Patent application number | Description | Published |
20080299519 | Dental Methods, Compositions, and Kits Including Acid-Sensitive Dyes - Methods and compositions including an aqueous liquid that includes an acid-sensitive dye are disclosed for use in dental and orthodontic procedures. The aqueous liquid can be useful for providing a visible color change to indicate contact with acidic materials including, for example, etching compositions, self-etching adhesives, and self-adhesive compositions. | 12-04-2008 |
20090011388 | SELF-ETCHING DENTAL COMPOSITIONS AND METHODS - The present invention is directed to dental compositions that can be used as adhesives for bonding a dental material to a dental structure surface and/or as a dental restorative material. The dental composition is preferably applied to a dental structure surface under conditions effective to etch the dental structure surface. | 01-08-2009 |
20090304809 | DENTAL FILLERS, METHODS, COMPOSITIONS INCLUDING A CASEINATE - The present application provides dental fillers, and methods of making and using dental fillers that include a treated surface that includes a caseinate. Dental compositions including such dental fillers can be useful for delivering ions to the oral environment. Dental compositions, and methods of using dental compositions that include a caseinate and a hardenable resin or a water-dispersible, polymeric film former are also provided. | 12-10-2009 |
20100015578 | METHODS OF USING A DENTAL COMPOSITION HAVING AN ACIDIC COMPONENT AND A PHOTOBLEACHABLE DYE - Methods of using a dental composition having a photobleachable dye and an acidic component with a pKa of less than 4.5 are disclosed. The photobleachable dye is selected from the group consisting of aminoanthraquinone dyes, azo dyes, and combinations thereof. The aged color of the dental composition is substantially the same as the color of the dental composition immediately after hardening. | 01-21-2010 |
20120258424 | DENTAL AUTO-MIXING METHOD, DEVICE, AND COMPOSITION FOR TEMPORARY CEMENTS - The abstract has been amended as follows: A method of dispensing a hardenable dental composition, which can form a temporary bond, comprising 1) providing multi-part hardenable dental composition comprising part (A) in the form of a paste comprising acid-reactive glass particles and a liquid selected from the group consisting of water, a monomer having at least one ethylenically 10 unsaturated group per monomer molecule, and a combination thereof; and part (B) comprising a water soluble polyacid and a liquid selected from the group consisting of water, a monomer having at least one ethylenically unsaturated group per monomer molecule, and a combination thereof; and 2) extruding the composition through a static mixer in fluid communication with a first reservoir containing the part (A) and a second reservoir 20 containing the part (B); wherein a plunger is positioned in each reservoir for simultaneously forcing part (A) and part (B) into the static mixer. | 10-11-2012 |
20120277343 | DENTAL FILLERS, METHODS, COMPOSITIONS INCLUDING A CASEINATE - The present application provides dental fillers, and methods of making and using dental fillers that include a treated surface that includes a caseinate. Dental compositions including such dental fillers can be useful for delivering ions to the oral environment. Dental compositions, and methods of using dental compositions that include a caseinate and a hardenable resin or a water-dispersible, polymeric film former are also provided. | 11-01-2012 |
20120295214 | DENTAL AUTO-MIXING METHODS, DEVICES, AND COMPOSITIONS - A method of dispensing a hardenable dental composition comprising 1) providing a two-part hardenable dental composition, and 2) extruding the composition through a static mixer in fluid communication with a first reservoir containing the first part and a second reservoir containing the second part, wherein a plunger is positioned in each reservoir for simultaneously forcing both parts into the static mixer, extruding the composition through the static mixer, and dispensing the composition, and wherein an extrusion force is applied to the plunger for extruding the composition through the static mixer without the aid of a mechanical advantage provided by an attached or external device. Also disclosed is a method of bonding a prosthetic device to a dental structure using the dispensing method, a device for dispensing the composition using the dispensing method, a kit comprising the device, and the composition used in the dispensing method. | 11-22-2012 |
20130164709 | SUBSTITUTED SACCHARIDE COMPOUNDS AND DENTAL COMPOSITIONS - Substituted saccharide compounds, dental compositions comprising substituted saccharide compounds, and methods of using dental compositions are described. In one embodiment, the substituted saccharide amide compound comprises a hydrophobic group and at least one free-radically polymerizable group with the proviso that the hydrophobic group is not bonded to the ethylenically unsaturated carbon atom of the free-radically polymerizable group. The hydrophobic group is typically bonded to a nitrogen atom of a saccharide amine residue or a carbonyl moiety of saccharide amide residue. | 06-27-2013 |
20130316307 | DENTAL COMPOSITIONS COMPRISING ETHYLENICALLY UNSATURATED ADDITION-FRAGMENTATION AGENT - Dental compositions are described comprising an addition-fragmentation agent comprising at least one ethylenically unsaturated terminal group and a backbone unit comprising an α,β-unsaturated carbonyl; at least one monomer comprising at least two ethylenically unsaturated group; and inorganic oxide filler. The addition-fragmentation agent is preferably free-radically cleavable. The addition-fragmentation agent preferably comprises at least two ethylenically unsaturated terminal groups, such as (meth)acTylate groups. In some embodiments, the addition-fragmentation agent has the formula: wherein R | 11-28-2013 |
20140206788 | ADDITION-FRAGMENTATION AGENTS - Addition-fragmentation agents of the formula are disclosed having the following functional groups: 1) a labile addition-fragmentation group that can cleave and reform to relieve strain, 2) a free-radically polymerizable group, and 3) a surface-modifying functional group that associates with the surface of a substrate. | 07-24-2014 |
20140234528 | FUNCTIONALIZED ADHESIVE COATED ORTHODONTIC APPLIANCES - Provided are methods for making adhesive coated orthodontic appliances having a silane treated metallic bonding surface, and related assemblies. Exemplary methods of making an adhesive coated orthodontic appliance include providing a metallic bonding surface on the orthodontic appliance for attachment to a tooth surface, sand blasting the bonding surface with a silica-based media, functionalizing the bonding surface in the presence of a pH-modified coupling agent solution, and applying an adhesive onto at least a portion of the bonding surface, where the adhesive is a hydrophilic adhesive having a water uptake of at least 0.5 percent of its original weight after hardening. | 08-21-2014 |
20150238389 | DENTAL COMPOSITIONS COMPRISING ETHYLENICALLY UNSATURATED ADDITION-FRAGMENTATION AGENT - Dental compositions are described comprising an addition-fragmentation agent of the formula: | 08-27-2015 |
20150283039 | DENTAL COMPOSITIONS COMPRISING ADDITION-FRAGMENTATION AGENTS - A curable dental composition comprising an addition-fragmentation agent and a curable dental resin is disclosed. | 10-08-2015 |
20150328086 | ADDITION-FRAGMENTATION OLIGOMERS - Addition-fragmentation oligomers of the general formula Z—B | 11-19-2015 |
Patent application number | Description | Published |
20090199296 | DETECTING UNAUTHORIZED USE OF COMPUTING DEVICES BASED ON BEHAVIORAL PATTERNS - Techniques for detecting unauthorized use (e.g., malicious attacks) of the computing systems (e.g., computing devices) are disclosed. Unauthorized use can be detected based on patterns of use (e.g., behavioral patterns of use typically associated with a human being) of the computing systems. Acceptable behavioral pattern data can be generated for a computing system by monitoring the use of a support system (e.g., an operating system, a virtual environment) operating on the computing system. For example, a plurality of system support provider components of a support system (e.g., system calls, device drivers) can be monitored in order to generate the acceptable behavioral pattern data in a form which effectively defines an acceptable pattern of use (usage pattern) for the monitored system support provider components, thereby allowing detection of unauthorized use of a computing system by detecting any deviation from the acceptable pattern of use of the monitored system support provider components. | 08-06-2009 |
20090265756 | SAFETY AND MANAGEMENT OF COMPUTING ENVIRONMENTS THAT MAY SUPPORT UNSAFE COMPONENTS - Techniques for managing and protecting computing environments are disclosed. A safe computing environment can be provided for ensuring the safety and/or management of a device. The safe computing environment can be secured by a safe component that isolates and protects it from unsafe computing environments which may also be operating. As a result, various security and management activities can be securely performed from a safe computing environment. A safe computing environment can, for example, be provided on a device as a safe virtual computing environment (e.g., a safe virtual machine) protected by a safe virtual computing monitor (e.g., a safe virtual machine monitor) from one or more other virtual computing environments that are not known or not believed to be safe for the device. It will also be appreciated that the safe components can, for example, be provided as trusted components for a device. As such, various trusted components (or agent) can operate in a trusted computing environment secured from interference by components that many not be trusted and perform various security and/or management tasks alone or in connection, for example, with other trusted components (e.g., trusted serves). | 10-22-2009 |
20090271844 | SAFE AND EFFICIENT ACCESS CONTROL MECHANISMS FOR COMPUTING ENVIRONMENTS - Improved techniques for controlling access to accessible components of computing environments are disclosed. The techniques, among other things, can be used to provide Mandatory Access Control (MAC) mechanisms for mobile and embedded systems. One or more accessible components (e.g., accessible resources) which a component may attempt to access are determined so that one or more access permissions can be stored in a manner that they can be obtained if the component attempts to access the one or more accessible components, thereby allowing access to the one or more accessible components to be determined based on access permissions that are readily available. Generally, access permissions can be identified and stored in anticipation of need. Access permissions can be identified, for example, based on the likelihood of use, or all possible access permissions can be determined and stored. A safe (e.g., a trusted) access controlling (or monitoring) system (or component) can control access to resources of a computing environment. For example, a trusted access monitoring system can be provided in a secure and trusted operating environment utilizing Mandatory Access Control (MAC) capabilities of a secure operating system (e.g., SELinux Operating System). | 10-29-2009 |
20090300049 | VERIFICATION OF INTEGRITY OF COMPUTING ENVIRONMENTS FOR SAFE COMPUTING - Improved verification techniques for verification of the integrity of various computing environments and/or computing systems are disclosed. Verifiable representative data can effectively represent verifiable content of a computing environment, thereby allowing the integrity of the computing environment to be verified based on the verifiable representative data instead of the content being represented. Verifiable representative data can effectively include selected portions of the content (e.g., selected content which may be of general and/or specific security interest) and can be generally smaller than the verifiable content it represents. As such, it may generally be more efficient to use the verifiable representative data instead of the content it represents. Verifiable representative data can also be organized. By way of example, unstructured content (e.g., a configuration file written in text) can be effectively transformed based on a scheme (e.g., an XML schema) into a structured text-based content written in a structured language (e.g., XML). Verifiable organized representative data can be organized in accordance with various organizational aspects including, for example, structural, semantics, parameter verification, parameter simplification, and other organizational rules and/or preferences. Organization of verifiable organized representative data can be verified as an additional measure of its integrity, and by in large the integrity of a computing environment and/or system being effectively represented by the verifiable representative data. | 12-03-2009 |
20100106976 | REPRESENTATION AND VERIFICATION OF DATA FOR SAFE COMPUTING ENVIRONMENTS AND SYSTEMS - Techniques for representation and verification of data are disclosed. The techniques are especially useful for representation and verification of the integrity of data (integrity verification) in safe computing environments and/or systems (e.g., Trusted Computing (TC) systems and/or environments). Multiple independent representative values can be determined independently and possibly in parallel for respective portions of the data. The independent representative values can, for example, be hash values determined at the same time for respective distinct portions of the data. The integrity of the data can be determined based on the multiple hash values by, for example, processing them to determine a single hash value that can serve as an integrity value. By effectively dividing the data into multiple portions in multiple processing streams and processing them in parallel to determine multiple hash values simultaneously, the time required for hashing the data can be reduced in comparison to conventional techniques that operate to determine a hash value for the data as a whole and in a single processing stream. As a result, the time required for integrity verification can be reduced, thereby allowing safe features to be extended to devices that may operate with relatively limited resources (e.g., mobile and/or embedded devices) as well as improving the general efficiency of device that are or will be using safety features (e.g., Trusted Computing (TC) device). | 04-29-2010 |
20100117873 | INTEGRATING HASHING AND DECOMPRESSION OF COMPRESSED DATA FOR SAFE COMPUTING ENVIRONMENTS AND SYSTEMS - Techniques for hashing and decompression of data are disclosed. Hashing and decompression of compressed data can be integrated in order to effectively hash and decompress the compressed data at the same time. The integrated hashing and decompression techniques of the invention are useful for any computing environment and/or system where compressed data is hashed and decompressed. The invention is especially useful for safe computing environment and/or system (e.g., a Trusted Computing (TC) computing environment) where hashing decompression of compressed data can be routinely performed. The Integrity of a computing environment and/or system can be protected by integrating the decompressing and hashing of the compressed data or effectively hashing and decompressing the compressed data at the same time. A combined hashing and decompression function can be provided based on conventional hashing and compression functions by integrating their similar components and in an efficient manner. | 05-13-2010 |
20100122314 | ACTIVE ACCESS MONITORING FOR SAFER COMPUTING ENVIRONMENTS AND SYSTEMS - Techniques for controlling access are disclosed. The techniques can be used for reference monitoring in various computing systems (e.g., computing device) including those that may be relatively more susceptible to threats (e.g., mobile phones). Allowed access can be disallowed. In other words, permission to access a component can be effectively withdrawn even though access may be on-going. After permission to access a component has been allowed, one or more disallow access conditions or events can be effectively monitored in order to determine whether to withdraw the permission to access the component. As a result, allowed access to the component can be disallowed. Access can be disallowed by effectively considering the behavior of a component in the aggregate and/or over a determined amount of time. By way of example, a messaging application can be disallowed access to a communication port if the messaging application sends more messages than an acceptable limit during a session or in 4 hours. Disallow-access policies, rules and/or conditions can be defined and modified, for example, by end-users and system administrators, allowing a customizable and flexible security environment that is more adaptable to change. | 05-13-2010 |
Patent application number | Description | Published |
20090115837 | SYSTEMS AND METHODS FOR IMPLEMENTING INTERNET VIDEO CONFERENCING USING STANDARD PHONE CALLS - A video conferencing system ( | 05-07-2009 |
20100162171 | VISUAL ADDRESS BOOK AND DIALER - A method may include associating a plurality of graphical images with a plurality of contacts in a device having contact management functionality and displaying the plurality of graphical images to a user. The method may further include receiving a user selection of one of the plurality of graphical images; and initiating voice-based communication with the contact associated with the selected graphical image. | 06-24-2010 |
20110028137 | END OF CALL SERVICES - A method may include receiving user preference information associated with display of content items. A triggering activity may be identified at a user device. Context information associated with the user device may be determined. A content item may be selected for display on the user device from a plurality of available content items based on the user preference information and the context information. The selected content item may be displayed on the user device. | 02-03-2011 |
20110099040 | MOBILE TAXI DISPATCH SYSTEM - A mobile taxi dispatch system may receive a request for a taxi vehicle from a user, select one or more taxi vehicles to contact in response to receiving the request and send the request to the selected one or more taxi vehicles. The mobile taxi dispatch system may further receive acceptances of the request from at least one of selected one or more taxi vehicles, select a particular taxi vehicle from the at least one of the selected one or more taxi vehicles that accepted the request. The selecting may be based on one or more criteria. The mobile taxi dispatch system may also send a confirmation to the user and to the particular taxi. | 04-28-2011 |
20110187865 | ACCESSING WEB-BASED CAMERAS ARRANGED BY CATEGORY - A device receives category information associated with multiple cameras, and receives video information from the multiple cameras. The device also arranges the video information based on the category information associated with the multiple cameras and based on location information associated with a user device. The device further receives a video request from the user device, and provides, to the user device, video information from a camera, of the multiple cameras, that matches the video request. | 08-04-2011 |
20120047534 | MATRIX SEARCH OF VIDEO USING CLOSED CAPTION INFORMATION - Closed caption data for video programs, such as television programs, may be used to implement a video search. In one implementation, a device may perform a search to obtain video programs that are relevant to the search. The search may be performed using an index generated from closed caption data of video programs. The device may additionally present the video programs that are relevant to the search as a matrix of reduced-in-size images sampled from the video programs that are relevant to the search query. The images may be sampled from the video programs near a position in the video programs corresponding to the positions at which the search query is relevant to the video program. | 02-23-2012 |
20120062473 | MEDIA EXPERIENCE FOR TOUCH SCREEN DEVICES - A method may include receiving and outputting a selected multimedia stream at a mobile device. It is determined that a user wishes to browse other available multimedia streams. The selected multimedia stream is paused while the user browses the other available multimedia streams. The selected multimedia stream is cached while the user browses the other available multimedia streams. It is determined that the user has finished browsing the other available multimedia streams. The cached multimedia stream is output. | 03-15-2012 |
20120066226 | SOCIAL MEDIA ORGANIZER FOR INSTRUCTIONAL MEDIA - A social media organizer for instructional or educational content may maintain one or more media clips relating to used-defined educational or instructional topics. In one implementation, a device may maintain user-created sets of media clips, where the media clips in a set of media clips include instructional media clips that relate to a particular subject. The device may further receive rankings from users relating to a quality of the sets of media clips and determine one or more of the sets of media clips that match a user search request. Additionally, the device may provide an interface that provides commands for the user to control playback of the media clips. | 03-15-2012 |
20120081299 | METHOD AND APPARATUS FOR PROVIDING REMOTE CONTROL VIA A TOUCHABLE DISPLAY - An approach is provided for controlling a display of a set-top box from a remote control device having a touchable display. User input is received via the touchable display of the remote control device. A control signal is generated in response to the user input for controlling a set-top box coupled to a display. The set-top box is configured to present the content on the display concurrently with the touchable display. | 04-05-2012 |
20120089474 | AUTOMATED AUTOMOBILE MAINTENANCE USING A CENTRALIZED EXPERT SYSTEM - A system includes a database that stores an expert knowledgebase, and one or more servers configured to implement an expert system. The one or more servers receive sensor data associated with sensors from automobile maintenance systems associated with respective ones of multiple automobiles, and analyze the sensor data, using the expert system and the expert knowledgebase, to diagnose whether the multiple automobiles require maintenance and/or repair. The one or more servers send, via a network, results of the analysis of the sensor data to service stations for scheduling maintenance and/or repair of the multiple automobiles. | 04-12-2012 |
20120113264 | MULTI-FEED EVENT VIEWING - A method may include receiving a number of video feeds from video capture devices located at an event venue. The number of video feeds may be dynamically analyzed to determine feed information associated with the number of video feeds. A request to view a multi-feed event may be received from a user device. At least some of the number of video feeds may be provided to the user device in response to the request. Feed information corresponding to the at least some of the number of video feeds may be provided based on the dynamically analyzing. | 05-10-2012 |
20120161971 | AUTOMATED ATTENDANCE TRACKING AND EVENT NOTIFICATION - A system is configured to receive information associated with a location of a user device; retrieve information associated with a location at which a user, of the user device, is to be during a period of time; determine whether to assign, to the user device, a late status or an absent status based on the location of the user device, the assigned location, and the period of time; assign a late status when the location of the user device does not match the assigned location when the period of time begins; send, to another user device, a notification that the user device is late to the assigned location based on the assigning of the late status; assign an absent status when the location of the user device does not match the assigned location during the period of time; and send to the other user device, another notification that the user device was absent from the assigned location based on the assigning of the absent status. | 06-28-2012 |
20120162423 | METHODS AND SYSTEMS FOR AUTOMOBILE SECURITY MONITORING - Systems and methods for providing an automobile security monitoring service are disclosed. In one embodiment, a method for monitoring the security of a plurality of automobiles includes monitoring, over a network, the security of the plurality of automobiles, receiving, from one of the plurality of automobiles over the network, a message indicating a potential security threat to the automobile, and sending, over a network to a terminal device associated with an owner of the automobile, an alert indicating the potential security threat to the automobile. The method further includes receiving, over the network from the terminal device and responsive to the alert, a request of the owner to stream video from a security camera onboard the automobile, issuing, to the automobile over the network and based on the request, a command to the automobile to stream video from the security camera onboard the automobile. The method further includes receiving, from the automobile over the network, video from the security camera onboard the automobile, and streaming received video over the network to the terminal device. | 06-28-2012 |
20120164989 | METHODS AND SYSTEMS FOR PROVIDING A WIRELESS AUTOMOBILE KEY SERVICE - Systems and methods for providing a wireless automobile key service are disclosed. In one embodiment, a method includes detecting whether the mobile device is connected to the automobile over a first network, launching a wireless automobile key service application on the mobile device when it is detected that the mobile device is connected to the automobile over the first network, and receiving, via the application from an operator of the automobile using the mobile device, a request to issue a command to the automobile. The method further includes determining whether the requested command is a first command or a second command. The method further includes when the requested command is a first command, sending, from the mobile device to a server over a second network, a request to issue the first command to the automobile. The method also includes when the requested command is a second command, sending, from the mobile device to the sever over the second network, a request to issue the second command to the automobile, and receiving, at the mobile device from the server over the second network, status information associated with the automobile. | 06-28-2012 |
20120299749 | PARKING LOT MANAGEMENT SYSTEM - A parking lot management system determines a current parking space inventory for one or more parking lots using a parking database. The parking lot management system receives, via a network, a location associated with a parking customer, and identifies a parking lot of the one or more parking lots currently having available parking spaces based on the customer's location. The parking lot management system sends, via the network, at least one of a current occupancy, parking rates, or a location of the identified parking lot to the parking customer. The parking lot management system further receives a parking space reservation inquiry from the parking customer, and identifies a parking space from the identified parking lot based on the parking customer's location. | 11-29-2012 |
20130080972 | PROACTIVE USER INTERFACE - A system may include a computing device configured to provide a proactive user interface, the proactive user interface configured to selectively propose suggested actions when a user of the computing device is determined to be in a passive mode. The computing device may include a proactive user interface module configured to: wait for at least one event, determine whether trigger criteria are met based on the at least one event, and when the trigger criteria are met, propose a suggested action to the user based on the at least one event. | 03-28-2013 |
20130086159 | MEDIA CONTENT RECOMMENDATIONS BASED ON SOCIAL NETWORK RELATIONSHIP - A system includes a plurality of media content processing devices, a content server, and a recommendation server. Each media content processing device is configured to receive media content from a content provider. The content server is configured to provide the media content to each of the media content processing devices. The recommendation server is configured to collect viewing data from each of the media content processing device. The recommendation server is further configured to provide each media content processing device with a viewing recommendation based at least in part on the viewing data collected from one or more of the other media content processing devices and a social network relationship between at least two of the media content processing devices. | 04-04-2013 |
20130097179 | CROWD-SOURCED PROBLEM SOLVING - A device includes an input device configured to receive a plurality of user inputs including a predetermined user input. A display device is configured to display a graphical user interface. A memory device is configured to store device information. A help application is in communication with the input device, the display device, and the memory device and is configured to detect the predetermined user input and, in response, populate the graphical user interface with a list of selectable solutions associated with the device information in accordance with a performance rank associated with each solution. | 04-18-2013 |
20130150088 | LOCATION-BASED PROXIMITY NOTIFICATION - A user device may receive selection of a type of a location-based proximity notification, and may receive a device parameter, a message parameter, and a location parameter for the selected notification type. The user device may detect that the user device is proximate to a location defined by the location parameter, and may provide a proximity notification message, defined by the message parameter, to a device defined by the device parameter, when the user device is proximate to the location. | 06-13-2013 |
20130152168 | WIRELESS CONNECTION METHOD AND DEVICE - A method, a device, and an access point are provided for obtaining network access. A method, comprising: receiving, by an access point device and from wireless device, a request for authorization to access a network through the access point; determining, by the access point, a distance between the access point and the wireless device; determining, by the access point, that the distance is less than a first threshold distance; using, by the access point, a first process to grant access to the network through the access point when the distance is less than the first threshold distance; and using, by the access point, a second process to grant access to the network through the access point when the distance is not less than the first threshold distance, where the first process is a different and less complex for granting access to the network than the second process. | 06-13-2013 |
20130190013 | LOCATION-BASED CALL CENTER FILTERING - A device may receive a request for a service call and location information associated with a user device, and may determine an address of a customer, associated with the user device, based on the location information. The device may determine customer information based on the address, and may filter a list of call centers, for the service call, based on the customer information and the address. The device may generate trouble ticket information for the service call, and may provide the customer information and the trouble ticket information to call centers provided in the filtered list of call centers. | 07-25-2013 |
20140040935 | MULTI-SCREEN TARGETED ADVERTISING - A system provides, to consumers, coupon offers that correspond to television advertising seen by the consumer. The system may receive tracking information of a television advertisement presented to a user of a particular set-top box, and identify, from a group of stored coupon content, particular coupon content corresponding to the television advertisement. Based on stored delivery preferences for the user, the system sends the particular coupon content to a user device (e.g., a smart phone, computer, etc.) associated with the set-top box. | 02-06-2014 |
20140139617 | SYSTEMS AND METHODS FOR IMPLEMENTING INTERNET VIDEO CONFERENCING USING STANDARD PHONE CALLS - A video conferencing system ( | 05-22-2014 |
20140180777 | METHOD AND APPARATUS FOR PAIRING OF A POINT OF SALE SYSTEM AND MOBILE DEVICE - A method and apparatus for improved approaches for pairing of a POS system and mobile device is described. The method includes: determining, by a POS system, a proximity of a physical location of a mobile device to an access point associated with the POS system, wherein the mobile device is configured to connect to the access point and to initiate establishment of a communication session over a service provider network; initiating a link, via the access point, between the mobile device and the POS system based on the determined proximity; receiving, via the link, an indication of an item that includes a good, a service, or a combination thereof; determining, by the POS system, item information for the item based on the indication; and transmitting, via the link, the item information to the mobile device. | 06-26-2014 |
Patent application number | Description | Published |
20120083658 | MINIMALLY OBSTRUCTIVE RETRACTOR - This application presents minimally-obstructive and structurally-adjustable retractors which afford an open work area of desirable size and enhanced visualization for a surgeon about the perineum and the posterior vaginal wall of the patient. The retractors may be lightweight and compact, and also configured and dimensioned to minimize slippage during use. The retractors may retract the engorged labia of the postpartum patient as well as the vaginal walls. The device may also be used as a speculum. | 04-05-2012 |
20120209076 | MINIMALLY OBSTRUCTIVE RETRACTOR - This application presents minimally-obstructive and structurally-adjustable retractors which afford an open work area of desirable size and enhanced visualization for a surgeon about the perineum and the posterior vaginal wall of the patient. The retractors may be lightweight and compact, and also configured and dimensioned to minimize slippage during use. The retractors may retract the engorged labia of the postpartum patient as well as the vaginal walls. The device may also be used as a speculum. | 08-16-2012 |
20130041229 | MINIMALLY OBSTRUCTIVE RETRACTOR - This application presents minimally-obstructive and structurally-adjustable retractors which afford an open work area of desirable size and enhanced visualization for a surgeon about the perineum and the posterior vaginal wall of the patient. The retractors may be lightweight and compact, and also configured and dimensioned to minimize slippage during use. The retractors may retract the engorged labia of the postpartum patient as well as the vaginal walls. The device may also be used as a speculum. | 02-14-2013 |
20130139831 | RETENTION DEVICE - This application presents retention devices that afford the user quick and easy placement. These retention devices may accommodate objects of various shapes and sizes. The device provides sturdy means for retaining and securing an object to a surface without the need to handle and position flaps of tape. The device allows easy removal from the retained object without adhesives directly contacting or damaging it sensitive surfaces. The retention described here may be used to quickly secure anatomic structures during operations, such as securing the penis against the abdomen during vasectomy, without causing discomfort or damage to sensitive skin during application or removal. | 06-06-2013 |
20130144313 | SURGICAL FORCEPS - This application presents a bifurcated, optimally-angled surgical forceps. In one example, this surgical forceps may enable a more natural maneuver for initial clamping of the vas deferens through the scrotal skin. This may be more comfortable for users and easier to maintain, and may provide greater tactile surface contact between the thumb and vas deferens. This device also may provide the surgeon with an entire segment of vas deferens upon which the vasectomy may be performed, thus reducing the need for frequent repositioning of instruments. The device may also be applied to other surgical procedures that may benefit from the features of the device and where a section of a tubular anatomical structure may need clamping at two points along its length. Examples include blood and lymphatic vessels, ducts of the digestive system, and large nerves or nerve bundles. | 06-06-2013 |
20140364695 | SPECULUM FOR OBSTETRICAL AND GYNECOLOGICAL EXAMS AND RELATED PROCEDURES - This application presents structurally-adjustable vaginal specula, which provides visualization and access to the vagina and the cervix. The specula may be lightweight and compact, and may also be configured and dimensioned to minimize slippage during use. The specula may comprise built-in light sources. The specula may comprise a fluid handler, for example, to remove fluids from the vagina during medical interventions. The specula may retract the labia as well as the vaginal walls. The speculum may also be used as a retractor. | 12-11-2014 |
20140364698 | MINIMALLY OBSTRUCTIVE RETRACTOR FOR VAGINAL REPAIRS - This application presents minimally-obstructive and structurally-adjustable retractors for vaginal repairs, which afford an open work area of desirable size and enhanced visualization for a surgeon about the perineum and the posterior vaginal wall of the patient. The retractors may be lightweight and compact, and also configured and dimensioned to minimize slippage during use. The retractors may have occluders that may partially or substantially block or absorb fluids, for example, from or around the cervix. The retractors may incorporate built-in light sources. The retractors may retract the engorged labia of the postpartum patient as well as the vaginal walls. The retractor may also be used as a speculum. | 12-11-2014 |
20150359550 | SURGICAL FORCEPS - This application presents a bifurcated, optimally-angled surgical forceps. In one example, this surgical forceps may enable a more natural maneuver for initial clamping of the vas deferens through the scrotal skin. This may be more comfortable for users and easier to maintain, and may provide greater tactile surface contact between the thumb and vas deferens. This device also may provide the surgeon with an entire segment of vas deferens upon which the vasectomy may be performed, thus reducing the need for frequent repositioning of instruments. The device may also be applied to other surgical procedures that may benefit from the features of the device and where a section of a tubular anatomical structure may need clamping at two points along its length. Examples include blood and lymphatic vessels, ducts of the digestive system, and large nerves or nerve bundles. | 12-17-2015 |
Patent application number | Description | Published |
20120105211 | APPARATUS AND METHOD FOR DETECTING RFID SIGNALS - A mixed-mode signal detection apparatus suitable for ISO/IEC 14443 Type A and Type B RFID proximity card applications. The apparatus combines switched capacitor sampling and digital post processing to recover information from Amplitude Shift Keying (ASK) modulated signals. A phase detector triggers a pulse generator, which is used to signal sample and hold units that store the peak value of each carrier signal cycle. The samples are used to form a discrete version of the modulation signal and are post-processed digitally to recover encoded signal information. | 05-03-2012 |
20120201289 | DECISION FEEDBACK EQUALIZER AND TRANSCEIVER - A decision feedback equalizer, transceiver, and method are provided, the equalizer having at least one comparator, the at least one comparator comprising a first stage, comprising a main branch having two track switches with a resistive load, an offset cancellation branch, a plurality of tap branches with transistor sizes smaller than the main branch, in which previous decisions of the equalizer are mixed with the tap weights using current-mode switching, and a cross coupled latch branch; and a second stage, comprising a comparator module for making decisions based on the outputs of the first stage and a clock input, and a plurality of flip-flops for storing the output of the comparator module. | 08-09-2012 |
20130169416 | STREAMLINED APPARATUS AND METHODS FOR RFID COMMUNICATION - Methods and devices for receiving a data signal transmitted via load modulation, by detecting current supplied in an amplifier feeding the antenna of the device which transmits the carrier signal. | 07-04-2013 |
20140101734 | CREDENTIAL AUTHENTICATION METHODS AND SYSTEMS - Methods and systems are provided for performing and verifying transactions involving authentication with a secure credential, such as a smart card, in an untrusted or semi-trusted environment. An application module, operating in an untrusted or semi-trusted environment can be denied access to sensitive data. The application module can determine a preliminary command to be sent to the credential and transmit the preliminary command to a broker module. The broker module, operating in a trusted environment, can supply sensitive data and transmit the command to the credential. Subsequently, the broker module can extract sensitive data from a response before it is transmitted to the application module. A verification server can audit the transaction to verify that it was carried out properly. | 04-10-2014 |
20150121086 | SYSTEMS AND METHODS FOR SECURE PROCESSING WITH EMBEDDED CRYPTOGRAPHIC UNIT - Processor system with a general purpose processor and a cryptographic processor dedicated to performing cryptographic operations and enforcing the security of critical security parameters. The cryptographic processor prevents exposure of critical security parameters outside the cryptographic processor itself, and instead implements a limited scripting engine, which can be used by the general purpose processor to execute operations that require the critical security parameters. | 04-30-2015 |
20150310237 | STREAMLINED APPARATUS AND METHODS FOR RFID COMMUNICATION - Methods and devices for receiving a data signal transmitted via load modulation, by detecting current supplied in an amplifier feeding the antenna of the device which transmits the carrier signal. | 10-29-2015 |
Patent application number | Description | Published |
20100104551 | METHOD FOR PROLONGING ACTIVITY OF AUTODEGRADABLE ENZYMES AND COMPOSITIONS THEREOF - A composition of a long-acting enzyme comprises the enzyme in a formulation comprising a buffer and an additive selected from the group consisting of tranexamic acid, ε-aminocaproic acid, and analogs of L-lysine other than tranexamic acid and ε-aminocaproic acid, combinations thereof, and mixtures thereof. The composition can further comprise another additive selected from the group consisting of L-lysine, L-arginine, L-ornithine (or its pharmaceutically acceptable salts; e.g., L-ornithine hydrochloride), γ-aminobutyric acid, 5-aminovaleric acid, 7-aminoheptanoic acid, glycylglycine, triglycine, N-α-acetyl-L-arginine, betaine, sarcosine, gelatin, HSA, streptokinase, tPA, uPA, non-ionic surfactants, glycerin, D-sorbitol, combinations thereof, and mixtures thereof. A method for prolonging the activity of an autodegradable enzyme comprises storing the enzyme after manufacture at a low pH, and reconstituting the acidified enzyme before use with a solution containing at least one of such additives. The method is useful to provide enzyme for wide use, which otherwise would lose activity upon long storage. In one embodiment the method is applicable to provide enzyme for inducing controlled posterior vitreous detachment. | 04-29-2010 |
20110189174 | COMPOSITIONS AND METHODS FOR TREATING, REDUCING, AMELIORATING, ALLEVIATING, OR INHIBITING PROGRESSION OF, PATHOGENIC OCULAR NEOVASCULARIZATION - A composition for treating, reducing, ameliorating, alleviating, or inhibiting the progression of, pathological ocular neovascularization comprises an integrin or vitronectin receptor antagonist having any one of Formulae I-XI, as defined herein. The composition can further comprise a VEGF inhibitor. Such composition is administered to an ocular environment by a method such as topical application, periocular injection, intravitreal injection, or intravitreal implantation. The composition can be administered alone or in combination with another procedure chosen to enhance the outcome of the treatment. | 08-04-2011 |