14th week of 2014 patent applcation highlights part 62 |
Patent application number | Title | Published |
20140096248 | IDENTIFYING WHETHER AN APPLICATION IS MALICIOUS - Identifying whether a first application is malicious. The first application can be presented for installation on a processing system. The first application can be scanned, via a static analysis implemented by a processor, to determine whether a user interface layout of the first application is suspiciously similar to a user interface layout of a second application installed on the processing system. When the user interface layout of the first application is suspiciously similar to the user interface layout of the second application installed on the processing system, an alert can be generated indicating that the first application is malicious. | 2014-04-03 |
20140096249 | CONTINUOUS ANOMALY DETECTION BASED ON BEHAVIOR MODELING AND HETEROGENEOUS INFORMATION ANALYSIS - The present disclosure describes a continuous anomaly detection method and system based on multi-dimensional behavior modeling and heterogeneous information analysis. A method includes collecting data, processing and categorizing a plurality of events, continuously clustering the plurality of events, continuously model building for behavior and information analysis, analyzing behavior and information based on a holistic model, detecting anomalies in the data, displaying an animated and interactive visualization of a behavioral model, and displaying an animated and interactive visualization of the detected anomalies. | 2014-04-03 |
20140096250 | SYSTEM AND METHOD FOR COUNTERING DETECTION OF EMULATION BY MALWARE - Instructions of an application program are emulated such that they are carried out sequentially in a first virtual execution environment that represents the user-mode data processing of the operating system. A system API call requesting execution of a user-mode system function is detected. In response, the instructions of the user-mode system function called by the API are emulated according to a second emulation mode in which the instructions of the user-mode system function are carried out sequentially in a second virtual execution environment that represents the user-mode data processing of the operating system, including tracking certain processor and memory states affected by the instructions of the user-mode system function. Results of the emulating of the application program instructions according to the first emulation mode are analyzed for any presence of malicious code. | 2014-04-03 |
20140096251 | APPARATUS, SYSTEM AND METHOD FOR IDENTIFYING AND MITIGATING MALICIOUS NETWORK THREATS - Implementations of the present disclosure involve a system and/or method for identifying and mitigating malicious network threats. Network data associated is retrieved from various sources across a network and analyzed to identify a malicious network threat. When a threat is found, the system performs a mitigating action to neutralize the malicious network threat | 2014-04-03 |
20140096252 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR DYNAMICALLY ADJUSTING A LEVEL OF SECURITY APPLIED TO A SYSTEM - A system, method, and computer program product are provided for dynamically adjusting a level of security applied to a system. In use, predetermined activity that is at least potentially associated with unwanted activity is identified on a system. Further, a level of security applied to the system is dynamically adjusted, in response to the identification of the predetermined activity. | 2014-04-03 |
20140096253 | AVOIDANCE OF HOSTILE ATTACKS IN A NETWORK - For improving the protection of a network against denial of service attacks and other hostile attacks, while keeping the operation of the network simple and efficient and considering restricted capacities of single network nodes, a control unit, a system and a method for operating a network with a plurality of nodes are provided, wherein at least one operation parameter of at least one node is adjusted based on a current network phase and a data packet received by the node ( | 2014-04-03 |
20140096254 | EFFICIENT DATA TRANSFER IN A VIRUS CO-PROCESSING SYSTEM - Circuits and methods are provided for detecting, identifying and/or removing undesired content. According to one embodiment, a method for virus co-processing is provided. A general purpose processor stores a data segment to its system memory using a virtual address. The system memory has stored therein a page directory and a page table containing information for translating virtual addresses to physical addresses within a physical address space of the system memory. A virus processing hardware accelerator translates the virtual address of the data segment to a physical address of the data segment based on the page directory and the page table. The hardware accelerator accesses the data segment based on the physical address. The hardware accelerator scans the data segment for viruses by executing multiple pattern comparisons against the data segment. The hardware accelerator returns a result of the scanning to the general purpose processor via the system memory. | 2014-04-03 |
20140096255 | CORRECTING WORKFLOW SECURITY VULNERABILITIES VIA STATIC ANALYSIS AND VIRTUAL PATCHING - A computer program can be statically analyzed to determine an order in which client side workflows are intended to be implemented by the computer program. A virtual patch can be generated. When executed by a processor, the virtual patch can track web service calls from a client to the computer program, and determine whether the order of the web service calls from the client to the computer program correlate to the order in which client side workflows are intended to be implemented by the computer program. If the order of the web service calls from the client to the computer program do not correlate to the order in which client side workflows are intended to be implemented by the computer program, an alert can be generated. | 2014-04-03 |
20140096256 | JOINT PERFORMANCE-VULNERABILITY METRIC FRAMEWORK FOR DESIGNING AD HOC ROUTING PROTOCOLS - A system for routing data along a path that is both efficient and secure is provided. A performance and vulnerability routing system selects a path for routing using a joint metric for a link in a network of nodes. The system calculates the joint metric based on a combination of a performance metric and a vulnerability metric of a link. The performance metric for a link indicates the cost of transmitting data over the link, and the vulnerability metric for the link indicates the security of data that is transmitted over the link. The system combines the performance metric and the vulnerability metric to generate the joint metric, which indicates a joint cost of transmitting data. The system then selects paths for transmitting data that tend to minimize the sum of the joint costs of the links along the paths. | 2014-04-03 |
20140096257 | SECURITY REMEDIATION - A method is provided to remediate defects in first computer program code that can be used to configure a computer to produce code for use by the same or a different computer configured using second computer program code to use the produced code to produce output information, the method comprising: configuring a computer to perform static analysis of the first program to produce an information structure in a non-transitory computer readable storage device that associates a respective code statement of the first program code with a respective context, wherein the context associates a parser state with a potential defect in the produced code; identify a defect in the first computer program code that is associated with the respective code statement; and determining a remediation for the identified defect. | 2014-04-03 |
20140096258 | CORRECTING WORKFLOW SECURITY VULNERABILITIES VIA STATIC ANALYSIS AND VIRTUAL PATCHING - A computer program can be statically analyzed to determine an order in which client side workflows are intended to be implemented by the computer program. A virtual patch can be generated. When executed by a processor, the virtual patch can track web service calls from a client to the computer program, and determine whether the order of the web service calls from the client to the computer program correlate to the order in which client side workflows are intended to be implemented by the computer program. If the order of the web service calls from the client to the computer program do not correlate to the order in which client side workflows are intended to be implemented by the computer program, an alert can be generated. | 2014-04-03 |
20140096259 | SECURE TRANSPORT OF WEB FORM SUBMISSIONS - Methods and systems for secure web form submission may implement one or more operations including, but not limited to: receiving web content including at least one web form from a web server at a client; determining a value of at least one web form submission security attribute of the at least one web form; and transmitting submission data associated with the at least one web form from the client to the web server according to the value of the web form submission security attribute. | 2014-04-03 |
20140096260 | SYSTEMS AND METHODS TO PROVIDE SECURE STORAGE - Systems and method to provide secure storage are disclosed. An example method includes establishing a secure tunnel between a storage device and an agent, transferring first data from the storage device to the agent via the secure tunnel, the secure tunnel to prevent software executing in an operating system from modifying the data, and identifying a data modification by comparing the first data to second data. | 2014-04-03 |
20140096261 | METHOD AND APPARATUS FOR PROVIDING PRIVACY POLICY FOR DATA STREAM - An approach for providing a privacy policy for a data stream is described. A privacy policy determination platform causes, at least in part, an interception of at least one data stream accessible to at least one processing element of a stream processing framework. The privacy policy determination platform also causes, at least in part, a parsing of the at least one data stream to determine privacy sensitive data associated with at least one user. The privacy policy determination platform further determines at least one privacy policy for the at least one user, the at least one processing element, the at least one data stream, or a combination thereof based, at least in part, on the privacy sensitive data. | 2014-04-03 |
20140096262 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR SECURELY COLLECTING, SAFEGUARDING, AND DISSEMINATING ELECTRONICALLY STORED INFORMATION - Applicant has created methods, systems, and computer readable media for securely collecting, safeguarding, and disseminating electronically stored information to facilitate an account owner's management of her personal, private, business, and legal documents. The method for safeguarding can include a double authentication process that only grants exclusive access to an account owner's encrypted information through the use of a uniquely generated security key. The method for collecting information can include a real-time encryption process to permit an account holder to securely upload and store electronic media in category-based compartmentalized locations. Further, the method can include a process for generating category-based advertisements through an integrated marketing platform with geo-fencing capabilities to facilitate the account owner's selection of a variety of services related to the stored information. Finally, the method for disseminating information can include authenticating a request to disseminate the stored information to one or more trustees. | 2014-04-03 |
20140096263 | SYSTEMS AND METHODS FOR ENABLING AN AUTOMATIC LICENSE FOR MASHUPS - Systems and methods for managing digital rights settings are provided. In some aspects, the systems and methods described include receiving user input including an order for obtaining access rights to a media asset. Control circuitry determines whether the media asset is associated with a first package of media assets. The control circuitry cross-references a database of user order history to determine whether the user has obtained access rights for each media asset in the first package of media assets. If the user has obtained access rights for each media asset in the first package of media assets, the control circuitry generates digital rights settings for each media asset in the first package of media assets to enable the user to create a mashup. The mashup includes portions of at least one media asset in the first package. The control circuitry generates a display based on the digital rights settings. | 2014-04-03 |
20140096264 | ANALYTE DATA RETRIEVER - Methods and apparatus, including computer program products, are provided for processing analyte data. In some example implementations, a method may include receiving, at a first processing system including a user interface, an installation package including a plug-in and code configured to provide at the first processing system an interface between a sensor system configured to measure an analyte concentration level in a host and a second processing system; storing, by the first processing system, the installation package in a location based on a role of a user initiating the installation of the code; installing the plug-in for the user interface to enable the plug-in to control one or more aspects of an installation of the code; and initiating, by at least the plug-in, the installation of the code at the first processing system to provide the interface. Related systems, methods, and articles of manufacture are also disclosed. | 2014-04-03 |
20140096265 | METHOD AND A TECHNICAL EQUIPMENT FOR CONTROLLING METADATA ACCESS - A method for controlling access to metadata or a property in metadata of an electronic object comprises receiving a request from an identified user to access metadata of an electronic object; determining one or more pseudo-users that are allowed to access the requested metadata of the electronic object and their corresponding access modes; retrieving at least one person identity by utilizing at least one property value of one or more properties of the electronic object, which one or more properties correspond to the determined one or more pseudo-users; comparing the identity of the requesting identified user to the retrieved person identities, and if there is a match; providing to the requesting identified user an access to selected properties in the metadata, which selected properties are determined according to the access mode. The invention also relates to a method for defining access to metadata of an electronic object. | 2014-04-03 |
20140096266 | Protecting Online Meeting Access Using Secure Personal Universal Resource Locators - Access to online collaborative resources such as an online meeting, web conference, online chat room, an online video conference, an online audio conference, a collaboratively edited document, a collaborative browsing session, an online social networking group, or a web site is secured by providing a first user-specific URL to a first user for addressing collaborative resource; responsive to the first user accessing the first user-specific URL, granting by a computing system access to the collaborative event to the first user; and responsive to a second user accessing the first user-specific URL, preventing by a computing system access to the collaborative event to the second user. Optionally, time criteria for accessing the first user-specific URL may be used to invalidating the first user-specific URL, wherein access to the collaborative resource is disabled. | 2014-04-03 |
20140096267 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR SECURELY COLLECTING, SAFEGUARDING, AND DISSEMINATING ELECTRONICALLY STORED INFORMATION - Applicant has created methods, systems, and computer readable media for securely collecting, safeguarding, and disseminating electronically stored information to facilitate an account owner's management of her personal, private, business, and legal documents. The method for safeguarding can include a double authentication process that only grants exclusive access to an account owner's encrypted information through the use of a uniquely generated security key. The method for collecting information can include a real-time encryption process to permit an account holder to securely upload and store electronic media in category-based compartmentalized locations. Further, the method can include a process for generating category-based advertisements through an integrated marketing platform with geo-fencing capabilities to facilitate the account owner's selection of a variety of services related to the stored information. Finally, the method for disseminating information can include authenticating a request to disseminate the stored information to one or more trustees. | 2014-04-03 |
20140096268 | INFORMATION PROCESSING APPARATUS, DATA RETURNING METHOD AND STORAGE MEDIUM - According to one embodiment, an information processing apparatus provides a data storage service via a network for storing data of a user. The apparatus includes a recipient setting module and an account issuing module. The recipient setting module is configured to accept and set a recipient of data and recipient-receivable data, designated by the user. The account issuing module is configured to issue an account to the recipient set by the recipient setting module. The account has an access right for enabling the recipient to access the recipient-receivable data. | 2014-04-03 |
20140096269 | SYSTEMS AND METHODS FOR FAST STARTUP STREAMING OF ENCRYPTED MULTIMEDIA CONTENT - Methods and systems to allow for the streaming of media from a file server to a client, where the streaming occurs concurrently with the execution of an information security protocol. The security protocol allows the client to securely receive one or more keys that allow the client to access the media. This permits a user to access the media sooner than would otherwise be possible, while allowing timely performance of security related processing. | 2014-04-03 |
20140096270 | SECURE DATA CONTAINERS AND DATA ACCESS CONTROL - Various embodiments are generally directed to creating, sharing and various aspects of accessing information that is digitally stored in a data container on one or more computing devices. An apparatus comprises a processor circuit and a storage communicatively coupled to the processor circuit and storing a first sequence of instructions operative on the processor circuit to receive a signal indicating an access to a data container stored in the storage and comprising a protected data and a second sequence of instructions; and execute the second sequence of instructions, the second sequence of instructions operative on the processor circuit to examine security data associated with the apparatus and stored in the storage, and determine whether to grant access to the protected data based on the examination. Other embodiments are described and claimed herein. | 2014-04-03 |
20140096271 | Segment Authentication for Dynamic Adaptive Streaming - A method comprising generating a segment signature for a segment of a media content based on the segment, trusted information contained in a media presentation description (MPD), and a signature signing key, wherein the MPD describes the media content. An apparatus comprising a processor configured to compute a segment signature for a segment of a media content based on the segment, a signature signing key, and trusted information contained in a media presentation description (MPD), wherein the MPD describes the media content. | 2014-04-03 |
20140096272 | SYSTEM AND METHOD FOR VALIDATING INPUT BY DETECTING AND RECOGNIZING HUMAN PRESENCE - Techniques are disclosed for validating input on a handheld device. In response to receiving an input and a request to access a computing resource, an application running on the handheld device may collect data from one or more sensors of the handheld device. The application may then determine, based on the collected sensor data, if an individual is interacting with the device and recognize the input as valid if such is the case. In one embodiment, the application may present a challenge to a user which is difficult for computer programs to perform, and determine whether an individual is interacting with the device based on successful completion of the challenge. In an alternative embodiment, the application may collect data and determine whether an individual is interacting with the device without presenting an explicit challenge to the user. | 2014-04-03 |
20140096273 | MOUSE FOR PREDICTING A BEHAVIOR OF DRUGS IN HUMANS - The present invention is directed to the production, breeding and use of transgenic non-human animals such as mice in which specific genes, such as serum albumin, or portions of genes have been replaced by homologs from another animal, such as a human, to make the physiology of the animals so modified more like that of the other animal with respect to drug pharmacokinetics and metabolism. The invention also extends to the use of the genetically modified non-human animals of the invention for pharmacological and/or toxicological studies. | 2014-04-03 |
20140096274 | TNF Family Ligand Variants - The present invention relates to variants of TNF family ligands which have been mutated at the ligand trimerisation interface so that they are not capable of assembling into trimers, and either assemble into dimers or remain as monomers. Such ligands bind to the TNF receptor but are unable to activate it, effectively functioning as competitive inhibitors. The invention also relates to nucleic acids encoding the variants of TNF family ligands, vectors and host cells comprising the nucleic acid and methods for the treatment of diseases associated with aberrant signalling through a TNF receptor. | 2014-04-03 |
20140096275 | PORCINE REPRODUCTIVE AND RESPIRATORY SYNDROME VIRUS RESISTANT ANIMALS - The disclosure relates to genetically modified swine wherein at least one allele of a SIGLEC1 gene has been inactivated and/or at least one allele of a CD163 gene has been inactivated. Genetically modified swine having both alleles of the SIGLEC1 gene and/or both alleles CD 163 gene inactivated are resistant to porcine reproductive and respiratory syndrome virus (PRRSV). Methods for producing such transgenic swine are also provided. | 2014-04-03 |
20140096276 | PLANTS AND SEEDS OF COMMON WHEAT CULITVAR XY06-892 - A wheat cultivar, designated XY06-892, is disclosed. The invention relates to the seeds, plants, and hybrids of wheat cultivar XY06-892, and to methods for producing a wheat plant produced by crossing plants from wheat cultivar XY06-892 with themselves or with plants from another wheat variety. The invention also relates to methods for producing a wheat plant containing in its genetic material one or more transgenes and to the transgenic wheat plants and plant parts produced by those methods. The invention also relates to wheat varieties or breeding varieties and plant parts derived from wheat cultivar XY06-892, to methods for producing other wheat varieties, lines or plant parts derived from wheat cultivar XY06-892, and to the wheat plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid wheat seeds and plants produced by crossing wheat cultivar XY06-892 with another wheat cultivar. | 2014-04-03 |
20140096277 | MELON HYBRID SV1047MF AND PARENTS THEREOF - The invention provides seed and plants of melon hybrid SV1047MF and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of melon hybrid SV1047MF and the parent lines thereof, and to methods for producing a melon plant produced by crossing such plants with themselves or with another melon plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2014-04-03 |
20140096278 | Methods and Compositions for Selecting an Improved Plant - The invention is directed, in an embodiment, to a method for producing a transgenic plant comprising: providing a substantially homozygous plant line suitable for transformation; selecting a subline of the plant line having reduced heterogeneity; transforming plant materials from the subline with a transgenic construct that confers a desired trait to at least one transformed plant; recovering at least one transgenic event from the transformation step; and selecting a transgenic event exhibiting a desirable level of the desired trait using plants of the subline as control. The invention is also directed to a method for producing a plant having a desired trait. The invention also provides transgenic plants produced according to these methods. | 2014-04-03 |
20140096279 | BARLEY CULTIVAR BG-161 - A barley cultivar, designated BG-161, is disclosed. The invention relates to seeds, plants, and hybrids of barley cultivar BG-161, and methods for producing a barley plant produced by crossing plants from barley cultivar BG-161 with themselves or plants from another barley variety. The invention also relates to methods for producing a barley plant containing in its genetic material one or more transgenes and to the transgenic barley plants and plant parts produced by those methods. The invention also relates to barley varieties derived from barley cultivar BG-161, to methods for producing other barley varieties, lines or plant parts derived from barley cultivar BG-161, and to the barley plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid barley seeds and plants produced by crossing barley cultivar BG-161 with another barley cultivar. | 2014-04-03 |
20140096280 | MEANS AND METHODS TO INDUCE APOMIXIS IN PLANTS - The present invention relates to nucleic acid molecules for use in inducing aponnixis in a plant, transgenic cells, in particular transgenic plant cells, comprising said nucleic acid molecule, transgenic plants, in particular plant seeds, comprising said nucleic acid molecule, methods for inducing apomixis in a plant, methods for the production of apomictic plants and uses thereof. | 2014-04-03 |
20140096281 | AXMI232, AXMI233, AND AXMI249 TOXIN GENES AND METHODS FOR THEIR USE - Compositions and methods for conferring pesticidal activity to bacteria, plants, plant cells, tissues and seeds are provided. Compositions comprising a coding sequence for a toxin polypeptide are provided. The coding sequences can be used in DNA constructs or expression cassettes for transformation and expression in plants and bacteria. Compositions also comprise transformed bacteria, plants, plant cells, tissues, and seeds. In particular, isolated toxin nucleic acid molecules are provided. Additionally, amino acid sequences corresponding to the polynucleotides are encompassed, and antibodies specifically binding to those amino acid sequences. In particular, the present invention provides for isolated nucleic acid molecules comprising nucleotide sequences encoding the amino acid sequence shown in SEQ ID NO:4-19, or the nucleotide sequence set forth in SEQ ID NO: 1-3, as well as variants and fragments thereof. | 2014-04-03 |
20140096282 | VACCINE FOR CONTROL OF BEET CURLY TOP VIRUS INFECTION OF PLANTS - The disclosure provides plant vaccine compositions and methods for inducing immunity to Beet Curly Top Virus (BCTV) and related curtoviruses in a susceptible plant. | 2014-04-03 |
20140096283 | Plants Having Enhanced Yield-Related Traits and a Method for Making the Same - The present invention relates generally to the field of molecular biology and concerns a method for enhancing various yield-related traits in plants by modulating expression in a plant of a nucleic acid encoding a TCP1 or a TCP2 transcription factor, an Epsin-like polypeptide, a tRNA delta(2)-isopentenylpyrophosphate transferase (IPPT) polypeptide, or a SHORT-ROOT (SHR) polypeptide. The present invention also concerns plants having modulated expression of a nucleic acid encoding a TCP1 or TCP2 polypeptide, an Epsin-like polypeptide, a tRNA delta(2)-isopentenylpyrophosphate transferase (IPPT) polypeptide, or a SHORT-ROOT (SHR) polypeptide, which plants have enhanced yield-related traits relative to corresponding wild type plants or other control plants. The invention also provides constructs useful in performing the methods of the invention. | 2014-04-03 |
20140096284 | METHOD FOR THE DELIVERY OF MOLECULES LYOPHILIZED ONTO MICROPARTICLES TO PLANT TISSUES - The invention provides particles and methods to deliver freeze- or air-dried molecules to cells. | 2014-04-03 |
20140096285 | SOYBEAN-BASED PORCINE REPRODUCTIVE AND RESPIRATORY SYNDROME VIRUS VACCINE AND METHODS FOR MAKING AND USING THE SAME - A transgenic soybean plant harboring an exogenous nucleic acid molecule encoding porcine reproductive and respiratory syndrome virus ORF7 immunogen and methods for using the same to induce an antibody response and prevent a porcine reproductive and respiratory syndrome virus infection are provided. | 2014-04-03 |
20140096286 | PROMOTER, PROMOTER CONTROL ELEMENTS, AND COMBINATIONS, AND USES THEREOF - The present document is directed to promoter sequences and promoter control elements, polynucleotide constructs comprising the promoters and control elements, and methods of identifying the promoters, control elements, or fragments thereof. The document further relates to the use of such promoters or promoter control elements to modulate transcript levels in plants, and plants containing such promoters or promoter control elements. | 2014-04-03 |
20140096287 | Polypeptides having endoglucanase activity and polynucleotides encoding same - The present invention relates to isolated polypeptides having endoglucanase activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides. | 2014-04-03 |
20140096288 | MICROSOMAL omega6 OLEATE DESATURASES - The present invention relates to the field of plant molecular biology, more particularly | 2014-04-03 |
20140096289 | CAPSICUM ROOTSTOCK - The present invention relates to a plant from the | 2014-04-03 |
20140096290 | DARLINGTON LETTUCE VARIETY - A new lettuce variety designated ‘Darlington’ is described. ‘Darlington’ is an iceberg lettuce variety exhibiting stability and uniformity. | 2014-04-03 |
20140096291 | BRILLIANT WHITE CAULIFLOWER - The present invention includes cauliflowers with enhanced whiteness and methods for obtaining such cauliflowers. The present invention also provides reagents that can be used in methods for obtaining such cauliflowers. | 2014-04-03 |
20140096292 | METHODS AND COMPOSITIONS FOR THE INHIBITION OF MERISTEMATIC GROWTH ON CUCURBIT ROOTSTOCK - The invention provides methods of inhibiting the growth of a shoot apical meristem of a cucurbit rootstock plant, comprising contacting a shoot apical meristem of the cucurbit rootstock plant with an effective amount of a composition comprising one or more fatty alcohols, thereby inhibiting the growth of the shoot apical meristem of the cucurbit rootstock plant. The present invention further provides methods for preparing and producing cucurbit rootstock plants for grafting and methods for grafting. Additionally provided are cucurbit rootstock plants and plant parts and grafted cucurbit plants produced by the methods of the invention. | 2014-04-03 |
20140096293 | METHOD AND APPARATUS FOR INSPECTING THERMAL ASSIST TYPE MAGNETIC HEAD - To reliably detect scattered light generated in the near field light generation area in the inspection of a thermal assist type magnetic head (herein after refer to magnetic head), the present invention provides a magnetic head inspection apparatus including: a scanning probe microscope including a cantilever having a probe with a magnetic film formed on the surface of the tip; a probe unit for supplying alternating current to a terminal formed in a magnetic head element, so that the laser beam is incident on the near field light emitting part; an imaging unit for taking an image of the probe unit and the magnetic head element; a scattered light detection unit for detecting the scattered light generated from the probe present in the generation area of the near field light of the magnetic head element, through a pinhole; and a signal processing unit for inspecting the magnetic head element. | 2014-04-03 |
20140096294 | Black berry plant named: 'Willamette Thornless Marion' - The present invention relates to a new and distinct cultivar of blackberry plant named “Willamette Thornless Marion’. The new cultivar originated as a mutation of the ‘Marion’. It is nearly identical in all ways to the ‘Marion’ except that it does not have thorns. | 2014-04-03 |
20140096295 | Strawberry plant named 'RED MERLIN' - This invention relates to a new and distinct variety of strawberry plant named ‘RED MERLIN’. The variety is characterized by its red fruit color, conical fruit shape, medium fruit size, early time of ripening, not remontant bearing, and flat globose plant habit. | 2014-04-03 |
20140096296 | Strawberry Plant Named 'HERRIOT' - This invention relates to a new and distinct June-bearing (short day responsive) strawberry plant named ‘Herriot’ primarily adapted to the growing conditions of the west central New York and other regions of similar climate. The new plant is primarily characterized by strong vigor, longer than broad fruit, conical fruit shape, uniformity in-shape between primary and secondary fruit, reflexed calyx, bright red fruit color, glossy fruit skin and highly pigmented petioles. | 2014-04-03 |
20140096297 | Hop plant named 'LD1817' - ‘LD1817’ is a strong, hearty hop plant, dark green in color with relatively large leaves in comparison to other hops. ‘LD1817’ easily reaches the full 18-foot height of the hop trellis with heavy vines and foliage. The cones, once fully matured, measure about 3 cm to 5 cm inches in length, are abundant on the vine, and have a pleasing, fruity aroma with moderate alpha acids. | 2014-04-03 |
20140096298 | Dracaena Plant Named 'Dragonrayo' - A new and distinct | 2014-04-03 |