Patent application number | Description | Published |
20090177231 | SPINE RECONSTRUCTION ROD EXTENDER - A spine reconstruction rod extender may be used to extend an existing spine reconstruction rod without skipping a pedicle screw in the new construct, exposing the entire old construct, or adding a significant amount of size to the junction between the old and new construct. The resulting extended rod is a strong, durable inline spine reconstruction rod extender. | 07-09-2009 |
20090177232 | SPINE RECONSTRUCTION ROD EXTENDER - A spine reconstruction rod extender may be used to extend an existing spine reconstruction rod without skipping a pedicle screw in the new construct, exposing the entire old construct, or adding a significant amount of size to the junction between the old and new construct. The resulting extended rod is a strong, durable inline spine reconstruction rod extender. | 07-09-2009 |
20090204154 | EXPANDABLE ROD SYSTEM TO TREAT SCOLIOSIS AND METHOD OF USING THE SAME - Correction of a scoliotic curve in a spine comprises the steps of implanting an expanding rod isolated completely under the skin and attached to selected portions of the scoliotic curve of the spine at opposing ends of the rod; and producing a controlled force by means of expansion of the rod over at an extended time period under external control until a desire spinal curve is obtained. An incremental force is generated to stretch the scoliotic curve of the spine between the selected portions where attachment of the rod is defined. The controlled force is provided steadily for at least one month or alternatively 1-3 months. Multiple rods may be employed each associated with a different scoliotic curve of the spine or a different portion of the scoliotic curve. | 08-13-2009 |
20090287220 | PERCUTANEOUS SCREW EXTRACTOR - Apparatus and methods for percutaneous screw extraction from orthopedic plates are described. The screw extractor eliminates the need for relatively large incisions to expose an orthopedic plate for the replacement of failed screws in the plate. The present invention further provides a device to function with slightly modified screws that allows the screws to be removed quickly, easily, and safely, with no larger incisions than were used to install the plate. | 11-19-2009 |
20090299370 | DYNAMIZATION OF FIXED SCREW FRACTURE PLATES - A locking fracture plate may become a dynamic locking plate with the removal of a single set screw. The set screw removal may be done at the time of the initial implantation of the fracture plate, or several weeks later after the fracture has been allowed to consolidate. The device of the present invention may allow for the set screw to be removed percutaneously under x-ray control. The dynamized plate may allow for fracture compression but not for fracture displacement (loss or reduction) by rotation or sheer. The dynamized plate, with the set screw removed, may still protect the fracture from rotation and sheer. While conventional fracture plates may rigidly hold the bones in place, thereby potentially slowing bone fusion, or, in extreme cases, resulting in nonunion of the fracture, the fracture plate of the present invention may allow for fracture compression and, therefore, permit bone healing, growth and repair. | 12-03-2009 |
20100094302 | SPINAL DISTRACTION SYSTEM - A spinal distraction system includes an adjustable spinal distraction rod having first and second members, the adjustable spinal distraction rod configured for non-invasive elongation of the first and second members. The system includes an anchor rod configured for mounting to a bone of a subject, and a socket coupled to the anchor rod, the socket having a lumen dimensioned to receive an end of a first member, wherein the end of the first member is configured for telescopic sliding movement within the lumen of the socket and wherein the second member is configured for mounting to a second bone of a subject. | 04-15-2010 |
20120191138 | USE OF FLEXIBLE BUSHINGS TO PROMOTE HEALING AND STABLE FRACTURE COMPRESSION IN ORTHOPEDIC TRAUMA PLATES - In one embodiment, an orthopedic plate system is provided, comprising one or more orthopedic plates, each having one or more openings, a plurality of screws for securing one or more bones to said plates through said openings, and, means for flexibly locking said screws to said plates so that controlled motion of said bones is enabled after the securing of said bones to said plates. One advantage of said system is that of enhancing the healing of said bones and/or their fractures. A screw and bushing assembly, which flexibly locks said screw to an orthopedic plate, and a method of installing said orthopedic plate, are also disclosed. | 07-26-2012 |
20130096615 | EXPANDABLE ROD SYSTEM TO TREAT SCOLIOSIS AND METHOD OF USING THE SAME - Correction of a scoliotic curve in a spine comprises the steps of implanting an expanding rod isolated completely under the skin and attached to selected portions of the scoliotic curve of the spine at opposing ends of the rod; and producing a controlled force by means of expansion of the rod over at an extended time period under external control until a desire spinal curve is obtained. An incremental force is generated to stretch the scoliotic curve of the spine between the selected portions where attachment of the rod is defined. The controlled force is provided steadily for at least one month or alternatively 1-3 months. Multiple rods may be employed each associated with a different scoliotic curve of the spine or a different portion of the scoliotic curve. | 04-18-2013 |
20140371796 | EXPANDABLE ROD SYSTEM TO TREAT SCOLIOSIS AND METHOD OF USING THE SAME - Correction of a scoliotic curve in a spine comprises the steps of implanting an expanding rod isolated completely under the skin and attached to selected portions of the scoliotic curve of the spine at opposing ends of the rod; and producing a controlled force by means of expansion of the rod over at an extended time period under external control until a desire spinal curve is obtained. An incremental force is generated to stretch the scoliotic curve of the spine between the selected portions where attachment of the rod is defined. The controlled force is provided steadily for at least one month or alternatively 1-3 months. Multiple rods may be employed each associated with a different scoliotic curve of the spine or a different portion of the scoliotic curve. | 12-18-2014 |
20150134008 | EXPANDABLE ROD SYSTEM TO TREAT SCOLIOSIS AND METHOD OF USING THE SAME - Correction of a scoliotic curve in a spine comprises the steps of implanting an expanding rod isolated completely under the skin and attached to selected portions of the scoliotic curve of the spine at opposing ends of the rod; and producing a controlled force by means of expansion of the rod over at an extended time period under external control until a desire spinal curve is obtained. An incremental force is generated to stretch the scoliotic curve of the spine between the selected portions where attachment of the rod is defined. The controlled force is provided steadily for at least one month or alternatively 1-3 months. Multiple rods may be employed each associated with a different scoliotic curve of the spine or a different portion of the scoliotic curve. | 05-14-2015 |
Patent application number | Description | Published |
20090094161 | Provisioning users to multiple agencies - Apparatus and methods are described for providing employee cards to employees, such as PIV cards to federal employees, including provisioning the employees to a more than one agency (and more than one card) without requiring multiple instances of enrolling and adjudicating the employee. Representatively, a sponsor enters information about the employee into a computer-displayed form (e.g., web-based). Biometric identity information is collected for the employee, but if such has already begun or is complete for at least a first agency, the collected information is used for a second agency without redundant collection. In the event an adjudication level of the first agency is at least as stringent as it is for the second agency, the employee is eligible to receive an employee card for the second agency, in addition to an employee card for the first agency. | 04-09-2009 |
20090125986 | Secure launching of browser from privileged process - Methods and apparatus include securely launching a web browser from a privileged process of a workstation to minimize enterprise vulnerabilities. The workstation includes a web browser pointed toward a web server and a Logon API for use with a password/credential. An executable file is wrapped about the browser and imposes restrictions, such as preventing the writing to a registry or installing ActiveX controls. It also has functionality to prevent users from linking to web locations in other than an https protocol or following links beyond an original host. Upon indication of a forgotten password/credential, a DLL logs onto a user account which invokes the executable file to launch the web browser in the https protocol. Upon authentication of identity, the user changes their password/credential for later logging-on to the workstation via the Logon API, but in a capacity without the limited functionality or the imposed browser restrictions. | 05-14-2009 |
20090132828 | CRYPTOGRAPHIC BINDING OF AUTHENTICATION SCHEMES - Methods and apparatus cryptographically bind authentication schemes to verify that a secure authentication sequence was executed for access to sensitive applications/resources. Users execute two login sequences with a strong authentication framework. Upon completion of the first, the framework generates an unencrypted token from underlying data, later hashed into an authentication token. With a private key corresponding to the first sequence, the authentication token is encrypted and passed to the second sequence where it is encrypted again with a private key corresponding to the second sequence. Upon access attempts to the sensitive applications/resources, verification of execution of the two login sequences includes recovering the authentication token from its twice encrypted form and comparing it to a comparison token independently generated by the application/resource via the underlying data. An audit log associated with the application/resource stores the data, the recovered authentication token, etc., for purposes of later non-repudiation. | 05-21-2009 |
20090144450 | SYNCHING MULTIPLE CONNECTED SYSTEMS ACCORDING TO BUSINESS POLICIES - Apparatus and methods are described for synching data of multiple connected systems according to business policies utilized for common computing goals, such as identity management. A plurality of connectors interface with a corresponding one of the computing systems and have at least one object or attribute indicative of a status of an aspect of the common computing goals. A central connector interfaces with each of the connectors and encapsulates the entirety of business policies in a single location. It also monitors changes in the objects or attributes and, if detected, pushes data to a connector for pushing to its corresponding computing system. In this manner, data from all systems flows through the central connector and overcomes prior problems of business policies being located piecemeal in a variety of connectors, which may need swapping. Computer program products, computing systems, retrofits to existing software, to name a few, are other features. | 06-04-2009 |
20090193247 | PROPRIETARY PROTOCOL TUNNELING OVER EAP - Methods and apparatus provide tunneling one authentication framework over a more widely accepted framework (e.g., EAP). In this manner, pluralities of strong authentication protocols are wirelessly enabled between a supplicant and server that are not otherwise wirelessly enabled. During use, packets are wirelessly transmitted and received between the supplicant and server according to EAP's prescribed message format, including a wireless access point. In a tunnel, various authentication protocols form the payload component of the message format which yields execution capability of more than one protocol, instead of the typical single protocol authentication. Certain tunneled frameworks include NMAS, LDAP/SASL, Open LDAP/SLAPD, or IPSEC. Computer program products, computing systems and various interaction between the supplicant and server are also disclosed. | 07-30-2009 |
20120137351 | SECURE LAUNCHING OF BROWSER FROM PRIVILEGED PROCESS - Methods and apparatus include securely launching a web browser from a privileged process of a workstation to minimize enterprise vulnerabilities. The workstation includes a restricted-capability web browser pointed toward a web server. An executable file is wrapped about the browser and imposes restrictions, such as preventing the writing to a registry or installing ActiveX controls. It also has functionality to prevent users from linking to web locations in other than an https protocol or following links beyond an original host. Upon indication of a forgotten password/credential, the restricted-capability web is launched browser toward a web server. Upon authentication of identity, the user changes their password/credential for later logging-on to the workstation, but in a capacity without the limited functionality or the imposed browser restrictions. | 05-31-2012 |