Patent application number | Description | Published |
20100191182 | Mixing Tool - The present invention provides devices and methods for mixing a formulation containing two or more constituents, such as a drug product and a diluent. The devices have a chamber for securing a container of the drug product. Various embodiments are presented. In one embodiment the device has two or more sides connected by a hinge, the two or more sides defining the chamber between them, and a handle for grasping and manipulating the device. In another embodiment the device has a housing with two or more side bars defining the chamber, the container being visible from outside the housing between the side bars and having a stopping element at the distal end, and a handle having two arms for grasping. | 07-29-2010 |
20110212138 | SUSTAINED RELEASE FORMULATIONS USING NON-AQUEOUS CARRIERS - The disclosure provides one-component, injectable, sustained release formulations which comprise microspheres containing active pharmaceutical ingredients (e.g., exenatide), wherein the microspheres are suspended in a non-aqueous carrier. The non-aqueous carrier can be an oil, a fractionated oil, triglycerides, diglycerides, monoglycerides, propylene glycol fatty acid diesters, and the like. The formulations offer distinct advantages of long shelf life for the stability and potency of the formulation and sustained release of active pharmaceutical ingredients to reduce the frequency of medication dosing and to increase patient compliance. | 09-01-2011 |
20120296309 | MIXING TOOL - The present invention provides devices and methods for mixing a formulation containing two or more constituents, such as a drug product and a diluent. The devices have a chamber for securing a container of the drug product. Various embodiments are presented. In one embodiment the device has two or more sides connected by a hinge, the two or more sides defining the chamber between them, and a handle for grasping and manipulating the device. In another embodiment the device has a housing with two or more side bars defining the chamber, the container being visible from outside the housing between the side bars and having a stopping element at the distal end, and a handle having two arms for grasping. | 11-22-2012 |
20150056285 | SUSTAINED RELEASE FORMULATIONS USING NON-AQUEOUS CARRIERS - The disclosure provides one-component, injectable, sustained release formulations which comprise microspheres containing active pharmaceutical ingredients (e.g., exenatide), wherein the microspheres are suspended in a non-aqueous carrier. The non-aqueous carrier can be an oil, a fractionated oil, triglycerides, diglycerides, monoglycerides, propylene glycol fatty acid diesters, and the like. The formulations offer distinct advantages of long shelf life for the stability and potency of the formulation and sustained release of active pharmaceutical ingredients to reduce the frequency of medication dosing and to increase patient compliance. | 02-26-2015 |
Patent application number | Description | Published |
20140068797 | METHODS AND COMPOSITIONS FOR RNA-DIRECTED TARGET DNA MODIFICATION AND FOR RNA-DIRECTED MODULATION OF TRANSCRIPTION - The present disclosure provides a DNA-targeting RNA that comprises a targeting sequence and, together with a modifying polypeptide, provides for site-specific modification of a target DNA and/or a polypeptide associated with the target DNA. The present disclosure further provides site-specific modifying polypeptides. The present disclosure further provides methods of site-specific modification of a target DNA and/or a polypeptide associated with the target DNA The present disclosure provides methods of modulating transcription of a target nucleic acid in a target cell, generally involving contacting the target nucleic acid with an enzymatically inactive Cas9 polypeptide and a DNA-targeting RNA. Kits and compositions for carrying out the methods are also provided. The present disclosure provides genetically modified cells that produce Cas9; and Cas9 transgenic non-human multicellular organisms. | 03-06-2014 |
20160046961 | Methods and Compositions for RNA-Directed Target DNA Modification and For RNA-Directed Modulation of Transcription - The present disclosure provides a DNA-targeting RNA that comprises a targeting sequence and, together with a modifying polypeptide, provides for site-specific modification of a target DNA and/or a polypeptide associated with the target DNA. The present disclosure further provides site-specific modifying polypeptides. The present disclosure further provides methods of site-specific modification of a target DNA and/or a polypeptide associated with the target DNA The present disclosure provides methods of modulating transcription of a target nucleic acid in a target cell, generally involving contacting the target nucleic acid with an enzymatically inactive Cas9 polypeptide and a DNA-targeting RNA. Kits and compositions for carrying out the methods are also provided. The present disclosure provides genetically modified cells that produce Cas9; and Cas9 transgenic non-human multi-cellular organisms. | 02-18-2016 |
20160060653 | METHODS AND COMPOSITIONS FOR RNA-DIRECTED TARGET DNA MODIFICATION AND FOR RNA-DIRECTED MODULATION OF TRANSCRIPTION - The present disclosure provides a DNA-targeting RNA that comprises a targeting sequence and, together with a modifying polypeptide, provides for site-specific modification of a target DNA and/or a polypeptide associated with the target DNA. The present disclosure further provides site-specific modifying polypeptides. The present disclosure further provides methods of site-specific modification of a target DNA and/or a polypeptide associated with the target DNA The present disclosure provides methods of modulating transcription of a target nucleic acid in a target cell, generally involving contacting the target nucleic acid with an enzymatically inactive Cas9 polypeptide and a DNA-targeting RNA. Kits and compositions for carrying out the methods are also provided. The present disclosure provides genetically modified cells that produce Cas9; and Cas9 transgenic non-human multicellular organisms. | 03-03-2016 |
20160060654 | METHODS AND COMPOSITIONS FOR RNA-DIRECTED TARGET DNA MODIFICATION AND FOR RNA-DIRECTED MODULATION OF TRANSCRIPTION - The present disclosure provides a DNA-targeting RNA that comprises a targeting sequence and, together with a modifying polypeptide, provides for site-specific modification of a target DNA and/or a polypeptide associated with the target DNA. The present disclosure further provides site-specific modifying polypeptides. The present disclosure further provides methods of site-specific modification of a target DNA and/or a polypeptide associated with the target DNA The present disclosure provides methods of modulating transcription of a target nucleic acid in a target cell, generally involving contacting the target nucleic acid with an enzymatically inactive Cas9 polypeptide and a DNA-targeting RNA. Kits and compositions for carrying out the methods are also provided. The present disclosure provides genetically modified cells that produce Cas9; and Cas9 transgenic non-human multicellular organisms. | 03-03-2016 |
20160068864 | METHODS AND COMPOSITIONS FOR RNA-DIRECTED TARGET DNA MODIFICATION AND FOR RNA-DIRECTED MODULATION OF TRANSCRIPTION - The present disclosure provides a DNA-targeting RNA that comprises a targeting sequence and, together with a modifying polypeptide, provides for site-specific modification of a target DNA and/or a polypeptide associated with the target DNA. The present disclosure further provides site-specific modifying polypeptides. The present disclosure further provides methods of site-specific modification of a target DNA and/or a polypeptide associated with the target DNA The present disclosure provides methods of modulating transcription of a target nucleic acid in a target cell, generally involving contacting the target nucleic acid with an enzymatically inactive Cas9 polypeptide and a DNA-targeting RNA. Kits and compositions for carrying out the methods are also provided. The present disclosure provides genetically modified cells that produce Cas9; and Cas9 transgenic non-human multicellular organisms. | 03-10-2016 |
Patent application number | Description | Published |
20090159996 | Method Of Producing Microsprings Having Nanowire Tip Structures - A stress-engineered microspring is formed generally in the plane of a substrate. A nanowire (or equivalently, a nanotube) is formed at the tip thereof, also in the plane of the substrate. Once formed, the length of the nanowire may be defined, for example photolithographically. A sacrificial layer underlying the microspring may then be removed, allowing the engineered stresses in the microspring to cause the structure to bend out of plane, elevating the nanowire off the substrate and out of plane. Use of the nanowire as a contact is thereby provided. The nanowire may be clamped at the tip of the microspring for added robustness. The nanowire may be coated during the formation process to provide additional functionality of the final device. | 06-25-2009 |
20110163061 | Method Of Producing Microsprings Having Nanowire Tip Structures - A stress-engineered microspring is formed generally in the plane of a substrate. A nanowire (or equivalently, a nanotube) is formed at the tip thereof, also in the plane of the substrate. Once formed, the length of the nanowire may be defined, for example photolithographically. A sacrificial layer underlying the microspring may then be removed, allowing the engineered stresses in the microspring to cause the structure to bend out of plane, elevating the nanowire off the substrate and out of plane. Use of the nanowire as a contact is thereby provided. The nanowire may be clamped at the tip of the microspring for added robustness. The nanowire may be coated during the formation process to provide additional functionality of the final device. | 07-07-2011 |
20110167526 | Microsprings Having Nanowire Tip Structures - A stress-engineered microspring is formed generally in the plane of a substrate. A nanowire (or equivalently, a nanotube) is formed at the tip thereof, also in the plane of the substrate. Once formed, the length of the nanowire may be defined, for example photolithographically. A sacrificial layer underlying the microspring may then be removed, allowing the engineered stresses in the microspring to cause the structure to bend out of plane, elevating the nanowire off the substrate and out of plane. Use of the nanowire as a contact is thereby provided. The nanowire may be clamped at the tip of the microspring for added robustness. The nanowire may be coated during the formation process to provide additional functionality of the final device. | 07-07-2011 |
20130298830 | GROWTH REACTOR SYSTEMS AND METHODS FOR LOW-TEMPERATURE SYNTHESIS OF NANOWIRES - A method for synthesis of silicon nanowires provides a growth reactor having a decomposition zone and a deposition zone. A precursor gas introduced into the decomposition zone is disassociated to form an activated species that reacts with catalyst materials located in the deposition zone to deposit nano-structured materials on a low melting point temperature substrate in the deposition zone. A decomposition temperature in the decomposition zone is greater than a melting point temperature of the low melting point temperature substrate. The silicon nanowire are grown directly on the low melting point temperature substrate in the deposition zone to prevent the higher temperatures in the decomposition zone from damaging the molecular structure and/or integrity of the lower melting point temperature substrate located in the deposition zone. | 11-14-2013 |
20140073117 | GROWTH REACTOR SYSTEMS AND METHODS FOR LOW-TEMPERATURE SYNTHESIS OF NANOWIRES - A method for synthesis of silicon nanowires provides a growth reactor having a decomposition zone and a deposition zone. A precursor gas introduced into the decomposition zone is disassociated to form an activated species that reacts with catalyst materials located in the deposition zone to deposit nano-structured materials on a low melting point temperature substrate in the deposition zone. A decomposition temperature in the decomposition zone is greater than a melting point temperature of the low melting point temperature substrate. The silicon nanowire are grown directly on the low melting point temperature substrate in the deposition zone to prevent the higher temperatures in the decomposition zone from damaging the molecular structure and/or integrity of the lower melting point temperature substrate located in the deposition zone. | 03-13-2014 |
Patent application number | Description | Published |
20090200539 | Composite Nanorod-Based Structures for Generating Electricity - Composite nanorod-based structures for generating electricity are disclosed. One embodiment is an article of manufacture that includes a first layer with an array of nanowires and a dielectric material. The nanowires include: a core semiconducting region with a first type of doping; a shell semiconducting region with a second type of doping; and a junction region between the core semiconducting region and the shell semiconducting region. The first type of doping is different from the second type of doping. The shell region length is less than the core region length. The shell semiconducting region surrounds a portion of the core semiconducting region over a length of the core semiconducting region corresponding to the junction region length. A second layer comprising a conducting material contacts the top surface of the first layer. A third layer comprising a conducting material contacts the bottom surface of the first layer. | 08-13-2009 |
20100158544 | FLEXIBLE DIAGNOSTIC SENSOR SHEET - A system of diagnosing a printer or photocopying system using a flexible diagnostic sheet is described. In the system, a thin diagnostic sheet including a plurality of sensors formed on the sheet is run through the paper path of the printing system. The printing system subjects the diagnostic sheet to the printing process, including the deposition of fuser oil and toner on the sheet. Sensors on the sheet record various parameters, including but not limited to the amount of fuser oil deposited and the charge on various toner particles. The information is transmitted to service personnel or the printer end user to enable timely repair of the printer. | 06-24-2010 |
20100158548 | FLEXIBLE NANOWIRE SENSORS AND FIELD-EFFECT DEVICES FOR TESTING TONER - A system, including an improved sensor, for determining toner particle uniformity is described. The sensor measures toner particle charge, typically be having the charge on the toner particle control a current flow through the channel of a thin film transistor. By measuring the charge on many toner particles, the system determines whether sufficient toner degradation has occurred that the toner should be replaced. The sensor is particularly suitable for being formed on a thin diagnostic sheet that is input through the paper path of a printing system. | 06-24-2010 |
20110089402 | Composite Nanorod-Based Structures for Generating Electricity - One aspect of the invention involves an article of manufacture that includes a dielectric layer with an array of pores, and an array of nanowires at least partially contained within the array of pores. A respective nanowire in the array of nanowires is formed within a respective pore in the array of pores. Nanowires in the array of nanowires include a core semiconducting region with a first type of, a shell semiconducting region with a second type of doping, and a junction region between the core semiconducting region and the shell semiconducting. Additionally, the article of manufacture includes a first conducting layer electrically coupled to a plurality of shell semiconducting regions for a plurality of nanowires in the array of nanowires, as well as a second conducting layer electrically coupled to a plurality of core semiconducting regions for a plurality of nanowires in the array of nanowires. | 04-21-2011 |
Patent application number | Description | Published |
20100189329 | Ultrasound Imaging System Parameter Optimization Via Fuzzy Logic - An ultrasound scanner is equipped with one or more fuzzy control units that can perform adaptive system parameter optimization anywhere in the system. In one embodiment, an ultrasound system comprises a plurality of ultrasound image generating subsystems configured to generate an ultrasound image, the plurality of ultrasound image generating subsystems including a transmitter subsystem, a receiver subsystem, and an image processing subsystem; and a fuzzy logic controller communicatively coupled with at least one of the plurality of ultrasound imaging generating subsystems. The fuzzy logic controller is configured to receive, from at least one of the plurality of ultrasound imaging generating subsystems, input data including at least one of pixel image data and data for generating pixel image data; to process the input data using a set of inference rules to produce fuzzy output; and to convert the fuzzy output into numerical values or system states for controlling at least one of the transmit subsystem and the receiver subsystem that generate the pixel image data. | 07-29-2010 |
20120095338 | ULTRASOUND IMAGING SYSTEM PARAMETER OPTIMIZATION VIA FUZZY LOGIC - An ultrasound scanner is equipped with one or more fuzzy control units that can perform adaptive system parameter optimization anywhere in the system. In one embodiment, an ultrasound system comprises a plurality of ultrasound image generating subsystems configured to generate an ultrasound image, the plurality of ultrasound image generating subsystems including a transmitter subsystem, a receiver subsystem, and an image processing subsystem; and a fuzzy logic controller communicatively coupled with at least one of the plurality of ultrasound imaging generating subsystems. The fuzzy logic controller is configured to receive, from at least one of the plurality of ultrasound imaging generating subsystems, input data including at least one of pixel image data and data for generating pixel image data; to process the input data using a set of inference rules to produce fuzzy output; and to convert the fuzzy output into numerical values or system states for controlling at least one of the transmit subsystem and the receiver subsystem that generate the pixel image data. | 04-19-2012 |
20120136242 | ENDOVASCULAR NAVIGATION SYSTEM AND METHOD - An endovascular navigation and positioning system including a transducer on a distal end of an endovascular instrument, a control system connected to the transducer, the control system being configured to generate and receive at least one acoustic signal using the transducer, a pre-processor containing computer-readable instructions for manipulating the acoustic signal input to extract information related to desired parameters, a processor configured to evaluate the parameters to generate an output related to guidance of the instrument, and an output device for displaying an indication of the output generated by the processor. The processor may evaluate the information using artificial intelligence including inference rules related to navigation state, comparisons to information in a database, and probabilities, among others. The system may use an electrical signal as a confirmation input. Further disclosed is a method of navigating and positioning an endovascular device in a vasculature. | 05-31-2012 |
20120238999 | Infusion Pump Systems and Methods - Some embodiments of an infusion pump system can include a controller in which one or more features sets to be provided by the controller are enabled or disabled based upon the particular pump device that is connected to the controller. For example, in some embodiments, one or more advanced features of the controller are available to the user only when a first type of pump device (e.g., having predefined settings stored therein) is connected to the controller, and those advanced features of the controller are disabled when a second type of pump device is connected to the controller. | 09-20-2012 |
20130150824 | Infusion Pump Systems and Methods - Some embodiments of an infusion pump system can include a controller in which one or more features sets to be provided by the controller are enabled or disabled based upon the particular pump device that is connected to the controller. For example, in some embodiments, one or more advanced features of the controller are available to the user only when a first type of pump device (e.g., having predefined settings stored therein) is connected to the controller, and those advanced features of the controller are disabled when a second type of pump device is connected to the controller. | 06-13-2013 |
20140025002 | Infusion Pump System and Method - Some embodiments of an infusion pump system may be configured to detect when at least one component of the pump system is exposed to an impact above a threshold level. In particular embodiments, the infusion pump system can be equipped with an impact detection system that can sense when an impact above the threshold level has occurred to the pump device, which thereby enables the infusion pump system to initiate appropriate patient safety countermeasures. | 01-23-2014 |
20140163462 | Infusion Pump System and Method - Some embodiments of an infusion pump system may be configured to detect when at least one component of the pump system is exposed to an impact above a threshold level. In particular embodiments, the infusion pump system can be equipped with a drive system detection system configured to detect when one or more components of the drive system are damaged or inoperable. | 06-12-2014 |
20140358111 | Infusion Pump System and Method - Some embodiments of an infusion pump system may be configured to detect when at least one component of the pump system is exposed to a moisture level above a threshold level. In particular embodiments, the infusion pump system can be equipped with a moisture level detection system that can sense when a moisture level above the threshold level has occurred to the pump device, which thereby enables the infusion pump system to initiate one or more patient safety countermeasures. | 12-04-2014 |
20140358112 | Infusion Pump System and Method - Some embodiments of an infusion pump system may be configured to provide a desired level of resistance to liquid ingress to the pump casing while contemporaneously providing air transmissibility for equalization of air pressure differentials between the interior and exterior of the pump casing. Further, some embodiments can detect when moisture inside a casing of the infusion pump system is greater than or equal to a threshold level and can initiate one or more patient safety countermeasures. | 12-04-2014 |
20150105726 | Infusion Pump System and Method - Some embodiments of an infusion pump system may be configured to detect when at least one component of the pump system is exposed to an impact above a threshold level. In particular embodiments, the infusion pump system can be equipped with an impact detection system that can sense when an impact above the threshold level has occurred to the pump device, which thereby enables the infusion pump system to initiate appropriate patient safety countermeasures. | 04-16-2015 |
20150201947 | APPARATUS AND METHODS FOR CLOSING VESSELS - Apparatus and methods are provided for closing a tubular structure within a patient's body. The apparatus includes a needle including a proximal end including a hub, a distal end including a sharpened distal tip, a lumen having an oblong cross-section extending proximally from the distal end, and defining a longitudinal axis between the proximal and distal ends, and a clip deliverable from the lumen. The clip is compressible between a relaxed state in which a plurality of tines of the clip are shaped to engage and close a tubular structure within a patient's body, and a stressed state in which the tines are compressed to allow the clip to be loaded into the. The apparatus may also include a pusher member for deploying the clip from the distal tip of the needle such that the tines engage and close a tubular structure through which the tubular member is directed. | 07-23-2015 |
20150327837 | ENDOVASCULAR NAVIGATION SYSTEM AND METHOD - A method of navigating and positioning an endovascular device in a vasculature is disclosed. Initially, a system including an endovascular device and at least one transducer is inserted into the lumen of a patient. An acoustic signal is then transmitted within the lumen. A reflected signal is pre-processed to extract one or more acoustic features. The one or more acoustic features are processed using a computer readable set of rules to produce an output related to guidance of the instrument within a blood vessel or a position of the instrument within the blood vessel. | 11-19-2015 |
20150343143 | Infusion Pump Systems and Methods - Some embodiments of an infusion pump system can include a controller in which one or more features sets to be provided by the controller are enabled or disabled based upon the particular pump device that is connected to the controller. For example, in some embodiments, one or more advanced features of the controller are available to the user only when a first type of pump device (e.g., having predefined settings stored therein) is connected to the controller, and those advanced features of the controller are disabled when a second type of pump device is connected to the controller. | 12-03-2015 |
20160038675 | INFUSION PUMP ASSEMBLY AND METHOD - Some embodiments of an infusion pump assembly may be equipped with one or more components to facilitate wireless operation of an infusion pump via a user-operated mobile device. In some embodiments, the mobile device and/or the infusion pump may prompt the user to confirm acceptance of a wirelessly communicated command to prevent an operation by the infusion pump (e.g., a dispensation of medicine) that is not desired by the user. | 02-11-2016 |
20160058939 | Infusion Pump System and Method - Some embodiments of an infusion pump system include a pump device with a drive system that is configured to attach with a medicine cartridge in manner that reduces the likelihood of dosage inaccuracies. In one example, the drive system of the pump device can be equipped with a plunger engagement device that is configured to mechanically anchor into a plunger of the medicine cartridge, and then to bias the plunger of the medicine cartridge in a direction toward a piston rod of the drive system. | 03-03-2016 |
20160095975 | Infusion Pump System and Method - Some embodiments of an infusion pump system may be configured to provide a desired level of resistance to liquid ingress to the pump casing while contemporaneously providing air transmissibility for equalization of air pressure differentials between the interior and exterior of the pump casing. Further, some embodiments can detect when moisture inside a casing of the infusion pump system is greater than or equal to a threshold level and can initiate one or more patient safety countermeasures. | 04-07-2016 |
Patent application number | Description | Published |
20130173666 | TECHNIQUES FOR DATA ASSIGNMENT FROM AN EXTERNAL DISTRIBUTED FILE SYSTEM TO A DATABASE MANAGEMENT SYSTEM - Techniques for data assignment from an external distributed file system (DFS) to a database management system (DBMS) are provided. Data blocks from the DFS are represented as first nodes and access module processors of the DBMS are represented as second nodes. A graph is produced with the first and second nodes. Assignments are made for the first nodes to the second nodes based on evaluation of the graph to integrate the DFS with the DBMS. | 07-04-2013 |
20140222871 | TECHNIQUES FOR DATA ASSIGNMENT FROM AN EXTERNAL DISTRIBUTED FILE SYSTEM TO A DATABASE MANAGEMENT SYSTEM - Techniques for data assignment from an external distributed file system (DFS) to a database management system (DBMS) are provided. Data blocks from the DFS are represented as first nodes and access module processors of the DBMS are represented as second nodes. A graph is produced with the first and second nodes. Assignments are made for the first nodes to the second nodes based on evaluation of the graph to integrate the DFS with the DBMS. | 08-07-2014 |
20140247941 | SELF-CONFIGURING WIRELESS NETWORK - Methods, systems, and apparatus, are provided for wireless networking. In some implementations, a self-configuring wireless system includes one or more wireless network devices; and an access point device, wherein the one or more wireless network devices are each preconfigured with a respective key, and wherein the access point device is configured to obtain the respective keys so as to enable the access point device to establish a secure wireless network with the one or more network devices using the respective keys upon powering up the access point device and the one or more wireless network devices at a user location. | 09-04-2014 |
20140279074 | DATA MANAGEMENT PLATFORM FOR DIGITAL ADVERTISING - A data management apparatus for digital advertising includes a data integration processor for collecting and storing data from providers, resolving heterogeneity of the data at schema and data levels, and performing validity checks of the data; an analytics processor for receiving validated data from the data integration processor and providing to users custom, nesting-aware, SQL-like query language and a library of data mining methods, machine learning models, and analytical user profiles (AUP); and an activation processor for encapsulating complex computations performed in real-time, segment evaluation, and online user classification using runtime user profiles (RUP). | 09-18-2014 |
20140281478 | CONFIGURING SECURE WIRELESS NETWORKS - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for configuring secure wireless networks. One of the methods includes receiving, at a security system management device, protocol and key information for establishing a connection as a client device to the wireless IP device, wherein the protocol and key information is received in response to a user transmitting an identifier for the IP device to a service provider system; establishing communication with the wireless IP device, wherein the wireless IP device is acting as an access point device; exchanging keys with the wireless IP device; rebooting the security system management device to become an access point for the secure wireless network; and establishing communication with the wireless IP device, wherein the wireless IP device has become a wireless client. | 09-18-2014 |
20140281990 | INTERFACES FOR SECURITY SYSTEM CONTROL - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for controlling security systems. One of the methods includes receiving, at a mobile device, an input to present camera video content; presenting, in a user interface, a first array of video content, wherein the respective video content is associated with a first security system location; receiving a user input to present a second array of video content, wherein the respective video content is associated with a second security system location, and wherein the user input comprises a touch input; and presenting, in the user interface, the second array of video content. | 09-18-2014 |
20150077250 | SECURITY SYSTEM COMMUNICATIONS MANAGEMENT - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing communications. One of the systems includes a plurality of security systems, each security system including a secure network coupling a plurality of security devices; a plurality of user devices authorized to send and receive communications associated with a respective security system of the plurality of security systems; and a service provider system configured to manage communications for each of the plurality of security systems with respective user devices, wherein, the service provider system or the user devices are configured to communicate with a push service to send push notifications. | 03-19-2015 |
20150279198 | SECURITY SYSTEM ACCESS DETECTION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for access and control of networked devices. In one aspect, a method includes receiving a request for access to a security system device; determining whether the device is set to a first mode or a second mode; and in response to determining that the device is in the second mode, generating one or more notifications to authorized users identifying the access to the security device. | 10-01-2015 |
20150373538 | Configuring Secure Wireless Networks - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for configuring secure wireless networks. One of the methods includes receiving, at a security system management device, protocol and key information for establishing a connection as a client device to the wireless IP device, wherein the protocol and key information is received in response to a user transmitting an identifier for the IP device to a service provider system; establishing communication with the wireless IP device, wherein the wireless IP device is acting as an access point device; exchanging keys with the wireless IP device; rebooting the security system management device to become an access point for the secure wireless network; and establishing communication with the wireless IP device, wherein the wireless IP device has become a wireless client. | 12-24-2015 |
Patent application number | Description | Published |
20090185743 | HISTOGRAM-MODELING BASED ALGORITHM FOR CONTRAST ENHANCEMENT - A histogram modeling based technique for image contrast enhancement. In some implementations, a histogram of an image is created and then transformed. Using the physics of sound or heat propagation, the technique may develop a spreaded histogram model that may be transformed. A nonlinear mapping may be created to remap an image for contrast enhancement. The technique may be performed without threshold tuning and may be implemented on a variety of display hardware. | 07-23-2009 |
20100054621 | DUAL LOOKUP TABLE DESIGN FOR EDGE-DIRECTED IMAGE SCALING - In general, the disclosure describes various techniques for providing edge-directed scaling filters that may be used to scale image data. An example device includes a storage medium configured to store a first lookup table and a second lookup table, and one or more processors configured to obtain one or more gradient values that each indicates a gradient between values of at least two pixels in a source image. The one or more processors are also configured to generate one or more inverse gradient values from a first lookup table based on the gradient values, and to generate one or more edge-directed scaling filter coefficients from a second lookup table based on the inverse gradient values. The one or more processors may be further configured to generate an edge-directed filter based on the coefficients, and to apply the filter to the at least two pixels to generate an interpolated pixel. | 03-04-2010 |
20110262001 | VIEWPOINT DETECTOR BASED ON SKIN COLOR AREA AND FACE AREA - In a particular illustrative embodiment, a method of determining a viewpoint of a person based on skin color area and face area is disclosed. The method includes receiving image data corresponding to an image captured by a camera, the image including at least one object to be displayed at a device coupled to the camera. The method further includes determining a viewpoint of the person relative to a display of the device coupled to the camera. The viewpoint of the person may be determined by determining a face area of the person based on a determined skin color area of the person and tracking a face location of the person based on the face area. One or more objects displayed at the display may be moved in response to the determined viewpoint of the person. | 10-27-2011 |
20120106847 | SYSTEMS AND METHODS TO IMPROVE FEATURE GENERATION IN OBJECT RECOGNITION - Present embodiments contemplate systems, apparatus, and methods to improve feature generation for object recognition. Particularly, present embodiments contemplate excluding and/or modifying portions of images corresponding to dispersed pixel distributions. By excluding and/or modifying these regions within the feature generation process, fewer unfavorable features are generated and computation resources may be more efficiently employed. | 05-03-2012 |
20120113241 | FINGERTIP TRACKING FOR TOUCHLESS USER INTERFACE - In general, this disclosure describes techniques for providing a gesture-based user interface. For example, according to some aspects of the disclosure, a user interface generally includes a camera and a computing device that identifies and tracks the motion of one or more fingertips of a user. In some examples, the user interface is configured to identify predefined gestures (e.g., patterns of motion) associated with certain motions of the user's fingertips. In another example, the user interface is configured to identify hand postures (e.g., patterns of showing up of fingertips). Accordingly, the user can interact with the computing device by performing the gestures. | 05-10-2012 |
20120139906 | HYBRID REALITY FOR 3D HUMAN-MACHINE INTERFACE - A three dimensional (3D) mixed reality system combines a real 3D image or video, captured by a 3D camera for example, with a virtual 3D image rendered by a computer or other machine to render a 3D mixed-reality image or video. A 3D camera can acquire two separate images (a left and a right) of a common scene, and superimpose the two separate images to create a real image with a 3D depth effect. The 3D mixed-reality system can determine a distance to a zero disparity plane for the real 3D image, determine one or more parameters for a projection matrix based on the distance to the zero disparity plane, render a virtual 3D object based on the projection matrix, combine the real image and the virtual 3D object to generate a mixed-reality 3D image. | 06-07-2012 |
20120140038 | ZERO DISPARITY PLANE FOR FEEDBACK-BASED THREE-DIMENSIONAL VIDEO - The techniques of this disclosure are directed to the feedback-based stereoscopic display of three-dimensional images, such as may be used for video telephony (VT) and human-machine interface (HMI) application. According to one example, a region of interest (ROI) of stereoscopically captured images may be automatically determined based on determining disparity for at least one pixel of the captured images are described herein. According to another example, a zero disparity plane (ZDP) for the presentation of a 3D representation of stereoscopically captured images may be determined based on an identified ROI. According to this example, the ROI may be automatically identified, or identified based on receipt of user input identifying the ROI. | 06-07-2012 |
20120321139 | CONTENT-ADAPTIVE SYSTEMS, METHODS AND APPARATUS FOR DETERMINING OPTICAL FLOW - Embodiments include methods and systems which determine pixel displacement between frames based on a respective weighting-value for each pixel or a group of pixels. The weighting-values provide an indication as to which pixels are more pertinent to optical flow computations. Computational resources and effort can be focused on pixels with higher weights, which are generally more pertinent to optical flow determinations. | 12-20-2012 |
20130187846 | BI-ORTHOGONAL PIXEL INTERPOLATION - The techniques described in this disclosure are directed to interpolating pixel values. In some examples, the techniques interpolate a pixel value for an interpolated center pixel based on pixel values of pixel that reside on diagonal lines that are orthogonal to one another. The techniques may determine first order derivative values and, in some examples, second order derivative values to determine which pixels to utilize to interpolate the pixel values for the interpolated center pixel. The techniques may similarly determine pixel values for non-center interpolated pixels using orthogonal vertical and horizontal lines. | 07-25-2013 |
20130194392 | Mobile Device Configured to Compute 3D Models Based on Motion Sensor Data - A particular method includes determining, based on data received from at least one motion sensor, a movement of a mobile device from a first position to a second position. The method also includes computing a three-dimensional (3D) model of an object based on a first image of the object corresponding to a first view of the object from the first position of the mobile device, a second image of the object corresponding to a second view of the object from the second position of the mobile device, and the movement of the mobile device. | 08-01-2013 |
20140029807 | CONTENT-ADAPTIVE PIXEL PROCESSING SYSTEMS, METHODS AND APPARATUS - Embodiments include methods and systems for context-adaptive pixel processing based, in part, on a respective weighting-value for each pixel or a group of pixels. The weighting-values provide an indication as to which pixels are more pertinent to pixel processing computations. Computational resources and effort can be focused on pixels with higher weights, which are generally more pertinent for certain pixel processing determinations. | 01-30-2014 |
20140050372 | METHOD AND APPARATUS FOR FACIAL RECOGNITION - Apparatus and methods for facial detection are disclosed. A plurality of images of an observed face is received for identification. Based at least on two or more selected images of the plurality of images, a template of the observed face is generated. In some embodiments, the template is a subspace generated based on feature vectors of the plurality of received images. A database of identities and corresponding facial data of known persons is searched based at least on the template of the observed face and the facial data of the known persons. One or more identities of the known persons are selected based at least on the search. | 02-20-2014 |
20140205141 | SYSTEMS AND METHODS FOR TRACKING AND DETECTING A TARGET OBJECT - A method for detecting and tracking a target object is described. The method includes performing motion-based tracking for a current video frame by comparing a previous video frame and the current video frame. The method also includes selectively performing object detection in the current video frame based on a tracked parameter. | 07-24-2014 |
20140286527 | SYSTEMS AND METHODS FOR ACCELERATED FACE DETECTION - A method for face detection is disclosed. The method includes evaluating a scanning window using a first weak classifier in a first stage classifier. The method also includes evaluating the scanning window using a second weak classifier in the first stage classifier based on the evaluation using the first weak classifier. | 09-25-2014 |
20140334740 | CONTENT-ADAPTIVE PIXEL PROCESSING SYSTEMS, METHODS AND APPARATUS - Embodiments include methods and systems for context-adaptive pixel processing based, in part, on a respective weighting-value for each pixel or a group of pixels. The weighting-values provide an indication as to which pixels are more pertinent to pixel processing computations. Computational resources and effort can be focused on pixels with higher weights, which are generally more pertinent for certain pixel processing determinations. | 11-13-2014 |
20140359559 | AUTOMATED GRAPH-BASED PROGRAMMING - A method includes capturing an image of a scene that includes a diagram. The method further includes applying functional block recognition rules to image data of the image to recognize functional blocks of the diagram. The functional blocks include at least a first functional block associated with a first computer operation. The method further includes determining whether the functional blocks comply with functional block syntax rules. A functional graph is computer-generated based on the functional blocks complying with the functional block syntax rules. The functional graph corresponds to the diagram, and the functional graph includes the functional blocks. | 12-04-2014 |
20150058579 | SYSTEMS AND METHODS FOR MEMORY UTILIZATION FOR OBJECT DETECTION - A method for memory utilization by an electronic device is described. The method includes transferring a first portion of a first decision tree and a second portion of a second decision tree from a first memory to a cache memory. The first portion and second portion of each decision tree are stored contiguously in the first memory. The first decision tree and second decision tree are each associated with a different feature of an object detection algorithm. The method also includes reducing cache misses by traversing the first portion of the first decision tree and the second portion of the second decision tree in the cache memory based on an order of execution of the object detection algorithm. | 02-26-2015 |
20150178943 | SYSTEM AND METHOD TO STABILIZE DISPLAY OF AN OBJECT TRACKING BOX - A method includes receiving first data defining a first bounding box for a first image of a sequence of images. The first bounding box corresponds to a region of interest including a tracked object. The method also includes receiving object tracking data for a second image of the sequence of images, the object tracking data defining a second bounding box. The second bounding box corresponds to the region of interest including the tracked object in the second image. The method further includes determining a similarity metric for first pixels within the first bounding box and search pixels within each of multiple search bounding boxes. Search coordinates of each of the search bounding boxes correspond to second coordinates of the second bounding box shifted in one or more directions. The method also includes determining a modified second bounding box based on the similarity metric. | 06-25-2015 |
20150339811 | SYSTEMS AND METHODS FOR HAZINESS DETECTION - A method performed by an electronic device is described. The method includes determining a haziness confidence level based on multiple modalities. The method also includes determining whether to perform an action based on the haziness confidence level. The method may include performing the action, including performing haziness reduction based on the haziness confidence level. | 11-26-2015 |
20150371360 | SYSTEMS AND METHODS FOR OBTAINING STRUCTURAL INFORMATION FROM A DIGITAL IMAGE - A method for obtaining structural information from a digital image by an electronic device is described. The method includes determining an iris position in a region of interest based on a gradient direction transform. Determining the iris position may include determining a first dimension position and a second dimension position corresponding to a maximum value in the transform space. | 12-24-2015 |
20160063357 | SYSTEMS AND METHODS FOR OBJECT CLASSIFICATION, OBJECT DETECTION AND MEMORY MANAGEMENT - A method for object classification by an electronic device is described. The method includes obtaining an image frame that includes an object. The method also includes determining samples from the image frame. Each of the samples represents a multidimensional feature vector. The method further includes adding the samples to a training set for the image frame. The method additionally includes pruning one or more samples from the training set to produce a pruned training set. One or more non-support vector negative samples are pruned first. One or more non-support vector positive samples are pruned second if necessary to avoid exceeding a sample number threshold. One or more support vector samples are pruned third if necessary to avoid exceeding the sample number threshold. The method also includes updating classifier model weights based on the pruned training set. | 03-03-2016 |
Patent application number | Description | Published |
20090010424 | System and Methods for Side-Channel Attack Prevention - A side channel attack utilizes information gained from the physical implementation of a cryptosystem. Software and hardware-based systems and methods for preventing side channel attacks are presented. Cryptographic hardware may introduce dummy operations to compensate for conditional math operations in certain functions such as modular exponentiation. Cryptographic hardware may also introduce random stalls of the data path to introduce alterations in the power profile for the operation. A cryptographic function may be mapped to a micro code sequence having a plurality of instructions. Firmware in the cryptosystem may alter the micro code sequence by altering the order of instructions, add dummy operations in the micro code sequence, break the micro code sequence into multiple sub micro code sequences and/or change the register location for source and destination operands used in the sequence. These alterations are designed to randomly change the timing and power profile of the requested function. | 01-08-2009 |
20090319804 | Scalable and Extensible Architecture for Asymmetrical Cryptographic Acceleration - Systems and methods for providing asymmetrical cryptographic acceleration are provided. The scalable asymmetric cryptographic accelerator engine uses a layered approach based on the collaboration of firmware and hardware to perform a specific cryptographic operation. Upon receipt of a request for a cryptographic function, the system accesses a sequence of operations required to perform the requested function. A micro code sequence is prepared for each hardware operation and sent to the hardware module. The micro code sequence includes a set of load instructions, a set of data processing instructions, and a set of unload instructions. An instruction may include a register operand having a register type and a register index. Upon receipt of a load instruction, the hardware module updates size information in a content addressable memory for a register included in the instruction. The hardware module continuously monitors the content addressable memory to avoid buffer overflow or underflow conditions. | 12-24-2009 |
20100254537 | Scalable and Secure Key Management For Cryptographic Data Processing - A method and system for secure and scalable key management for cryptographic processing of data is described herein. In the method, a General Purpose Cryptographic Engine (GPE) receives key material via a secure channel from a key server and stores the received Key encryption keys (KEKs) and/or plain text keys in a secure key cache. When a request is received from a host to cryptographically process a block of data, the requesting entity is authenticated using an authentication tag included in the request. The GPE retrieves a plaintext key or generate a plaintext using a KEK if the authentication is successful, cryptographically processes the data using the plaintext key and transmits the processed data. The system includes a key server that securely provides encrypted keys and/or key handles to a host and key encryption keys and/or plaintext keys to the GPE. | 10-07-2010 |
20130230165 | Scalable and Secure Key Management for Cryptographic Data Processing - A method and system for secure and scalable key management for cryptographic processing of data is described herein. In the method, a General Purpose Cryptographic Engine (GPE) receives key material via a secure channel from a key server and stores the received Key encryption keys (KEKs) and/or plain text keys in a secure key cache. When a request is received from a host to cryptographically process a block of data, the requesting entity is authenticated using an authentication tag included in the request. The GPE retrieves a plaintext key or generate a plaintext using a KEK if the authentication is successful, cryptographically processes the data using the plaintext key and transmits the processed data. The system includes a key server that securely provides encrypted keys and/or key handles to a host and key encryption keys and/or plaintext keys to the GPE. | 09-05-2013 |
20150256518 | Scalable and Secure Key Management for Cryptographic Data Processing - A method and system for secure and scalable key management for cryptographic processing of data is described herein. A method of secure key handling and cryptographic processing of data, comprising receiving a request from an entity to cryptographically process a block of data, the request including a key handle, wherein the key handle includes an authentication tag and an index; authenticating the requesting entity using the authentication tag; and referencing a plaintext key from a plurality of plaintext keys using the index if the requesting entity is authenticated successfully. | 09-10-2015 |