Jain
Jain Chandresh, Sammamish, WA US
Patent application number | Description | Published |
---|---|---|
20080263156 | Secure Transactional Communication - Systems for providing sign-up email addresses are disclosed herein. A user may set up a sign-up email address for receiving emails from a trusted, Internet-based enterprise. The user may set up a dedicated mailbox folder associated with the sign-up email address or enterprise. The email server may automatically direct emails coming from that enterprise into that folder. To “unsubscribe,” the user needs only to delete the folder or the sign-up address. Emails from the enterprise to the sign-up address may be highlighted in the user's main inbox. Thus, the user may be assured that any such email is truly from the enterprise, and not a phishing expedition or spam. Such systems also provide the user with effective tools to recognize phish or spam emails that appear to be from the trusted enterprise and not to act on them. | 10-23-2008 |
Jain Devendra, Navi Mumbai IN
Patent application number | Description | Published |
---|---|---|
20090205079 | ACETYL CoA CARBOXYLASE (ACCase) GENE FROM JATROPHA CURAS - The present invention provides methods for increasing oil content in | 08-13-2009 |
Jain Kamiya, Ghaziabad IN
Patent application number | Description | Published |
---|---|---|
20160059212 | WATER VAPOR ADSORPTION-DESORPTION MATERIAL AND METHOD FOR MEASURING LCST BEHAVIOR - Provided is a water vapor adsorption-desorption material in which a substance having a LCST is uniformly retained inside pores of a mesoporous body, which can reduce energy required for regeneration, and a method for measuring LCST behavior capable of measuring LCST behavior of an ionic liquid used in the water vapor adsorption-desorption material without errors. The water vapor adsorption-desorption material includes a mesoporous body and an ionic liquid retained inside pores of the mesoporous body, the ionic liquid exhibiting LCST behavior, and the method for measuring LCST behavior of an ionic liquid used for a water vapor adsorption-desorption material, the method including detecting a change of hydration/dehydration state of a mixture of the ionic liquid and water as electric signals, by means of AC impedance measurement. | 03-03-2016 |
Jain Khushbu, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20150112377 | EMBOLIC PROTECTION SYSTEM - A collapsible blood filtering aortic arch bridge comprising a dumbbell shaped chassis having a tubular waist, a first conical end, and a second conical end such that only a periphery of the first and second ends contact the intima of an aortic arch when the bridge is disposed and expanded within the aortic arch of a patient. The waist is flexible so that the bridge can bend to comply with the curvature of the aortic arch. The bridge additionally comprises a blood filtering sleeve disposed over an interior or an exterior of the chassis for filtering blood flowing through the bridge into aortic arch vessels of the patient when the bridge is disposed within the aortic arch. Furthermore, the bridge comprises a retrieval sleeve disposed over the exterior of the chassis for collapsing the bridge to a cylindrical form for retrieval of the bridge from the aortic arch. | 04-23-2015 |
Jain Krotz, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20080248108 | MULTILAYERED POLYELECTROLYTE-BASED CAPSULES FOR CELL ENCAPSULATION AND DELIVERY OF THERAPEUTIC COMPOSITIONS - The present invention provides novel, biocompatible matrices for cell encapsulation and transplantation. It further provides methods for delivering agents to encapsulated cells and to the local environment of a host system. The invention also provides methods for targeting and manipulating particular cells and/or proteins of the host system. In a composition aspect of the invention, a composition including a collection of capsules is provided. The capsules comprise an inner core, and the inner core is covered by an outer shell composed of a positive polyelectrolyte and a negative polyelectrolyte. The inner core of the capsules contains at least one cell. | 10-09-2008 |
20090069198 | Biomolecular Attachment Sites on Microelectronic Arrays and Methods Thereof - Methods of addressing a biomolecule to a selectively addressable electrode are described. A permeation layer overlying a plurality of selectively addressable electrodes is provided. The permeation layer includes a reactive group that is adapted to bond to a biomolecule and that requires activation through a chemical transformation before bonding to the biomolecule. At least one selectively addressable electrode is biased such that a pH change occurs in an overlying solution of the at least one selectively addressable electrode. The reactive group in a portion of the permeation layer above the at least one selectively addressable electrode is then chemically transformed to an activated reactive group as a result of the pH change. A biomolecule is then bound to the permeation layer overlying the at least one selectively addressable electrode through the activated reactive group. | 03-12-2009 |
20140212484 | MULTILAYERED POLYELECTROLYTE-BASED CAPSULES FOR CELL ENCAPSULATION AND DELIVERY OF THERAPEUTIC COMPOSITIONS - The present invention provides novel, biocompatible matrices for cell encapsulation and transplantation. It further provides methods for delivering agents to encapsulated cells and to the local environment of a host system. The invention also provides methods for targeting and manipulating particular cells and/or proteins of the host system. In a composition aspect of the invention, a composition including a collection of capsules is provided. The capsules comprise an inner core, and the inner core is covered by an outer shell composed of a positive polyelectrolyte and a negative polyelectrolyte. The inner core of the capsules contains at least one cell. | 07-31-2014 |
Jain Neena, South Plainfield, NJ US
Patent application number | Description | Published |
---|---|---|
20090281911 | TRADING SYSTEM - An anonymous trading system includes a prime broker facility that allows a third party to trade on behalf of an institution. A deal is executed between the third party and a counter-party and a further deal is then executed between the third party and the party on whose behalf it has traded. The second deal may be for the same amount as the first deal or may be altered to include the third party's fee for conducting the first deal. Clients of the third party have prices available to them for trades made via the third party which are displayed at their trader terminals. The client sees that a better price is available though the third party than by dealing direct and selects to conduct a deal through the third party. | 11-12-2009 |
20090292635 | TRADING SYSTEM - An anonymous trading system includes a prime broker facility that allows a third party to trade on behalf of an institution. A deal is executed between the third party and a counter-party and a further deal is then executed between the third party and the party on whose behalf it has traded. The second deal may be for the same amount as the first deal or may be altered to include the third party's fee for conducting the first deal. Clients of the third party have prices available to them for trades made via the third party which are displayed at their trader terminals. The client sees that a better price is available though the third party than by dealing direct and selects to conduct a deal through the third party. | 11-26-2009 |
20120239547 | Trading System Having Increased Liquidity Provision - An anonymous trading system includes a prime broker facility that allows a third party to trade on behalf of an institution. A deal is executed between the third party and a counter-party and a further deal is then executed between the third party and the party on whose behalf it has traded. The second deal may be for the same amount as the first deal or may be altered to include the third party's fee for conducting the first deal. Clients of the third party have prices available to them for trades made via the third party which are displayed at their trader terminals. The client sees that a better price is available though the third party than by dealing direct and selects to conduct a deal through the third party. | 09-20-2012 |
Jain Nikhil, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20140080405 | TAGGING LANGUAGE FOR BROADCAST RADIO - Apparatus, methods, processors and computer programs products for generating or processing a broadcast radio transmission comprising multimedia content and supplemental information corresponding to the multimedia content. The supplemental information comprises a selected data group from a plurality of predetermined data groups each comprising different data, wherein the selected data group further comprises a tag and a corresponding set of text data operable to initiate a predetermined capability of a wireless device. | 03-20-2014 |
Jain Prerna, New Delhi IN
Patent application number | Description | Published |
---|---|---|
20130167223 | METHODS AND APPARATUS FOR SECURING A SOFTWARE APPLICATION ON A MOBILE DEVICE - A method of securing a software application on a mobile device is described. The method includes configuring the mobile device with a management server to allow the mobile device to communicate wirelessly over a wireless network. A listing of applications is transmitted to the management server over the wireless network. The management server generates user credentials data to associate at least one user with an authorization to access at least one application residing on the mobile device. The management server transmits the user credentials data to the mobile device over the wireless network. The mobile device accesses the user credentials data when a user attempts to access the software application on the mobile device. The user is permitted to execute the software application when the user credentials data indicates that the user is authorized to access the software application. | 06-27-2013 |
Jain Richin, Cambridge, MA US
Patent application number | Description | Published |
---|---|---|
20140067772 | METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS FOR ACHIEVING EVENTUAL CONSISTENCY BETWEEN A KEY VALUE STORE AND A TEXT INDEX - An apparatus for reconciling data inconsistencies between indexes may include a processor and memory storing executable computer code causing the apparatus to at least perform operations including retrieving first metadata from a key value store in response to receipt of a request for data associated with a user. The computer program code may further cause the apparatus to retrieve second metadata from a text index in response to querying the text index for the second metadata. The second metadata may correspond to the first metadata of the key value store. The computer program code may further cause the apparatus to evaluate the first metadata of the key value store and the second metadata of the text index to determine whether there are any differences between the first metadata and the second metadata. Corresponding methods and computer program products are also provided. | 03-06-2014 |
Jain Rohit, Domlur 2nd Stage IN
Patent application number | Description | Published |
---|---|---|
20090182784 | RECOVERY POINT IDENTIFICATION IN CDP ENVIRONMENTS - The embodiments of the invention provide a method of identifying a recovery point in a continuous data protection (CDP) log. More specifically, the method begins by detecting corrupted data in the CDP log and identifying the nature of corruption. Next, the nature of corruption is mapped to applications to identify components that may have caused the corrupted data. The method then finds a time instance of uncorrupted data in the components. Specifically, this can include searching CDP log entries in an order independent of log event age. Alternatively, the process of finding the time instance can include creating a data image of a first copy of uncorrupted data and sequentially apply entries of the CDP log until the corrupted data is reached. | 07-16-2009 |