13th week of 2014 patent applcation highlights part 73 |
Patent application number | Title | Published |
20140090025 | INFORMATION PROCESSING DEVICE AND METHOD - Access restriction is performed on access to a page on which information is posted from a terminal of a subject. It is determined whether positions of terminals used by the subject and a manager, who is associated with the subject in advance, accord with each other. A relaxation operation is received from the terminal of the manager, when it is determined that the positions accord with each other. The access restriction by a restriction unit is relaxed, when the relaxation operation is received. A characteristic word of the page accessed by the terminal of the subject for which the access restriction is relaxed is acquired. The acquired characteristic word is transmitted to the terminal of the manager to display the characteristic word. A recovery operation is received from the terminal of the manager. The access restriction performed by the restriction unit is recovered, when the recovery operation is received. | 2014-03-27 |
20140090026 | System and Method for Managing Role Based Access Controls of Users - A method and system for role based access control for a plurality of users in a heterogeneous enterprise environment, comprising: establishing a functional relationship between a plurality of provisioning unit using a provision unit module. The users are mapped with the provisioning unit based on attributes of the users. Events are captured via the provision unit module. The users needed to be re-mapped are determined upon the event completion. Application role defined in context of an application embedded in an application registry module is mapped with the provisioning unit. Call back service is executed for the re-mapped users having entitlement associated with each of the application stored in a roles registry module. An application role is determined and defined for a new user for the plurality of the application enabling managing of the role based access control. | 2014-03-27 |
20140090027 | AUTHORIZATION SERVER SYSTEM, CONTROL METHOD THEREOF, AND STORAGE MEDIUM - In response to reception of a request, an authorization server system identifies authorization based on first authorization information received by a reception unit along with the request. The authorization server system gives at least some of the identified authorization to an application, and issues second authorization information for identifying the given authorization. | 2014-03-27 |
20140090028 | IMAGE FORMING APPARATUS, METHOD FOR CONTROLLING IMAGE FORMING APPARATUS, AND STORAGE MEDIUM THEREFOR - When a request for acquiring authorization information is received from a resource service application that is a request source, an image forming apparatus transmits a request for further delegating an authorization delegated from a user to the resource service application to an authorization server system together with first authorization information, and acquires second authorization information issued based on the first authorization information from the authorization server system. | 2014-03-27 |
20140090029 | NETWORK ACCESS METHOD, AUTHENTICATION METHOD, COMMUNICATIONS SYSTEM AND RELEVANT DEVICES - A network access method, an authentication method, a communications system, and relevant devices are provided to support implicit authentication based on subscriber line information in Internet Protocol version 6 (IPv6). The authentication method includes: receiving a request message sent from an Access Node (AN), wherein the request message carries subscriber line information and a Link-Local Address (LLA); sending an access request to an Authentication, Authorization and Accounting (AAA) server according to the subscriber line information; receiving an authentication result indicating the authentication is successful; determining whether an address matching the LLA carried in the request has been stored in the BNG; and storing the LLA in the BNG, if the address matching the LLA is not stored in the BNG. | 2014-03-27 |
20140090030 | CAPTIVE PORTAL THAT MODIFIES CONTENT RETRIEVED FROM DESIGNATED WEB PAGE TO SPECIFY BASE DOMAIN FOR RELATIVE LINK AND SENDS TO CLIENT IN RESPONSE TO REQUEST FROM CLIENT FOR UNAUTHORIZED WEB PAGE - The described captive portal techniques cause client devices to render and display designated web pages. One designated web page may be different than a requested web page such as when a client is not authorized to access the requested page and is instead caused to display a login portal. The captive portal may modify the designated web page to ensure that relative links lacking base domains now have specified base domains pointing to an authorized web server. The modified content is sent from the captive portal to the client device for display. Client web browser security measures related to redirection messages are thereby bypassed and load on the captive portal is minimal. Another designated web page may be the same as the requested web page such as when the requested page is an authorized page even for non-logged in clients. Authorized pages may be modified to add a login link. | 2014-03-27 |
20140090031 | Device-Specific Authorization at Distributed Locations - A method includes receiving authentication information for a client device at a server. The authentication information includes a network address of the client device, a geographic location of the client device, and a first result of a one-way hash function based on a combination of the network address, an authentication seed, and a first secret. The method includes computing, with the server, a second result of the one-way hash function based on a combination of the network address, the authentication seed, and a second secret. The method also includes enabling the client device to access a second network in response to a determination by the server that the first result matches the second result and a determination by the server that the client device is authorized to access the second network based on the geographic location. | 2014-03-27 |
20140090032 | SYSTEM AND METHOD FOR REAL TIME SECURE IMAGE BASED KEY GENERATION USING PARTIAL POLYGONS ASSEMBLED INTO A MASTER COMPOSITE IMAGE - A method including: receiving, at a first device, a challenge provided from a second device, wherein the challenge includes an encoding algorithm and a request for credentials from the first device; and outputting, from the first device to the second device, a response to the challenge, wherein the response includes at least one image, the at least one image including an article of evidence arranged according to the encoding algorithm. | 2014-03-27 |
20140090033 | Context Aware Content Distribution - Described herein are systems and methods for context aware content distribution. Content such as e-books, presentations, audio, video, applications, and so forth may be distributed to user devices after establishing a trust relationship. An invitation to provide content may be sent to a user device based on the context of the user device, such as proximity to pre-determined devices, location, and so forth. Upon acceptance of the invitation to opt-in to receiving content, a trust relationship may be established which provides for the transfer of content to the user device. | 2014-03-27 |
20140090034 | SMART PLUG OR CRADLE - There is provided a method and apparatus for allowing a user of a mobile device to securely access a storage device of a home network of the user. The method and apparatus advantageously allow for the user to share data stored on the home network with other users, or to give full or restricted access to other computing devices. The apparatus consists of a network element residing on the home network of the user, which enables communications between the network storage and the mobile device when the mobile device is in a remote location. | 2014-03-27 |
20140090035 | Authentication System and Method - Security is improved as compared to the security of conventional authentication systems, only by requesting a user to perform operations involving the same number of operations as that of the conventional authentication systems. When login information is registered, an authentication system ( | 2014-03-27 |
20140090036 | ONLINE CREDENTIAL PLATFORM - An online credential platform enables organizations and people to create, manage, exchange and verify professional and personal credentials to support trust, reputation and transactions. The platform can allow credential issuers to create credential types and then assign them to proxies that represent real world persons or entities. Following this, it can allow other sites and applications to verify a person's or entity's credentials within the scope of their site or application reliably and with maximum privacy/anonymity. | 2014-03-27 |
20140090037 | SINGLE SIGN-ON IN MULTI-TENANT ENVIRONMENTS - The disclosed embodiments provide a system that authenticates a user. During operation, the system identifies a first tenant associated with a first request for a first resource from the user and obtains an authentication policy for the first tenant. Next, the system uses an authentication mechanism associated with the authentication policy to authenticate the user. Upon authenticating the user, the system provides a first security token for enabling access to the first resource by the user. | 2014-03-27 |
20140090038 | PRIORITIZING A CONTENT ITEM FOR A USER - The disclosed subject matter relates to methods for prioritizing a content item for a user. In one aspect, a method includes receiving user authentication events corresponding to a user account. A user is associated with the user account. The method further includes determining a time distribution of the received user authentication events. The method further includes constructing, based on the determination, a content prioritization user model corresponding to the user associated with the user account. The method further includes receiving a content item associated with the user. The method further includes associating, based on the content prioritization user model, a content priority value with the content item. The content priority value corresponds to a predicted aspect of the user. | 2014-03-27 |
20140090039 | Secure System Access Using Mobile Biometric Devices - Methods and apparatuses for secure system access are disclosed. In one example, a user request to access a secure system is received. A biometric user authentication request is transmitted to a user mobile device, and biometric data is obtained from the user. The user identity is authenticated utilizing the biometric data, and a response is transmitted from the mobile device to the secure system indicating the user identity is authenticated. | 2014-03-27 |
20140090040 | SYSTEM AND METHOD FOR REAL TIME SECURE IMAGE BASED KEY GENERATION USING PARTIAL POLYGONS ASSEMBLED INTO A MASTER COMPOSITE IMAGE - A method including: receiving, at a first device, a challenge provided from a second device, wherein the challenge includes an encoding algorithm and a request for credentials from the first device; and outputting, from the first device to the second device, a response to the challenge, wherein the response includes at least one image, the at least one image including an article of evidence arranged according to the encoding algorithm. | 2014-03-27 |
20140090041 | METHOD, APPARATUS AND SYSTEM FOR AUTHENTICATING OPEN IDENTIFICATION BASED ON TRUSTED PLATFORM - The disclosure relates to a method, an apparatus and a system for authenticating an open identification (ID) based on a trusted platform to prevent network overload which may occur due to data transmission repeated at every time of open ID authentication. An open ID authentication system includes a web service providing apparatus configured to provide a specific web service and to support a login of a user device in an open ID service procedure according to mutual arrangements with an open ID management apparatus, and the user device configured to have a separate environment formed of a non-security region operating based on an open operating system and a security region operating based on a security operating system. | 2014-03-27 |
20140090042 | USER AUTHENTICATED SECURE COMMUNICATION LINK - Systems and methods are provided for establishing a secure communication link between a first client and a second client. One exemplary computer-implemented method for establishing a secure communication link between a first client and a second client includes accessing, from a storage, identification information of a user of the first client. The method further includes receiving a Domain Name Service (DNS) request from the first client requesting a secure network address corresponding to a secure domain name associated with the second client. The method further includes authenticating the user based on the user identification information. The method also includes transmitting the secure computer network address in response to the DNS request based on a determination that the user has been authenticated. A secure communication link between the first client and the second client is established based on the secure computer network address. | 2014-03-27 |
20140090043 | Controlled Discovery of SAN-Attached SCSI Devices and Access Control Via Login Authentication - A method for accessing data in a storage area network is provided. The method initiates with receiving a request for a list of targets on the storage area network. All the targets on the storage area network are exposed to the requestor and authentication requiring a password is requested from the requestor to grant access to the targets on the storage are network. Access to the targets is granted if the password is acceptable, and access to the targets is refused if the password is unacceptable. | 2014-03-27 |
20140090044 | Method and Apparatus for Trusted Branded Email - A trusted branded email method and apparatus in one aspect detects branded electronic messages and performs validation before it is sent to a recipient. In another aspect, an electronic messages is branded by embedding branding assets and validation signatures. Algorithms that generate validation signatures are dynamically selected to further strengthen the security aspects. Branding assets are presented to a user using a distinct indicia that represents to the user that the branding assets are secure. | 2014-03-27 |
20140090045 | SYSTEMS AND METHODS FOR FACILITATING LOGIN AID FUNCTIONALITY IN MOBILE COMMERCE - This disclosure describes systems, methods, and computer-readable media related to systems and methods for facilitating login functionality in mobile commerce. A user device may receive information. The user device may transmit the information to a remote server. The user device may receive a token generated by the remote server based at least in part on the information. The user device may receive a request for the information. The user device may transmit the token associated with the information to the remote server. The user device may receive a notification that the remote server transmitted the requested information. | 2014-03-27 |
20140090046 | SYSTEM AND METHOD FOR PROVIDING NETWORK SECURITY TO MOBILE DEVICES - A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected by greater security and possibly by the same level of security offered by its associated corporation/enterprise. In one embodiment, a mobile security system includes a connection mechanism for connecting to a data port of a mobile device and for communicating with the mobile device; a network connection module for acting as a gateway to a network; a security policy for determining whether to forward content intended for the mobile device to the mobile device; and a security engine for executing the security policy. | 2014-03-27 |
20140090047 | MULTIPLE CPU ARCHITECTURE PLATFORM NETWORK FIREWALL - A system includes a communication processor and an application processor communicatively coupled to the communication processor. The communication processor is configured to detect a receipt of an incoming data packet, initially process at least a portion of the incoming data packet in the communication processor to determine if the incoming packet satisfies a first set of pre-determined criteria and automatically enable a transfer of the incoming data packet to the application processor depending upon an outcome of the initial processing of the incoming data packet. | 2014-03-27 |
20140090048 | Mobile IP Over VPN Communication Protocol - The present invention supports a communication protocol for transmission of information packets between a mobile node and a virtual private network. Information packets are encapsulated and decapsulated along the route as the information packet is forwarded among the various networks on its path to the destination address; either the mobile node on a foreign network or a correspondence node on a virtual private network. A home agent on the virtual private network supports transmitting the information packets, and the information packets are transmitted from the virtual private network from the home agent or a virtual private network gateway. | 2014-03-27 |
20140090049 | CONTEXT-BASED DATABASE SECURITY - A processor-implemented method, system, and/or computer program product secures data stores. A non-contextual data object is associated with a context object to define a synthetic context-based object. The synthetic context-based object is associated with at least one specific data store in a data structure, where the specific data store contains data that is associated with data contained in the non-contextual data object and the context object. An ambiguous request is received from a user for data related to an ambiguous subject-matter. The context of the ambiguous request from the user is determined and associated with the synthetic context-based object that is associated with said a specific data store, where that specific data store contains data related to the context of a now contextual request from the user. The user is then provided access to the specific data store while blocking access to other data stores in the data structure. | 2014-03-27 |
20140090050 | SYSTEMS AND METHODS FOR IDENTIFYING UNAUTHORIZED USERS OF AN ELECTRONIC DEVICE - This is generally directed to identifying unauthorized users of an electronic device. In some embodiments, an unauthorized user of the electronic device can be detected by identifying particular activities that may indicate suspicious behavior. In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identity of the owner of the electronic device. When an unauthorized user is detected, various safety measures can be taken. For example, information related to the identity of the unauthorized user, the unauthorized user's operation of the electronic device, or the current location of the electronic device can be gathered. As another example, functions of the electronic device can be restricted. In some embodiments, the owner of the electronic device can be notified of the unauthorized user by sending an alert notification through any suitable medium, such as, for example, a voice mail, e-mail, or text message. | 2014-03-27 |
20140090051 | Managing Heterogeneous Product Features Using a Unified License Manager - An information handling system includes a device, a controller, and a license manager subsystem. The controller is configured to determine whether the device has a license assigned and to communicate with the device pursuant to a uniform protocol. The communications include issuing a command to the device to provide an identification and a command to the device to activate itself. | 2014-03-27 |
20140090052 | METHOD FOR INPUTTING A CODE USING A PORTABLE DEVICE, AND ASSOCIATED PORTABLE DEVICE - A method and apparatus are provided for entering a code using a portable device. The method includes measuring at least one angle of inclination of the portable device and generating an input code from the measured angle of inclination. | 2014-03-27 |
20140090053 | Internet Protocol Address Distribution Summary - Examples disclosed herein relate to an Internet Protocol address distribution summary. A processor may determine a statistical distribution between at least one portion of bits of Internet Protocol addresses accessing a website and determine a summary value representative of the degree of change within the statistical distribution. The processor may output the summary value. | 2014-03-27 |
20140090054 | System and Method for Detecting Anomalies in Electronic Documents - A system and method are described herein for detecting an anomaly in an electronic document. In a computer system, a detection engine is attached to an application program which processes the electronic document. Function calls to a service provided through an application program interface (API) are intercepted by the detection engine as the application program processes the electronic document. If an entry for the intercepted function call is not present in the detection model, or an entry is present but the argument value does not match the argument value in the detection model, an alert is raised. The detection model is populated by processing a plurality of known good documents, populating the detection model with entries on intercepted good function calls and their argument values. A threshold may be applied to the detection model, removing from the detection model function calls which were observed less than the threshold amount. | 2014-03-27 |
20140090055 | Automated Detection of Harmful Content - This document discloses a solution for automatically detecting malicious content by computer security routine executed in a processing device. A user input to a social media application is detected by the computer security routine. The user input indicates that a user wants to share content with at least one other user through the social media application. In response, the computer security routine suspends said sharing and performs, before determining whether or not to allow the sharing, a security check for suspiciousness of contents the user intends to share. | 2014-03-27 |
20140090056 | SECURITY ALERT PRIORITIZATION - In one implementation, a security alert prioritization system identifies a host and a domain associated with a security alert that was generated in response to a communication between the host and the domain. The security alert prioritization system accesses a security state associated with the host and a security state associated with the domain, and compute a priority of the security alert based on the security state associated with the host and the security state associated with the domain. | 2014-03-27 |
20140090057 | METHODS AND SYSTEMS FOR FULL PATTERN MATCHING IN HARDWARE - Methods and systems are provided for hardware-based pattern matching. In an embodiment, an intrusion-prevention system (IPS) identifies a full match between a subject data word comprising subject-data blocks and a signature data pattern comprising signature-data blocks. The IPS receives the subject data word via a network interface, and thereafter makes a partial-match determination that two or more but less than all of the subject-data blocks respectively match the same number of the signature-data blocks stored in partial-match hardware with respect to both value and position. Thereafter, the IPS makes a full-match determination that all of the subject-data blocks respectively match all of the signature-data blocks stored in the IPS's full-match hardware with respect to both value and position. The IPS then stores an indicator that the full-match determination has been made, and may carry out one or more additional intrusion-prevention responses as well. | 2014-03-27 |
20140090058 | TRAFFIC SIMULATION TO IDENTIFY MALICIOUS ACTIVITY - Systems and methods may simulate traffic to identify malicious activity. A dynamic analysis system comprising a processor in communication with a network may receive a copy of a malware program and load the copy of the malware program into a simulated endpoint. The system may monitor simulated endpoint network traffic to or from the simulated endpoint, assess the simulated endpoint network traffic to determine a source and/or destination for the simulated endpoint network traffic and/or content of the simulated endpoint network traffic, and capture and store metadata associated with, the simulated endpoint network traffic. A comparison system may compare simulated network traffic metadata to observed network traffic metadata to determine whether the metadata are statistically similar. When the metadata are not statistically similar, the system may generate a low infection confidence score. When the metadata are statistically similar, the system may generate a high infection confidence score. | 2014-03-27 |
20140090059 | HEURISTIC BOTNET DETECTION - In some embodiments, heuristic botnet detection is provided. In some embodiments, heuristic botnet detection includes monitoring network traffic to identify suspicious network traffic; and detecting a bot based on a heuristic analysis of the suspicious network traffic behavior using a processor, in which the suspicious network traffic behavior includes command and control traffic associated with a bot master. In some embodiments, heuristic botnet detection further includes assigning a score to the monitored network traffic, in which the score corresponds to a botnet risk characterization of the monitored network traffic (e.g., based on one or more heuristic botnet detection techniques); increasing the score based on a correlation of additional suspicious behaviors associated with the monitored network traffic (e.g., based on one or more heuristic botnet detection techniques); and determining the suspicious behavior is associated with a botnet based on the score. | 2014-03-27 |
20140090060 | TRUSTED NETWORK INTERFACE - Systems and methods for combating and thwarting attacks by cybercriminals are provided. Network security appliances interposed between computer systems and public networks, such as the Internet, are configured to perform defensive and/or offensive actions against botnets and/or other cyber threats. According to some embodiments, network security appliances may be configured to perform coordinated defensive and/or offensive actions with other network security appliances. | 2014-03-27 |
20140090061 | SYSTEM AND METHOD FOR AUTOMATED MACHINE-LEARNING, ZERO-DAY MALWARE DETECTION - Improved systems and methods for automated machine-learning, zero-day malware detection. Embodiments include a method for improved zero-day malware detection that receives a set of training files which are each known to be either malign or benign, partitions the set of training files into a plurality of categories, and trains category-specific classifiers that distinguish between malign and benign files in a category of files. The training may include selecting one of the plurality of categories of training files, identifying features present in the training files in the selected category of training files, evaluating the identified features to determine the identified features most effective at distinguishing between malign and benign files, and building a category-specific classifier based on the evaluated features. Embodiments also include by a system and computer-readable medium with instructions for executing the above method. | 2014-03-27 |
20140090062 | METHOD AND APPARATUS FOR VIRUS SCANNING - Method and apparatus for virus scanning, and a non-transitory computer-readable medium that stores instructions for performing virus scanning. The method includes detecting a status of a system; and when the status of the system is idle, if current virus scanning has begun, continuing the current virus scanning, and if the current virus scanning has not begun, acquiring a scanning progress of previous virus scanning, beginning the current virus scanning according to the acquired scanning progress, and recording a scanning progress of the current virus scanning. | 2014-03-27 |
20140090063 | SYSTEM AND METHOD FOR INHIBITING THE PROCESSING OF NEW CODE MODULES BY AN OUTDATED RUNTIME ENVIRONMENT - A system and method for inhibiting some code modules from being processed by an outdated runtime environment are disclosed. The system and method may operate to detect that a runtime environment installed on a computer system is outdated. New code modules that have not been previously processed by the runtime environment may be inhibited from being processed by the outdated runtime environment, while known code modules that have been previously processed may be allowed to continue being processed uninhibitedly by the outdated runtime environment. | 2014-03-27 |
20140090064 | TRAINING CLASSIFIERS FOR PROGRAM ANALYSIS - Methods for training a static security analysis classifier include running an initial security analysis on a training codebase to generate a set of vulnerabilities associated with the training codebase; analyzing the program with a feature set that limits a number of detected vulnerabilities to generate a limited set of vulnerabilities associated with the feature set; comparing the limited set of vulnerabilities to a known vulnerability distribution to generate an accuracy score; and iterating the steps of analyzing and comparing using different feature sets to find a feature set having a highest accuracy score. | 2014-03-27 |
20140090065 | Method and Apparatus for Paralleling and Distributing Static Source Code Security Analysis Using Loose Synchronization - A method of static source code analysis is provided. A forward search of source code is performed from each of a plurality of source nodes. A backward search of source code is performed from each of a plurality of sink nodes, wherein the forward search and the backward search are performed in parallel simultaneously. The progress of the forward search and the backward search are monitored to determine if the searches intersect at a common node. A vulnerability alert is generated when the monitoring determines that a forward search and a backward search reach a common node. | 2014-03-27 |
20140090066 | SECURITY DATA AGGREGATION AND BUSINESS INTELLIGENCE FOR WEB APPLICATIONS - Systems and methods may provide for detecting a browser request for web content. Additionally, interaction information associated with a plurality of sources may be determined in response to the browser request, and a risk profile may be generated based on the interaction. The risk profile may include at least a portion of the interaction information as well as recommended control actions to mitigate the identified risk. In one example, the risk profile is presented to a user associated with the browser request as well as to a security control module associated with the platform. | 2014-03-27 |
20140090067 | CUSTOMIZING A SECURITY REPORT USING STATIC ANALYSIS - Respective edge weights are assigned to edges of a plurality of paths in a control flow graph representing a model of data flow of a computer program. Edge weights assigned to each edge are processed to determine a total edge weight for the respective paths, the total edge weight for a respective path being a sum of the edge weights assigned to the respective edges of the path. At least one path in the control flow graph whose total edge weight satisfies a particular total edge weight criteria can be identified, and the control flow graph can be updated to indicate to the user the at least one path in the control flow graph whose total edge weight satisfies the particular total edge weight criteria. The updated control flow graph can be presented to the user. | 2014-03-27 |
20140090068 | METHOD AND APPARATUS FOR PARALLELING AND DISTRIBUTING STATIC SOURCE CODE SECURITY ANALYSIS USING LOOSE SYNCHRONIZATION - A method of static source code analysis is provided. A forward search of source code is performed from each of a plurality of source nodes. A backward search of source code is performed from each of a plurality of sink nodes, wherein the forward search and the backward search are performed in parallel simultaneously. The progress of the forward search and the backward search are monitored to determine if the searches intersect at a common node. A vulnerability alert is generated when the monitoring determines that a forward search and a backward search reach a common node. | 2014-03-27 |
20140090069 | TRAINING CLASSIFIERS FOR PROGRAM ANALYSIS - Classifier training modules and systems are shown that include a memory configured to store a known vulnerability distribution and an initial feature set; and a processor configured to run an initial security analysis on a training codebase to generate a set of vulnerabilities associated with the training codebase, to analyze the program with the feature set to limit a number of detected vulnerabilities to generate a limited set of vulnerabilities associated with the feature set, to compare the limited set of vulnerabilities to the known vulnerability distribution to generate an accuracy score, and to iteratively refine the analysis by updating the feature set to find a feature set having a highest accuracy score. | 2014-03-27 |
20140090070 | CUSTOMIZING A SECURITY REPORT USING STATIC ANALYSIS - Respective edge weights are assigned to edges of a plurality of paths in a control flow graph representing a model of data flow of a computer program. Edge weights assigned to each edge are processed to determine a total edge weight for the respective paths, the total edge weight for a respective path being a sum of the edge weights assigned to the respective edges of the path. At least one path in the control flow graph whose total edge weight satisfies a particular total edge weight criteria can be identified, and the control flow graph can be updated to indicate to the user the at least one path in the control flow graph whose total edge weight satisfies the particular total edge weight criteria. The updated control flow graph can be presented to the user. | 2014-03-27 |
20140090071 | Systems and Methods for Runtime Adaptive Security to Protect Variable Assets - A method of adapting a security configuration of a data processing application at runtime, and a system, together with its computing architecture, are disclosed. The system stores a causal network comprising a plurality of nodes and a plurality of incoming and outgoing causal links associated therewith, wherein each node of the causal network is associated with a security concern or a requirement that can be affected by any configuration of the security controls. The current value of assets nodes, as well as those of the security concerns that can be affected by monitored contextual factors, are updated. The control nodes corresponding to the security controls is updated according to the security configuration whose utility is evaluated by the causal network. The node corresponding to the at least one variable is updated with the determined current value, which is propagated through the causal network through the causal links associated with the updated node. The security configuration with the highest utility is selected and replaces the actual configuration by activating and/or deactivating the security functions corresponding to security control nodes enabled/disabled in the selected security configuration. | 2014-03-27 |
20140090072 | System, Method, and Computer Program Product for Isolating a Device Associated with At Least Potential Data Leakage Activity, Based on User Input - A system, method, and computer program product are provided for isolating a device associated with at least potential data leakage activity, based on user input. In operation, at least potential data leakage activity associated with a device is identified. Furthermore, at least one action is performed to isolate the device, based on user input received utilizing a user interface. | 2014-03-27 |
20140090073 | Obscuring Sensitive Portions of Universal Resource Locator - Portions of a URL such as the query string are obscured or otherwise removed from view in the address bar of a browser or other application automatically by the receiving device employing obscuration rules, or upon command from an originating device sourcing the resource. | 2014-03-27 |
20140090074 | ENHANCED PRIVACY FOR PROVISION OF COMPUTER VISION - Methods, apparatuses and storage medium associated with providing enhanced privacy during usage of computer vision are disclosed. In embodiments, an apparatus may include one or more privacy indicators to indicate one or more privacy conditions of the apparatus in association with provision of computer vision on the apparatus. The apparatus may further include a privacy engine coupled with the one or more privacy indicators, and configured to pre-process images from an image source of the apparatus associated with the provision of computer vision to the apparatus, to increase privacy for a user of the apparatus, and to control the one or more privacy indicators. In embodiments, the apparatus may include means for blanking out one or more pixels with depth values identified as greater than a threshold. Other embodiments may be described and claimed. | 2014-03-27 |
20140090075 | FLEXIBLE CONTENT PROTECTION SYSTEM USING DOWNLOADABLE DRM MODULE - A secure platform is enabled in which DRM modules can be downloaded and securely installed onto a consumer electronic device, such as a TV. Downloadable DRM solutions are supported for CE manufacturers. The problem of making downloadable DRM modules operate securely on a trusted generic hardware platform without compromising the security of DRM systems is addressed. The downloadable DRM solution uses secure trusted computing-based mechanisms thereby enabling a service provider to perform remote static and dynamic (run-time) attestation of the downloaded DRM module and DRM license in the media device and of content protection application (CPA). | 2014-03-27 |
20140090076 | METHOD FOR DETECTING A POSSIBILITY OF AN UNAUTHORIZED TRANSMISSION OF A SPECIFIC DATUM - A tracing device for detecting whether a specific attribute datum has a possibility of being stolen is provided. The tracing device includes a label map and a first processing device, wherein the label map has a specific label attached on the specific attribute datum and a buffer region, and the first processing device is coupled to the label map and determines whether there is the specific label in the buffer region. | 2014-03-27 |
20140090077 | METHOD AND APPARATUS FOR APPLICATION MANAGEMENT IN USER DEVICE - The method and apparatus support signature-based application management that examines credibility of an application to be installed or executed and controls installation and execution accordingly. The application management method for a user device includes: receiving user input for installing an application; comparing signature information of the application with an authentication list stored in a signature information storage; preventing, when the signature information is present in a blacklist of the authentication list, installation of the application; initiating, when the signature information is present in a whitelist of the authentication list, installation of the application; and selectively performing, when the signature information is not present in either the blacklist or the whitelist, installation of the application according to user consent. | 2014-03-27 |
20140090078 | Generating Secure Device Secret Key - Methods, devices, systems and computer program products are provided to facilitate cryptographically secure retrieval of secret information that is embedded in a device. The embedded secret information can include a random number that is not custom-designed for any specific requestor of the secret information. Upon receiving a request for the embedded secret information, an encrypted secret is provided to the requestor that enables the recovery of the embedded secret information by only the requestor. Moreover, a need for maintenance of a database of the embedded secret information and the associated requestors is eliminated. | 2014-03-27 |
20140090079 | BUSINESS DATA BROWSING SYSTEM MANAGING THE RETENTION PERIOD OF BUSINESS DATA - In a server of a business data browsing system, a management unit makes retention period information associated with business data of a user to be stored into a database. A determining unit is operative in response to a browsing inquiry of the business data held in a user terminal to reference the retention period information of the business data stored in the database to thereby determine whether or not browsing of the business data is permitted to produce a determination result. A transmitting unit transmits the determination result toward the user terminal. Thus, it is possible to improve the security level and convenience of business data held in the user terminal. | 2014-03-27 |
20140090080 | ELECTRONIC APPARATUS AND CONTROL METHOD - According to one embodiment, an electronic apparatus includes a close proximity communication module and a controller. The close proximity communication module executes close proximity communication. The controller receives, by using the close proximity communication, first account information from an external apparatus close to the electronic apparatus in response to an account setting request from the external apparatus, and sets the first account information in the electronic apparatus. The first account information is information for logging in to a server system configured to provide a certain service. | 2014-03-27 |
20140090081 | Privacy Preserving Data Search - Database entries can be protected by indexing the entries using a plurality of indexes, each associated with a level of access rights. A level of access rights can be determined from a search query, and an index can be selected based on the determined level of access rights. A search key can be generated based on the received query, and the selected index can be searched using the search query. Database entries mapped to the values of the selected index returned in response to the search can be outputted. Each index is associated with a different granularity defining the number and/or ambiguity of search results returned in response to searching an index. | 2014-03-27 |
20140090082 | DATA ISOLATION IN SHARED RESOURCE ENVIRONMENTS - A data connection of a shared resource is placed in isolation mode to remove its ability to communicate with other data connections of the shared resource. This ability to isolate the data connection is dynamic in that it can be turned on/off at any time. This provides increased data security for the entities using the data connection. | 2014-03-27 |
20140090083 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - The present invention enables execution of predetermined content usage control processing without depending on a framework of a content playback program (application). Upon content playback processing, a flag which sets information of determination as to whether or not it is necessary to refer to a management information file such as a token or a usage control information file associated with content is recorded in a content file including encrypted content to be stored in a recording medium. Upon the content playback processing, a playback apparatus acquires the content file including the encrypted content stored in the recording medium, refers to a flag recorded in the content file and determines whether or not it is necessary to refer to the management information file based on a setting of the flag. When the setting of the flag indicates that it is necessary to refer to the management information file, it is possible to select a correct management information file based on a content file identifier as a search key. | 2014-03-27 |
20140090084 | COLLABORATIVE COMIC CREATION - System and method for collaborative comic creation and editing by a plurality of users. Users may access the comic from a central server (aka shared data center) over the internet. When a user begins to make a change to a selected object in the comic, a momentary object lock may be generated and propagated to the other users to prevent them from making conflicting changes to the object. Modified comic data defining the change may then be sent from the user's computer to the central server for storage and propagation to the other users to update the comic at the user terminals and the central server. Each user may have a set of editing privileges which define the comic data the user may change. A permanent lock may be generated for each user and applied against the comic data that the user is not entitled to change. | 2014-03-27 |
20140090085 | DATABASE ACCESS CONTROL - A method for database access control includes receiving an access request from a requesting user, the access request identifying one or more data entries stored in a base table storing a plurality a data entries each associated with a data category. The identified one or more data entries from the base table are retrieved and a security table including one or more data categories to which the requesting user is authorized to access is generated based on an identity of the requesting user. The data entries associated with a data category included in the security table are outputted as a result table. | 2014-03-27 |
20140090086 | Digital File Distribution in a Social Network System - Systems and methods for obtaining a digital file similar to one used by a device associated with a member of a social network are provided. Digital file information about the digital file is stored on a web-based social network database. The digital file may be located on the same server as the web-based social network database or a third party server such as a mobile phone carrier. A user of the web-based social network database requesting the digital file may require a different format of the digital file than that used by the device of the member. If a different format is requested by the user, a server finds or converts the digital file to be compatible for use by a device specified by the user. | 2014-03-27 |
20140090087 | METHOD OF MANAGING MAP INFORMATION, NAVIGATION SYSTEM, INFORMATION TERMINAL, AND NAVIGATION DEVICE - A method of managing map information including: attaching a retrieval identifier, according to input information, to map information which is obtained by retrieval based on the input information, the retrieval identifier indicating whether the map information is personal data or public data; storing the map information as the personal data into a storage device, the map information being indicated to be the personal data by the retrieval identifier attached in the attaching, and storing the map information as the public data into the storage device, the map information being indicated to be the public data by the retrieval identifier; and executing a navigation process using at least one of the personal data and the public data which are stored in the storage device. | 2014-03-27 |
20140090088 | Facilitating Claim Use by Service Providers - Aspects of the subject matter described herein relate to facilitating claim use in an identity framework. In aspects, a definition of a trust framework may be received and stored. A graphical interface may display a plurality of trust frameworks and allow an administrator to select which trust framework to instantiate. The graphical interface may also allow the administrator to define which rules of the trust framework to use in the instance of the trust framework. After receiving this information, the instance of the trust framework may be instantiated and configuration data provided to the administrator to allow the administrator to configure a Web service to invoke the instance of the trust framework to grant or deny access to the Web service. | 2014-03-27 |
20140090089 | CLOUD KEY DIRECTORY FOR FEDERATING DATA EXCHANGES - Embodiments are directed to providing attribute-based data access. In an embodiment, a data request specifies one or more search data attributes describing requested data that is to be found in an anonymous directory. The anonymous directory is configured to provide access to secured data according to access controls defined one or more clients. The secured data includes data that is associated with a particular client and that is encrypted using multi-authority attribute-based encryption, which associates the data with one or more encryption data attributes and that enables the data to be provided if conditions in the corresponding access controls are met. The particular portion of data is provided based on determining that the conditions in the corresponding access controls are met, and that at least one of the search data attributes is determined to be relevant to at least one of the encryption data attributes. | 2014-03-27 |
20140090090 | SYSTEM, METHOD, AND APPARATUS TO MITIGATERISK OF COMPROMISED PRIVACY - Various exemplary embodiments relate to a method and related network node including one or more of the following: retrieving a record of a first transaction, wherein the first transaction is associated with personally identifiable information of an owner; determining a first privacy risk value based on: a first transaction security metric associated with the first transaction, wherein the first transaction security metric includes a first set of security parameters, and a first set of weights correlated to the first set of security parameters; determining the current security status based on the first privacy risk value; and transmitting the current security status to the entity. | 2014-03-27 |
20140090091 | MANAGING PERSONAL PRIVACY SETTINGS - Various systems and methods for managing user information on mobile devices are described herein. A selection of user information is received from a user operating a user device. A privacy setting for the selection of user information is received from the user, the privacy setting to permit or deny access to the user information to a third-party application. The selection of user information and the privacy setting is transmitted from the user device to a receiving device, where the receiving device is configured to enforce the privacy setting for the third-party application executing on the receiving device. | 2014-03-27 |
20140090092 | INPUT/OUTPUT MODULE, DATA PROCESSING APPARATUS AND METHOD FOR CHECKING THE OPERATION OF A DATA PROCESSING APPARATUS - Various embodiments provide an input/output module, including: at least one input/output port for the input of data; a signature generator that is coupled to the input/output port and is set up to generate a signature for the data from the data; a reference input, wherein the reference input is set up for the application of a reference signature; and a comparator that is coupled to the signature generator and to the reference input, and is set up to output an alarm signal if the signature of the data on the input/output port differs from the reference signature. | 2014-03-27 |
20140090093 | MESH GRID PROTECTION SYSTEM - A mesh grid protection system is provided. The system includes grid lines forming a mesh grid proximate to operational logic and assertion logic configured to transmit a first set of signals on a first set of grid lines. The system also includes transformation logic coupled to the grid lines and configured to receive the first set of signals and transform the first set of signals to generate a second set of signals and transmit the second set of signals on a second set of grid lines. The system further includes verification logic coupled to the transformation logic and configured to compare the second set of signals to an expected set of signals. | 2014-03-27 |
20140090094 | MODULATORS OF SLC22A7 - The present invention is directed to the identification of modulators for SLC22A7 transporter and therapeutic uses thereof. Hence, in one embodiment the present invention relates to a method for identifying and/or obtaining a compound capable of modulating glutamate transport, comprising contacting a test compound with a system for measuring those transport activity, which system comprises an SLC22A7 polypeptide or a functional fragment thereof, and a substrate for measuring glutamate transport by the system; and detecting an altered level of the those transport activity of the SLC22A7 polypeptide or functional fragment in the presence of the test compound compared to the described transport activity in the absence of the test compound and/or presence of a control. | 2014-03-27 |
20140090095 | Genetically Modified Mice and Engraftment - A mouse with a humanization of the mIL-3 gene and the mGM-CSF gene, a knockout of a mRAG gene, and a knockout of a mIl2rg subunit gene; and optionally a humanization of the TPO gene is described. A RAG/Il2rg KO/hTPO knock-in mouse is described. A mouse engrafted with human hematopoietic stem cells (HSCs) that maintains a human immune cell (HIC) population derived from the HSCs and that is infectable by a human pathogen, e.g., | 2014-03-27 |
20140090096 | SPINACH HYBRID SV3580VC - The invention provides seed and plants of spinach hybrid SV3580VC and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of spinach hybrid SV3580VC and the parent lines thereof, and to methods for producing a spinach plant produced by crossing such plants with themselves or with another spinach plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the leaf and gametes of such plants. | 2014-03-27 |
20140090097 | SELF-COMPATIBLE, RAPID-CYCLING BRASSICA RAPA PLANTS LACKING INBREEDING DEPRESSION - The invention provides | 2014-03-27 |
20140090098 | METHODS AND COMPOSITIONS FOR EXTENDING SHELF LIFE OF PLANT PRODUCTS - The invention provides compositions and methods related to selective inhibition of PPO11 and use for improving shelf life of a plant or parts thereof. In accordance with the invention, for example, compositions for topical application to a plant or part thereof, are provided that can reduce browning of the plant or part thereof to extend shelf life. | 2014-03-27 |
20140090099 | GENERATION OF HAPLOID PLANTS AND IMPROVED PLANT BREEDING - Methods and compositions for generating haploid organisms are described. | 2014-03-27 |
20140090100 | OMEGA-9 QUALITY BRASSICA JUNCEA - The invention relates to improved | 2014-03-27 |
20140090101 | TRANSGENIC PLANTS WITH ENHANCED AGRONOMIC TRAITS - This invention provides transgenic plant cells with recombinant DNA for expression of proteins that are useful for imparting enhanced agronomic trait(s) to transgenic crop plants. This invention also provides transgenic plants and progeny seed comprising the transgenic plant cells where the plants are selected for having an enhanced trait selected from the group of traits consisting of enhanced water use efficiency, enhanced cold tolerance, increased yield, enhanced nitrogen use efficiency, enhanced seed protein, enhanced seed oil and modified oil composition. Also disclosed are methods for manufacturing transgenic seed and plants with enhanced traits. | 2014-03-27 |
20140090102 | USE OF THE RD29 PROMOTER OR FRAGMENTS THEREOF FOR STRESS-INDUCIBLE EXPRESSION OF TRANSGENES IN COTTON - In one aspect, the present application discloses a chimeric gene comprising (a) a first nucleic acid sequence comprising at least 400 consecutive nucleotides of SEQ ID NO: 1 or SEQ ID NO: 2 or a nucleic acid sequence having at least 80% sequence identity thereto any of which confers stress inducibility on said chimeric gene; (b) a second nucleic acid sequence encoding an expression product of interest, which is involved in the response of a cotton plant to stress; and optionally (c) a transcription termination and polyadenylation sequence. In another aspect, the application discloses a cotton plant cell comprising (a) a chimeric gene comprising a first nucleic acid sequence comprising at least 400 consecutive nucleotides of SEQ ID NO: 1 or SEQ ID NO: 2 or a nucleic acid sequence having at least 80 sequence identity thereto any of which confers stress inducibility on said chimeric gene; (b) a second nucleic acid sequence encoding an expression product of interest; and optionally (c) a transcription termination and polyadenylation sequence. In addition, the present application discloses a cotton plant, a method of expressing a transgene in cotton under stress conditions, a method of producing a cotton plant, a method of detecting the expression of a transgene under stress conditions and a method for modulating the resistance of a cotton plant to stress as characterized in the claims. | 2014-03-27 |
20140090103 | METHODS AND COMPOSITIONS FOR INCREASING PLANT DISEASE RESISTANCE AND YIELD - The present invention discloses novel plant homologs of the | 2014-03-27 |
20140090104 | INSECTICIDAL PROTEINS - Compositions and methods for controlling plant pests are disclosed. In particular, novel engineered hybrid insecticidal proteins (eHIPs) having toxicity to at least corn rootworm are provided. By fusing unique combinations of complete or partial variable regions and conserved blocks of at least two different | 2014-03-27 |
20140090105 | Methods for Increasing Resistance to Soybean Cyst Nematode in Soybean Plants - The invention relates to methods and compositions for increasing resistance to infection by soybean cyst nematode on a soybean plant, plant part or plant cell. Nucleotide sequences that confer resistance to soybean cyst nematode when expressed in soybean are provided. | 2014-03-27 |
20140090106 | LYSM RECEPTOR-LIKE KINASES TO IMPROVE PLANT DEFENSE RESPONSE AGAINST FUNGAL PATHOGENS - Perception of chitin fragments (chitooligosaccharides) is an important first step in plant defense response against fungal pathogen. LysM receptor-like kinases (LysM RLKs) are instrumental in this perception process. LysM RLKs also play a role in activating transcription of chitin-responsive genes (CRGs) in plants. Mutations in the LysM kinase receptor genes or the downstream CRGs may affect the fungal susceptibility of a plant. Mutations in LysM RLKs or transgenes carrying the same may be beneficial in imparting resistance against fungal pathogens. | 2014-03-27 |
20140090107 | PLANT VARIANT, METHOD FOR PRODUCING PLANT VARIANT, AND METHOD FOR ACCUMULATING SOLUBLE SUGAR - This invention is intended to allow accumulation of large quantities of soluble sugars in tissue other than plant seeds. A plant is modified so as to suppress a gene encoding a subunit exhibiting the highest sequence similarity with the subunit encoded by the AGPL1 gene of rice among subunits constituting. | 2014-03-27 |
20140090108 | Vectors and Methods For Enhancing Recombinant Protein Expression in Plants - Expression vectors and methods of their use for enhancing the production of recombinant proteins in plants or plant cells are described. Production can be further enhanced upon co-expression of the P19 suppressor of gene-silencing from tomato bushy stunt virus. Preferably, the recombinant proteins are therapeutic enzymes and/or antibodies and methods are carried out in | 2014-03-27 |
20140090109 | CULTIVAR, METHOD FOR DIFFERENTIATING PLANT CULTIVARS, AND METHOD FOR CAUSING EARLIER MATURING OF RICE INDIVIDUAL - An object of the present invention is to provide a new rice cultivar that matures earlier than the original cultivar, and a method for causing a rice individual to mature earlier. The present invention relates to a rice cultivar Koshihikari kazusa no. 6 having the cultivar registration application number 25587, a progeny individual obtained by crossbreeding two individuals selected from the group consisting of an individual of the aforementioned cultivar and a progeny individual thereof, and a method for causing a rice individual to mature earlier that comprises replacing a region corresponding to a region containing base number 31,720,064 to base number 31,724,043 of the third chromosome of rice cultivar Nipponbare with a chromosome fragment composed of the corresponding region of rice cultivar Koshihikari kazusa no. 6 or rice cultivar Habataki in the third chromosome of the rice individual. | 2014-03-27 |
20140090110 | PLANTS HAVING ENHANCED YIELD-RELATED TRAITS AND METHOD FOR MAKING THE SAME - Provided is a method for enhancing yield-related traits in plants by increasing expression in plants of a nucleic acid encoding a Low Sulfur Upregulated polypeptide (LSU). Also provided are plants having increased expressing of a nucleic encoding an LSU polypeptide, which have enhanced yield-related traits compared with control plants. Also provided are LSU-encoding nucleic acids, and constructs comprising the same, useful in enhancing yield-related traits in plants. | 2014-03-27 |
20140090111 | Plant Hormone Biosensors - The invention provides fusion proteins comprising at least two fluorescent proteins, with the fluorescent proteins emitting different wavelengths of light from one another, at least one plant hormone binding domain that changes three-dimensional conformation upon specifically binding to a plant hormone, and two linker peptides, with the first linker linking the first fluorescent protein to the N-terminus of the plant hormone binding domain and the second linker linking the second fluorescent protein to the C-terminus of the plant hormone binding domain. The invention also provides for methods of using the fusion proteins of the present invention and nucleic acids encoding the fusion proteins. | 2014-03-27 |
20140090112 | FAD2 PERFORMANCE LOCI AND CORRESPONDING TARGET SITE SPECIFIC BINDING PROTEINS CAPABLE OF INDUCING TARGETED BREAKS - A method of gene editing or gene stacking within a FAD2 loci by cleaving, in a site directed manner, a location in a FAD2 gene in a cell, to generate a break in the FAD2 gene and then ligating into the break a nucleic acid molecule associated with one or more traits of interest is disclosed. | 2014-03-27 |
20140090113 | ENGINEERED TRANSGENE INTEGRATION PLATFORM (ETIP) FOR GENE TARGETING AND TRAIT STACKING - An Engineered Transgene Integration Platform (ETIP) is described that can be inserted randomly or at targeted locations in plant genomes to facilitate rapid selection and detection of a GOI that is perfectly targeted (both the 5′ and 3′ ends) at the ETIP genomic location. One element in the subject disclosure is the introduction of specific double stranded breaks within the ETIP. In some embodiments, an ETIP is described using zinc finger nuclease binding sites, but may utilize other targeting technologies such as meganucleases, CRISPRs, TALs, or leucine zippers. Also described are compositions of, and methods for producing, transgenic plants wherein the donor or payload DNA expresses one or more products of an exogenous nucleic acid sequence (e.g. protein or RNA) that has been stably-integrated into an ETIP in a plant cell. In embodiments, the ETIP facilitates testing of gene candidates and plant expression vectors from ideation through Development phases. | 2014-03-27 |
20140090114 | Nucleic acid molecules and other molecules associated with plants and uses thereof for plant improvement - Recombinant polynucleotides useful for improvement of plants are provided. In particular, polynucleotide sequences are provided from plant sources. Polypeptides encoded by the polynucleotide sequences are also provided. The disclosed recombinant polynucleotides and polypeptides find use in production of transgenic plants to produce plants having improved properties. | 2014-03-27 |
20140090115 | FUNCTIONAL EXPRESSION OF SHUFFLED YEAST NITRATE TRANSPORTER (YNT1) IN MAIZE TO IMPROVE NITRATE UPTAKE UNDER LOW NITRATE ENVIRONMENT - The present invention provides methods and compositions relating to altering NT activity, nitrogen utilization efficiency and/or uptake in plants. The invention relates to a method for the production of plants with maintained or increased yield under low nitrogen fertility. The invention provides isolated nitrate transporter variant (NT variant) nucleic acids and their encoded proteins. The invention further provides recombinant expression cassettes, host cells, and transgenic plants. Plants transformed with nucleotide sequences encoding the NT variant enzyme show improved properties, for example, increased yield. | 2014-03-27 |
20140090116 | FAD2 PERFORMANCE LOCI AND CORRESPONDING TARGET SITE SPECIFIC BINDING PROTEINS CAPABLE OF INDUCING TARGETED BREAKS - Methods and compositions for gene disruption, gene editing or gene stacking within a FAD2 loci by cleaving, in a site directed manner, a location in a FAD2 gene in a soybean cell, to generate a break in the FAD2 gene and then optionally integrating into the break a nucleic acid molecule of interest is disclosed. | 2014-03-27 |
20140090117 | MAGNETIC HEAD INSPECTION SYSTEM AND MAGNETIC HEAD INSPECTION METHOD - The magnetic head inspection method includes, exciting the cantilever of a magnetic force microscope at a predetermined frequency, the cantilever being provided with a magnetic probe on the end thereof, floating the magnetic probe over the writing head of the magnetic head and two-dimensionally scanning a search range, detecting the specific position of the writing head based on the search two-dimensional magnetic field intensity of the writing head with exciting state of the cantilever in the two-dimensional scan, setting a shape detection range smaller than the search range for detecting the shape of the writing head based on the specific position, and floating the magnetic probe over the writing head with exciting state of the cantilever, detecting the shape of the writing head by detecting the detection two-dimensional magnetic field intensity of the writing head in the two-dimensional scan. | 2014-03-27 |
20140090118 | PROBES FOR MULTIDIMENSIONAL NANOSPECTROSCOPIC IMAGING AND METHODS OF FABRICATION THEREOF - This disclosure provides systems, methods, and apparatus related to probes for multidimensional nanospectroscopic imaging. In one aspect, a method includes providing a transparent tip comprising a dielectric material. A four-sided pyramidal-shaped structure is formed at an apex of the transparent tip using a focused ion beam. Metal layers are deposited over two opposing sides of the four-sided pyramidal-shaped structure. | 2014-03-27 |
20140090119 | Ananas plant named 'Duranas2' - A new and distinct | 2014-03-27 |
20140090120 | Cherry rootstock plant named 'STO3' - A new and distinct cultivar of | 2014-03-27 |
20140090121 | Satsuma hybrid named 'Sonet' - A new Satsuma hybrid ( | 2014-03-27 |
20140090122 | Blackberry plant named 'A-2312' - Description and specifications of a new and distinct blackberry cultivar named ‘A-2312’ which originated from seed produced by a hand pollinated cross of Ark. Selection APF-1 (non-patented, unreleased genotype)×A-2002 (non-patented, unreleased genotype) is provided. This new blackberry cultivar can be distinguished by its firm, large, sweet fruit with excellent postharvest handling potential, attractive fruit appearance, very good flavor, excellent plant health, potential reduced chilling requirement compared to other University of Arkansas's cultivars, and high yields. | 2014-03-27 |
20140090123 | Hop Plant Named 'HORT3953' - A new and distinct hop plant is described. The triploid cultivar results out of selection from a population of seedlings derived from the deliberate crossing the unreleased selections 00-L125-09 (not patented) and 99-58-39 (not patented). The new variety, ‘Hort3953’, is distinguished from others by its late spring growth and late cone maturity along with a high alpha:beta acids ratio. The new variety is suitable for beer flavouring. | 2014-03-27 |
20140090124 | Tibouchina urvilleana plant named 'TB01' - ‘TB01’ is a distinctive variety of | 2014-03-27 |