Patent application number | Description | Published |
20100290956 | CAP-LINKED TEST STRIP CARRIER FOR VIAL AUGMENTATION - The present disclosure provides test strip carriers for insertion into test strip vials and methods of making the same. Also provided are test strip vials including test strip carriers, and systems including test strip vials, test strip carriers and analytical test strips. The test strip carriers of the present disclosure are capable of engaging with the caps of test strip vials and thereby facilitating the retrieval of one or more test strips from the test strip vials upon opening of the test strip vials. | 11-18-2010 |
20110184264 | Universal Test Strip Port - The present disclosure provides a sensor port configured to receive a plurality of analyte sensors having different sizes, shapes and/or electrode configurations. Also provided are analyte meters, analyte monitoring devices and/or systems and drug delivery devices and/or systems utilizing the disclosed sensor ports. | 07-28-2011 |
20120100601 | Analyte Measurement Devices and Systems, and Components and Methods Related Thereto - In some aspects, a modular analyte measurement system having a replaceable strip port module is provided to permit contaminated modules to be replaced. Some aspects of the present disclosure related to barriers for strip ports or the sealing of strip ports and/or analyte measurement devices to maintain a clean strip port and/or enable the strip port to be cleaned for reuse. Cleaning tools are also provided. Also provided are strip port interfaces that guide fluid away from the strip port opening, as well as absorptive elements that prevent fluid from entering a strip port. Analyte measurement devices with gravity sensors or accelerometers are also provided, along with methods related thereto. Also provided are docking station that serve as an information server and provides storage and recharging capabilities. | 04-26-2012 |
20130017056 | Cap-Linked Test Strip Carrier for Vial Augmentation - The present disclosure provides test strip carriers for insertion into test strip vials and methods of making the same. Also provided are test strip vials including test strip carriers, and systems including test strip vials, test strip carriers and analytical test strips. The test strip carriers of the present disclosure are capable of engaging with the caps of test strip vials and thereby facilitating the retrieval of one or more test strips from the test strip vials upon opening of the test strip vials. | 01-17-2013 |
20130334065 | ANALYTE MEASUREMENT DEVICES AND SYSTEMS, AND COMPONENTS AND METHODS RELATED THERETO - In some aspects, a modular analyte measurement system having a replaceable strip port module is provided to permit contaminated modules to be replaced. Some aspects of the present disclosure related to barriers for strip ports or the sealing of strip ports and/or analyte measurement devices to maintain a clean strip port and/or enable the strip port to be cleaned for reuse. Cleaning tools are also provided. Also provided are strip port interfaces that guide fluid away from the strip port opening, as well as absorptive elements that prevent fluid from entering a strip port. Analyte measurement devices with gravity sensors or accelerometers are also provided, along with methods related thereto. Also provided are docking station that serve as an information server and provides storage and recharging capabilities. | 12-19-2013 |
20140131199 | Analyte Measurement Devices and Systems, and Components and Methods Related Thereto - In some aspects, a modular analyte measurement system having a replaceable strip port module is provided to permit contaminated modules to be replaced. Some aspects of the present disclosure related to barriers for strip ports or the sealing of strip ports and/or analyte measurement devices to maintain a clean strip port and/or enable the strip port to be cleaned for reuse. Cleaning tools are also provided. Also provided are strip port interfaces that guide fluid away from the strip port opening, as well as absorptive elements that prevent fluid from entering a strip port. Analyte measurement devices with gravity sensors or accelerometers are also provided, along with methods related thereto. Also provided are docking station that serve as an information server and provides storage and recharging capabilities. | 05-15-2014 |
20140374277 | Universal Test Strip Port - The present disclosure provides a sensor port configured to receive a plurality of analyte sensors having different sizes, shapes and/or electrode configurations. Also provided are analyte meters, analyte monitoring devices and/or systems and drug delivery devices and/or systems utilizing the disclosed sensor ports. | 12-25-2014 |
20150293568 | Electronic Devices Having Integrated Reset Systems and Methods Thereof - Methods and devices for power cycling an electronic device are provided. Also provided are systems and kits. | 10-15-2015 |
Patent application number | Description | Published |
20110172220 | DISCODERMOLIDE ANALOGUES AND METHODS OF THEIR USE - 6- and 7-substituted coumarin and related 6- and 7-substituted 1H-quinolin-2-one compounds, pharmaceutical compositions containing these compounds, and methods for their pharmaceutical use are disclosed. In certain embodiments, the 7-substituted coumarin and related 7-substituted 1H-quinolin-2-one compounds mimic or exceed the high level of pharmacological activity of discodermolide. In other embodiments, their preparation involves more readily available materials, higher yield processes and/or simpler synthetic sequences. In yet other embodiments, the compounds of the invention represent structurally simpler, therapeutically active analogues of discodermolide than heretofore known and may be useful as microtubule stabilizers and, inter alia, for treating and/or preventing cancer and other diseases, disorders, and/or conditions mediated by the stabilization of microtubules. | 07-14-2011 |
20130178445 | Novel Benzopyran Compounds, Compositions and Uses Thereof - Benzopyran compounds with strong anti-estrogenic activity and essentially no estrogenic activity are provided, which are OP-1038, which is 3-(4-hydroxyphenyl)-4-methyl-2-(4-{2-[(3R)-3-methylpyrrolidin-1-yl]ethoxy}phenyl)-2H-chromen-7-ol, and OP-1074, which is (2S)-3-(4-hydroxyphenyl)-4-methyl-2-(4-{2-[(3R)-3-methylpyrrolidin-1-yl]ethoxy}phenyl)-2H-chromen-7-ol. OP-1074 is a pure anti-estrogen when tested in the agonist mode and a complete anti-estrogen when tested in the antagonist mode. These compounds are useful for the treatment or prevention of a variety of conditions that are modulated through the estrogen receptor in mammals including humans. | 07-11-2013 |
20150197506 | NOVEL BENZOPYRAN COMPOUNDS, COMPOSITIONS AND USES THEREOF - Benzopyran compounds with strong anti-estrogenic activity and essentially no estrogenic activity are provided, which are OP-1038, which is 3-(4-hydroxyphenyl)-4-methyl-2-(4-{2-[(3R)-3-methylpyrrolidin-1-yl]ethoxy}phenyl)-2H-chromen-7-ol, and OP-1074, which is (2S)-3-(4-hydroxyphenyl)-4-methyl-2-(4-{2-[(3R)-3-methylpyrrolidin-1-yl]ethoxy}phenyl)-2H-chromen-7-ol. OP-1074 is a pure anti-estrogen when tested in the agonist mode and a complete anti-estrogen when tested in the antagonist mode. These compounds are useful for the treatment or prevention of a variety of conditions that are modulated through the estrogen receptor in mammals including humans. | 07-16-2015 |
Patent application number | Description | Published |
20120260102 | SYSTEM AND METHOD FOR EXECUTING AN ENCRYPTED BINARY FROM A MEMORY POOL - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for executing encrypted computer code. A system configured to practice the method receives a request to execute encrypted computer code. In response to the request, the system identifies a portion of the encrypted computer code for execution and decrypts the portion to yield decrypted computer code. Then the system stores the decrypted computer code in a pool of memory and executes the decrypted computer code from the pool of memory. The system can store the decrypted computer code in the pool of memory based on a randomization algorithm so that identical executions of the encrypted computer code result in selections of different available memory locations within the pool of memory. Related portions can be stored non-consecutively in the pool of memory. The pool of memory can store different portions of decrypted computer code over time. | 10-11-2012 |
20120260106 | SYSTEM AND METHOD FOR BINARY LAYOUT RANDOMIZATION - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for binary layout randomization. A system performs binary layout randomization by loading computer code into memory and identifying a section of the computer code to randomize. A loader remaps the section of computer code to a different location in memory utilizing a remapping algorithm. The loader can shuffle sections of code in place or move sections of code elsewhere. The loader patches relative addresses to point to the updated locations in memory. After the system patches the addresses, the system executes the computer code from memory. In one embodiment, the system encrypts the computer code prior to loading the computer code into memory. The loader decrypts the encrypted computer code prior to remapping the section of computer code to a different location in memory. Optionally, the loader can decrypt the encrypted computer code after patching relative addresses. | 10-11-2012 |
20120284688 | SYSTEM AND METHOD FOR BLURRING INSTRUCTIONS AND DATA VIA BINARY OBFUSCATION - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for obfuscating a computer program. A system configured to practice the method identifies a set of executable instructions at a first location in an instruction section of the computer program and identifies a second location in a data section of the computer program. Then the system moves the set of executable instructions to the second location and patches references in the computer program to the set of executable instructions to point to the second location. The instruction section of the computer program can be labeled as _TEXT,_text and the data section of the computer program is labeled as _DATA,_data. The set of executable instructions can include one or more non-branching instructions optionally followed by a branching instruction. The placement of the first and second locations can be based on features of a target computing architecture, such as cache size. | 11-08-2012 |
20130036473 | SYSTEM AND METHOD FOR BRANCH FUNCTION BASED OBFUSCATION - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for obfuscating branches in computer code. A compiler or a post-compilation tool can obfuscate branches by receiving source code, and compiling the source code to yield computer-executable code. The compiler identifies branches in the computer-executable code, and determines a return address and a destination value for each branch. Then, based on the return address and the destination value for each branch, the compiler constructs a binary tree with nodes and leaf nodes, each node storing a balanced value, and each leaf node storing a destination value. The non-leaf nodes are arranged such that searching the binary tree by return address leads to a corresponding destination value. Then the compiler inserts the binary tree in the computer-executable code and replaces each branch with instructions in the computer-executable code for performing a branching operation based on the binary tree. | 02-07-2013 |
20130104239 | SYSTEM AND METHOD FOR OBFUSCATING DATA USING INSTRUCTIONS AS A SOURCE OF PSEUDORANDOM VALUES - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for obfuscating data using instructions as a source of pseudorandom values. Obfuscation is performed by receiving instructions and data and compiling the instructions and the data into an executable file having a text section and a data section. The text section can include instructions and the data section can include data segments. The system obfuscates the data section iteratively by generating a hash of an address for a respective data segment, and based on the hash, identifying a corresponding address in the text section that includes at least one instruction. The system retrieves a mask key from the corresponding address and applies the mask key to the respective data segment, yielding a masked data segment. In one embodiment, integrity verification of obfuscated data is performed without exposing the data in an unprotected state by utilizing multiple mask keys. | 04-25-2013 |
Patent application number | Description | Published |
20090113189 | Method and System for Hiding Information in the Instruction Processing Pipeline - A system, article of manufacture and method is provided for transferring secret information from a first location to a second location. The secret information is encoded and stalls in executable code are located. The executable code is configured to perform a predetermined function when executed on a pipeline processor. The encoded information is inserted into a plurality of instructions and the instructions are inserted into the executable code at the stalls. There is no net effect of all of the inserted instructions on the predetermined function of the executable code. The executable code is transferred to the second location. The location of the stalls in the transferred code is identified. The encoded information is extracted from the instructions located at the stalls. The encoded information may then be decoding information to generate the information at the second location. | 04-30-2009 |
20090113549 | SYSTEM AND METHOD TO ANALYZE SOFTWARE SYSTEMS AGAINST TAMPERING - A system, article of manufacture and method is provided for determining the vulnerability to attack of a software system by generating a hybrid graph, the hybrid graph including an attack graph portion describing at least one potential attack goal on the software system and describing sub-attacks required to achieve the potential attack goal. The hybrid graph also includes a defense graph describing ways to defend against the potential sub-attacks. The hybrid attack-defense graph may be evaluated and a score may be calculated based on the evaluation. | 04-30-2009 |
20090113552 | System and Method To Analyze Software Systems Against Tampering - A system, article of manufacture and method is provided for determining the vulnerability to attack of a software system by generating a hybrid graph, the hybrid graph including an attack graph portion describing at least one potential attack goal on the software system and describing sub-attacks required to achieve the potential attack goal. The hybrid graph also includes a defense graph describing ways to defend against the potential sub-attacks. The hybrid attack-defense graph may be evaluated and a score may be calculated based on the evaluation. | 04-30-2009 |
20090113553 | METHOD AND SYSTEM FOR HIDING INFORMATION IN THE INSTRUCTION PROCESSING PIPELINE - A system, article of manufacture and method is provided for transferring secret information from a first location to a second location. The secret information is encoded and stalls in executable code are located. The executable code is configured to perform a predetermined function when executed on a pipeline processor. The encoded information is inserted into a plurality of instructions and the instructions are inserted into the executable code at the stalls. There is no net effect of all of the inserted instructions on the predetermined function of the executable code. The executable code is transferred to the second location. The location of the stalls in the transferred code is identified. The encoded information is extracted from the instructions located at the stalls. The encoded information may then be decoding information to generate the information at the second location. | 04-30-2009 |
20090287679 | Evaluation of tamper resistant software system implementations - According to one embodiment of the present invention, a method for evaluating a software system includes defining a rating of the tamper resistance of a software system and breaking down the rating into a plurality of metrics relevant to the tamper resistance of the software system. A score may then be calculated for each metric and the scores may be combined into a composite score for the rating. | 11-19-2009 |