Patent application number | Description | Published |
20150033574 | WASHING MACHINE HAVING DRYING APPARATUS - A washing machine having a drying apparatus, which can perform a heated drying operation and shorten a drying time of laundry, is provided. The washing machine having a drying apparatus includes a top cover which is provided in an upper part of a body and has at least one air hole formed in a top surface thereof, a drying duct which is provided in the top cover to supply air heated by a heater provided thereinside to the air hole, and a rack member which is provided to be extractable from the body to hang laundry above the body. | 02-05-2015 |
20150247274 | WASHING MACHINE AND WASHING WATER SUPPLY DEVICE - Provided is a washing machine including a main body having an opening and a door assembly disposed at the opening, wherein the door assembly includes a door that opens and closes the opening and an auxiliary washing unit having an auxiliary washing space in which hand-washing can be performed, and provided to pivot about one side of the door in an inside of the door. Through this configuration, separated washing spaces can be provided and separate hand-washing can be performed. Also, pressure of washing water supplied into the washing machine can be regulated so that water supply efficiency can be improved and a flow rate of the washing water can be adjusted. | 09-03-2015 |
20150247275 | WASHING MACHINE AND WASHING WATER SUPPLY DEVICE - Provided is a washing machine including a main body having an opening and a door assembly disposed at the opening, wherein the door assembly includes a door that opens and closes the opening and an auxiliary washing unit having an auxiliary washing space in which hand-washing can be performed, and provided to pivot about one side of the door in an inside of the door. Through this configuration, separated washing spaces can be provided and separate hand-washing can be performed. Also, pressure of washing water supplied into the washing machine can be regulated so that water supply efficiency can be improved and a flow rate of the washing water can be adjusted. | 09-03-2015 |
20150247276 | WASHING MACHINE AND WASHING WATER SUPPLY DEVICE - Provided is a washing machine including a main body having an opening and a door assembly disposed at the opening, wherein the door assembly includes a door that opens and closes the opening and an auxiliary washing unit having an auxiliary washing space in which hand-washing can be performed, and provided to pivot about one side of the door in an inside of the door. Through this configuration, separated washing spaces can be provided and separate hand-washing can be performed. Also, pressure of washing water supplied into the washing machine can be regulated so that water supply efficiency can be improved and a flow rate of the washing water can be adjusted. | 09-03-2015 |
Patent application number | Description | Published |
20130047152 | Preserving, From Resource Management Adjustment, Portions Of An Overcommitted Resource Managed By A Hypervisor - Methods, apparatuses, and computer program products for preserving, from resource management adjustment, portions of an overcommitted resource managed by a hypervisor are provided. Embodiments include identifying, by the hypervisor, a privileged guest from among a plurality of guests of the hypervisor; identifying, by the hypervisor, portions of the overcommitted resource that are allocated to the privileged guest; and preventing, by the hypervisor, resource management adjustment to the identified portions of the overcommitted resource that are allocated to the privileged guest. | 02-21-2013 |
20130047159 | Preserving, From Resource Management Adjustment, Portions Of An Overcommitted Resource Managed By A Hypervisor - Methods, apparatuses, and computer program products for preserving, from resource management adjustment, portions of an overcommitted resource managed by a hypervisor are provided. Embodiments include identifying, by the hypervisor, a privileged guest from among a plurality of guests of the hypervisor; identifying, by the hypervisor, portions of the overcommitted resource that are allocated to the privileged guest; and preventing, by the hypervisor, resource management adjustment to the identified portions of the overcommitted resource that are allocated to the privileged guest. | 02-21-2013 |
20130091318 | SYSTEM AND METHOD FOR CRITICAL ADDRESS SPACE PROTECTION IN A HYPERVISOR ENVIRONMENT - A system and method in one embodiment includes modules for detecting an access attempt to a critical address space (CAS) of a guest operating system (OS) that has implemented address space layout randomization in a hypervisor environment, identifying a process attempting the access, and taking an action if the process is not permitted to access the CAS. The action can be selected from: reporting the access to a management console of the hypervisor, providing a recommendation to the guest OS, and automatically taking an action within the guest OS. Other embodiments include identifying a machine address corresponding to the CAS by forcing a page fault in the guest OS, resolving a guest physical address from a guest virtual address corresponding to the CAS, and mapping the machine address to the guest physical address. | 04-11-2013 |
20130097203 | SYSTEM AND METHOD FOR PROVIDING THRESHOLD LEVELS ON PRIVILEGED RESOURCE USAGE IN A MOBILE NETWORK ENVIRONMENT - A system and method in one embodiment includes modules for detecting a request by an application in a mobile device to access a privileged resource, determining a cumulative usage of the privileged resource by the application, and performing an action according to a rule if a predefined threshold level of usage triggers the action based on the cumulative usage. More specific embodiments include blocking the request, and sending a notification to a user and updating a rules database to modify the predefined threshold level of usage associated with the rule. Other embodiments include monitoring permissions of the application to the privileged resource, and removing any permissions that have not been used for a predefined time period, logging the request into a log in a utilization database, reading the log, collating information in the log, and analyzing the log. | 04-18-2013 |
20130097652 | SYSTEM AND METHOD FOR PROFILE BASED FILTERING OF OUTGOING INFORMATION IN A MOBILE ENVIRONMENT - A system and method in one embodiment includes modules for detecting an access request by an application to access information in a mobile device, determining that the application is a potential threat according to at least one policy filter, and blocking a send request by the application to send the information from the mobile device without a user's consent. More specific embodiments include user selecting the information through a selection menu on a graphical user interface that includes information categories pre-populated by an operating system of the mobile device, and keywords that can be input by the user. Other embodiments include queuing the send request in a queue with other requests, and presenting an outbox comprising the queue to the user to choose to consent to the requests. The outbox includes graphical elements configured to permit the user to selectively consent to any requests in the queue. | 04-18-2013 |
20130275965 | CONTROL OF JAVA RESOURCE RUNTIME USAGE - A method for providing control of Java resource runtime usage may include establishing communication with one or more Java virtual machines (JVMs) forming a hive via a hive communication channel where the hive comprises a plurality of JVMs configured to enable utilization of at least one shared resource, receiving, via the hive communication channel, environmental information indicative of hive activity relative to the at least one shared resource from at least one of the one or more JVMs, and adapting, via processing circuitry, operations associated with use of the at least one shared resource based on the environmental information. | 10-17-2013 |
20130275976 | CONTROL OF JAVA RESOURCE RUNTIME USAGE - A method for providing control of Java resource runtime usage may include establishing communication with one or more Java virtual machines (JVMs) forming a hive via a hive communication channel where the hive comprises a plurality of JVMs configured to enable utilization of at least one shared resource, receiving, via the hive communication channel, environmental information indicative of hive activity relative to the at least one shared resource from at least one of the one or more JVMs, and adapting, via processing circuitry, operations associated with use of the at least one shared resource based on the environmental information. | 10-17-2013 |
20140194094 | DATA LOSS PREVENTION FOR MOBILE COMPUTING DEVICES - System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy. | 07-10-2014 |
20140281492 | Prevention of Forgery of Web Requests to a Server - Technologies for prevention of forgery of a network communication request to a server include a system for security of a network communication request. The system includes a communication module configured to receive the network communication request from a client. The network communication request may have a content parameter. The communication module may be configured to generate a string of content parameters comprising the content parameters and a hash of the content parameter, and communicate portions of a result of the network communication request to the client incorporating the encrypted string of content parameters. Furthermore, the communication module may receive a subsequent request from the client. The subsequent request may be associated with the network communication request. As a result of authenticating the subsequent request, the communication module may complete the network communication request. | 09-18-2014 |
20140325193 | DYNAMIC INSTRUMENTATION - Techniques for dynamic instrumentation are provided. A method for instrumentation preparation may include obtaining address data of an original instruction in an original instruction stream, obtaining kernel mode data comprising a kernel breakpoint handler, obtaining user mode data comprising a user breakpoint handler, allocating a page of a process address space, creating a trampoline, associating the trampoline with a breakpoint instruction, and replacing the original instruction with the breakpoint instruction. A method for instrumentation may include detecting the breakpoint instruction, calling the kernel breakpoint handler, modifying an instruction pointer via the kernel breakpoint handler such that the instruction pointer points to the trampoline, and executing the trampoline. The system for instrumentation may include a breakpoint setup module and a breakpoint execution module for respectively setting up and completing instrumentation involving the trampoline. | 10-30-2014 |
20150237011 | SYSTEM AND METHOD FOR PROFILE BASED FILTERING OF OUTGOING INFORMATION IN A MOBILE ENVIRONMENT - A system and method in one embodiment includes modules for detecting an access request by an application to access information in a mobile device, determining that the application is a potential threat according to at least one policy filter, and blocking a send request by the application to send the information from the mobile device without a user's consent. More specific embodiments include user selecting the information through a selection menu on a graphical user interface that includes information categories pre-populated by an operating system of the mobile device, and keywords that can be input by the user. Other embodiments include queuing the send request in a queue with other requests, and presenting an outbox comprising the queue to the user to choose to consent to the requests. The outbox includes graphical elements configured to permit the user to selectively consent to any requests in the queue. | 08-20-2015 |
20160088011 | NON-INVASIVE WHITELISTING - In an example, there is disclosed a security architecture for enhanced, non-invasive whitelisting of executable objects. When an executable object tries to perform an action, a security engine seamlessly intercepts the action and determines whether the action is whitelisted, blacklisted, or graylisted, assigning the action a corresponding security score. Whitelisted actions may be allowed, blacklisted actions may be disallowed, and graylisted actions may require additional verification from a user. Because the score is assigned to the combination of the executable object and the action, false positives may be avoided, such as those that may occur when an executable object is prefetched but has not yet tried to perform any useful work. | 03-24-2016 |
Patent application number | Description | Published |
20130184455 | CONJUGATES COMPRISING HYDROXYALKYL STARCH AND A CYTOTOXIC AGENT AND PROCESS FOR THEIR PREPARATION - The present invention relates to a hydroxyalkyl starch conjugate and a method for preparing the same, said hydroxyalkyl starch conjugate comprising a hydroxyalkyl starch derivative and a cytotoxic agent, the cytotoxic agent comprising at least one secondary hydroxyl group, wherein the hydroxyalkyl starch is linked via said secondary hydroxyl group to the cytotoxic agent. The conjugate according to the present invention has a structure according to the following formula HAS′(-L-M) | 07-18-2013 |
20130211060 | CONJUGATES COMPRISING HYDROXYALKYL STARCH AND A CYTOTOXIC AGENT AND PROCESS FOR THEIR PREPARATION - The present invention relates to a hydroxyalkyl starch conjugate and a method for preparing the same, said hydroxy-yalkyl starch conjugate comprising a hydroxyalkyl starch derivative and a cytotoxic agent, the cytotoxic agent comprising at least one secondary hydroxyl group, wherein the hydroxyalkyl starch is linked via said secondary hydroxyl group to the cytotoxic agent. The conjugate according to the present invention has a structure according to the following formula HAS′(-L-M) | 08-15-2013 |
20140073779 | CONJUGATES COMPRISING HYDROXYALKYL STARCH AND A CYTOTOXIC AGENT AND PROCESS FOR THEIR PREPARATION - The present invention relates to a hydroxyalkyl starch conjugate and a method for preparing the same, said hydroxyalkyl starch conjugate comprising a hydroxyalkyl starch derivative and a cytotoxic agent, the cytotoxic agent comprising at least one secondary hydroxyl group, wherein the hydroxyalkyl starch is linked via said secondary hydroxyl group to the cytotoxic agent. The conjugate according to the present invention has a structure according to the following formula HAS′(-L-M) | 03-13-2014 |
20140088298 | CONJUGATES COMPRISING HYDROXYALKYL STARCH AND A CYTOTOXIC AGENT AND PROCESS FOR THEIR PREPARATION - The present invention relates to a hydroxyalkyl starch conjugate and a method for preparing the same, said hydroxy-yalkyl starch conjugate comprising a hydroxyalkyl starch derivative and a cytotoxic agent, the cytotoxic agent comprising at least one secondary hydroxyl group, wherein the hydroxyalkyl starch is linked via said secondary hydroxyl group to the cytotoxic agent. The conjugate according to the present invention has a structure according to the following formula HAS′(-L-M) | 03-27-2014 |
20150183789 | IMPROVED PROCESS FOR THE PREPARATION OF PRALATREXATE - An improved process for the preparation of Pralatrexate which is less hazardous. The invention further relates to novel intermediates and process thereof useful for the preparation of Pralatrexate. The present invention also relates to a substantially pure Pralatrexate and a process for obtaining the same in high yield. | 07-02-2015 |
20150297738 | CONJUGATES COMPRISING HYDROXYALKYL STARCH AND A CYTOTOXIC AGENT AND PROCESS FOR THEIR PREPARATION - The present invention relates to a hydroxyalkyl starch conjugate and a method for preparing the same, said hydroxyalkyl starch conjugate comprising a hydroxyalkyl starch derivative and a cytotoxic agent, the cytotoxic agent comprising at least one secondary hydroxyl group, wherein the hydroxyalkyl starch is linked via said secondary hydroxyl group to the cytotoxic agent. The conjugate according to the present invention has a structure according to the following formula HAS′(-L-M) | 10-22-2015 |