Patent application number | Description | Published |
20080208754 | METHOD FOR DETECTING DUPLICATED INSTANCES OF A SOFTWARE LICENSE - A method for issuing and updating a software program license for a computer, with a unique identifier data object embedded in the computer and referenced by the license. The unique identifier may also be used with a conventional computer fingerprint. The software program does not run on a computer without a license that references the unique identifier. The license is issued via a server over a network (such as the Internet) and must be regularly updated by the server. When updating, the present unique identifier is sent to the server, to verify that the unique identifier is the latest unique identifier issued for that license. If an unauthorized copy is made for operation on an unlicensed computer, such as by cloning the licensed computer, this is detected when the second computer is updated, because the unique identifier sent with the update request is no longer current. | 08-28-2008 |
20080209558 | Self-defensive protected software with suspended latent license enforcement - A method and system of computer program modules for extending the cover time of protection for a licensed software product, by increasing the difficulty and time required for an attacker to produce a workable cracked version of the program. When an attack is detected, critical information about the effectiveness of the attack are withheld from the attacker by simulating the behavior of a cracked program, thereby inducing the attacker to prematurely consider the attack successful. Latent license enforcement features are provided, whose activation is suspended until predefined environmental conditions are met. | 08-28-2008 |
20080209559 | Method for detecting that a protected software program is cracked - A method for determining if a software program having a protective envelope has been cracked, and signaling an indication thereof. A direct determination is made of whether the protective envelope is intact or has been compromised by an attack, without requiring a license violation to occur. Executable code in the protective envelope generates an envelope confirmation which is validated by executable code in the program itself. Any disabling or separation of the envelope from the program will be detectable by the program at validation time. Provisions are made for a secure envelope confirmation, the use of arguments as input to the confirmation generation, and for incorporating information related to the computer and user to facilitate identifying the attacker. Signaled indications can include network messaging to alert the licensor that the program has been cracked. | 08-28-2008 |
20080259797 | Load-Balancing Bridge Cluster For Network Nodes - A network load-balancing cluster configured to function as a transparent bridge, by connecting the load-balancing nodes in series rather than in parallel, as is done in prior-art configurations. A load-balancing algorithm and method are disclosed, by which each node in the configuration independently determines whether to process a data packet or pass the data packet along for processing by another node. To support this, load-balancing nodes are equipped with both software and hardware data pass-through capabilities that allow the nodes to pass along data packets that are processed by a different nodes. | 10-23-2008 |
Patent application number | Description | Published |
20090026079 | ELECTRO-BLOTTING DEVICES, SYSTEMS, AND KITS AND METHODS FOR THEIR USE - The invention provides a dry electroblotting system for dry blotting gels, in which the system includes an electroblotting transfer stack that comprises an analysis gel and a blotting membrane, an anode, a body of anodic gel matrix juxtaposed with the anode between the anode and the transfer stack, a cathode, and a body of cathodic gel matrix juxtaposed with the cathode between the cathode and the transfer stack, in which the anodic gel matrix and the cathodic gel matrix each comprise an ion source for electrophoretic transfer. The dry electroblotting system does not use any liquid buffers that are added to the system just before electroblotting (such as when the transfer stack is being assembled). The anode, the cathode, or both can be separate from a power supply and provided as part of a disposable electrode assembly that also includes a body of gel matrix that includes ions for electrophoretic transfer. | 01-29-2009 |
20090145759 | Methods, Cassettes, Gels and Apparatuses for Isolation and Collection of Biomolecules from Electrophoresis Gels - Electrophoresis systems, assemblies, cassettes and methods for easily, and more effectively and efficiently, isolating a biomolecule band from an electrophoretic gel are provided. The methods use an electrophoresis cassette with at least one loading well and at lest one collection well. A sample containing the biomolecule of interest is placed into at least one loading well and buffer or water is placed in at lest one collection well. An electric field is then applied to drive migration and separation of the sample into different component bands within the gel. When the component of interest is located within at least one collection well, the electric field is terminated and the buffer or water in the collection well is removed, thereby isolating and collecting the sample component of interest. | 06-11-2009 |
20100044229 | Electrophoretically Enhanced Detection of Analytes on a Solid Support - The present embodiments provide systems, kits and methods suitable for performing dry or substantially dry electro-blotting analyses on immobilized protein or nucleic acid samples. Electro-blotting performed according to the presently described embodiments may include a step whereby detection of one or more immobilized proteins or nucleic acids is electrophoretically accelerated. Methods for performing electro-blotting of immobilized proteins or nucleic acids may include applying an electric voltage to one or more reagents typically used in protein or nucleic acid blotting procedure. The one or more reagents may be absorbed on a suitable carrier matrix. Electro-blotting performed in accordance with the systems and methods described herein may be performed under substantially dry conditions (i.e., with little or no aqueous buffers). | 02-25-2010 |
20110011741 | APPARATUS AND METHOD FOR ELECTROPHORESIS - Apparatus for conducting electrophoresis therein includes a chamber with a gel matrix. The chamber has a first sealed region and a second sealed region, and an anode within the first sealed region of the chamber and in contact with the gel matrix, and a cathode within the second sealed region and in contact with the gel matrix. At least one of the electrodes also provides ions for driving the electrophoresis. The apparatus further includes a matrix with at least one sparingly water-soluble salt. | 01-20-2011 |
20120000781 | Electro-blotting Devices, Systems, and Kits and Methods for Their use - The invention provides a dry electroblotting system for dry blotting gels, in which the system includes an electroblotting transfer stack that comprises an analysis gel and a blotting membrane, an anode, a body of anodic gel matrix juxtaposed with the anode between the anode and the transfer stack, a cathode, and a body of cathodic gel matrix juxtaposed with the cathode between the cathode and the transfer stack, in which the anodic gel matrix and the cathodic gel matrix each comprise an ion source for electrophoretic transfer. The dry electroblotting system does not use any liquid buffers that are added to the system just before electroblotting (such as when the transfer stack is being assembled). The anode, the cathode, or both can be separate from a power supply and provided as part of a disposable electrode assembly that also includes a body of gel matrix that includes ions for electrophoretic transfer. | 01-05-2012 |
20120004138 | ELECTROPHORESIS APPARATUS FOR SIMULTANEOUS LOADING OF MULTIPLE SAMPLES - The present invention includes apparatus for simultaneous loading of multiple samples for molecular separation, including a separation area with walls wherein at least one of the walls has apertures having loading sites, a gel located within the separation area, and a plurality of wells within the gel. The apertures are connected to the plurality of wells by channels structurally configured to convey samples from the apertures to the wells. | 01-05-2012 |
20120138465 | ELECTRO-BLOTTING DEVICES, SYSTEMS, AND KITS AND METHODS FOR THEIR USE - The invention provides a dry electroblotting system for dry blotting gels, in which the system includes an electroblotting transfer stack that comprises an analysis gel and a blotting membrane, an anode, a body of anodic gel matrix juxtaposed with the anode between the anode and the transfer stack, a cathode, and a body of cathodic gel matrix juxtaposed with the cathode between the cathode and the transfer stack, in which the anodic gel matrix and the cathodic gel matrix each comprise an ion source for electrophoretic transfer. The dry electroblotting system does not use any liquid buffers that are added to the system just before electroblotting (such as when the transfer stack is being assembled). The anode, the cathode, or both can be separate from a power supply and provided as part of a disposable electrode assembly that also includes a body of gel matrix that includes ions for electrophoretic transfer. | 06-07-2012 |
20120211364 | ELECTRO-BLOTTING DEVICES, SYSTEMS, AND KITS AND METHODS FOR THEIR USE - The invention provides an electroblotting system for blotting gels, in which the system includes an electroblotting transfer stack that comprises an analysis gel and a blotting membrane, an anode, an ion source juxtaposed with the anode between the anode and the transfer stack, a cathode, and another ion source juxtaposed with the cathode between the cathode and the transfer stack, in which the each ion source is sufficient for electrophoretic transfer. The anode, the cathode, or both can be separate from a power supply and provided as part of a disposable electrode assembly that also includes a body of gel matrix that includes ions for electrophoretic transfer. | 08-23-2012 |
20120309024 | Electrophoretically Enhanced Detection of Analytes on a Solid Support - The present embodiments provide systems, kits and methods suitable for performing dry or substantially dry electro-blotting analyses on immobilized protein or nucleic acid samples. Electro-blotting performed according to the presently described embodiments may include a step whereby detection of one or more immobilized proteins or nucleic acids is electrophoretically accelerated. Methods for performing electro-blotting of immobilized proteins or nucleic acids may include applying an electric voltage to one or more reagents typically used in protein or nucleic acid blotting procedure. The one or more reagents may be absorbed on a suitable carrier matrix. Electro-blotting performed in accordance with the systems and methods described herein may be performed under substantially dry conditions (i.e., with little or no aqueous buffers). | 12-06-2012 |
20130008790 | COMPOSITE COMPOSITIONS FOR ELECTROPHORESIS - The invention is drawn to composite agarose/acrylamide compositions and gels. In particular it relates to gels for the separation of molecules, particularly macromolecules such as proteins. The invention is also directed to the preparation of composite gels, the separation of molecules by techniques such as electrophoresis using such gels, and the transfer of proteins from such gels to a transfer membrane using an immunoblot transfer gel. | 01-10-2013 |
20130020199 | METHODS, CASSETTES, GELS AND APPARATUSES FOR ISOLATION AND COLLECTION OF BIOMOLECULES FROM ELECTROPHORESIS GELS - Electrophoresis systems, assemblies, cassettes and methods for easily, and more effectively and efficiently, isolating a biomolecule band from an electrophoretic gel are provided. The methods use an electrophoresis cassette with at least one loading well and at least one collection well. A sample containing the biomolecule of interest is placed into at least one loading well and buffer or water is placed in at least one collection well. An electric field is then applied to drive migration and separation of the sample into different component bands within the gel. When the component of interest is located within at least one collection well, the electric field is terminated and the buffer or water in the collection well is removed, thereby isolating and collecting the sample component of interest. | 01-24-2013 |
20130075261 | ELECTROPHORETICALLY ENHANCED DETECTION OF ANALYTES ON A SOLID SUPPORT - The present embodiments provide systems, kits and methods suitable for performing dry or substantially dry electro-blotting analyses on immobilized protein or nucleic acid samples. Electro-blotting performed according to the presently described embodiments may include a step whereby detection of one or more immobilized proteins or nucleic acids is electrophoretically accelerated. Methods for performing electro-blotting of immobilized proteins or nucleic acids may include applying an electric voltage to one or more reagents typically used in protein or nucleic acid blotting procedure. The one or more reagents may be absorbed on a suitable carrier matrix. Electro-blotting performed in accordance with the systems and methods described herein may be performed under substantially dry conditions (i.e., with little or no aqueous buffers). | 03-28-2013 |
20140131205 | Electro-Blotting Devices, Systems, and Kits and Methods for Their Use - The invention provides a dry electroblotting system for dry blotting gels, in which the system includes an electroblotting transfer stack that comprises an analysis gel and a blotting membrane, an anode, a body of anodic gel matrix juxtaposed with the anode between the anode and the transfer stack, a cathode, and a body of cathodic gel matrix juxtaposed with the cathode between the cathode and the transfer stack, in which the anodic gel matrix and the cathodic gel matrix each comprise an ion source for electrophoretic transfer. The dry electroblotting system does not use any liquid buffers that are added to the system just before electroblotting (such as when the transfer stack is being assembled). The anode, the cathode, or both can be separate from a power supply and provided as part of a disposable electrode assembly that also includes a body of gel matrix that includes ions for electrophoretic transfer. | 05-15-2014 |
20140158541 | Transilluminator Base and Scanner for Imaging Fluorescent Gels - Cassette electrophoresis systems that allow viewing of molecules during the electrophoresis run are disclosed. Cassette electrophoresis bases that reversibly engage light sources, such as light source bases are disclosed. Also disclosed are visible light transillumination systems for viewing a pattern of fluorescence emitted by fluorophores comprising a cassette housing fluorophore-containing material and a base unit to support the cassette. In some aspects the base unit that includes a power supply also houses a light source having output in the visible wavelength region and a filter placed between the light source and the fluorophores. The system is constructed and arranged such that patterns of fluorescence emitted by the fluorophores are viewable. | 06-12-2014 |
20150060279 | ELECTROPHORETICALLY ENHANCED DETECTION OF ANALYTES ON A SOLID SUPPORT - The present embodiments provide systems, kits and methods suitable for performing dry or substantially dry electro-blotting analyses on immobilized protein or nucleic acid samples. Electro-blotting performed according to the presently described embodiments may include a step whereby detection of one or more immobilized proteins or nucleic acids is electrophoretically accelerated. Methods for performing electro-blotting of immobilized proteins or nucleic acids may include applying an electric voltage to one or more reagents typically used in protein or nucleic acid blotting procedure. The one or more reagents may be absorbed on a suitable carrier matrix. Electro-blotting performed in accordance with the systems and methods described herein may be performed under substantially dry conditions (i.e., with little or no aqueous buffers). | 03-05-2015 |
Patent application number | Description | Published |
20090254503 | METHOD AND SYSTEM FOR AUTOMATED EXPERTISE EXTRACTION - A method and system for expertise extraction for an expert system, is provided. One implementation involves modeling active learning for interrogating an expert for knowledge as attributes of an n-dimensional hyper-cube where each attribute represents a possible output and every dimension represents a feature in a feature space; dividing the n-dimensional hyper-cube into m different attributes, each attribute representing a union of at most p cubes, wherein the n dimensions represent n boolean inputs and the m attributes represent m possible outputs; and discovering all possible outputs by querying a portion of the feature space for generating queries to an expert for all possible outputs, including obtaining at least one representative input for each of the m possible outputs, while using a limited number of queries to the hyper-cube. | 10-08-2009 |
20090259703 | Handling Mask and Range Constraints - Handling mask and range constraints. For example, a method of handling range and mask constraints, may include determining whether or not to utilize a mask constraint and a range constraint by determining whether or not the range and mask constraints are satisfiable. Other embodiments are described and claimed. | 10-15-2009 |
20090259704 | Generating a Number based on Mask and Range Constraints - Generating a number based on mask and range constraints. For example, a method of generating a pseudo random number satisfying a range constraint and a mask constraint may include determining a number of possible solutions satisfying the range constraint and the mask constraint; selecting an index representing a solution of the possible solutions; and generating the pseudo random number based on the index. Other embodiments are described and claimed. | 10-15-2009 |
20100052954 | Converting a Mask Constraint into a Bitset Constraint - Converting a mask constraint into a bitset constraint. For example, a method of converting a mask constraint into a bitset constraint may include determining an intermediate bitset based on a variable-bit component of the mask constraint; and generating the bitset constraint based on the intermediate bitset and on a fixed-bit component of the mask constraint. Other embodiments are described and claimed. | 03-04-2010 |
20100082719 | Generating a Number based on a Bitset Constraint - Generating a number based on a bitset constraints. For example, a method of generating a pseudo random number satisfying a bitset constraint may include determining a number of possible solutions satisfying the bitset constraint; selecting an index representing a solution of the possible solutions; and generating the pseudo-random number based on the index. Other embodiments are described and claimed. | 04-01-2010 |
20100249976 | METHOD AND SYSTEM FOR EVALUATING A MACHINE TOOL OPERATING CHARACTERISTICS - A method and system for evaluating a performance of a semiconductor manufacturing tool while manufacturing microelectronic devices are disclosed. At least one report is generated based on executions of at least one statistical test. The report includes at least one heat map having rows that correspond to sensors, columns that correspond to trace data obtained during recipe steps, and cells at the intersection of the rows and the columns. At least one sensor in the tool obtains trace data of a recipe step while manufacturing at least one microelectronic device. A computing device analyzes the obtained trace data to determine a level of operational significance found in the data and assigns a score to the trace data that indicates a level of operational significance. Then, the computing device places the score in a corresponding cell of the heat map. A user uses the cell for evaluating the tool performance. | 09-30-2010 |
20120185522 | Generating a Number based on Mask and Range Constraints - Generating a number based on mask and range constraints. For example, a method of generating a pseudo random number satisfying a range constraint and a mask constraint may include determining a number of possible solutions satisfying the range constraint and the mask constraint; selecting an index representing a solution of the possible solutions; and generating the pseudo random number based on the index. Other embodiments are described and claimed. | 07-19-2012 |
20130006406 | METHOD AND SYSTEM FOR EVALUATING A MACHINE TOOL OPERATING CHARACTERISTICS - A method, a system and a computer program product suitable for use in a manufacturing environment comprising a multiplicity of nominally identical independent tools. A computing device generates a multi dimensional array of process trace data derived from at least one of the independent tools, wherein, the array includes data representing a first dimension comprising a list of steps in a manufacturing recipe and data representing a second dimension comprising a list of a set of sensors generating measurements from at least one of the independent tools. The computing device conducts an analysis on at least one preselected subset of the multi dimensional array for the purpose of evaluating at least one operating characteristic of at least one of the independent tools. The computing device presents results of the analysis via a set of hierarchically linked and browseable graphics. | 01-03-2013 |
20140052699 | ESTIMATION OF DATA REDUCTION RATE IN A DATA STORAGE SYSTEM - Systems and methods for estimating data reduction ratio for a data set is provided. The method comprises selecting a plurality of m elements from a data set comprising a plurality of N elements; associating an identifier h | 02-20-2014 |
20140195498 | REAL-TIME REDUCTION OF CPU OVERHEAD FOR DATA COMPRESSION - Real-time reduction of CPU overhead for data compression is performed by a processor device in a computing environment. Non-compressing heuristics are applied on a randomly selected data sample from data sequences for determining whether to compress the data sequences. A compression potential is calculated based on the non-compressing heuristics. The compression potential is compared to a threshold value. The data sequences are either compressed if the compress threshold is matched, compressed using Huffman coding if Huffman coding threshold is matched, or stored without compression. | 07-10-2014 |
20140195499 | REAL-TIME CLASSIFICATION OF DATA INTO DATA COMPRESSION DOMAINS - For real-time classification of data into data compression domains, a decision is made for which of the data compression domains write operations should be forwarded by reading randomly selected data of the write operations for computing a set of classifying heuristics thereby creating a fingerprint for each of the write operations. The write operations having a similar fingerprint are compressed together in a similar compression stream. | 07-10-2014 |
20150070392 | AERIAL VIDEO ANNOTATION - A method comprising using at least one hardware processor for: receiving an aerially-captured video and metadata associated with the video; receiving deviation data indicative of an amount of inaccuracy in the metadata; and overlaying, on the video, a geographic annotation descriptive of an object of interest having known geographic coordinates, wherein the geographic annotation is of a size and a shape representative of the amount of inaccuracy. | 03-12-2015 |
20150074651 | DIRECTING VERIFICATION TOWARDS BUG-PRONE PORTIONS - A method, system and product for directing verification towards bug-prone portions. The method comprising syntactically analyzing a computer program to identify portions of the computer program that correspond to one or more bug patterns; and performing verification of the computer program, wherein the verification comprises traversing a control flow graph of the computer program and tracking symbolic values of variables of the computer program, wherein said performing comprises directing the traversal of the control flow graph to nodes of the control flow graph that correspond to the identified portions, whereby bug-prone portions of the computer program are prioritized to be verified before non-bug-prone portions of the computer program. | 03-12-2015 |
Patent application number | Description | Published |
20080208754 | METHOD FOR DETECTING DUPLICATED INSTANCES OF A SOFTWARE LICENSE - A method for issuing and updating a software program license for a computer, with a unique identifier data object embedded in the computer and referenced by the license. The unique identifier may also be used with a conventional computer fingerprint. The software program does not run on a computer without a license that references the unique identifier. The license is issued via a server over a network (such as the Internet) and must be regularly updated by the server. When updating, the present unique identifier is sent to the server, to verify that the unique identifier is the latest unique identifier issued for that license. If an unauthorized copy is made for operation on an unlicensed computer, such as by cloning the licensed computer, this is detected when the second computer is updated, because the unique identifier sent with the update request is no longer current. | 08-28-2008 |
20080209558 | Self-defensive protected software with suspended latent license enforcement - A method and system of computer program modules for extending the cover time of protection for a licensed software product, by increasing the difficulty and time required for an attacker to produce a workable cracked version of the program. When an attack is detected, critical information about the effectiveness of the attack are withheld from the attacker by simulating the behavior of a cracked program, thereby inducing the attacker to prematurely consider the attack successful. Latent license enforcement features are provided, whose activation is suspended until predefined environmental conditions are met. | 08-28-2008 |
20080209559 | Method for detecting that a protected software program is cracked - A method for determining if a software program having a protective envelope has been cracked, and signaling an indication thereof. A direct determination is made of whether the protective envelope is intact or has been compromised by an attack, without requiring a license violation to occur. Executable code in the protective envelope generates an envelope confirmation which is validated by executable code in the program itself. Any disabling or separation of the envelope from the program will be detectable by the program at validation time. Provisions are made for a secure envelope confirmation, the use of arguments as input to the confirmation generation, and for incorporating information related to the computer and user to facilitate identifying the attacker. Signaled indications can include network messaging to alert the licensor that the program has been cracked. | 08-28-2008 |
20080259797 | Load-Balancing Bridge Cluster For Network Nodes - A network load-balancing cluster configured to function as a transparent bridge, by connecting the load-balancing nodes in series rather than in parallel, as is done in prior-art configurations. A load-balancing algorithm and method are disclosed, by which each node in the configuration independently determines whether to process a data packet or pass the data packet along for processing by another node. To support this, load-balancing nodes are equipped with both software and hardware data pass-through capabilities that allow the nodes to pass along data packets that are processed by a different nodes. | 10-23-2008 |
20080312943 | Method And System For Data Product License-Modification Coupons - A method and system for issuing and redeeming digital coupons for requesting and granting modifications of licensed computer data products. Modifications include versions and configurations of the licensed data product as well as licensing issues related thereto. A product licensor issues authenticated coupons to customer organizations which utilize the licensed data products. The coupons are not necessarily specific to any particular computer or device, data product, version, license or configuration. Coupons can thereby be easily distributed to users within the organization. A user fills out the coupon with a request for the desired modifications and sends the coupon to the licensor, who fulfills the request by sending modification installation code directly to the user, thereby avoiding unnecessary overhead burdens on the organization. Digital coupons may be used in conjunction with external hardware devices (“dongles”) or with internal software licensing modules. | 12-18-2008 |
20090006865 | Efficient Remotely-Keyed Symmetric Cryptography For Digital Rights Management - An efficient symmetrical-cryptographic method for using a fast but insecure host to perform encryption/decryption based on a secret key in a secure, but slow hardware token, such as a smartcard or similar device, without revealing the secret key to the host, and such that the ciphertext and plaintext are exactly the same size. The present method is suitable for use in Digital Rights Management and Software Rights Management applications which require precise interchangeability of ciphertext and plaintext in pre-allocated areas of data storage. | 01-01-2009 |
20090210943 | Method to detect viruses hidden inside a password-protected archive of compressed files - A method for inspecting a compressed archive file for virus infection without having to decompress the files contained therein. Data in the archive header is used to determine the probability that the compressed archive is infected. Default parameters used for the compression, the compression ratio, the number of files stored in the compressed archive, and the total size of the archive are factors utilized during inspection according to the present invention to detect archives with a high probability of infection, as well as to recognize archives with a low probability of infection. The method is especially beneficial when the archive has been encrypted or password-protected and the files contained therein cannot be decompressed, but is also advantageous when decompression is possible. In addition, use of the present invention avoids the danger of attempting to decompress a malicious archive containing an archive bomb. | 08-20-2009 |