed communicative act is reviewed to see if it may lead to a privacy leak. If, upon review, it is determined that performing the proposed communicative act could lead to a privacy leak, then an appropriate response is taken, such as preventing the proposed act from being performed or suggesting a modification to the proposed act that would lessen the likelihood of a privacy leak. A privacy server creates a privacy profile for a user based on information about the user's personae and how those personae are used. Using that profile, the privacy server can judge whether a proposed communicative act would support an unwanted inference. | 2014-08-28 |
20140245453 | METHOD AND APPARATUS FOR TRANSMITTING A USER DATAGRAM PROTOCOL MESSAGE THAT IS LARGER THAN A DEFINED SIZE - A first device initiates a handshake message exchange with a second device according to a security protocol. The first device determines that an application datagram is to be transmitted according to a first transport protocol that limits a size of a datagram based on a defined size. The first device also determines that an application datagram size is larger than the defined size. The first device fragments the application datagram if the application datagram size is larger than the defined size and secures the application datagram with the security protocol. The first device also encapsulates the application datagram fragments in handshake messages, wherein an encapsulated application datagram fragment is transmitted from the first device to the second device in a first security protocol record. The first device may also transmit, to the second device, another application datagram secured with the security protocol. | 2014-08-28 |
20140245454 | METHOD AND APPARATUS FOR PROTECTING FLIGHT DATA - The present invention relates to a system and method for automatically protecting flight data in response to a variety of kinds of cyber terror that paralyze control service in a flight data system by enhancing the availability, reliability, and integrity of the flight data system when damage due to external or internal viruses or hacking, such as the alteration or modification of flight data, occurs. The flight data protection system has an advantage in that it can manage a system safely by providing an embedded system, using an Enhanced Write Filter (EWF), and protecting an Operating System (OS). | 2014-08-28 |
20140245455 | Privacy Preserving Interaction process for Collective Outcome - A process where everyone can interact by broadcasting encrypted conditional commitment segments, and at the end, everyone must undisputedly agree on quantifiable collective outcome, and no-one should know which way anyone else intentions was. | 2014-08-28 |
20140245456 | NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM AND INFORMATION PROCESSING APPARATUS INCLUDING SHARED LIBRARY THAT PREVENTS UNAUTHORIZED USE - A non-transitory computer-readable recording medium includes a shared library that is executed by a processor. The shared library includes a preprocessing function and a function. The function causes the processor to execute a process if a value, as an execution result of the preprocessing function, is valid, and not to execute the process if the value is invalid. The preprocessing function causes the processor to acquire encrypted unique information from the storage device, to decrypt the unique information, to acquire, from the storage device, specific information that specifies an application using the shared library, and to return the value that is valid or invalid based on a comparison between the specific information and the decrypted unique information. | 2014-08-28 |
20140245457 | METHOD AND DEVICE FOR INITIATING PRIVACY MODE OF DATA PROCESSING APPARATUS - This application discloses method and device for initiating privacy mode of data processing apparatus, the method includes: setting privacy space as privacy mode to protect corresponding privacy information on the data processing apparatus, setting authentication information corresponding to the privacy space and setting specified interface for inputting the authentication information; Monitoring input information on the data processing apparatus at the specified interface of the data processing apparatus, comparing degree of similarity between the input information and the authentication information corresponding to the privacy space after the input information is detected, and initiating the privacy space in a case where the degree of similarity between the input information and the authentication information corresponding to the privacy space is higher than a corresponding threshold. | 2014-08-28 |
20140245458 | Document Server and Client Device Document Viewer and Editor - A method of storing a document on a server, including: extracting document content from a document stored on the server, using a processor on the server; dividing the document content into a plurality of document content sections; generating a parallel data structure for the plurality of document content sections based on a viewing size, where the parallel data structure includes a plurality of selectors, and the plurality of selectors includes pagination selectors; and storing the plurality of document content sections in a plurality of locations on the server. The method may further include storing the parallel data structure in a location on the server separate the plurality of document content sections; generating a table of contents based on the pagination; and rendering the plurality of document content sections into a plurality of document pages based on the plurality of selectors in the parallel data structure. | 2014-08-28 |
20140245459 | SYSTEMS, METHODS AND APPARATUSES FOR BROKERING DATA BETWEEN WIRELESS DEVICES, SERVERS AND DATA RENDERING DEVICES - Provide dare methods, systems and apparatuses for data brokering between hand held wireless devices (WDs) and data rendering devices (DRDs). DRDs in the form of multimedia devices used for rendering data by printing (e.g. to a networked printer) or displaying video data (e.g., televisions, video monitors, and projectors) are provided with data for rendering at the DRD at the request of WDs. DRDs are capable of receiving data data from a network at the request of a WD and/or directly from a WD as the host and then rendering or displaying the data on devices capable of receiving and processing the data. DRD (e.g. printers and multimedia video devices) can also be controlled by the WD during display of the data and to control display of the data. | 2014-08-28 |
20140245460 | MODIFY EXECUTION OF APPLICATION UNDER TEST SO USER IS POWER USER - Example embodiments disclosed herein relate to modifying execution of an application under test to act as if a user is a power user. The application under test is hosted in a real-time modifier. A security crawl is performed on the application under test logged in as the user. The user is treated as a power user. | 2014-08-28 |
20140245461 | TECHNIQUES FOR IN-APP USER DATA AUTHORIZATION - Techniques for in-app user data authorization are described. An apparatus may comprise a processor circuit, a permissions component, and a token component. The permissions component may be operative on the processor circuit to receive a request from an application to perform a task on a device and to return a response to the request to the application based on active permissions for the application. The token component may be operative on the processor circuit to manage a token database and to determine the active permissions for the application based on the token database. Other embodiments are described and claimed. | 2014-08-28 |
20140245462 | PERSONAL SITE PRIVACY POLICY - A request, from a requester, is received to view user information on a user's personal site associated with a user. A relationship is determined between the requester and the user. User information is provided to the requester based on the requester's relationship to the user. | 2014-08-28 |
20140245463 | SYSTEM AND METHOD FOR ACCESSING MULTIMEDIA CONTENT - A systems and method for accessing multimedia content are provided. The method for accessing multimedia content includes receiving a user query for accessing multimedia content of a multimedia class, the multimedia content being associated with a plurality of multimedia classes and each of the plurality of multimedia classes being linked with one or more portions of the multimedia content, executing the user query on a media index of the multimedia content, identifying portions of the multimedia content tagged with the multimedia class based on the execution of the user query, retrieving a tagged portion of the multimedia content tagged with the multimedia class based on the execution of the user query, and transmitting the tagged portion of the multimedia content to the user through a mixed reality multimedia interface. | 2014-08-28 |
20140245464 | Method of Protecting Power Receiver and Related Wireless Charging Device - A method for a power receiver for protecting a power receiver from being taken without permission while charged wirelessly includes receiving wireless power from a power transmitter and performing wireless charging in a security mode by the power receiver; detecting whether the wireless charging is interrupted without receiving a security code for authorization; and starting a protection function if the power receiver detects that the wireless charging is interrupted without receiving the security code for authorization. | 2014-08-28 |
20140245465 | TRANSGENIC BIRD EXPRESSING FOREIGN GENE USING ENDOPLASMIC RETICULUM CHAPERONE PROMOTER - An aim is to produce a suitable foreign protein in egg white in transgenic birds at levels equivalent to or higher than the expression levels achieved using an ovalbumin promoter or an actin promoter, and to reduce the great burden on birds by reducing the expression at sites other than the oviduct while achieving expression sufficient to predict the expression levels before the birds reach sexual maturity. Provided is a transgenic bird containing a nucleic acid base sequence in chromosome in a cell that forms the oviduct, the sequence containing: (a) an avian endoplasmic reticulum chaperone promoter; and (b) a nucleic acid base sequence encoding a suitable foreign protein, functionally linked to the promoter. Also provided is a method for producing a suitable foreign protein, including recovering the suitable foreign protein from the transgenic bird. Further provided is a method for producing a transgenic bird, including introducing a nucleic acid base sequence into a chromosome in a cell that forms the oviduct, the sequence containing: (a) an avian endoplasmic reticulum chaperone promoter; and (b) a nucleic acid base sequence encoding a suitable foreign protein, functionally linked to the promoter. | 2014-08-28 |
20140245466 | HUMANIZED T CELL CO-RECEPTOR MICE - The invention provides genetically modified non-human animals that express chimeric human/non-human T cell co-receptor polypeptides (e.g., CD4, CD8α, CD8β), as well as embryos, cells, and tissues comprising the same. Also provided are constructs for making said genetically modified animals and methods of making the same. | 2014-08-28 |
20140245467 | GENETICALLY MODIFIED MAJOR HISTOCOMPATIBILITY COMPLEX MICE - The invention provides genetically modified non-human animals that express chimeric human/non-human MHC I and MHC II polypeptides and/or human or humanized β2 microglobulin polypeptide, as well as embryos, cells, and tissues comprising the same. Also provided are constructs for making said genetically modified animals and methods of making the same. Methods of using the genetically modified animals to study various aspects of human immune system are provided. | 2014-08-28 |
20140245468 | NON-HUMAN ANIMALS WITH MODIFIED IMMUNOGLOBULIN HEAVY CHAIN SEQUENCES - Non-human animals, e.g., mammals, e.g., mice or rats, are provided comprising an immunoglobulin heavy chain locus that comprises a rearranged human immunoglobulin heavy chain variable region nucleotide sequence. The rearranged human immunoglobulin heavy chain variable region nucleotide sequence may be operably linked to a heavy or light chain constant region nucleic acid sequence. Also described are genetically modified non-human animals comprising an immunoglobulin light chain locus comprising one or more but less than the wild type number of human immunoglobulin light chain variable region gene segments, which may be operably linked to a light chain constant region nucleic acid sequence. Also provided are methods for obtaining nucleic acid sequences that encode immunoglobulin light chain variable domains capable of binding an antigen in the absence of a heavy chain. | 2014-08-28 |
20140245469 | GUZMANIA HYBRID NAMED 'ACE' - A new and distinct | 2014-08-28 |
20140245470 | HYBRID TOMATO 'CADDO' - The present disclosure relates to a new and distinctive hybrid tomato designated ‘Caddo’, to the plants of hybrid tomato ‘Caddo’, to the plant parts of hybrid tomato ‘Caddo’ including the fruit, and to methods for producing a hybrid tomato using ‘Caddo’ as a parent. The disclosure further relates to methods for producing a tomato plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to the methods for producing other tomato lines derived from hybrid tomato ‘Caddo’. | 2014-08-28 |
20140245471 | CARROT PLANTS WITH A HIGH ANTHOCYANIN LEVEL - The present invention relates to a carrot plant, or part thereof the roots of which comprise an average total anthocyanin level of at least 2000 μg/g FW and optionally a medium level of haloing and zoning and to plants of a carrot variety NUN 89682 CAC and seeds and progeny thereof. The invention further relates to methods for producing a carrot plant by traditional breeding methods. The invention further relates to a method for producing a carrot plant containing in its genetic material one or more transgenes. | 2014-08-28 |
20140245472 | HYBRID CARROT VARIETY NUN 85222 - The present invention relates to plants of a carrot variety NUN 85222 and seeds and progeny thereof. The invention further relates to methods for producing a carrot plant by traditional breeding methods. The invention further relates to a method for producing a carrot plant containing in its genetic material one or more transgenes. | 2014-08-28 |
20140245473 | HYBRID CARROT VARIETY NUN 85931 - The present invention relates to plants of a carrot variety NUN 85931 and seeds and progeny thereof. The invention further relates to methods for producing a carrot plant by traditional breeding methods. The invention further relates to a method for producing a carrot plant containing in its genetic material one or more transgenes. | 2014-08-28 |
20140245474 | NUCLEOTIDE SEQUENCES AND POLYPEPTIDES ENCODED THEREBY USEFUL FOR MODIFYING PLANT CHARACTERISTICS IN RESPONSE TO COLD - Methods and materials for modulating cold tolerance levels in plants are disclosed. For example, nucleic acids encoding cold tolerance-modulating polypeptides are disclosed as well as methods for using such nucleic acids to transform plant cells. Also disclosed are plants having increased cold tolerance levels and plant products produced from plants having increased cold tolerance levels. | 2014-08-28 |
20140245475 | COTTON VARIETY ST 4946GLB2 - The cotton variety ST 4946GLB2 is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and cotton lint as well as to hybrid cotton plants and seeds obtained by repeatedly crossing plants of variety ST 4946GLB2 with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of ST 4946GLB2 and to plants of ST 4946GLB2 reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from ST 4946GLB2. | 2014-08-28 |
20140245476 | COTTON VARIETY ST 6448GLB2 - The cotton variety ST 6448GLB2 is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and cotton lint as well as to hybrid cotton plants and seeds obtained by repeatedly crossing plants of variety ST 6448GLB2 with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of ST 6448GLB2 and to plants of ST 6448GLB2 reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from ST 6448GLB2. | 2014-08-28 |
20140245477 | VARIETY CORN LINE KLI6131 - The present invention provides an inbred corn line designated KLI6131, methods for producing a corn plant by crossing plants of the inbred line KLI6131 with plants of another corn plant. The invention further encompasses all parts of inbred corn line KLI6131, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line KLI6131, and plants produced according to these methods. | 2014-08-28 |
20140245478 | VARIETY CORN LINE KDL6289 - The present invention provides an inbred corn line designated KDL6289, methods for producing a corn plant by crossing plants of the inbred line KDL6289 with plants of another corn plant. The invention further encompasses all parts of inbred corn line KDL6289, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line KDL6289, and plants produced according to these methods. | 2014-08-28 |
20140245479 | VARIETY CORN LINE MFX7805 - The present invention provides an inbred corn line designated MFX7805, methods for producing a corn plant by crossing plants of the inbred line MFX7805 with plants of another corn plant. The invention further encompasses all parts of inbred corn line MFX7805, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line MFX7805, and plants produced according to these methods. | 2014-08-28 |
20140245480 | VARIETY CORN LINE CJ6328 - The present invention provides an inbred corn line designated CJ6328, methods for producing a corn plant by crossing plants of the inbred line CJ6328 with plants of another corn plant. The invention further encompasses all parts of inbred corn line CJ6328, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line CJ6328, and plants produced according to these methods. | 2014-08-28 |
20140245481 | VARIETY CORN LINE ID3633 - The present invention provides an inbred corn line designated ID3633, methods for producing a corn plant by crossing plants of the inbred line ID3633 with plants of another corn plant. The invention further encompasses all parts of inbred corn line ID3633, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line ID3633, and plants produced according to these methods. | 2014-08-28 |
20140245482 | VARIETY CORN LINE LLD7345 - The present invention provides an inbred corn line designated LLD7345, methods for producing a corn plant by crossing plants of the inbred line LLD7345 with plants of another corn plant. The invention further encompasses all parts of inbred corn line LLD7345, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line LLD7345, and plants produced according to these methods. | 2014-08-28 |
20140245483 | VARIETY CORN LINE AF3242 - The present invention provides an inbred corn line designated AF3242, methods for producing a corn plant by crossing plants of the inbred line AF3242 with plants of another corn plant. The invention further encompasses all parts of inbred corn line AF3242, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line AF3242, and plants produced according to these methods. | 2014-08-28 |
20140245484 | VARIETY CORN LINE KFX5857 - The present invention provides an inbred corn line designated KFX5857, methods for producing a corn plant by crossing plants of the inbred line KFX5857 with plants of another corn plant. The invention further encompasses all parts of inbred corn line KFX5857, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line KFX5857, and plants produced according to these methods. | 2014-08-28 |
20140245485 | VARIETY CORN LINE ID6708 - The present invention provides an inbred corn line designated ID6708, methods for producing a corn plant by crossing plants of the inbred line ID6708 with plants of another corn plant. The invention further encompasses all parts of inbred corn line ID6708, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line ID6708, and plants produced according to these methods. | 2014-08-28 |
20140245486 | VARIETY CORN LINE FX6156 - The present invention provides an inbred corn line designated FX6156, methods for producing a corn plant by crossing plants of the inbred line FX6156 with plants of another corn plant. The invention further encompasses all parts of inbred corn line FX6156, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line FX6156, and plants produced according to these methods. | 2014-08-28 |
20140245487 | VARIETY CORN LINE AX3611 - The present invention provides an inbred corn line designated AX3611, methods for producing a corn plant by crossing plants of the inbred line AX3611 with plants of another corn plant. The invention further encompasses all parts of inbred corn line AX3611, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line AX3611, and plants produced according to these methods. | 2014-08-28 |
20140245488 | VARIETY CORN LINE IID3422 - The present invention provides an inbred corn line designated IID3422, methods for producing a corn plant by crossing plants of the inbred line IID3422 with plants of another corn plant. The invention further encompasses all parts of inbred corn line IID3422, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line IID3422, and plants produced according to these methods. | 2014-08-28 |
20140245489 | VARIETY CORN LINE HAF4561 - The present invention provides an inbred corn line designated HAF4561, methods for producing a corn plant by crossing plants of the inbred line HAF4561 with plants of another corn plant. The invention further encompasses all parts of inbred corn line HAF4561, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line HAF4561, and plants produced according to these methods. | 2014-08-28 |
20140245490 | FERTILIZATION AND FRUIT SIZE - Plants having modulated expression of a HAF or BEE polypeptide and which modulate aspects of plant fertility, such as parthenocarpy, fertilization efficiency, and/or fruit size, are described. Methods of modulating fertility characteristics in a plant by modulating the expression of a HAF or BEE polypeptide in the plant are also described. | 2014-08-28 |
20140245491 | AXMI218, AXMI219, AXMI220, AXMI226, AXMI227, AXMI228, AXMI229, AXMI230 AND AXMI231 DELTA-ENDOTOXIN GENES AND METHODS FOR THEIR USE - Compositions and methods for conferring pesticidal activity to bacteria, plants, plant cells, tissues and seeds are provided. Compositions comprising a coding sequence for a toxin polypeptide are provided. The coding sequences can be used in DNA constructs or expression cassettes for transformation and expression in plants and bacteria. Compositions also comprise transformed bacteria, plants, plant cells, tissues, and seeds. In particular, isolated toxin nucleic acid molecules are provided. Additionally, amino acid sequences corresponding to the polynucleotides are encompassed, and antibodies specifically binding to those amino acid sequences. In particular, the present invention provides for isolated nucleic acid molecules comprising nucleotide sequences encoding the amino acid sequence shown in SEQ ID NO:13-30, or the nucleotide sequence set forth in SEQ ID NO:1-12, as well as variants and fragments thereof. | 2014-08-28 |
20140245492 | GENE ASSOCIATED WITH NON-BIOLOGICAL STRESS RESISTANCE, AND TRANSFORMED PLANT - The present invention relates to a composition for enhancing non-biological stress resistance in plants and a composition for accelerating germination. A nucleotide sequence of the present invention is involved in the resistance against the drying stresses in plants, and a transformed plant in which the nucleotide sequence is overexpressed has prominent resistance against various kinds of non-biological stress, including drought stress. In addition, the nucleotide sequence of the present invention is involved in ABA hormone sensitivity in plants, and germination is greatly improved in a plant in which the nucleotide sequence expression is suppressed. Therefore, the composition of the present invention can be useful as new functional crops regardless of the climate of the cultivation area, or as seeds for long-term storage with an increased storage period. | 2014-08-28 |
20140245493 | USE OF PLANT-DERIVED DHAR OR MDHAR GENE AS A MODULATOR FOR CROP YIELD AND ENVIRONMENTAL STRESS - The present invention relates to a method for increasing crop yield or enhancing resistance of a plant to environmental stress by using dhar (dehydroascorbate reductase) gene derived from rice ( | 2014-08-28 |
20140245494 | CANNABIS PLANT NAMED EREZ - The disclosure relates to a new and distinct cultivar of | 2014-08-28 |
20140245495 | CANNABIS PLANT NAMED MIDNIGHT - The disclosure relates to a new and distinct | 2014-08-28 |
20140245496 | COMPOSITIONS AND METHODS FOR THE BIOSYNTHESIS OF VANILLAN OR VANILLIN BETA-D-GLUCOSIDE - Recombinant microorganisms, plants, and plant cells are disclosed that have been engineered to express a mutant AROM polypeptide and/or mutant catechol-O-methyltransferase polypeptide alone or in combination with one or more vanillin biosynthetic enzymes or UDP-glycosyltransferases (UGTs). Such microorganisms, plants, or plant cells can produce vanillin or vanillin beta-D-glucoside. | 2014-08-28 |
20140245497 | DROUGHT TOLERANT PLANTS AND RELATED CONSTRUCTS AND METHODS INVOLVING GENES ENCODING FERREDOXIN FAMILY PROTEINS - Isolated polynucleotides and polypeptides and recombinant DNA constructs useful for conferring drought tolerance, compositions (such as plants or seeds) comprising these recombinant DNA constructs, and methods utilizing these recombinant DNA constructs. The recombinant DNA construct comprises a polynucleotide operably linked to a promoter that is functional in a plant, wherein said polynucleotide encodes a ferredoxin family protein. | 2014-08-28 |
20140245498 | POLYPEPTIDES HAVING CELLULOLYTIC ENHANCING ACTIVITY AND POLYNUCLEOTIDES ENCODING SAME - The present invention relates to isolated polypeptides having cellulolytic enhancing activity and polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides. | 2014-08-28 |
20140245499 | SORGHUM PLANTS HAVING A MUTANT POLYNUCLEOTIDE ENCODING THE LARGE SUBUNIT OF MUTATED ACETOHYDROXYACID SYNTHASE PROTEIN AND INCREASED RESISTANCE TO HERBICIDES - A sorghum seed comprising in its genome at least one polynucleotide encoding a polypeptide having an alanine to threonine substitution at position 93 of the | 2014-08-28 |
20140245500 | Cherry tree named 'Royal Belle' - A new and distinct variety of cherry tree. The following features of the tree and its fruit are characterized with the tree budded on ‘Mahaleb’ Rootstock (non-patented), grown on Handford sandy loam soil with Storie Index rating 95, in USDA Hardiness Zone 9, near Modesto, Calif., with standard commercial fruit growing practices, such as pruning, thinning, spraying, irrigation and fertilization. Its novelty consist of the following combination of desirable features:
| 2014-08-28 |
20140245501 | Avocado tree named 'Flavia' - The ‘Flavia’ avocado is notable for its larger fruit size and earlier fruit maturity for harvesting than ‘Hass’. | 2014-08-28 |
20140245502 | Citrus reticulata plant named 'WG 02' - A new and distinct | 2014-08-28 |
20140245503 | Raspberry plant - Vajolet Plus cultivar - The raspberry cultivar Vajolet Plus was obtained by crossing of two unknown hybrid raspberry at the Val di Cembra, Faver, in Trentino Region of Italy. The new cultivar is a primocane variety producing two crops per year, wherein the fruits ripen on current season's cane in late to very late and on previous season's cane early to medium. The resulting fruits are broad conical and medium red in coloration. | 2014-08-28 |
20140245504 | Lagerstroemia Plant Named 'Piilag B5' - A new and distinct cultivar of | 2014-08-28 |
20140245505 | Lagerstroemia Plant Named 'Piilag B2' - A new and distinct cultivar of | 2014-08-28 |
20140245506 | Lagerstroemia Plant Named 'PIILAG B1' - A new and distinct cultivar of | 2014-08-28 |
20140245507 | Lagerstroemia plant named 'PIILAG B4' - A new and distinct cultivar of | 2014-08-28 |