06th week of 2012 patent applcation highlights part 58 |
Patent application number | Title | Published |
20120036558 | SECURE ACCESS MANAGEMENT AGAINST VOLATILE IDENTITY STORES - Embodiments of the present invention are directed to managing access to protected computer resources. More particularly, embodiments of the present invention provide systems and methods for modifying a user's ability to access a protected computer resource while the user is currently using the resource. If the privileges granted to a user for accessing the protected resource are altered, these alterations take effect in substantially real time. In an exemplary embodiment, a user data repository will initiate the process of altering the user's access privileges upon changes of data in the repository. In this way, it does not matter how or by whom the data in the repository is changed, but the change itself is sufficient to initiate a re-computation of a user's access privileges to the protected resource. | 2012-02-09 |
20120036559 | SYSTEM, METHOD AND APPARATUS FOR SECURITY MANAGEMENT OF AN ELECTRONIC DEVICE - A system, method and apparatus for security management of an electronic device or subscriber are provided. In one aspect, the system includes a profile server and an inspection point server that are both connectable to a mobile electronic device. The mobile electronic device is configured to send contextual data such as location data or information pertaining to the identity of the subscriber from the device and into a network attached to the mobile electronic device. The profile server is configured to authorize (or deny authorization) the release of contextual data such as location data or information pertaining to the identity of the subscriber. The inspection point server is configured to intercept the contextual data such as location data or information pertaining to the identity of the subscriber being sent from the device and query the profile server to determine if the request was authorized. | 2012-02-09 |
20120036560 | TOPOLOGY BASED FAST SECURED ACCESS - The present invention relates to methods, apparatuses, and computer program products for providing secure access for a user or terminal to a network, wherein an intermediate authentication node is authorized to listen to and store authentication related information. When an authentication request is received, the stored authentication related information is checked and the user or terminal is authenticated if a match between authentication related information of the authentication request and the stored authentication related information is determined, and an authentication server responsible for the authentication request is notified about the authentication result. | 2012-02-09 |
20120036561 | METHODS AND SYSTEMS FOR SECURELY MANAGING VIRTUALIZATION PLATFORM - Virtualization platforms and management clients therefor are communicatively coupled to one another via a control layer logically disposed therebetween. The control layer is configured to proxy virtualization management commands from the management clients to the virtualization platforms, but only after successful authentication of users (which may include automated agents and processes) issuing those commands and privileges of those users as defined by access control information accessible to the control layer. The control layer may be instantiated as an application running on a physical appliance logically interposed between the virtualization platforms and management clients, or a software package running on dedicated hardware logically interposed between the virtualization platforms and management clients, or as an application encapsulated in a virtual machine running on a compatible virtualization platform logically interposed between the virtualization platforms and management clients. | 2012-02-09 |
20120036562 | Trusted License Removal in a Content Protection System or the Like - A digital license includes an identification of a removal service that can authorize removing such license. A client selects the license to be removed and the service, constructs a challenge including therein a challenge license identification block (LIB) identifying the license to be removed, and sends the challenge to the service. The service receives the challenge, stores at least a portion of the challenge in a database, constructs a response corresponding to the challenge and including therein a response LIB identifying the license to be removed and an identification of the service, and sends the response to the client. The client receives the response, employs the response LIB from the response to identify the license to be removed, and removes the identified license upon confirming that the identification of the service in the identified license matches the identification of the service in the response. | 2012-02-09 |
20120036563 | SYSTEMS, DEVICES, METHODS AND COMPUTER PROGRAM PRODUCTS FOR ESTABLISHING NETWORK CONNECTIONS BETWEEN SERVICE PROVIDERS AND APPLICATIONS THAT RUN NATIVELY ON DEVICES - A login session server is configured to establish a communications session between an application that runs natively on a device and a service that is secured by a web services gateway by supporting a temporary login session socket between the device and the login session server and by passing a login session token to the device over the temporary login session socket. The temporary login session socket can be used to verify that the application that runs natively on the device is authorized to use the services of the service provider. Related systems, devices, methods and computer program products are disclosed. | 2012-02-09 |
20120036564 | PEER ENROLLMENT METHOD, ROUTE UPDATING METHOD, COMMUNICATION SYSTEM, AND RELEVANT DEVICES - Embodiments of the present invention disclose a peer enrollment method, a route updating method, a communication system, and relevant devices to improve security of a peer-to-peer (P2P) network. The peer enrollment method includes: receiving an enrollment request from a peer, where the enrollment request carries identity information of the peer; verifying the identity information of the peer, and if the verification succeeds, obtaining peer location information of the peer and generating a peer credential according to the peer location information; and sending the peer credential carrying the peer location information to the peer so that the peer joins the P2P network according to the peer credential. Embodiments of the present invention further provide a route updating method, a communication system, and relevant devices. Embodiments of the present invention may improve security of the P2P network effectively. | 2012-02-09 |
20120036565 | PERSONAL DATA PROTECTION SUITE - An online protection suite that provides subscribers to organizations a highly integrated desktop application with a dashboard set of services combining single-click access to user accounts and a bulletin-board of constantly refreshed posters offering a variety of related products and services. | 2012-02-09 |
20120036566 | AUTOMATIC CONFIGURATION AND CONTINUATION OF FEDERATION RELATIONSHIPS - Embodiments are directed to establishing the integrity of a portion of data on at least one level of a plurality of network stack levels and automatically continuing an established federation relationship between at least two federation computer systems. In an embodiment, a first federation computer system receives a digital signature corresponding to a computer system signed by a digital signature which includes the computer system's identity and other federation relationship information configured to establish a trusted federation relationship between a first federation computer system and a second federation computer system. The first federation computer system attempts to validate the received digital signature at a first level of a network stack and determines that the validation at the first network stack layer was unsuccessful. The first federation computer system then validates the received digital signature at a second, different level of the network stack. | 2012-02-09 |
20120036567 | METHODS FOR ESTABLISHING A SECURITY SESSION IN A COMMUNICATIONS SYSTEM - A security gateway and an initiating device perform methods for establishing a security session. The methods includes the security gateway: receiving a first message from an initiating device, the first message including a first message authentication code; validating the first message using the message authentication code; and responsive to the validating, sending a second message to the initiating device, the second message including a timestamp and further including a second message authentication code for authenticating of the timestamp by the initiating device, wherein the first and second messages are used to establish the security session, and the authenticated timestamp is used for subsequent replay protection of messages between the security gateway and the initiating device. The method further includes the security gateway validating a dynamically assigned IP address for the initiating device to use in authorizing VPN traffic between the two devices. | 2012-02-09 |
20120036568 | PROVISIONING DEVICE - There is provided a provisioning device which provides, in advance, setting information necessary for joining in a wireless network to a first field device which is to newly join the wireless network to exchange data with an existing field device that is installed in a plant. The provisioning device includes: a storage unit that stores a white list which contains unique information of the first field device and the setting information such that the unique information and the setting information are correlated with each other; a device information acquiring unit that acquires the unique information from the first field device by wireless communication; an extracting unit that extracts, from the white list, the setting information that is correlated with the acquired unique information; and a setting unit that sends the extracted setting information to the first field device by wireless communication. | 2012-02-09 |
20120036569 | SECURING PORTABLE EXECUTABLE MODULES - An import address table (IAT) and dynamic linked libraries (DLLs) security mender process is configured to store nominal IAT table entries and in-process binary images, from either a priori data and/or from computed values. Particular IAT table entries and in-process binary images are fetched for comparison with expected values. These particular IAT table entries and/or in-process binary images are then overwritten with nominal values for the IAT table entries and in-process binary images. The IAT-DLL security mender runs in parallel with the operating system and has access to its IAT and inline code in system memory. | 2012-02-09 |
20120036570 | IMAGE FORMING APPARATUS, METHOD FOR CONTROLLING THE SAME, AND STORAGE MEDIUM - An image forming apparatus to communicate with a service provision system via a firewall may include an identification unit, a determination unit, and a communication unit. The identification unit identifies, out of services provided by the service provision system, a service which provides a substitute function corresponding to a function of the image forming apparatus limited by a failure. The determination unit determines, out of a plurality of communication methods to be used for communication with the service provision system via the firewall, a communication method to be used to perform data communication with the service identified by the identification unit. The communication unit performs data communication with the service identified by the identification unit by using the communication method determined by the determination unit. | 2012-02-09 |
20120036571 | SMART CARD, ANTI-VIRUS SYSTEM AND SCANNING METHOD USING THE SAME - A smart card installed in a device receives from the device data to be scanned and determines whether a virus exists in the data. Accordingly, security of the device may be enhanced without using substantial resources of the device. | 2012-02-09 |
20120036572 | SYSTEM-ON-A-CHIP MALICIOUS CODE DETECTION APPARATUS FOR A MOBILE DEVICE - System-on-chip (SoC)-based apparatus for detecting malicious code in portable terminal is provided. SoC-based apparatus includes SoC including central processing unit (CPU) configured to generally control respective units of SoC for SoC-based malicious code detection, SoC memory-based firewall configured to classify packets input from outside through network interface unit, perform filtering operation, such as allowing operation and dropping operation, on the classified packets according to a predetermined setting, and output the result of the filtering operation to an application memory or an anti-malware engine, the SoC memory-based anti-malware engine configured to detect malicious code by performing a pattern-matching operation between a code pattern in a file input from the firewall and a pattern of malicious code registered in a malware signature database (DB) of a mobile device application unit, and an SoC memory-based control module configured to control operation of the firewall and the anti-malware engine in connection with the CPU. | 2012-02-09 |
20120036573 | Drag-and-Tag Authentication - A drag-and-tag authentication apparatus includes an electronic device, a setting mechanism and an authentication mechanism. The electronic device includes a processor, a display electrically connected to the processor, an operation unit electrically connected to the processor, and a power supply electrically connected to the processor. The setting mechanism is electrically connected to the processor and includes first and second selection units operable for selecting literal and graphic items. The authentication mechanism is electrically connected to the processor and includes literal items and graphic items. Some of the literal items can be located and define a polygonal region. Some of the graphic items can be located and covered by the polygonal region for authentication. | 2012-02-09 |
20120036574 | REMOTE ACCESS ARCHITECTURE ENABLING A CLIENT TO PERFORM AN OPERATION - Enabling a client computer to perform an operation is disclosed. Login information is received from a client computer. The login information is confirmed by querying a trusted agent on the client computer. | 2012-02-09 |
20120036575 | METHOD AND APPARATUS FOR MAKING A DECISION ON A CARD - Method and devices for making access decisions in a secure access network are provided. The access decisions are made by a portable credential using data and algorithms stored on the credential. Since access decisions are made by the portable credential non-networked hosts or local hosts can be employed that do not necessarily need to be connected to a central access controller or database thereby reducing the cost of building and maintaining the secure access network. | 2012-02-09 |
20120036576 | APPARATUS AND METHOD FOR DEFENDING AGAINST INTERNET-BASED ATTACKS - A system for defending against internet-based attacks is disclosed. The system may include an electronic data processor which may be configured to receive information associated with a device when a web request is transmitted by the device to access a web page monitored by the electronic data processor. The processor may also determine whether traffic associated with the web request from the device is suspected of being used for malicious activity and, if not, enable the device to access the web page. If the traffic is suspected of being used for malicious activity, then the processor may transmit a challenge to the device if the traffic is determined to be suspected. Furthermore, the processor may receive information associated with the web request, which may be provided by a uniform resource locator invoked in response to the traffic being determined to be suspected. The processor may also deny the device access to the web page based on a variety of factors. | 2012-02-09 |
20120036577 | METHOD AND SYSTEM FOR ALERT CLASSIFICATION IN A COMPUTER NETWORK - A method and a system for classification of intrusion alerts in computer network is provided. The method comprises the steps of monitoring traffic data in a computer network, detecting an intrusion, providing an intrusion alert and data in relation to the intrusion alert, generating a statistical analysis of the data in relation to the intrusion alert and classifying the intrusion alert based on said statistical analysis. The intrusion alerts and the data in relation to an intrusion alert may be generated by anomaly-based intrusion detection system. The generating a statistical analysis may comprise generating information about a statistical distribution of n-grams in the data. The classification may comprise comparing the statistical analysis with a model analysis of intrusion alerts with predefined alert classes. This model may be generated by providing a training set of data in relation to alerts, generating a model statistical analysis of said data, predefining at least two alert classes, and assigning predefined alert classes to the statistical analysis, based on information provided by a signature-based intrusion detection system, or by a human operator. | 2012-02-09 |
20120036578 | TRACING TRAITOR COALITIONS AND PREVENTING PIRACY OF DIGITAL CONTENT IN A BROADCAST ENCRYPTION SYSTEM - Embodiments of the invention relate to finding coalitions of receivers who collude to produce pirated protected content, then evaluates the confidence that particular members of each identified coalition are traitors versus innocent receivers incriminated by chance. Typically, each file in a group of original files is modified to include variations of critical file segments. The group of files is then broadcast with individualized codes that enable particular authorized receivers to properly process the modified files. The modifications in a pirated version of a file can identify which traitorous receivers contributed to its piracy. Candidate coalitions of differing size are first evaluated to determine if they cover observed file variations with greater than a predetermined likelihood that an innocent coalition is falsely incriminated by chance. Individual members of satisfactory coalitions are then evaluated. Traitors may be cryptographically revoked. | 2012-02-09 |
20120036579 | SYSTEM AND METHOD FOR DETECTING ABNORMAL SIP TRAFFIC ON VOIP NETWORK - Provided is a system for detecting abnormal traffic on a network. The system includes: a receiving module which receives session initiation protocol (SIP) traffic information from a network; a decoding module which receives the SIP traffic information from the receiving module and decodes the received SIP traffic information; a traffic information database (DB) which receives the decoded SIP traffic information from the decoding module and stores the received SIP traffic information; an analysis traffic information DB which collects information from the traffic information DB for a predetermined period and stores the collected information as analysis traffic information; a reference traffic information DB which stores reference traffic information; and an attack detection module which compares the analysis traffic information with the reference traffic information and detects whether analysis traffic is attack traffic. | 2012-02-09 |
20120036580 | SELECTIVE WEBSITE VULNERABILITY AND INFECTION TESTING - In embodiments of the present invention improved capabilities are described for selective website vulnerability and infection testing and intelligently paced rigorous direct website testing. By providing robust website content integrity checking while only lightly loading the website hosting server, visitor bandwidth availability is maintained through selective testing and intelligently paced external website exercising. A modular pod-based computing architecture of interconnected severs configured with a sharded database facilitates selective website testing and intelligent direct website test pacing while providing scalability to support large numbers of website testing subscribers. | 2012-02-09 |
20120036581 | SECURITY APPARATUS - A security apparatus positioned between at least one domain having a level of trust or of sensitivity A and at least one domain having a level of trust or sensitivity B, bearing in mind that the level A is different from the level B, comprises a virtualization software layer V implemented on the physical layer H and positioned between said physical layer H and at least one set consisting of at least three different compartmentalized blocks having different sensitivity levels, BLA, BLB, MDS. The compartmentalized blocks rest on the physical layer H and the virtualization layer and the blocks include at least one of: a network block A, BLA, comprising all the network functions used to process data of security level A, a network block B, BLB, comprising all the network functions used to process data of security level B, and a security module software block, MDS, or airlock positioned between at least one block of BLA type and at least one block of BLB type, said security module being designed to monitor the exchanges of data between said blocks BLA and BLB, said security module comprising all the security, filtering or cryptographic function transformations. | 2012-02-09 |
20120036582 | SYSTEM AND METHOD TO FORCE A MOBILE DEVICE INTO A SECURE STATE - Embodiments relate to systems and methods for implementation on a mobile device to force the mobile device into a secure state upon detection or determination of a triggering event. Once it is determined that a triggering event has occurred, each application operating on the mobile device is caused to immediately unreference sensitive objects and a secure garbage collection operation is performed upon the unreferenced sensitive objects to render data associated therewith unreadable. The mobile device is then caused to enter a secure state, in which the mobile device cannot be accessed without authorization. A microprocessor within the mobile device is configured to determine the existence of the triggering event according to a configuration data structure and to perform the secure garbage collection. | 2012-02-09 |
20120036583 | COMPUTER READABLE MEDIUM STORING PROGRAM, INFORMATION PROCESSING APPARATUS, AND METHOD - A computer readable medium stores a program for controlling access to electronically stored information. The program causes a computer to execute a process including receiving first user information indicating a first user who performs an operation of changing an access right, second user information indicating a second user having the access right, and operation information indicating the operation; extracting grantor information corresponding to grantee information representing the second user information from access right grantor/grantee correspondence information in which grantor information indicating a grantor who has granted an access right to perform an operation on information is related to grantee information indicating a grantee granted the access right by the grantor; determining whether or not the extracted grantor information represents the first user information; and changing the access right indicated by the operation information if it is determined that the extracted grantor information represents the received first user information. | 2012-02-09 |
20120036584 | REPORTING INFORMATION ABOUT USERS WHO OBTAIN COPYRIGHTED MEDIA USING A NETWORK IN AN UNAUTHORIZED MANNER - Methods and systems for reporting information about users who obtain copyrighted media illegally using a network are provided. A particular copyrighted media from a source of copyrighted media may be associated with a user's computer. Copyright fees have not been paid for the particular copyrighted media. Information about the user of the computer is reported. | 2012-02-09 |
20120036585 | METHOD AND SYSTEM OF DETERRING UNAUTHORIZED USE OF MEDIA CONTENT BY DEGRADING THE CONTENTS WAVEFORM - In one embodiment, the present invention pertains to a method and system for deterring unauthorized use of media content in a computing system and network. In one embodiment, the invention comprises detecting an unauthorized use of the media content in a computing system or network, the media content having a characteristic digital waveform format and an associated indicator for indicating to a compliance mechanism an unauthorized use of the media content. On detecting an unauthorized use of the media content, the media content characteristic digital waveform format is degraded. In this embodiment of the invention, unauthorized use is non-compliance with a use restriction applicable to the presentation of the media content in the computing system or network. In accordance with this embodiment of the invention, the media content is rendered incomprehensible to an unauthorized user experiencing the media content, thereby likely deterring further unauthorized use of the media. | 2012-02-09 |
20120036586 | Reclaim my lost computer - If this invention is granted and allowed to be brought to market there will finally be a method by which a lost or stolen computer will have a very high degree of probability that it will be returned to its rightful owner in good working order. In the near future I think it will destroy the market for all stolen computers. | 2012-02-09 |
20120036587 | PROSTATE CANCER CELL LINES AND THEIR USE IN SCREENING METHOD - The present invention relates to a prostate cancer cell line CNCM deposit number I-4126, the use thereof for preparing resistant prostate cancer cell lines, the resistant prostate cancer cell lines, and the use of these prostate cancer cell lines for screening compounds of interest. | 2012-02-09 |
20120036588 | METHOD FOR OBSERVING GAD67-POSITIVE CELL IN TRANSGENIC ANIMAL - A method for observing glutamate decarboxylase 67-positive cells in a transgenic mouse includes providing the transgenic mouse in which a nucleic acid sequence encoding green fluorescent protein is inserted in a frame within exon 1 of an endogenous glutamate decarboxylase 67 gene, whereby the transgenic mouse is capable of a functional expression of the green fluorescent protein in place of the endogenous glutamate decarboxylase 67 gene. Then, the glutamate decarboxylase 67-positive cells which are specifically visualized by the expression of the green fluorescent protein can be observed. The method may further include analyzing a function or morphology of the GABAergic neurons based on the observation of the glutamate decarboxylase 67-positive cells where the glutamate decarboxylase 67-positive cells are specifically visualized corresponding to a cell distribution of GABAergic neurons. | 2012-02-09 |
20120036589 | VACCINE - The present invention is concerned with the development of a vaccine against | 2012-02-09 |
20120036590 | INTERFERON-LIKE PROTEIN ZCYTO21 - The present invention relates to polynucleotide and polypeptide molecules for Zcyto21, an interferon-like protein, which is most closely related to interferon-α at the amino acid sequence level. The present invention also includes antibodies to the Zcyto21 polypeptides, and methods of using the polynucleotides and polypeptides. | 2012-02-09 |
20120036591 | METHODS FOR MITOCHONDRIAL DNA REPLACEMENT IN OOCYTES - Methods are provided for producing a primate oocyte in vitro. The methods include removing nuclear DNA from a recipient primate oocyte from a first primate in a manner that does not lower levels of maturation promoting factor (MPF) to form an enucleated recipient primate oocyte. The recipient primate oocyte is enucleated using a non-UV-based spindle imaging system. Nuclear genetic material or DNA including chromosomes from a donor primate oocyte arrested at metaphase II from a second primate is isolated in the form of the karyoplast and introduced into the enucleated recipient primate oocyte. Introduction of the chromosomes is performed using a fusogenic agent or electroporation to produce a hybrid oocyte. | 2012-02-09 |
20120036592 | Process for Producing a Hybrid Maize Having Insulated Casing and Individual Shield for Grains, by Means of a Genetic Tool, and a Hybrid Maize Thereof - A process for the generation of hybrid maize whose grains are differentiated and preserved by entirely covering their surfaces, isolating the entire endosperm from the outside and conserving all the nutritious and germinative characteristics from the parentals; and the maize produced by the process. | 2012-02-09 |
20120036594 | RNA-Mediated Induction of Gene Expression in Plants - The present invention is in the field of plant genetics and provides methods for increasing gene expression of a target gene in a plant or part thereof. In addition the invention relates to methods for modifying the specificity of plant specific promoters and for engineering small non-coding activating RNA (sncaRNA) in order to increase expression of a target gene in a plant or part thereof. The present invention also provides methods for the identification of sncaRNA, and its primary transcripts in a plant capable of increasing gene expression in a plant or part thereof. | 2012-02-09 |
20120036595 | Whole Seed Specific Promoter - The present invention is concerned with the provision of means and methods for gene expression. Specifically, it relates to a polynucleotide comprising an expression control sequence which allows for seed specific of a nucleic acid of interest being operatively linked thereto in plants. Furthermore, vectors, host cells, transgenic plants and methods for expressing nucleic acids of interest are provided which are based on the said polynucleotide. | 2012-02-09 |
20120036596 | MAMMALIAN-TYPE GLYCOSYLATION IN PLANTS BY EXPRESSION OF NON-MAMMALIAN GLYCOSYLTRANSFERASES - The present invention relates to non-mammalian β-1,4-galactosyltransferases that can be used in their wild-type or in modified forms. The invention further relates to transformed plants and plant cells expressing non-mammalian β-1,4-galacto-syltransferase and methods to produce glycoproteins with altered and preferably mammalian-type glycosylation. The invention additionally provides nucleic acid molecules and expression vectors of non-mammalian β-1,4-galactosyltransferases. | 2012-02-09 |
20120036597 | Cold-Tolerant Plants - Disclosed are chill- or cold-tolerant plants and methods of making the plants. Also disclosed are methods for identifying a plant that is tolerant to chill. | 2012-02-09 |
20120036598 | PLANTS WITH IMPROVED MORPHOGENESIS AND METHOD OF CONSTRUCTING THE SAME - The invention relates to plants and their progeny with improved morphogenesis in a variety of organs; to a method for producing the plants; and to a method for producing calli. | 2012-02-09 |
20120036599 | NOVEL FUNGAL ENZYMES - This invention relates to novel enzymes and novel methods for producing the same. More specifically this invention relates to a variety of fungal enzymes. Nucleic acid molecules encoding such enzymes, compositions, recombinant and genetically modified host cells, and methods of use are described. The invention also relates to a method to convert lignocellulosic biomass to fermentable sugars with enzymes that degrade the lignocellulosic material and novel combinations of enzymes, including those that provide a synergistic release of sugars from plant biomass. The invention also relates to methods to use the novel enzymes and compositions of such enzymes in a variety of other processes, including washing of clothing, detergent processes, deinking and biobleaching of paper and pulp, and treatment of waste streams. | 2012-02-09 |
20120036600 | METHOD FOR GENERATING HYPOALLERGENIC GLYCOPROTEINS IN MUTATED OR TRANSGENIC PLANTS OR PLANT CELLS, AND MUTATED OR TRANSGENIC PLANTS AND PLANT CELLS FOR GENERATING HYPOALLERGENIC GLYCOPROTEINS - Method for providing a hypoallergenic glycoprotein includes growing at least one of a mutated plant, a part of the mutated plant, plant cells produced from the mutated plant, a transgenic plant, a part of the transgenic plant and plant cells produced from the transgenic plant wherein an activity of an enzyme Golgi α-mannosidase II has been eliminated or decreased so as to obtain a grown material. The hypoallergenic glycoprotein is isolated from the grown material. | 2012-02-09 |
20120036601 | Broccoli Type Adapted for Ease of Harvest - A broccoli plant characterized in having an exerted head having a crown higher than the leaf canopy and a harvestable head of at least about 200 grams when planted at a density of 40,000 plants per hectare, where the harvestable head comprises the top 25 centimeters of said stalk. | 2012-02-09 |
20120036602 | Video rate-enabling probes for atomic force microscopy - Method for producing a probe for atomic force microscopy with a silicon nitride cantilever and an integrated single crystal silicon tetrahedral tip with high resonant frequencies and low spring constants intended for high speed AFM imaging. | 2012-02-09 |
20120036603 | METHOD AND APPARATUS FOR MICROMACHINES, MICROSTRUCTURES, NANOMACHINES AND NANOSTRUCTURES - Parts and structures are described for micro and nano machines and the creation of macro structures with nano and micro layers of special materials to provide improved performance. | 2012-02-09 |
20120036604 | Lagerstroemia (indica x fauriei) plant named 'JD900' - A new and distinct variety of | 2012-02-09 |
20120036605 | Lagerstroemia (indica x fauriei) plant named 'JD818' - A new and distinct variety of | 2012-02-09 |
20120036606 | Lagerstroemia (indica x fauriei) plant named 'JD827' - A new and distinct variety of | 2012-02-09 |
20120032466 | TRANSVERSE SLIDING/ACCOMMODATION EASY ENTRY SEAT - A vehicle having a door opening defining a threshold. A slide system includes a track operably connected to the vehicle. A slide is linearly moveable relative to the track. A seat is operably connected to the slide. The slide is laterally movable between a retracted position that corresponds with the seat being positioned inside the vehicle and an extended position that corresponds with the seat being disposed in the threshold. | 2012-02-09 |