Patent application number | Description | Published |
20100010341 | Biopsy Marker with In Situ-Generated Imaging Properties - A biopsy marker having radio-opaque properties that are derived in situ, based on a natural a biological response, such as for example, calcification, accumulation or tissue-concentration of a chemical agent so as to provide an imaging contrast. A biodegradable foam such as collagen foam or gelatin foam is embedded with a biological tissue that is susceptible to the calcification. Initially the marker can be imaged using ultrasound, but over time, the embedded material calcifies causing it to become visible under radiation imaging. | 01-14-2010 |
20100030072 | Multiple Imaging Mode Tissue Marker - An intracorporeal marker for marking a site within living tissue of a host having a body of porous hydroxyapatite whose physical properties permit the body to be distinguished from human soft tissue under visualization using ultrasonic and radiation imaging modalities. | 02-04-2010 |
20100030108 | LARGE SAMPLE LOW ASPECT RATIO BIOPSY NEEDLE - A high aspect ratio biopsy needle achieves reliable performance with large solid sample size by means of a variety of features and combinations thereof, including support to prevent bending, reinforcement of the needle, and cutting edges arranged to resist deformation. | 02-04-2010 |
20130023789 | LARGE SAMPLE LOW ASPECT RATIO BIOPSY NEEDLE - A high aspect ratio biopsy needle achieves reliable performance with large solid sample size by means of a variety of features and combinations thereof, including support to prevent bending, reinforcement of the needle, and cutting edges arranged to resist deformation. | 01-24-2013 |
20130184562 | BIOPSY MARKER WITH IN SITU-GENERATED IMAGING PROPERTIES - An intracorporeal marker, for marking a site within living tissue of a host, includes an outer body portion of biodegradable material. An inner body portion is located in the outer body portion. The inner body portion includes biological material that becomes calcified in the living tissue of the host over time. An agent interacts with the biological material to promote calcification of the biological material of the inner body portion in the living tissue of the host. | 07-18-2013 |
20130190616 | MULTIPLE IMAGING MODE TISSUE MARKER - An intracorporeal marker for marking a site within living tissue of a host having a body of porous hydroxyapatite whose physical properties permit the body to be distinguished from human soft tissue under visualization using ultrasonic and radiation imaging modalities. | 07-25-2013 |
Patent application number | Description | Published |
20090265296 | Scalable and Interactive Method of Generating and Modifying Network Configurations to Enforce Compliance with High-Level Requirements - A system and method provides a solution to the problem of applying end-to-end requirements of connectivity, security, reliability and performance to configure a network and ultimately assign network components to the network. All requirements are modeled as constraints and a constraint solver does the resolution Not every constraint to be solved is solved by the model-finder. Instead, we “factor away” subsets of a constraint that can be efficiently solved via a special-purpose constraint solver, such as an SQL/Prolog engine, linear programming system, or even an algorithm, leaving behind a constraint that truly requires the power of model-finding, and that is often efficiently solvable by existing model-finders. Such constraints are compiled into quantifier-free constraints that are Boolean combinations of constraints of two forms x=y and x=c where x, y are variables and c is a constant. Such constraints can be efficiently solved by modern SAT-based model-finders. The system intelligently removes the quantifiers instead of having the model-finder remove the quantifiers. An “unsatisfiability-core” analysis efficiently guides the search for configurations to change to restore consistency. | 10-22-2009 |
20100042605 | VERSIONING RELATIONAL DATABASE DISJOINT RECORDS - An inventive system and method for versioning relational database disjoint records comprises a relational database, configuration files translated into query files, and a version control system, wherein each query file is stored and checked into the version control system, updating a version number of the query file. Each query file comprises a set of query statements. Query files are retrieved from the version control system based on the version number or an independent data item, and put into the database for analysis. In one embodiment, one of the configuration files comprises a configuration of a device, such as a router, a switch, a firewall, or a medical record. The method comprises acquiring configuration files, changing the configuration files into query files and storing the query files, and checking each query file into a version control system, wherein the checking in updates a version number of the query file. | 02-18-2010 |
20100199344 | REDUNDANCY DETECTION AND RESOLUTION AND PARTIAL ORDER DEPENDENCY QUANTIFICATION IN ACCESS CONTROL LISTS - Aspects of the invention pertain to analyzing and modifying access control lists that are used in computer networks. Access control lists may have many individual entries that indicate whether information can be passed between certain devices in a computer network. The access control lists may include redundant or conflicting entries. An aspect of the invention converts an order-dependent control list into an order-free equivalent. Redundant entries are identified and removed without adversely affecting the access control list. Redundancy may be identified by evaluating the volume contraction ratio, which is the ratio of the volume of spin-off entries to specific original entry in the access control list. This ratio reflects the extent of order-dependent impact on that entry in a given access control list. | 08-05-2010 |
20100199346 | SYSTEM AND METHOD FOR DETERMINING SYMANTIC EQUIVALENCE BETWEEN ACCESS CONTROL LISTS - Aspects of the invention pertain to analyzing and modifying access control lists that are used in computer networks. Access control lists may have many individual rules that indicate whether information can be passed between certain devices in a computer network. The access control lists may include redundant or conflicting rules. An aspect of the invention determines whether two or more access control lists are equivalent or not. Order-dependent access control lists are converted into order-independent access control lists, which enable checking of semantic equivalence of different access control lists. Upon conversion to an order-independent access control list, lower-precedence rules in the order-free list are checked for overlap with a current higher precedence entry. If overlap exists, existing order-free rules are modified so that spinoff rules have no overlap with the current entry. This is done while maintaining semantic equivalence. | 08-05-2010 |
20100217860 | SYSTEMS AND METHODS FOR SINGLE SESSION MANAGEMENT IN LOAD BALANCED APPLICATION SERVER CLUSTERS - Aspects of the invention pertain to user session management in load balanced clusters. Multiple application servers communicate with a central data server to ensure there is a single session per user ID. The central data server maintains a user session index and a parameter table. Each time a network access is attempted using a given user ID, a load balancer assigns the session to one of the application servers. The assigned application server queries the central data server to determine whether a session status for the user's login ID is inactive or active. If inactive, a new, unique value is assigned as the session number. If active, the session number is evaluated to determine whether multiple sessions exist. In this case, one of the sessions is terminated to ensure a single session per user ID. Preferably, the terminated session is the earlier session. | 08-26-2010 |
20110283348 | SYSTEM AND METHOD FOR DETERMINING FIREWALL EQUIVALENCE, UNION, INTERSECTION AND DIFFERENCE - Aspects of the invention pertain to integrated compliance analysis of multiple firewalls and access control lists for network segregation and partitioning. Access control lists may have many individual rules that indicate whether information can be passed between certain devices in a computer network. The access control lists in different firewalls in different network segments within a given network may overlap or have inconsistent rules. Aspects of the invention generate differences between firewalls, analyze equivalency of firewalls, generate the intersection (if any) between a pair of firewalls, and generate the union (if any) between firewalls. Such information provides an integrated analysis of multiple interrelated firewalls, including inbound and outbound access control lists for such firewalls, and may be used to manage firewall operation within the network to ensure consistent operation and maintain network security. It also addresses a wide range of security questions that arise when dealing with multiple firewalls. | 11-17-2011 |
Patent application number | Description | Published |
20090190499 | System for Extracting and Combining Information from IP Device Configurations, Inventory Systems, and Real-Time Network Monitoring - The inventive system and method for improving network security, availability, and regulatory compliance, and maximizing a network comprises a network configuration component, a network inventory component, a network monitoring component, and a network assessment component, wherein information is extracted from each of the configuration, inventory, and monitoring components, the extracted information is combined and assessed in the assessment component, and the maximized network is produced using the combined information. In one embodiment, the combined information is stored in a database. In one embodiment, an XML is produced from the extracted inventory information, and this XML is converted to a canonical form. | 07-30-2009 |
20100050258 | LIGHTWEIGHT PACKET-DROP DETECTION FOR AD HOC NETWORKS - In packet-drop attacks in ad hoc networks, a malicious network node chooses to selectively drop packets that are supposed to be forwarded, which results in adverse impact on application good-put and network stability. A method and system for detection of packet-drop attacks in ad hoc networks requires network nodes to report statistics on IP flow packets originated, received, or forwarded to neighbors. These statistics are analyzed and correlated to determine nodes suspected of dropping packets. | 02-25-2010 |