Patent application number | Description | Published |
20100299703 | Live Uplink Transmissions And Broadcasting Management System And Method - A live uplink transmission and broadcasting management system and method for managing a plurality of live uplink transmissions and broadcasting events, the system comprising: (i) a publication portal for publishing transmissions of live events; (ii) a database for storing metadata, system data, broadcast data and user data; (iii) a broadcast manager adapted for receiving and processing in real-time metadata information related to a plurality of live uplink transmission events wherein each live uplink transmission event transmits in a plurality of uplink channels, wherein processed metadata information generate data elements adapted for being used in telecom and datacom real time management applications, said broadcast manager also adapted for updating the publication portal with live event information and (iv) a set of Quality of Service (QoS) management methods to coordinate the usage of Uplink transmissions based on the received metadata and their processing in the broadcast manager | 11-25-2010 |
20130155231 | REMOTE WIRELESS COMMUNICATION - A transceiver unit for generating bonded streams of data includes a data processor to bond a first multiplicity of outgoing streams of data into an outgoing bonded stream. A scheduler transmits the outgoing bonded stream via a second multiplicity of modems for communication over a third multiplicity of wireless or wired channels. An assembly engine receives and assembles the incoming bonded stream from the third multiplicity of wireless or wired channels into a fourth multiplicity of output data. | 06-20-2013 |
20130310108 | MULTI-MODEM COMMUNICATION USING VIRTUAL IDENTITY MODULES - Communication apparatus ( | 11-21-2013 |
20150057044 | Multi-modem communication using virtual identity modules - Communication apparatus ( | 02-26-2015 |
20150089020 | LIVE VIDEO CONTENT EXCHANGE - A method for content exchange includes receiving at an exchange server ( | 03-26-2015 |
Patent application number | Description | Published |
20150133956 | IMPLANT AND DELIVERY SYSTEM FOR NEURAL STIMULATOR - Apparatus is described, the apparatus including an oral surgical guide. The oral surgical guide includes an arch portion configured to be placed on a dental arch of a subject; and an extension portion extending from the arch portion, and shaped to define a guide hole. Other applications are also described. | 05-14-2015 |
20150174406 | SPG STIMULATION - A method for treating a subject is provided, including applying electrical stimulation to a site of the subject selected from the group consisting of: a sphenopalatine ganglion (SPG), a greater palatine nerve, a lesser palatine nerve, a sphenopalatine nerve, a communicating branch between a maxillary nerve and an SPG, an otic ganglion, an afferent fiber going into the otic ganglion, an efferent fiber going out of the otic ganglion, an infraorbital nerve, a vidian nerve, a greater superficial petrosal nerve, and a lesser deep petrosal nerve. The stimulation is configured to excite nervous tissue of the site at a strength sufficient to induce at least one neuroprotective occurrence selected from the group consisting of: an increase in cerebral blood flow (CBF) of the subject, and a release of one or more neuroprotective substances, and insufficient to induce a significant increase in permeability of a blood-brain barrier (BBB) of the subject. | 06-25-2015 |
Patent application number | Description | Published |
20090105783 | LONG-TERM SPG STIMULATION THERAPY FOR PREVENTION OF VASCULAR DEMENTIA - A method is provided that includes identifying that a subject is at risk of suffering from vascular dementia (VaD). Responsively to the identifying, a risk of development of the VaD is reduced by applying electrical stimulation to a site of the subject selected from the group consisting of: a sphenopalatine ganglion (SPG), a greater palatine nerve, a lesser palatine nerve, a sphenopalatine nerve, a communicating branch between a maxillary nerve and an SPG, an otic ganglion, an afferent fiber going into the otic ganglion, an efferent fiber going out of the otic ganglion, an infraorbital nerve, a vidian nerve, a greater superficial petrosal nerve, and a lesser deep petrosal nerve; and configuring the stimulation to induce at least one neuroprotective occurrence selected from the group consisting of: an increase in cerebral blood flow of the subject, and a release of one or more neuroprotective substances. Other embodiments are also described. | 04-23-2009 |
20090210026 | SPG STIMULATION FOR ENHANCING NEUROGENESIS AND BRAIN METABOLISM - A method is provided, including identifying an electrical stimulation protocol as being suitable for augmenting genesis of one or more cell populations in at least one brain region of the subject. The cell genesis is augmented by applying the identified stimulation protocol to an SPG, a greater palatine nerve, a branch of the greater palatine nerve, a lesser palatine nerve, a sphenopalatine nerve, a communicating branch between a maxillary nerve and an SPG, an otic ganglion, an afferent fiber going into the otic ganglion, an efferent fiber going out of the otic ganglion, an infraorbital nerve, a vidian nerve, a greater superficial petrosal nerve, a lesser deep petrosal nerve, a maxillary nerve, a branch of the maxillary nerve, a nasopalatine nerve, a peripheral site that provides direct or indirect afferent innervation to the SPG, or a peripheral site that is directly or indirectly efferently innervated by the SPG. | 08-20-2009 |
20120016434 | POST-ACUTE ELECTRICAL STIMULATION TREATMENT OF ADVERSE CEREBROVASCULAR EVENTS - A method for treatment is provided, including identifying that a subject has suffered from an adverse cerebrovascular event, excluding Alzheimer's disease and Parkinson's disease. Responsively to the identifying, beginning at least nine hours after the event, electrical stimulation is applied to a site of the subject selected from the group consisting of: a sphenopalatine ganglion (SPG), a greater palatine nerve, a lesser palatine nerve, a sphenopalatine nerve, a communicating branch between a maxillary nerve and an SPG, an otic ganglion, an afferent fiber going into the otic ganglion, an efferent fiber going out of the otic ganglion, an infraorbital nerve, a vidian nerve, a greater superficial petrosal nerve, and a lesser deep petrosal nerve. The stimulation is configured to excite nervous tissue of the site at a strength sufficient to induce at least one neuroprotective occurrence selected from the group consisting of: an increase in cerebral blood flow (CBF) of the subject, and a release of one or more neuroprotective substances. | 01-19-2012 |
20130184803 | SUBMUCOSAL IMPLANTATION OF NEURAL STIMULATORS - A method is provided that includes advancing at least one electrode through mucosa of an oral cavity, along a path that does not enter a greater palatine canal, to within 10 mm of a sphenopalatine fossa. The at least one electrode is left implanted within 10 mm of the sphenopalatine fossa. Optionally, the at least one electrode is advanced into the sphenopalatine fossa via a lateral aspect of the fossa, and left implanted in the sphenopalatine fossa. Other embodiments are also described. | 07-18-2013 |
20130218249 | NEUROPROTECTIVE ELECTRICAL STIMULATION - Apparatus is provided that includes one or more electrodes, configured to be applied to a sphenopalatine ganglion (SPG), a greater palatine nerve, a lesser palatine nerve, a sphenopalatine nerve, a communicating branch between a maxillary nerve and an SPG, an otic ganglion, an afferent fiber going into the otic ganglion, an efferent fiber going out of the otic ganglion, an infraorbital nerve, a vidian nerve, a greater superficial petrosal nerve, or a lesser deep petrosal nerve; and a control unit, configured to drive the electrodes to apply electrical stimulation to the site, and configure the stimulation to excite nervous tissue of the site at a strength sufficient to induce at least one neuroprotective occurrence selected from the group consisting of: an increase in cerebral blood flow (CBF), and a release of one or more neuroprotective substances, and insufficient to induce a significant increase in permeability of a blood-brain barrier (BBB). | 08-22-2013 |
Patent application number | Description | Published |
20090143790 | SUTURING ASSEMBLY AND METHOD - A suturing assembly including a first puncture element including a sharp distal end for puncturing tissue, a second puncture element including a sharp distal end for puncturing tissue, the distal ends of the first and second puncture elements being spaced from each other by a gap, suture thread disposed along a portion of the first puncture element, wherein the suture thread is arranged to be grabbed at the distal end of the first puncture element, and a suture grabber positioned at the distal end of the second puncture element. | 06-04-2009 |
20090188965 | DEVICE AND METHOD FOR APPLYING ROTARY TACKS - A tacker for applying a rotary tack, including a drive shaft coupled to a trigger, wherein operating the trigger causes rotation of the drive shaft, an articulated applicator arm pivotally connected to the drive shaft at a pivot, the articulated applicator arm including a rotatable output shaft connected to a magazine that holds a rotary tack, and a clutch mechanism which, at initial movement of the trigger, has a first orientation that causes the articulated applicator arm to pivot about the pivot until reaching a stop, and has a second orientation wherein upon continued movement of the trigger, the clutch mechanism permits the drive shaft to rotate the output shaft and cause application of the rotary tack from the magazine. | 07-30-2009 |
20100001038 | PIVOTING TACKER - A tacker for applying a rotary tack, including a drive shaft coupled to a trigger, wherein operating the trigger causes rotation of the drive shaft, a magazine that holds a rotary tack rotatingly connected to the drive shaft, and an articulated applicator arm including a rotatable output shaft rotatingly connected to the magazine, wherein the magazine is proximal to the articulated applicator arm, the articulated applicator arm including one or more pivoting links, each pivoting link including a link shaft, wherein operation of the trigger causes the driver shaft and the one or more link shafts to rotate so as to distally advance the rotary tack from the magazine past the one or more pivoting links. | 01-07-2010 |
20100057113 | METHOD AND APPARATUS FOR INSERTION OF DEVICE IN TROCAR - A method for insertion of a device in a trocar, including placing a finger trap over a reducible portion of a device that has a reducible perimeter, such that the finger trap applies a force on the reducible portion of the device to reduce its perimeter, and inserting the device into a trocar. | 03-04-2010 |
20100270354 | ERGONOMIC ROTARY TACKER - A tacker for applying a rotary tack, including a tacker for applying a rotary tack, including a handle with a first trigger assembly and a second trigger assembly, the trigger assemblies being coupled to an articulated applicator arm which is disposed through a drive shaft connected to the handle, the first trigger assembly operative to apply a rotary tack from a distal end of the applicator arm and the second trigger assembly operative to bend the distal end of the applicator arm, wherein a longitudinal axis of the handle is tilted with respect to the drive shaft. | 10-28-2010 |
20100274266 | ROTARY TACK - A rotary tack including a helical body constructed of a resorbable material and having a closed-loop base and a helix of spiral coils that extend from the base which terminate in a tip for piercing tissue, wherein each of the coils has a cross-section with an inner perimeter including an arcuate portion and a straight portion contiguous to each other. | 10-28-2010 |
20100318107 | TISSUE REPAIR METHOD AND KIT - A method for tissue repair including providing a kit including a mesh placer, mesh stitcher and mesh tacker, placing the mesh at a tissue repair site with the mesh placer, holding the mesh in place with the mesh placer, and fastening the mesh to tissue with at least one of the mesh tacker and mesh stitcher. | 12-16-2010 |
20130119108 | DRIVE MECHANISM FOR ARTICULATING TACKER - A tacker for applying a rotary tack, including a drive shaft coupled to a trigger assembly, wherein operating the trigger assembly causes rotation of the drive shaft, a distal portion of the drive shaft passing into an articulated arm that holds rotary tacks, wherein upon operation of the trigger assembly, the drive shaft rotates to cause deployment of the tacks distally out of the articulated arm, and wherein the drive shaft includes a cable on which are located a plurality of axially spaced drive links that transfer rotational motion of the drive shaft to rotation of the tacks. | 05-16-2013 |
20140155693 | ENDOSCOPIC DELIVERY SYSTEM - An endoscopic delivery system including an endoscope including at least one imaging device and a working channel, and a catheter arranged to pass through the working channel, wherein the catheter is formed with an observation window on a side portion thereof, the window being in a line of sight of the at least one imaging device. | 06-05-2014 |
20140155928 | LONG-TERM OBSTRUCTION DEVICE - An obstruction device including a proximal obstruction balloon and a distal obstruction balloon mounted on a shaft, wherein a neck portion of said shaft provides a gap between a distal end of said proximal obstruction balloon and a proximal end of said distal obstruction balloon. | 06-05-2014 |
20140309669 | POSITIONING TOOL FOR ANASTOMOSIS - An assembly including a positioning tool that includes a probe affixed to a portion of a grasping tool, wherein a distal tip of the probe protrudes distally from the grasping tool a distance corresponding to a position for placing a magnet with the grasping tool. | 10-16-2014 |
20140309682 | INFLATION AND DEFLATION OF OBSTRUCTION DEVICE - An assembly including an obstruction device including a proximal obstruction balloon and a distal obstruction balloon mounted on a shaft, the balloons being inflatable via an inflation lumen, and a delivery system that includes an insertion tool and an injection site assembly assembled with one of the balloons, the insertion tool including a connector which is connectable to the injection site assembly and which permits passing tools and injection fluid therethrough. | 10-16-2014 |
20140350588 | OBSTRUCTION DEVICE - An obstruction device ( | 11-27-2014 |
Patent application number | Description | Published |
20130103704 | JAVASCRIPT REDUCTOR - A system can be provided for dynamically serving a content file. A content object request function can receive a request for a webpage defined by the content file, the content file including a plurality of embedded or referenced content objects, at least one of the plurality of content objects including a Javascript. A content-file modifier can modify the content file to include instructions to generate reports comprising information relating to invocation of stubs. A report receiver can receive reports from the end user system, and an object usage analyzer quantifes usage of each of the stubs. An object prioritizor can prioritize the plurality of content objects based on the analysis, the prioritization including an identification of at least one high-priority content object. An object injector can modify the content file such that the high-priority content object automatically loads upon rendering of the content file. | 04-25-2013 |
20130326022 | CHRONOLOGICAL-PROGRESSION ACCESS PRIORITIZATION - In some embodiments of the invention, a system for serving dynamic content objects is provided. The system includes a request fulfiller that: receives a request for a webpage from an end-user system, retrieves a content file associated with the requested webpage, and transmits a modified content file to the end-user system. The system further includes a content-file modifier that generates the modified content file, the content-file modifier including: a dynamic-code detector that detects that the retrieved content file comprises or is associated with a dynamic code; and a reporting-code injector that injects a reporting code into the retrieved content file or an associated content file to produce the modified content file, the reporting code including instructions to report data identifying usage characteristics of one or more content objects. A high-priority content object is identified based on the reported data, and access to the high-priority content object is improved. | 12-05-2013 |
20140047061 | INTER POINT OF PRESENCE SPLIT ARCHITECTURE - A system and method for accelerating web page delivery is disclosed in one embodiment. Web content requests are made to an edge server of a first point of presence (POP) of a content delivery network (CDN). The web content has embedded resource links. The first POP can rewrite the embedded resource links to route requests for the embedded resource links to any POP in the CDN or even the origin server. In some embodiments, the first POP can decide if the first POP and/or another POP referenced in a rewritten embedded resource link should cache and/or accelerate the resource referenced in the embedded resource link. | 02-13-2014 |
Patent application number | Description | Published |
20080239976 | Communication link interception using link fingerprint analysis - A method for monitoring communication includes intercepting one or more communication links, which are part of a communication system that includes a plurality of the communication links. Data content that is carried by the one or more communication links is decoded. First and second mathematical fingerprints related to the one or more intercepted communication links are computed by evaluating statistical characteristics of the data content decoded from the one or more communication links. The first and second fingerprints are compared to produce a matching result, and a predefined action is performed with respect to the one or more communication links responsively to the matching result. | 10-02-2008 |
20140359761 | SYSTEM AND METHOD FOR MALWARE DETECTION LEARNING - Malware detection techniques that detect malware by identifying the C&C communication between the malware and the remote host, and distinguish between communication transactions that carry C&C communication and transactions of innocent traffic. The system distinguishes between malware transactions and innocent transactions using malware identification models, which it adapts using machine learning algorithms. However, the number and variety of malicious transactions that can be obtained from the protected network are often too limited for effectively training the machine learning algorithms. Therefore, the system obtains additional malicious transactions from another computer network that is known to be relatively rich in malicious activity. The system is thus able to adapt the malware identification models based on a large number of positive examples—The malicious transactions obtained from both the protected network and the infected network. As a result, the malware identification models are adapted with high speed and accuracy. | 12-04-2014 |
20150026809 | SYSTEMS AND METHODS FOR IDENTIFYING MALICIOUS HOSTS - A malware detection system analyzes communication traffic to and/or from a certain host. The malware detection system uses the mismatch between host name and IP address to assign a quantitative score, which is indicative of the probability that the host is malicious. The system may use this score, for example, in combination with other indications, to decide whether the host in question is malicious or innocent. The overall decision may use, for example, a rule engine, machine learning techniques or any other suitable means. The malware detection system may also analyze alerts regarding hosts that are suspected of being malicious. The alerts may originate, for example, from Command & Control (C&C) detection, from an Intrusion Detection System (IDS), or from any other suitable source. A given alert typically reports a name of the suspected host and an IP address that allegedly belongs to that host. | 01-22-2015 |
20150215221 | SYSTEM AND METHOD FOR EXTRACTING USER IDENTIFIERS OVER ENCRYPTED COMMUNICATION TRAFFIC - Systems and methods for extracting user identifiers over encrypted communication traffic are provided herein. An example method includes monitoring multiple flows of communication traffic. A sequence of messages is then sent to a user in accordance with a first temporal pattern. A flow whose activity has a second temporal pattern that matches the first pattern is then identified among the monitored flows. The identified flow is then associated with the user. | 07-30-2015 |
Patent application number | Description | Published |
20100313267 | SYSTEMS AND METHODS FOR EFFICIENT KEYWORD SPOTTING IN COMMUNICATION TRAFFIC - Methods and systems related to keyword searching processes. A list of keywords may be first represented by a set of short substrings. The substrings are selected such that an occurrence of a substring indicates a possible occurrence of one or more of the keywords. Input data may be initially pre-processed, so as to identify locations in the input data in which the substrings occur. Then, the identified locations are searched for occurrences of the actual keywords. The pre-processing scheme enables the keyword search process to search only in the identified locations of the substrings instead of over the entire input data. | 12-09-2010 |
20120106378 | SYSTEM AND METHOD FOR IP TARGET TRAFFIC ANALYSIS - Methods and systems for identifying network users who communicate with the network (e.g., the Internet) via a given network connection. The disclosed techniques analyze traffic that flows in the network to determine, for example, whether the given network connection serves a single individual or multiple individuals, a single computer or multiple computers. A Profiling System (PS) acquires copies of data traffic that flow through network connections that connect computers to the WAN. The PS analyzes the acquired data, attempting to identify individuals who login to servers. | 05-03-2012 |
20120213074 | SYSTEM AND METHOD FOR FLOW TABLE MANAGEMENT - Methods and systems for managing the actions that are applied to packet flows by packet processing systems. A packet processing system maintains a flow table, i.e., a list of active flows and respective actions to be applied to the flows. The system classifies each incoming packet into a respective flow, and processes the packet in accordance with the action that is specified for this flow in the flow table. Typically, the system deletes a packet flow from the flow table when it becomes inactive, e.g., when no packets belonging to the flow arrive within a certain time-out period. | 08-23-2012 |
20120215909 | SYSTEM AND METHOD FOR EFFICIENT CLASSIFICATION AND PROCESSING OF NETWORK TRAFFIC - Methods and systems for analyzing flows of communication packets. A front-end processor associates input packets with flows and forwards each flow to the appropriate unit, typically by querying a flow table that holds a respective classification for each active flow. In general, flows that are not yet classified are forwarded to the classification unit, and the resulting classification is entered in the flow table. Flows that are classified as requested for further analysis are forwarded to an appropriate flow analysis unit. Flows that are classified as not requested for analysis are not subjected to further processing, e.g., discarded or allowed to pass. | 08-23-2012 |
20120290829 | SYSTEM AND METHOD FOR SELECTIVE INSPECTION OF ENCRYPTED TRAFFIC - Inspection of encrypted network traffic where multiple network connections are monitored that carry encrypted data, but only a subset of the network connections are decrypted and inspected. Typically, only network connections that are associated with designated target users whose encrypted data is to be inspected are decrypted. A Network Monitor Center (NMC) dynamically establishes a list of rules for selection of encrypted data connections. The rules are provided to a Secure data Inspection Appliance (SIA) that accepts some or all of the network user encrypted traffic and checks it against a rule table. When detecting an encrypted connection that matches the rule table, the SIA decrypts the connection and provides a copy of the connection plain data to the NMC. The NMC then inspects the plain data for security threats. Once a security threat is found in a connection, the NMC applies predefined consequent actions to this connection. | 11-15-2012 |
20130347114 | SYSTEM AND METHOD FOR MALWARE DETECTION - Systems and methods for malware detection techniques, which detect malware by identifying the C&C communication between the malware and the remote host. In particular, the disclosed techniques distinguish between request-response transactions that carry C&C communication and request-response transactions of innocent traffic. Individual request-response transactions may be analyzed rather than entire flows, and fine-granularity features examined within the transactions. As such, these methods and systems are highly effective in distinguishing between malware C&C communication and innocent traffic, i.e., in detecting malware with high detection probability and few false alarms. | 12-26-2013 |
20140165198 | SYSTEM AND METHOD FOR MALWARE DETECTION USING MULTIDIMENSIONAL FEATURE CLUSTERING - Methods and systems for malware detection techniques, which detect malware by identifying the Command and Control (C&C) communication between the malware and the remote host, and distinguish between communication transactions that carry C&C communication and transactions of innocent traffic. The fine-granularity features are examined, which are present in the transactions and are indicative of whether the transactions are exchanged with malware. A feature comprises an aggregated statistical property of one or more features of the transactions, such as average, sum median or variance, or of any suitable function or transformation of the features. | 06-12-2014 |
20140201361 | SYSTEM AND METHOD FOR IP TARGET TRAFFIC ANALYSIS - Methods and systems for identifying network users who communicate with the network (e.g., the Internet) via a given network connection. The disclosed techniques analyze traffic that flows in the network to determine, for example, whether the given network connection serves a single individual or multiple individuals, a single computer or multiple computers. A Profiling System (PS) acquires copies of data traffic that flow through network connections that connect computers to the WAN. The PS analyzes the acquired data, attempting to identify individuals who login to servers. | 07-17-2014 |
20140325653 | SYSTEM AND METHOD FOR AUTOMATED CONFIGURATION OF INTRUSION DETECTION SYSTEMS - Methods and systems for automated generation of malicious traffic signatures, for use in Intrusion Detection Systems (IDS). A rule generation system formulates IDS rules based on traffic analysis results obtained from a network investigation system. The rule generation system then automatically configures the IDS to apply the rules. An analysis process in the network investigation system comprises one or more metadata filters that are indicative of malicious traffic. An operator of the rule generation system is provided with a user interface that is capable of displaying the network traffic filtered in accordance with such filters. | 10-30-2014 |