31st week of 2012 patent applcation highlights part 63 |
Patent application number | Title | Published |
20120198542 | Shared Security Device - A mechanism is provided for sharing one or more security appliances. A trusted system component associated with an application of a plurality of applications in a logically partitioned data processing system sets a destination address of a received packet to an address of a security appliance shared by the plurality of applications. The trusted system component sends the received packet to the security appliance. The trusted system component receives a response from the security appliance. The trusted system component determines whether the response indicates permitting the received packet to proceed to the intended recipient. The trusted system component sends the received packet to the recipient in response to the response indicating permitting the received packet to proceed. | 2012-08-02 |
20120198543 | ACCESSIBLE FILES - A computer implemented method for accessing one or more files including scanning a storage device using a processor for one or more signed files in response to the storage device coupling to a machine, authenticating one or more of the signed files, and configuring the processor to access accessible files from the storage device in response to authenticating one or more of the signed files. | 2012-08-02 |
20120198544 | SYSTEM AND METHOD FOR CONTROLLING USER ACCESS TO AN ELECTRONIC DEVICE - A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker. | 2012-08-02 |
20120198545 | System and Method for Providing Digital Content - A method of electronically displaying glyphs. The method includes receiving a glyph spacing, moving a first glyph toward a second glyph along an axis, identifying an intersection of a first axis coordinate of the first glyph with a second axis coordinate of the second glyph, and moving at least one of the glyphs along the axis to separate the first and second axis coordinates of the respective first and second glyphs by the glyph spacing. | 2012-08-02 |
20120198546 | APPARATUS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR ENTERING SECURE PASSWORDS - Apparatus, methods and/or computer program products are provided that facilitate entering secure passwords into a user device. A user requested image is displayed via a display or monitor of a user device. The image is zoomable to one or more higher resolution levels beyond an initial display resolution, and the image is displayed at higher resolution levels in response to a user activating a zoom function via the user device. The coordinates of a user selected feature within a displayed higher resolution level image are obtained and translated into a password. The password is then entered into the requesting application. | 2012-08-02 |
20120198547 | ENHANCED ORGANIZATION AND AUTOMATIC NAVIGATION OF DISPLAY SCREENS FACILITATING AUTOMATION CONTROL - The disclosed subject matter comprises an enhanced screen organizer component (ESOC) that can efficiently control organization and presentation of desired screens, which relate to an industrial control system, to a user. At design time, a designer employs the ESOC to select and organize one or more screens for a project relating to a control system, create and organize screen folders that can contain desired folders or screens in a hierarchical fashion, select a home screen or favorite screens, respectively, for the operator, role or group, wherein a home screen can be a screen a user views when authenticated into a terminal or the screen the user can be returned to in response to selection of a home control. During run time, the user can access desired screens, and use context menus to select a home screen, favorite screens, or other screens, in accordance with user access rights. | 2012-08-02 |
20120198548 | BLANK SMART CARD DEVICE ISSUANCE SYSTEM - A smart card issuance system and method are disclosed. In a first aspect a method and system for issuing a smart card device (SC) is disclosed. The method and system comprise providing an initialization phase of the SC by a manufacturer and providing an authentication phase of the SC by the manufacturer. The method and system also include deploying the SC, providing a first time authentication phase for a specific customer by the issuer (IS) after the SC is deployed and starting a first phase of the registration process of the SC for the specific customer by the issuer. The method and system further include providing another authentication phase of the SC by IS after the first time authentication; and providing of an authentication of the IS by the SC. When both the SC and IS are mutually authenticated, the IS and the specific customer are allowed to complete the registration process. In a second aspect, a data transmission process and system for a smart card device (SC) of an issuer (IS) is disclosed. The process and system comprises performing a login of the SC by a user and performing a mutual authentication of the SC and the IS. The process and system further includes establishing a session key after mutual authentication is established. The session key is used to encrypt and decrypt data for transmission between the IS and the SC. | 2012-08-02 |
20120198549 | METHOD AND SYSTEM FOR DETECTING MALICIOUS DOMAIN NAMES AT AN UPPER DNS HIERARCHY - A method and system for detecting a malicious domain name, comprising: collecting domain name statistical information from a non-recursive domain name system name server (RDNS NS); and utilizing the collected domain name statistical information to determine if a domain name is malicious or benign. | 2012-08-02 |
20120198550 | ELECTRONIC TRANSACTION RISK MANAGEMENT - A method of detecting unauthorized activity in an electronic message transfer system comprising a plurality of devices, each device being configured to generate and receive cryptographically secured transfer messages for exchanging content with other devices in the system. In each device, audit information is accumulated in a memory of the device. The device periodically forwards at least part of its accumulated audit information to a secure server. | 2012-08-02 |
20120198551 | METHOD, SYSTEM AND DEVICE FOR DETECTING AN ATTEMPTED INTRUSION INTO A NETWORK - Described herein are embodiments of methods, systems and devices for detecting an attempted intrusion into a network. In one aspect, the network is an advanced metering infrastructure (AMI) network. In another aspect, the network is an home area network (HAN). In accordance with one aspect, a method of detecting an attempted intrusion into a network is described. This embodiment of a method comprises configuring an entrapment meter such that it receives data packets from a network, but does not transmit data packets to the network. The entrapment meter is also configures such that the entrapment meter appears vulnerable to unauthorized intrusion to the network. The configured entrapment meter is used to detect an attempted unauthorized intrusion into the network. The attempted unauthorized intrusion is monitored. | 2012-08-02 |
20120198552 | METHOD, COMPUTER SOFTWARE, AND SYSTEM FOR PROVIDING END TO END SECURITY PROTECTION OF AN ONLINE TRANSACTION - Techniques for categorizing programs running on an information handling system. One method includes, while a program is running on an information handling system in a manner that permits the program to infect the information handling system, calculating a first score and a second score. The first score is indicative of the likelihood that the program is malicious; the second score is indicative of the likelihood that the program is valid. This method further includes categorizing the program with respect to the likelihood of the program infecting the information handling system, including by categorizing the program as valid code based on the second score being above a threshold value, regardless of the first score. | 2012-08-02 |
20120198553 | SECURE AUDITING SYSTEM AND SECURE AUDITING METHOD - Disclosed is a technique that audits security of a terminal connected to a network and executes a given program wherein a computer-virus free file is permitted to execute a program in a manner such that a computer virus is not activated. As a result, the terminal is maintained in a secure state. | 2012-08-02 |
20120198554 | Obfuscated Malware Detection - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for detecting obfuscated malware. In one aspect, a method includes identifying call instructions in a binary executable; executing the call instruction; executing instructions subsequent to a target of the call instruction; determining that an address identified by a stack pointer is different from the return address; in response to the determination that the address is different, determining if there is a non-obfuscation signal; if there is a non-obfuscation signal, identifying the call instruction as a non-obfuscated call instruction; if there is not a non-obfuscation signal, identifying the call instruction as a possibly obfuscated call instruction; determining whether the call instructions identified as possibly obfuscated call instructions exceeds a threshold; in response to the determination that the call instructions identified as possibly obfuscated call instructions exceeds the threshold, identifying the executable as an obfuscated executable. | 2012-08-02 |
20120198555 | TESTING WEB SERVICES THAT ARE ACCESSIBLE VIA SERVICE ORIENTED ARCHITECTURE (SOA) INTERCEPTORS - Systems, methods, and computer program products are disclosed for testing web service-related elements, where the instructions of a web service-related element are statically analyzed to identify a characteristic of an output of the web service-related element, and where it is determined from a received response to a web service request that the web service request was processed by the web service-related element if at least a portion of the response matches the characteristic of the output of the web service-related element. | 2012-08-02 |
20120198556 | INSIDER THREAT PING AND SCAN - Embodiments of the present invention provide apparatuses and methods for identifying computer systems that pose a threat for potential dissemination of confidential information, and thereafter, scanning the computer systems for unauthorized activity related to potential dissemination of confidential information. Embodiments of the invention comprise compiling a list of user computer systems that are at risk of accessing, using, or disseminating confidential information; determining whether the computer systems on the list are available for scanning; and scanning the computer systems on the list to identify an incident related to potential or actual threats or breaches of confidential information. | 2012-08-02 |
20120198557 | DETERMINING THE VULNERABILITY OF COMPUTER SOFTWARE APPLICATIONS TO PRIVILEGE-ESCALATION ATTACKS - Determining the vulnerability of computer software applications to privilege-escalation attacks, such as where an instruction classifier is configured to be used for identifying a candidate access-restricted area of the instructions of a computer software application, and a static analyzer is configured to statically analyze the candidate access-restricted area to determine if there is a conditional instruction that controls execution flow into the candidate access-restricted area, perform static analysis to determine if the conditional instruction is dependent on a data source within the computer software application, and designate the candidate access-restricted area as vulnerable to privilege-escalation attacks absent either of the conditional instruction and the date source. | 2012-08-02 |
20120198558 | XSS DETECTION METHOD AND DEVICE - The present invention discloses a XSS detection method for detecting the XSS vulnerabilities in a web page, comprising for each parameter-value pair in a set of parameter-value pairs that can be accepted by the web page: constructing a parameter-value pair in which a dedicated script is inserted; assembling a URL corresponding to the web page based on the parameter-value pair in which a dedicated script is inserted; acquiring the dynamic web page content corresponding to the assembled URL; and simulating the execution of the acquired dynamic web page content, if the dedicated script is executed, it is determined that the processing of the parameter in the web page contains XSS vulnerabilities. The present invention further discloses a corresponding XSS detection device and a web site security scanning system and a web scanning system using such a device. | 2012-08-02 |
20120198559 | POLICY BASED MANAGEMENT OF CONTENT RIGHTS IN ENTERPRISE/CROSS ENTERPRISE COLLABORATION - Systems, methods and apparatuses (i.e., utilities) for use in managing access to and use of artifacts (e.g., word or pdf documents, jpegs, and the like) and any copies thereof in an enterprise/cross-enterprise environment. The utility may include a content management system for storing the artifacts and managing use of the artifacts and an information rights management system for use in sealing the artifacts, validating users and granting licenses for use of the artifacts at the directive of the content management system. | 2012-08-02 |
20120198560 | Secure active element machine - Based upon the principle of Turing incomputability, and novel properties of the Active Element Machine, a malware-resistant computing machine is constructed. This new computing machine is a non-Turing, non-register machine (non von-Neumann), called an Active Element Machine (AEM). AEM programs are designed so that the purpose of the computation is difficult to apprehend by an adversary and hijack with malware. These methods can help hinder reverse engineering of proprietary algorithms and hardware design. | 2012-08-02 |
20120198561 | DATA TRANSMISSION APPARATUS, CONTROL METHOD THEREFOR, AND IMAGE INPUT/OUTPUT APPARATUS - According to the present invention, a data transmission apparatus capable of transmitting data by using a plurality of transmission media, comprises an authority storage unit, adapted to store authority information representing use authority to use each transmission medium by each user; and a transmission control unit, adapted to, in transmitting data, restrict data transmission to a destination corresponding to a transmission medium for which a current user does not have the use authority. | 2012-08-02 |
20120198562 | DIGITAL WORKS HAVING USAGE RIGHTS AND METHOD FOR CREATING THE SAME - Digital work adapted to be distributed within a system for controlling at least one of the distribution and use of digital works. The digital work includes digital content representing a portion of a digital work suitable for being rendered by a rendering device and usage rights associated with the digital content. The usage rights specify a manner of use indicating one or more stated purposes for which the digital work can be at least one of used and distributed by an authorized party. | 2012-08-02 |
20120198563 | DIGITAL WORKS HAVING USAGE RIGHTS AND METHOD FOR CREATING THE SAME - Digital work adapted to be distributed within a system for controlling at least one of the distribution and use of digital works. The digital work includes digital content representing a portion of a digital work suitable for being rendered by a rendering device and usage rights associated with the digital content. The usage rights specify a manner of use indicating one or more stated purposes for which the digital work can be at least one of used and distributed by an authorized party. | 2012-08-02 |
20120198564 | Security Classification Based on User Interaction - An embodiment of the invention includes a method and system for content management. More specifically, the system includes a user interface for receiving content from a user and a data repository connected to the user interface for storing the content. The user interface also receives a request to access the content from the user. A program processor is connected to the data repository, wherein the program processor determines whether the content includes a security classification. A communications module is connected to the program processor, wherein the communications module sends an alert to the user interface when the content does not include a security classification. The alert includes a request to assign a security classification to the content. | 2012-08-02 |
20120198565 | BUSINESS METHOD FOR AGGREGATION AND PRESENTATION OF THE MEDIA DATA - A method for aggregation and presentation of media data, includes the following steps: launching the application registered for interacting with internet community; authorizing the application in the external systems of the internet community using external Application Programming Interfaces; obtaining the permit from a media data keeper to access his/her media data in the internet community; retrieving the media data from the internet community through the application registered in that particular internet community to allow both the media data keeper and the registered application to access and use the aggregated data; selecting potentially presentable (supported) media data from the previously formed media data bank; presenting a series of the aggregated media data to an individual or corporate user (the recipient). The aggregation and presentation of the media data from the internet community is implemented through computer or telecommunication systems that provide the functioning of the application which obtains media data from various sources, aggregates it, filters, identifies the possibility of presenting the particular media data, sorts it out and implements its presentation. | 2012-08-02 |
20120198566 | Secure Distribution of Media Data - A technique for distributing media data in a secured fashion that mitigates unwanted or illegal copying/distribution of such data. An initial, degraded version of the media data is sent to one or more recipient(s). After confirming identity of a recipient at a receiving system, a supplemental version of the media data is sent to the receiving system which augments the degraded version such that it can then be played by the recipient(s). The degraded version of the media data has a reduced quality that is obtained by removing portions of the data and filling in the removed portions with dummy data. During a subsequent rebuilding of the media data, a supplemental version of the media data is sent to the receiving data processing system where it is merged/combined with the degraded version to form a copy that corresponds to the original, high-quality version of the media data. | 2012-08-02 |
20120198567 | DIGITAL WORKS HAVING USAGE RIGHTS AND METHOD FOR CREATING THE SAME - Digital work adapted to be distributed within a system for controlling at least one of the distribution and use of digital works. The digital work includes digital content representing a portion of a digital work suitable for being rendered by a rendering device and usage rights associated with the digital content. The usage rights specify a manner of use indicating one or more stated purposes for which the digital work can be at least one of used and distributed by an authorized party. | 2012-08-02 |
20120198568 | Security Classification Applying Social Norming - An embodiment of the invention provides a method for security classification applying social norming. More specifically, content is received from a user via an interface; and, a data repository connected to the interface stores the content. A portal connected to the data repository identifies an attempt to access the content from a non-user. A program processor connected to the portal determines whether the content includes a security classification. When the content does not include a security classification, a communications module connected to the program processor sends an alert to the user. The alert includes a request to assign a security classification to the content. When the content includes a security classification, the communications module sends a message to the user, wherein the message includes a request to verify the security classification. | 2012-08-02 |
20120198569 | ASSOCIATED WITH ABNORMAL APPLICATION-SPECIFIC ACTIVITY MONITORING IN A COMPUTING NETWORK - Embodiments herein disclosed provide for computer network security and, more specifically, monitoring application-based access to secure data and monitoring predetermined actions conducted on applications to determine abnormal access or abnormal actions. Specific embodiments of the invention provide for improved database which implements time period-structured tables and file directories. Such structuring of the database provides for automated data purging, backing-up of data and data recovery. Additional embodiments provide for tracking data attributes related to the monitored data, such as the quality of the monitored data, the quality of the monitored data and the origin of the monitored data. In addition, embodiments provide for validating the source of the monitored data to assure that data is received from a valid application. | 2012-08-02 |
20120198570 | Geo-Enabled Access Control - Aspects described herein provide methods and systems that monitor mobile data processing devices used for remote access to a computer network or system, and allowing or preventing access to the computer system or network based at least in part on a determined geographical location of the mobile device. Different datasets stored on the network or system might have different geographical limitations associated with each. Different users also might have different geographic access limitations for the same dataset. User location may be based on GPS information associated with the device from which the user is attempting access, based on Wi-Fi, triangulation, or the like, or may be based on a photograph taken by the remote access device contemporaneously with the access request. | 2012-08-02 |
20120198571 | DIGITAL WORKS HAVING USAGE RIGHTS AND METHOD FOR CREATING THE SAME - Digital work adapted to be distributed within a system for controlling at least one of the distribution and use of digital works. The digital work includes digital content representing a portion of a digital work suitable for being rendered by a rendering device and usage rights associated with the digital content. The usage rights specify a manner of use indicating one or more stated purposes for which the digital work can be at least one of used and distributed by an authorized party. | 2012-08-02 |
20120198572 | Determining Fraudulent Use of Electronic Devices Utilizing Matrix Codes - In one or more implementations, a computing device may receive information from a matrix code reader that scans multiple matrix codes, each displayed by one of multiple devices. The computing device may determine whether or not the devices are being fraudulently utilized, such as whether the devices are in the same location. Additionally, in some implementations, a computing device may receive a service request from a matrix code reader that includes an associated telephone number. The computing device may extract the number and may handle the service request based on the number. Moreover, in various implementations, a computing device may receive information from a matrix code reader that scans a displayed matrix code. The information may include an electronic signature that is included in the matrix code by the device. After receiving the information, the computing device may analyze the information to determine that the electronic signature is valid. | 2012-08-02 |
20120198573 | Agents that Reduce Neuronal Overexcitation - The present invention provides methods of identifying candidate agents for treating excitotoxicity-related disorders. The present invention further provides methods for treating excitotoxicity-related disorders. | 2012-08-02 |
20120198574 | Targeted cell death - The present invention provides compositions and methods for studying neuropathy. The compositions and methods provided herein are particularly useful for screening agents of therapeutic and/or diagnostic potential. | 2012-08-02 |
20120198575 | METHODS AND COMPOSITIONS FOR DETERMINING THE PURITY OF CHEMICALLY SYNTHESIZED NUCLEIC ACIDS - This application describes an antibody that specifically binds to a synthetic oligomer (e.g., an oligonucleotide or oligopeptide) having a organic protecting group covalently bound thereto, which antibody does not bind to that synthetic oligomer when the organic protecting group is not covalently bound thereto. Methods of making and using such antibodies are also disclosed, along with cells for making such antibodies and articles carrying immobilized oligomers that can be used in assay procedures with such antibodies. | 2012-08-02 |
20120198576 | METHODS FOR MAKING EMBRYONIC CELLS, EMBRYOS, AND ANIMALS SENSITIZED TO STRESS - Embodiments of the invention are based upon the discovery that exposure of cleavage-stage embryos to a stress inducer, e.g. heat shock or chemical, renders the exposed embryos more sensitive to a secondary treatment with a stress inducer, e.g. heat shock or chemical inducer. Accordingly, the present invention is directed to methods for making embryos, embryonic cells arising from them, and animals and plants that are sensitized to stress, e.g. physiologic or chemical stressors. Methods of screening for inducers and inhibitors of stress using, as test model systems, embryonic cells, embryos, animals, and plants that are sensitized to stress are also disclosed. | 2012-08-02 |
20120198577 | Method of Isolating Human Neuroepithelial Precursor Cells from Human Fetal Tissue - A method for isolating human neuroepithelial precursor cells from human fetal tissue by culturing the human fetal cells in fibroblast growth factor and chick embryo extract and immunodepleting from the cultured human fetal cells any cells expressing A2B5, NG2 and eNCAM is provided. In addition, methods for transplanting these cells into an animal are provided. Animals models transplanted with these human neuroepithelial precursor cells and methods for monitoring survival, proliferation, differentiation and migration of the cells in the animal model via detection of human specific markers are also provided. | 2012-08-02 |
20120198578 | VIRAL ASSAY - The present invention relates to an assay for detecting virus, in particular an assay for detecting viral replication in a tissue sample. The invention also relates to methods of determining the susceptibility of an animal to a virus, and methods of breeding animals with decreased susceptibility to a virus. | 2012-08-02 |
20120198579 | COTTON VARIETY 09R903B2R2 - The invention relates to the novel cotton variety designated 09R903B2R2. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 09R903B2R2. Also provided by the invention are tissue cultures of the cotton variety 09R903B2R2 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 09R903B2R2 with itself or another cotton variety and plants produced by such methods. | 2012-08-02 |
20120198580 | COTTON VARIETY 10R011B2R2 - The invention relates to the novel cotton variety designated 10R011B2R2. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 10R011B2R2. Also provided by the invention are tissue cultures of the cotton variety 10R011B2R2 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 10R011B2R2 with itself or another cotton variety and plants produced by such methods. | 2012-08-02 |
20120198581 | PEA CULTIVAR FP2292 - A novel pea cultivar designated FP2292 is disclosed. The invention relates to the seeds of pea cultivar FP2292, to the plants of pea cultivar FP2292, and parts thereof, for example pollen, ovule, berry or pod. The invention also relates to methods for producing a pea plant by crossing the cultivar FP2292 with itself or another pea line. The invention further relates to methods for producing a pea plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other pea lines derived from the pea cultivar FP2292. | 2012-08-02 |
20120198582 | Rice Cultivar Designated 'CL111' - Hybrids and derived cultivars of the rice cultivar designated 1CL 111’ are disclosed. The invention relates to hybrid rice seeds and plants produced by crossing the cultivar ‘CL11 with another rice cultivar. The invention further relates to other derivatives of the rice cultivar ‘CL 111.’ | 2012-08-02 |
20120198583 | Compositions and Methods for Rapid and Efficient Production of Quality Protein Maize - Compositions and methods for the universal and accelerated production of QPM are disclosed. | 2012-08-02 |
20120198584 | EXPRESSION CASSETTES DERIVED FROM MAIZE - The present invention includes expression cassettes that contain regulatory sequences derived from a target gene, for example, regulatory sequences from the HSP70, Ubi158, and Ubi361 genes, for expression of recombinant gene products in plants. Developmental expression profiling data were used to indentify several gene candidates for strong constitutive expression cassette development. Three expression cassettes were developed. They are based on the ZmHSP70, ZmUbi158, and ZmUBI361 genes. | 2012-08-02 |
20120198585 | ENHANCING DROUGHT TOLERANCE AND BACTERIAL RESISTANCE OF CROP SPECIES BY FUNCTIONAL INTERFERENCE OF 14-3-3 - The present invention generally relates to plants and methods of producing modified plants that exhibit enhanced drought resistance and bacterial resistance relative to non-modified plants. | 2012-08-02 |
20120198586 | NUCLEIC ACID MOLECULES THAT TARGET THE VACUOLAR ATPASE H SUBUNIT AND CONFER RESISTANCE TO COLEOPTERAN PESTS - This disclosure concerns nucleic acid molecules and methods of use thereof for control of coleopteran pests through RNA interference-mediated inhibition of target coding and transcribed non-coding sequences in coleopteran pests. The disclosure also concerns methods for making transgenic plants that express nucleic acid molecules useful for the control of coleopteran pests, and the plant cells and plants obtained thereby. | 2012-08-02 |
20120198587 | SOYBEAN TRANSCRIPTION FACTORS AND OTHER GENES AND METHODS OF THEIR USE - Gene expression is controlled at the transcriptional level by very diverse group of proteins called transcription factors (TFs). 5671 soybean ( | 2012-08-02 |
20120198588 | TRANSGENIC PLANTS WITH ALTERED REDOX MECHANISMS AND INCREASED YIELD - Polynucleotides are disclosed which are capable of enhancing yield of a plant transformed to contain such polynucleotides. Also provided are methods of using such polynucleotides, and transgenic plants and agricultural products, including seeds, containing such polynucleotides as transgenes. | 2012-08-02 |
20120198589 | METHOD FOR PRODUCING TRANSGENIC SURFACE LAYER CHIMERIC PLANT - A rose is produced in which an introduced gene is only present in a part of the cells thereof, such as cells of the L1 layer of flower petals, but is not present in germ cells such as pollen cells or ovule cells. Since the introduced gene is not propagated to other roses even when this rose is crossed with other roses, the possibility of dispersal of the introduced gene can be completely negated. | 2012-08-02 |
20120198590 | ANTIFUNGAL METABOLITES FROM FUNGAL ENDOPHYTES OF PINUS STROBUS - The disclosure pertains to isolated white pine toxigenic endophytes and the compounds produced by the fungal endophytes as well as methods and uses of the white pine endophytes. The isolated white pine toxigenic endophytes are useful for preparing white pine seedlings and plants that have increased tolerance to a pest and are prepared by inoculating a white pine seedling during the susceptible time window. | 2012-08-02 |
20120198591 | ROOM TEMPERATURE QUANTUM FIELD EFFECT TRANSISTOR COMPRISING A 2-DIMENSIONAL QUANTUM WIRE ARRAY BASED ON IDEALLY CONDUCTING MOLECULES - One, several or very many parallel quantum wires, e.g. especially 1-dimensional quantum-conducting heavy ion tracks—“true” quantum wires at room temperature—see similarly EP1096569A1 [1] and [2], or also perhaps SWCNTs, vertically directed or also slightly tilted—up to about 45 degrees—arranged in a 2 dimensional plane, which as a 2-dimensional array interconnect the source and drain contacts of the here invented transistor, are modulated with respect to their quantum-mechanical conductivity via the strength of an applied electric or magnetic field [3], which is homogenous or variable in space locally across the 2 dimensional quantum wire array. The I-V curves of such quantum wires are measured via a double resonant tunnelling effect which allows identifying quantum effects at room temperature. A “true” quantum wire is characterized by quantized current steps and sharp current peaks in the I-V (Isd versus Usd, not just Is a versus Ugate) curve. In the ideal case the quantum wires consist of straight polyacetylene-reminiscent molecules of the cumulene form ( . . . ═C═C═C═C═C═C═ . . . ) or of the form ( . . . —C≡C—C≡C—C≡C— . . . ) which are generated by the energy deposition during the single swift (heavy) ions' passage through the insulating DLC-layer. The switching time of the transistor is determined practically solely by the switching time of the magnetic field (time constant of the “magnetic gate”), the ohmic resistance of the source-drain connection via the quantum wire array is in the conducting state practically zero. The controlling “gate”-magnetic field having a component normal to the quantum wires can be generated by a small controlling current through some inductance (embodiment 1, FIG. | 2012-08-02 |
20120198592 | Seashore Paspalum turfgrass named 'Aloha' - A newly discovered, and asexually propagated genotype of Seashore | 2012-08-02 |