21st week of 2010 patent applcation highlights part 62 |
Patent application number | Title | Published |
20100132036 | VERIFICATION OF OUTSOURCED DATA STREAMS - Embodiments disclosed herein are directed to verifying query results of an untrusted server. A data owner outsources a data stream to the untrusted server, which is configured to respond to a query from a client with the query result, which is returned to the client. The data owner can maintain a vector associated with query results returned by the server and can generate a verification synopsis using the vector and a seed. The verification synopsis includes a polynomial, where coefficients of the polynomial are determined based on the seed. The data owner outputs the verification synopsis and the seed to a client for verification of the query results. | 2010-05-27 |
20100132037 | SYSTEM AND METHOD TO LOCATE A PREFIX HIJACKER WITHIN A ONE-HOP NEIGHBORHOOD - Method, system and computer-readable medium to locate a prefix hijacker of a destination prefix within a one-hop neighborhood on a network. The method includes generating one-hop neighborhoods from autonomous system (AS)-level paths of plural monitors to a destination prefix. The method also includes determining a suspect set of AS identifiers resulting from a union of the one-hop neighborhoods. The method further includes calculating a count and a distance associated with each AS identifier of the suspect set. The count indicates how often the AS identifier appeared in the one-hop neighborhoods. The distance indicates a total distance from the AS identifier to AS identifiers associated with the plural monitors. Yet further, the method includes generating a one-hop suspect set of AS identifiers from the suspect set that have highest counts and highest distances. | 2010-05-27 |
20100132038 | System and Method for Computer Malware Detection - Disclosed are systems and methods for computer malware detection. The system is configured to emulate execution of a program code, monitor events of program execution, classify the monitored events as malicious or non-malicious, and collect information about unclassifiable events. The system further includes one or more analyst workstations configured to isolate a program analyst from external audiovisual stimuli. The workstation includes a video output device operable to display a list of unclassifiable events and event-related information to the program analyst and a user input device operable to receive analyst's physiological response indicative of whether the displayed list of unclassifiable events exhibits malicious behavior. | 2010-05-27 |
20100132039 | SYSTEM AND METHOD TO SELECT MONITORS THAT DETECT PREFIX HIJACKING EVENTS - Method, system and computer-readable medium to select monitors that increase the likelihood of detecting prefix hijacking events of a destination prefix are disclosed. The method includes assigning each of the candidate prefix hijack monitors to a respective cluster of a plurality of clusters. Each of the candidate prefix hijack monitors is associated with an autonomous system (AS) that indicates an AS path of autonomous systems (ASes) from the AS to a destination prefix associated with a destination AS. The method further includes iteratively merging a pair of clusters with a highest similarity score amongst cluster pairs of the plurality of clusters into a single cluster until a processed number of clusters is less than or equal to a predetermined number of clusters. The method also includes ranking each candidate prefix hijack monitor of each of the processed number of clusters according to a route type from an AS associated with the candidate prefix hijack monitor and an AS distance from the AS associated with the candidate prefix hijack monitor to the destination AS. Yet further, the method includes determining a highest ranked candidate prefix hijack monitor of each of the processed number of clusters. | 2010-05-27 |
20100132040 | Automated method and system for monitoring local area computer networks for unauthorized wireless access - According to an embodiment of the present invention, the wireless activity in a geographic area containing LAN connection ports is monitored using one or more sensor devices, called sniffers. By analyzing said wireless activity, one or more APs that are operating in said geographic area are identified. The active APs so identified are classified into three categories, namely “authorized” APs (those that are allowed by network administrator), “unauthorized” APs (those that are not allowed by the network administrator, but are still connected to the LAN of interest) and “external” APs (those that are not allowed by network administrator but are not connected to the LAN of interest, for example APs connected to the neighbor's LAN) by conducting one or more tests. The sniffers continue to monitor the selected geographic area to detect any wireless station attempting to connect to or communicating with the one or more identified unauthorized APs. Upon identifying unauthorized AP and/or intruding wireless station an indication is transferred to the prevention process. | 2010-05-27 |
20100132041 | INTERCEPTION-BASED CLIENT DATA NETWORK SECURITY SYSTEM - An interception-based client data network security system is provided, which includes a user end device, an interception device and a security center. The interception device performs interception of data packets from the user end device according to preset conditions and allows the intercepted data packets to be formedints event logs and then transmits the event logs to the security center for storage. And, the security center compares the stored event logs according to specific search commands for providing security services in correspondence with the stored event logs, thereby overcoming the drawbacks of conventional MPLS or mirror techniques in which the transfer of mass data packets causes overloading of the servers of the security center and excessive consumption of network bandwidth. | 2010-05-27 |
20100132042 | METHOD FOR UPGRADING ANTIVIRUS SOFTWARE AND TERMINAL AND SYSTEM THEREOF - A method for upgrading antivirus software and corresponding terminal and system thereof are provided. The method includes: reporting, by a first operating system connected to a terminal, a first device port of the terminal to a computer when the computer is started; running, by the computer, a second operating system of the port via the first device port; loading, by the second operation system, a driver of a network communication device or the terminal, and downloading, by the second operation system, an update file of the antivirus software from a remote virus database server via the network communication device, and adopting, by the first operating system of the terminal, the update file of the antivirus software to update the antivirus software. The beneficial effects of the present invention lie in that the latest antivirus software can be updated when the computer is started, thus ensuring the system security and antivirus efficiency. | 2010-05-27 |
20100132043 | Method and Apparatus for an End User Identity Protection Suite - A method comprising an indicator showing an overall security status of a user. | 2010-05-27 |
20100132044 | Computer Method and Apparatus Providing Brokered Privacy of User Data During Searches - Computer method and apparatus brokers and provides user data in a computer network of users. The invention system stores user data of the users. A search engine enables a searching user to query the stored user data and maintain anonymity of the users. The invention system brokers the query/search results. Each user whose stored user data matches the query maintains stewardship or control over the exposure of her/his user data. An output unit displays to the searching user the matching user data as brokered through (approved and optionally edited by) the respective user. | 2010-05-27 |
20100132045 | APPARATUS AND METHOD FOR RIGHT MANAGEMENT OF DIGITAL CONTENTS - Disclosed is an apparatus for right management of digital contents includes: a digital right manager that creates a usage right of digital contents on the basis of received right information; and a contents manager that provides the digital contents in accordance with the created usage right, wherein the contents manager includes a contents packing unit that receives the usage right created from the digital right manager, and extracts and packages components of the digital contents in accordance with the usage right, and a contents providing unit that receives packaged digital contents created from the contents packaging unit and provides the digital contents to a contents using device. | 2010-05-27 |
20100132046 | Electronic Circuit for Securing Data Interchanges Between a Computer Station and a Network - The present invention relates to an electronic circuit for securing data interchanges between a computer station and a network, said circuit comprising a first network interface connected to said network, said circuit comprising at least a second network interface connected to a network interface of said computer station, a unit for processing data passing between the first network interface and the second network interface, an interface for connection to an internal bus of the computer station suitable for electrically connecting the power supply, said electronic circuit not comprising any means of transferring processed data with the bus of said station. The invention applies in particular to the protection of personal computers handling confidential data. | 2010-05-27 |
20100132047 | SYSTEMS AND METHODS FOR TAMPER RESISTANT MEMORY DEVICES - Systems and methods for tamper resistant memory devices are provided. In one embodiment, a memory device comprises a memory cell for storing digital data, the memory cell having a plurality of memory addresses accessible for read and write operations through a memory interface; and a tamper detection circuit coupled to the memory cell, the tamper detection circuit comprising: a communications decoder coupled to the memory interface, wherein the communications decoder observes sequences of memory access operations to the memory cell; at least one timer for counting a duration of time; a tamper detect state machine responsive to the communications decoder and the at least one timer; and a data destruct engine responsive to the tamper detection state machine, wherein upon receiving an activation signal from the tamper diction state machine, the data destruct engine overwrites digital data stored in the memory cell. | 2010-05-27 |
20100132048 | Protecting Isolated Secret Data of Integrated Circuit Devices - A circuit arrangement, method, and design structure for controlling access to master secret data disposed in at least a portion of at least one persistent region of an integrated circuit device is disclosed. The circuit arrangement includes a clock circuit responsive to an external clock signal, a security state machine configured to control a security state of the integrated circuit device, and a master secret circuit in communication with the security state machine and configured to control access to the master secret data. The security state machine and master secret circuit are isolated from the clock circuit, and the master secret circuit is responsive to the security state machine to selectively erase at least a portion of the master secret data. The master secret circuit may be configured to erase the portion of the master secret data in response to a null or triggered security state. | 2010-05-27 |
20100132049 | LEVERAGING A SOCIAL GRAPH FROM A SOCIAL NETWORK FOR SOCIAL CONTEXT IN OTHER SYSTEMS - A social network contains information describing information about members of the social network and about various connections among the members. An external system that interacts with users (such as a website) communicates with the social network to access information about the members of the social network. In particular, the external system may determine whether a user is a member of the social network and then obtain information about the member and the member's connections within the social network. This allows an external system to use information from the social network to enhance a user's experience on the external system, while enforcing each member's privacy settings. | 2010-05-27 |
20100132050 | APPARATUS, SYSTEM, AND METHOD FOR ENFORCING POLICY REQUIREMENTS ASSOCIATED WITH A SERVICE - A computer-readable medium having stored thereon a plurality of instructions including instructions that when executed by a processor enable a service provider to track and enforce policy requirements associated with a provided service of the service provider. The application software configured to provide notification of the policy requirements and to trigger an intentional degradation of the provided service as a function of time when a user fails to comply with at least one of the policy requirements. | 2010-05-27 |
20100132051 | PROTECTING LIVE CONTENT IN A NETWORK - A method for protecting live content in a multimedia system. An Acquisition Point that receives content distributes it in a network comprising a recording device and a rendering device. The content is associated with a license comprising a content identifier and the identity of the sending Acquisition Point. If the content is live, the license indicates that the content is “live protected”. A rendering device that receives the content and its license asks | 2010-05-27 |
20100132052 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND COMPUTER READABLE MEDIUM - An information processing system includes: an organization information storage that stores organization information which defines an organization including users and groups of the users; a usage control information storage that stores usage control information which is for controlling use of control target information by each user in the organization defined by the organization information and defining a user or a group of users who or which is permitted to use the control target information and a usage range of the control target information in which the user or the group of the users is permitted to use the control target information; a judgment unit that judges whether or not an inconvenience resulting from a change of the organization occurs in the usage control information stored in the usage control information storage based on the organization information stored in the organization information storage; and a countermeasure unit that performs a countermeasure against the inconvenience in a case where the judgment unit judges that the inconvenience resulting from the change of the organization occurs. | 2010-05-27 |
20100132053 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD AND PROGRAM - An illegal use of a privileged instruction and a library function by an application process is prevented. A concept of “security gate” is provided, and an instruction is located at a head of the library function in a high-reliability memory area which is not easy changed such as a ROM, to request a security gate entry to an OS. An instruction is located at the last of the library function to request a security gate exit to the OS. The security level is changed to a higher level and a privileged instruction is allowed to be executed, only when the application process in a security gate entry state. | 2010-05-27 |
20100132054 | System and Method for Securing a Computer System - A secured computer system includes a communication interface and an intrusion detection module. The computer system may be portable and configured for wireless communication with a user of the system. The user may activate and configure an alarm monitor, which may be triggered by motion of the computer system. If the triggered alarm is not deactivated, an alarm sequence is activated. If the alarm sequence is not cancelled, then security measures for protecting sensitive data on the computer system from unauthorized access may be executed. The security measures may include removing data or rendering a storage device inaccessible. | 2010-05-27 |
20100132055 | ANIMAL MODEL FOR THE SELECTION AND VALIDATION OF AGENTS ACTIVE AGAINST PULMONARY EMPHYSEMA AND COLORECTAL CANCER - The present invention relates to a non-human animal model, cell and tissue cultures derived therefrom, which do not produce or produce only suboptimal levels of one or more functional sestrins and in addition do not produce or do only produce suboptimal levels of latent transforming growth factor β binding protein 4 (ltbp4). Furthermore, the present invention relates to a method for selecting agents for treating the pulmonary emphysema and/or the colorectal cancer exhibited by utilizing the animal model, cell or tissue culture of the invention. The animal model, cell or tissue culture is suitable for preclinical testing of efficacy, toxicity and bioavailability of potential agents. | 2010-05-27 |
20100132056 | Germ Cell Marker Using Fish Vasa Gene - In order to examine whether or not a germ cell derived from a donor fish, which has been transplanted into a recipient fish of a different species by a surrogate fish technique, grows or matures in the gonad of the recipient fish, it is necessary to use, as an indicator, a trait that is specifically expressed in the germ cell and can be used to distinguish the recipient fish from the donor fish. Vasa gene, which is a germ cell-specific gene, is specific to a primordial germ cell and a spermatogonium/an oogonium, and it is not expressed in a somatic cell. In the present invention, the Vasa gene sequences of a tuna, a chub mackerel, a spotted mackerel, an eastern little tuna, and a drumfish are determined, and the expression of such gene is used as a marker for a germ cell. In addition, according to the present invention, it is possible to specifically detect only a tuna Vasa gene in Vasa gene sequences that are highly conserved in fishes, without sequencing. Thus, a tuna-derived germ cell can be reliably and simply identified in the gonad of the recipient fish. As a result, the growth or breeding of tuna can be carried out with good efficiency. Moreover, utilizing the aforementioned findings, even in a case in which not only a tuna but also another Perciformes fish is used as a donor, a germ cell derived from the donor fish can be efficiently detected from the gonad of a recipient fish of a different species. | 2010-05-27 |
20100132057 | GENETICALLY MODIFIED ANIMAL FOR USE IN EVALUATING HARMFULNESS OF TEST SUBSTANCE - A genetically modified animal that includes an introduced DNA including a functionally linked aryl hydrocarbon receptor-binding enhancer located 5′-upstream of a tyrosine hydroxylase gene, promoter of any type, reporter gene, and poly(A) addition signal. | 2010-05-27 |
20100132058 | Methods and materials for determining pain sensitivity and predicting and treating related disorders - Methods of treating somatosensory disorders and modulating production of proinflammatory cytokines by administering to a subject an effective amount of a COMT modulator, ADRB2 modulator, ADRB3 modulator or combinations thereof are provided. Methods of predicting effective pharmacological therapies for a subject afflicted with a somatosensory disorder by determining a genotype of the subject with regard to a gene selected from the group consisting of COMT, ADRB2, ADRB3, and combinations thereof are further provided. Methods of determining pain responses or pain perception and predicting susceptibility of a subject to develop related disorders, such as somatosensory disorders and somatization, by determining a genotype of the subject with regard to a gene selected from the group consisting of COMT, ADRB2, ADRB3, and combinations thereof are further provided. | 2010-05-27 |
20100132059 | TEMPERATURE-INDUCED POLYNUCLEOTIDES AND USES THEREFOR - The present invention is based on the discovery that the transcriptional activity of both hamster mammary tumor 7 (HMT-7) and hamster layilin genes are increased when Chinese Hamster Ovary (CHO) cells are cultured at temperatures lower than 37° C. The present invention provides novel genomic, cDNA, and protein sequences of HMT-7 and a novel genomic sequence for hamster layilin. Included in the genomic sequences are novel temperature-induced promoter sequences for each; two promoter sequences are provided for HMT-7 and one promoter sequence is provided for layilin. The invention additionally provides antisense and siRNA molecules to the nucleic acid molecules of HMT-7. The invention also provides genetically engineered expression vectors comprising the novel temperature-induced promoters of the invention, which are particularly useful as part of a mammalian temperature-inducible expression system. The invention also provides host cells and/or transgenic animals comprising the novel nucleic acid molecules of the invention. The invention further provides methods of using the polynucleotides of the invention, e.g., for temperature-induced transgene expression. | 2010-05-27 |
20100132060 | THERAPEUTING COMPOSITIONS COMPRISING AN RNAI AGENT AND A NEUROTROPHIC FACTOR AND METHODS OF USE THEREOF - The invention provides novel combination therapies for treating neurodegenerative disease which comprise a) neurotrophic factors or suitable fragments thereof and b) agents capable of causing inhibition of a gene responsible for the neurodegenerative disease. The invention provides novel nucleic acid sequences, methods, and systems suitable for applications of these combination therapies. | 2010-05-27 |
20100132061 | NOVEL SOYBEAN 75155 - Disclosed is the seed of a novel soybean cultivar, designated 75155, a sample of which is deposited under ATCC Accession No. ______. Also disclosed are plants, or parts thereof, grown from the seed of the cultivar, plants having the morphological and physiological characteristics of the 75155 cultivar, and methods of using the plant or parts thereof in a soybean breeding program. | 2010-05-27 |
20100132062 | Rice Mutant Allele - A rice mutant allele designated Rc-g is disclosed. The invention relates to the Rc-g nucleotide sequence, the amino acid sequence, rice seeds containing the mutant allele Rc-g, to rice plants containing the mutant allele Rc-g and to methods for producing a rice plant containing the mutant allele Rc-g produced by crossing a rice plant containing allele Rc-g with itself or another rice variety. The invention further relates to hybrid rice seeds and hybrid rice plants containing mutant allele Rc-g. | 2010-05-27 |
20100132063 | TOBACCO CULTIVAR AOB 176 - The present invention relates to a novel tobacco cultivar designated AOB 176, which has low to intermediate nicotine content. The invention provides seeds of the cultivar AOB 176, plants and parts thereof of the cultivar AOB 176, a tissue culture derived from the cultivar AOB 176, hybrids produced from cultivar AOB 176 and lines derived from cultivar AOB 176, as well as genetically modified forms of the foregoing plants and tissue culture. Also provided are methods of producing cultivar AOB 176 plants, cultivar AOB 176 hybrid plants, and tobacco lines derived from cultivar AOB 176. In addition, products produced from the plants of the present invention are provided. | 2010-05-27 |
20100132064 | TOBACCO CULTIVAR AOB 175 - The present invention relates to a novel tobacco cultivar designated AOB 175, which has low to intermediate nicotine content. The invention provides seeds of the cultivar AOB 175, plants and parts thereof of the cultivar AOB 175, a tissue culture derived from the cultivar AOB 175, hybrids produced from cultivar AOB 175 and lines derived from cultivar AOB 175, as well as genetically modified forms of the foregoing plants and tissue culture. Also provided are methods of producing cultivar AOB 175 plants, cultivar AOB 175 hybrid plants, and tobacco lines derived from cultivar AOB 175. In addition, products produced from the plants of the present invention are provided. | 2010-05-27 |
20100132065 | Method and a Device for Micro-Reproduction of Plants - A method and a device for micro-reproduction of plants in a closed space, in which pieces of plant tissue are placed on a growth plate having at least light, air, moisture and nutrition supplied thereto, wherein the plant tissue is placed in a bio-incubator and is supplied probiotics in order to increase the plant growth and to reduce the growth of undesirable bacterial and fungal cultures. | 2010-05-27 |
20100132066 | AGROBACTERIUM-MEDIATED METHOD FOR PRODUCING TRANSFORMED PLANT WITHOUT SELECTION STEP - The present invention aims to provide a novel | 2010-05-27 |
20100132067 | MARKER MAPPING AND RESISTANCE GENE ASSOCIATIONS IN SOYBEAN - The invention provides novel molecular genetic markers in soybean, where the markers are useful, for example, in the marker-assisted selection of gene alleles that impart disease-resistance, thereby allowing the identification and selection of a disease-resistant plant. The markers also find use in positional cloning of disease-resistance genes. | 2010-05-27 |
20100132068 | Cosmid Vector For Plant Transformation And Use Thereof - The present invention aims to provide novel vectors for plant transformation. | 2010-05-27 |
20100132069 | PATHOGEN-INDUCIBLE PROMOTERS AND THEIR USE IN ENHANCING THE DISEASE RESISTANCE OF PLANTS - Methods for producing pathogen-inducible promoters for the expression of genes in plants are provided. The pathogen-inducible promoters are inducible by one, two, three, or more plant pathogens. Methods for producing R genes that are inducible in a plant by more than one plant pathogen are further provided. Additionally, provided are R genes and other nucleic acid molecules comprising the pathogen-inducible promoters and that are made by such methods as well as plants, plant parts, plant cells, seeds, and non-human host cells comprising the R genes and other nucleic acid molecules | 2010-05-27 |
20100132070 | Plant Defense Genes and Proteins and Methods of Use - Methods and compositions for modulating development and defense responses are provided. Nucleotide sequences encoding plant defense proteins are provided. The sequences can be used in expression cassettes for modulating development, developmental pathways, and defense responses. Transformed plants, plant cells, tissues, and seed are also provided. | 2010-05-27 |
20100132071 | Plants Having Enhanced Yield-Related Traits And A Method For Making The Same - The present invention relates generally to the field of molecular biology and concerns a method for enhancing yield-related traits and/or improving various plant growth characteristics by modulating expression in a plant of a nucleic acid encoding a GRP (Growth Regulating Protein). The GRP is selected from a LOB-domain comprising protein (LOB: Lateral Organ Boundaries), herein abbreviated as LBD polypeptide, a JMJC (JUMONJI-C) polypeptide, a CKI (Casein Kinase I) polypeptide, a bHLH11-like (basic Helix-Loop-Helix 11) protein, a plant homeodomain finger-homeodomain (PHDf-HD) polypeptide, an ASR (abscisic acid-, stress-, and ripening-induced) polypeptide and/or a Squamosa promoter binding protein-like 1 1 (SPL11) transcription factor polypeptide. The present invention also concerns plants having modulated expression of a nucleic acid encoding a GRP, which plants have improved growth characteristics relative to corresponding wild type plants or other control plants. The invention also provides novel GRP nucleic acids and GRP polypeptides as well as constructs useful in the methods of the invention. | 2010-05-27 |
20100132072 | Method to Increase Crop Grain Yield Utilizing Complementary Paired Growth and Yield Genes - The present invention provides methods to increase crop yield utilizing transgenic complementary paired genes controlling plant growth and yield. The specific genes increase female reproductive organs and are paired with genes responsible for modifying the growth of non-yield specific plant tissues. Plants, plant progeny, seeds and tissues created by these methods are also described. Polynucleotides encoding the paired sequences are provided for expression in a plant of interest. Expression cassettes, plants, plant cells, plant parts and seeds comprising the sequences of the invention are further provided. In specific embodiments, the polynucleotide is operably linked to a constitutive promoter. | 2010-05-27 |
20100132073 | SESQUITERPENOID MODIFYING ENZYMES - We describe glycosyltransferase polypeptides that modify sesquiterpenoids and including pharmaceutical compositions comprising glycosylated sesquiterpenoids; methods to treat diseases, in particular cancer, bacterial and fungal infections and also flavourings and scents comprising glycosylated sesquiterpenoids. | 2010-05-27 |
20100132074 | METHOD FOR MODIFYING PLANT ARCHITECTURE AND ENHANCING PLANT BIOMASS AND/OR SUCROSE YIELD - The present invention relates to methodology and constructs for modifying plant architecture and enhancing plant biomass and/or sucrose yield. | 2010-05-27 |
20100132075 | Self displacement sensing cantilever and scanning probe microscope - Provided is a self displacement sensing cantilever, including: a cantilever ( | 2010-05-27 |
20100132076 | Fluid Delivery for Scanning Probe Microscopy - The following invention pertains to the introduction of a gas (or fluid) around a SPM probe or nanotool™ to control chemical activity e.g. oxygen to promote oxidation, argon to inhibit oxidation or clean dry air (CDA) to inhibit moisture to control static charging due to the action of the probe or nanotools and to provide vacuum at and around the tip and substrate area. The invention can also produce electrical current for use with active electronic devices on, in or near the body of the device. In addition by use of a fluid like water, certain oils, and other liquids in conjunction with specific tip structure either electric discharge machining can be used at the tip area on the tip itself (in conjunction with a form structure on the work piece) or on a work piece beneath the tip to shape, polish and remove material at very small scales (10 microns to 1 nm or less). | 2010-05-27 |
20100132077 | SURFACE ANALYSIS AND MEASUREMENT METHOD BASED ON FLOW RESISTANCE OF FLUID AND ATOMIC FORCE MICROSCOPE USING THE METHOD - Provided is a surface analysis and measurement method based on the flow resistance of a fluid. The method comprises: spraying a fluid on the surface of a sample; identifying and determining if a flow resistance value of the fluid colliding with the sample surface is optimal for the measurement of the surface topography of the sample; setting the determined optimal flow resistance value to a reference value and moving the sample in the X-Y axes to allow the entire surface of the sample to be scanned; varying the position of the sample in the Z axis together with the X-Y axis movement to adjust varying flow resistance values of the fluid along the irregular surface topography of the sample to the set flow resistance value during scanning; and expressing the movement ranges of the sample in the X, Y and Z axes as numerical values and representing the numerical values as brightness values on a computer screen to display the surface topography of the sample. Further provided is an atomic force microscope using the method. | 2010-05-27 |
20100132078 | Method for Measuring the Force of Interaction in a Scanning Probe Microscope - A scanning probe microscope and method for operating the same are disclosed. The microscope includes a probe mount for attaching a probe, an electromechanical actuator, a probe position signal generator, an impulse signal generator and a servo. A probe tip is mounted on a first end of a cantilever arm, a second end of the cantilever arm being mounted on a mechanical vibrator that causes the second end to vibrate in response to a drive signal. The probe position signal generator generates a position signal indicative of a position of the probe relative to the second end of the cantilever arm. The impulse signal generator measures a quantity related to an impulse imparted to the probe tip by the interaction between the tip and the local characteristics of the sample. The servo operates the electromechanical actuator so as to maintain the measured quantity at a predetermined value. | 2010-05-27 |
20100132079 | POLARIZATION-MODULATED TIP ENHANCED OPTICAL MICROSCOPE - Methods and systems for improving high resolution imaging using a polarization-modulated tip enhanced optical microscope. A polarizer is configured to alternately create and remove a region of enhanced optical intensity adjacent the tip of the microscope probe at the focus of a light source. The sample being studied emits photons at specific rates relative to a background rate depending on the existence or nonexistence of the region of enhanced optical intensity. Comparing the rate of emissions when the region of enhanced optical intensity exists to when it does not creates a detailed image of the sample. By not requiring the probe to oscillate, this system enhances the resolution of the microscope without potentially causing damage to the sample. | 2010-05-27 |
20100132080 | METHOD OF MAKING AND ASSEMBLING CAPSULATED NANOSTRUCTURES - An encapsulated nanostructure fabricated using layers of polymer material and further processed for use in a micro-scale target device is presented. The fabrication includes the formation on a substrate of an array of encapsulated nanostructures. The encapsulated nanostructures each include a nanostructure and a micro-scale, multi-block structure that encapsulates the nanostructure. Each encapsulated nanostructure can be made usable by a target device by removing, e.g., by etching, one of the layers to expose a portion of the nanostructure. | 2010-05-27 |
20100132081 | Variety of apple tree rootstock named 'mich 96' - A new and distinct | 2010-05-27 |
20100132082 | "Variety of Hydrangea Plant Named 'Horath" - A new and distinct | 2010-05-27 |
20100132083 | Variety of hydrangea plant named 'Hormei' - A new and distinct | 2010-05-27 |
20100132084 | Variety of hydrangea plant named 'Horstol' - A new and distinct | 2010-05-27 |