Patent application number | Description | Published |
20100152211 | INHIBITORS OF HUMAN PHOSPHATIDYLINOSITOL 3-KINASE DELTA - Methods of inhibiting phosphatidylinositol 3-kinase delta isoform (PI3Kδ) activity, and methods of treating diseases, such as disorders of immunity and inflammation, in which PI3Kδ plays a role in leukocyte function are disclosed. Preferably, the methods employ active agents that selectively inhibit PI3Kδ, while not significantly inhibiting activity of other PI3K isoforms. Compounds are provided that inhibit PI3Kδ activity, including compounds that selectively inhibit PI3Kδ activity. Methods of using PI3Kδ inhibitory compounds to inhibit cancer cell growth or proliferation are also provided. Accordingly, the invention provides methods of using PI3Kδ inhibitory compounds to inhibit PI3Kδ-mediated processes in vitro and in vivo. | 06-17-2010 |
20100168139 | INHIBITORS OF HUMAN PHOSPHATIDYLINOSITOL 3-KINASE DELTA - Methods of inhibiting phosphatidylinositol 3-kinase delta isoform (PI3Kδ) activity, and methods of treating diseases, such as disorders of immunity and inflammation, in which PI3Kδ plays a role in leukocyte function are disclosed. Preferably, the methods employ active agents that selectively inhibit PI3Kδ, while not significantly inhibiting activity of other PI3K isoforms. Compounds are provided that inhibit PI3Kδ activity, including compounds that selectively inhibit PI3Kδ activity. Methods of using PI3Kδ inhibitory compounds to inhibit cancer cell growth or proliferation are also provided. Accordingly, the invention provides methods of using PI3Kδ inhibitory compounds to inhibit PI3Kδ-mediated processes in vitro and in vivo. | 07-01-2010 |
20120015964 | QUINAZOLINONES AS INHIBITORS OF HUMAN PHOSPHATIDYLINOSITOL 3-KINASE DELTA - Compounds that inhibit PI3Kδ activity, including compounds that selectively inhibit PI3Kδ activity, are disclosed. Methods of inhibiting phosphatidylinositol 3-kinase delta isoform (PI3Kδ) activity, and methods of treating diseases, such as disorders of immunity and inflammation in which PI3Kδ plays a role in leukocyte function, using the compounds also are disclosed. | 01-19-2012 |
20120135994 | INHIBITORS OF HUMAN PHOSPHATIDYLINOSITOL 3-KINASE DELTA - Methods of inhibiting phosphatidylinositol 3-kinase delta isoform (PI3Kδ) activity, and methods of treating diseases, such as disorders of immunity and inflammation, in which PI3Kδ plays a role in leukocyte function are disclosed. Preferably, the methods employ active agents that selectively inhibit PI3Kδ, while not significantly inhibiting activity of other PI3K isoforms. Compounds are provided that inhibit PI3Kδ activity, including compounds that selectively inhibit PI3Kδ activity. Methods of using PI3Kδ inhibitory compounds to inhibit cancer cell growth or proliferation are also provided. Accordingly, the invention provides methods of using PI3Kδ inhibitory compounds to inhibit PI3Kδ-mediated processes in vitro and in vivo. | 05-31-2012 |
20120172591 | INHIBITORS OF HUMAN PHOSPHATIDYLINOSITOL 3-KINASE DELTA - Methods of inhibiting phosphatidylinositol 3-kinase delta isoform (PI3Kδ) activity, and methods of treating diseases, such as disorders of immunity and inflammation, in which PI3Kδ plays a role in leukocyte function are disclosed. Preferably, the methods employ active agents that selectively inhibit PI3Kδ, while not significantly inhibiting activity of other PI3K isoforms. Compounds are provided that inhibit PI3Kδ activity, including compounds that selectively inhibit PI3Kδ activity. Methods of using PI3Kδ inhibitory compounds to inhibit cancer cell growth or proliferation are also provided. Accordingly, the invention provides methods of using PI3Kδ inhibitory compounds to inhibit PI3Kδ-mediated processes in vitro and in vivo. | 07-05-2012 |
20130116266 | QUINAZOLINONES AS INHIBITORS OF HUMAN PHOSPHATIDYLINOSITOL 3-KINASE DELTA - Compounds that inhibit P13Kδ activity, including compounds that selectively inhibit P13Kδ activity, are disclosed. Methods of inhibiting phosphatidylinositol 3-kinase delta isoform (P13Kδ) activity, and methods of treating diseases, such as disorders of immunity and inflammation in which P13Kδ plays a role in leukocyte function, using the compounds also are disclosed. | 05-09-2013 |
20130231356 | QUINAZOLINONES AS INHIBITORS OF HUMAN PHOSPHATIDYLINOSITOL 3-KINASE DELTA - Compounds that inhibit PI3Kδ activity, including compounds that selectively inhibit PI3Kδ activity, are disclosed. Methods of inhibiting phosphatidylinositol 3-kinase delta isoform (PI3Kδ) activity, and methods of treating diseases, such as disorders of immunity and inflammation in which PI3Kδ plays a role in leukocyte function, using the compounds also are disclosed. | 09-05-2013 |
20140121223 | QUINAZOLINONES AS INHIBITORS OF HUMAN PHOSPHATIDYLINOSITOL 3-KINASE DELTA - Compounds that inhibit PI3Kδ activity, including compounds that selectively inhibit PI3Kδ activity, are disclosed. Methods of inhibiting phosphatidylinositol 3-kinase delta isoform (PI3Kδ) activity, and methods of treating diseases, such as disorders of immunity and inflammation in which PI3Kδ plays a role in leukocyte function, using the compounds also are disclosed. | 05-01-2014 |
20140121224 | QUINAZOLINONES AS INHIBITORS OF HUMAN PHOSPHATIDYOSITOL 3-KINASE DELTA - Compounds that inhibit PI3Kδ activity, including compounds that selectively inhibit PI3Kδ activity, are disclosed. Methods of inhibiting phosphatidylinositol 3-kinase delta isoform (PI3Kδ) activity, and methods of treating diseases, such as disorders of immunity and inflammation in which PI3Kδ plays a role in leukocyte function, using the compounds also are disclosed. | 05-01-2014 |
20140154772 | INHIBITORS OF HUMAN PHOSPHATIDYLINOSITOL 3-KINASE DELTA - Methods of inhibiting phosphatidylinositol 3-kinase delta isoform (PI3Kδ) activity, and methods of treating diseases, such as disorders of immunity and inflammation, in which PI3Kδ plays a role in leukocyte function are disclosed. Preferably, the methods employ active agents that selectively inhibit PI3Kδ, while not significantly inhibiting activity of other PI3K isoforms. Compounds are provided that inhibit PI3Kδ activity, including compounds that selectively inhibit PI3Kδ activity. Methods of using PI3Kδ inhibitory compounds to inhibit cancer cell growth or proliferation are also provided. Accordingly, the invention provides methods of using PI3Kδ inhibitory compounds to inhibit PI3Kδ-mediated processes in vitro and in vivo. | 06-05-2014 |
20140378479 | QUINAZOLINONES AS INHIBITORS OF HUMAN PHOSPHATIDYLINOSITOL 3-KINASE DELTA - Compounds that inhibit PI3Kδ activity, including compounds that selectively inhibit PI3Kδ activity, are disclosed. Methods of inhibiting phosphatidylinositol 3-kinase delta isoform (PI3Kδ) activity, and methods of treating diseases, such as disorders of immunity and inflammation in which PI3Kδ plays a role in leukocyte function, using the compounds also are disclosed. | 12-25-2014 |
20160075705 | QUINAZOLINONES AS INHIBITORS OF HUMAN PHOSPHATIDYLINOSITOL 3-KINASE DELTA - Compounds that inhibit PI3Kδ activity, including compounds that selectively inhibit PI3Kδ activity, are disclosed. Methods of inhibiting phosphatidylinositol 3-kinase delta isoform (PI3Kδ) activity, and methods of treating diseases, such as disorders of immunity and inflammation in which PI3Kδ plays a role in leukocyte function, using the compounds also are disclosed. | 03-17-2016 |
Patent application number | Description | Published |
20090177790 | CONFIGURATION OF A PEER GROUP - Embodiments of the present invention relate to systems and methods for configuring computing devices to join a peer group. A peer group may be created on a subnetwork by a computing device. When a new computing device enters the subnetwork, it may join the peer group and be given access to the shared resources on the peer group and associated computing devices, using a communications layer and an authorization layer. Allowing a new computing device to join a peer group includes inviting the new device to join and then challenging the device for a passkey of the peer group. After joining the peer group, the computing device will be able to access and share resources with the peer group and other computing devices associated with the peer group. | 07-09-2009 |
20090178122 | ASSOCIATING COMPUTING DEVICES WITH COMMON CREDENTIALS - Method and computer storage media for sharing resources between a plurality of computing devices associated with a common non-enterprise network. A common set of credentials is stored on at least two or more of a plurality of computing devices that reside behind a routing device and are associated through a common non-enterprise network. Upon storing the common set of credentials, each of the two or more of a plurality of computing devices create a local account that contains, at least, the common set of credentials. The common set of credentials allow for the sharing, among the two or more of the plurality of computing devices, of resource that reside on or are associated with the computing devices. | 07-09-2009 |
20120158891 | TECHNIQUES FOR UNIVERSAL REPRESENTATION OF DIGITAL CONTENT - A universal content representation system (“UCRS”) implements techniques for universally representing digital content such as files, device information, and applications across a group of electronic devices that includes at least a source electronic device and a remote electronic device. Proxy content items, which correspond with items of content (“source content items”) stored on the source electronic device, are data stores for the corresponding source content items, and visually represent the corresponding source content items on the remote electronic device, whether the source electronic device is online or offline. A user of the remote electronic devices uses the proxy content items to search for and view source content items prior to requesting full access to the source content items. From time-to-time, source content items and proxy content items are synchronized with each other. | 06-21-2012 |
20120192275 | REPUTATION CHECKING OF EXECUTABLE PROGRAMS - The reputation of an executable computer program is checked when a user input to a computing device initiates a program launch, thus triggering a check of a local cache of reputation information. If the local cache confirms that the program is safe, it is permitted to launch, typically without notifying the user that a reputation check has been made. If the local cache cannot confirm the safety of the program, a reputation check is made by accessing a reputation service in the cloud. If the reputation service identifies the program as safe, it returns an indication to the computing device and the program is permitted to be launched, again without notifying the user that a reputation check has been made. If the reputation service identifies the program as unsafe or potentially unsafe, or does not recognize it at all, a warning is displayed to the user. | 07-26-2012 |
20130298214 | ASSOCIATING COMPUTING DEVICES WITH COMMON CREDENTIALS - Method and computer storage media for sharing resources between a plurality of computing devices associated with a common non-enterprise network. A common set of credentials is stored on at least two or more of a plurality of computing devices that reside behind a routing device and are associated through a common non-enterprise network. Upon storing the common set of credentials, each of the two or more of a plurality of computing devices create a local account that contains, at least, the common set of credentials. The common set of credentials allow for the sharing, among the two or more of the plurality of computing devices, of resource that reside on or are associated with the computing devices. | 11-07-2013 |
20140358887 | APPLICATION CONTENT SEARCH MANAGEMENT - A search service accesses application content accessible via one or more enumerated applications. The search service ranks the accessed application content in combination with non-application content to produce a combined ranking. Responsive to a search query, the search service provides one or more search results based on the combined ranking. | 12-04-2014 |
20140358909 | SEARCH RESULT CONTEXTS FOR APPLICATION LAUNCH - A search service executes on one or more computing systems and searches at least one index associated with content accessible through an application based on the at least one portion of the search query to provide search results associated with the application. A search results interface returns one or more search results from the search. At least one of the search results is associated with an application identifier identifying the application. The search service ranks the search results associated with the application with other search results from at least one other search of other content based on the search query. | 12-04-2014 |
20140358916 | PERSONALIZED PRIORITIZATION OF INTEGRATED SEARCH RESULTS - A search management system receives at a computing system one or more search results from a search operation based on a search query. The search operation performed a first search on content in a database accessible through an application, a second search on local to the computing system content, and a third search on Web content. At least one of the search results from the first search is associated with an application identifier identifying the application. A search results integrator ranks the search results from the first search, the second search, and the third search in aggregation according to historical search behavior collected about a user and presents the ranked search results from the first search, the second search, and the third search in an integrated view. | 12-04-2014 |
20140358970 | CONTEXT-BASED ACTIONS FROM A SOURCE APPLICATION - An action framework system provides context-based actions in association with a source application. The source application detects selection of a content element presented by the source application. The content element is associated with an application identifier identifying a target application and an action identifier identifying an operation to be executed by the target application on the content element. The target application identified by the application identifier is executed to perform the operation identified by the action identifier on the content element, responsive to detection of the selection of the content element. In one implementation, the source application is a search feature providing different contexts of search results (e.g., from a local file system search, a local application content search, a Web search, a remote application content search). | 12-04-2014 |
20140359598 | APPLICATION INSTALLATION FROM SEARCH RESULTS - A search management system receives at a computing device one or more search results from a search operation based on a search query. The search operation was performed a search on content in a datastore accessible through an application. At least one of the search results is associated with an application identifier identifying the application. A contextual application installer determines whether the application identified by the application identifier is already installed for execution by the computing device and installs the application on the computing device, if the application is not already installed on the computing device. As part of the installing operation, the contextual application installer presents a prompt identifying the application and installs the application on the computing device if an instruction to install the application is received responsive to presentation of the prompt. | 12-04-2014 |
Patent application number | Description | Published |
20090222592 | AUTOMATIC PERIPHERAL DEVICE SHARING - In accordance with the automatic peripheral device sharing, a peripheral device that has been newly installed on a device is detected and is shared with one or more additional devices coupled to the device. A notification of the peripheral device is automatically published to the one or more additional devices. This notification includes an indication of how the one or more additional devices can access the peripheral device. Each of the one or more additional devices can receive this notification and determine whether the peripheral device can be automatically installed on that device without user input. For each of the one or more additional devices, the peripheral device is installed on that device only if the peripheral device can be automatically installed on that device without user input. | 09-03-2009 |
20120304200 | Application Activation Framework - Techniques for application activation are described herein. An operating system (OS) can be configured to incorporate various extension points that are serviceable through contracts defining individual invocations of extensible functionality. The extensible functionality is integrated as part of the OS and controlled by the OS in a centralized manner. However, the specific implementations of the extensible functionally are offloaded to applications using the contracts. For example, the OS can include or otherwise make use of a centralized application activation component that employs an object-oriented approach to invoke applications to perform particular contracts. The application activation component can pass information describing a particular contract to activate a designated application and enable the application to service the contract in the manner specified by the OS. In this way, the manner in which contracts are handled by application code can be managed and coordinated through a centralized application activation component. | 11-29-2012 |
20130067473 | Modes for Applications - Techniques for modes for applications are described. In one or more implementations, multiple operational modes are provided for an application. The operational modes can be associated with different resource access permissions, trust statuses, graphical user interfaces, and so on. An application can be launched in a particular one of the operational modes based on a context in which a request to launch the application is received. In one or more implementations, correlations between launch request contexts for an application and operational modes can be configured to enable different launch requests to cause an application to launch into different operational modes. | 03-14-2013 |
20150286499 | Application Activation Framework - Techniques for application activation are described herein. An operating system (OS) can be configured to incorporate various extension points that are serviceable through contracts defining individual invocations of extensible functionality. The extensible functionality is integrated as part of the OS and controlled by the OS in a centralized manner. However, the specific implementations of the extensible functionally are offloaded to applications using the contracts. For example, the OS can include or otherwise make use of a centralized application activation component that employs an object-oriented approach to invoke applications to perform particular contracts. The application activation component can pass information describing a particular contract to activate a designated application and enable the application to service the contract in the manner specified by the OS. In this way, the manner in which contracts are handled by application code can be managed and coordinated through a centralized application activation component. | 10-08-2015 |
Patent application number | Description | Published |
20100204642 | CATHETER WITH MULTIPLE ULTRASOUND RADIATING MEMBERS - A method of delivery ultrasonic energy and a therapeutic compound to a treatment site and an ultrasonic catheter system are disclosed. The method comprises providing a catheter with a plurality of ultrasound radiating members, wherein the plurality of ultrasound radiating members are allocated into electrical groups comprising more than one ultrasound radiating member. The method further comprises independently driving each group of ultrasonic radiating members, and delivering the therapeutic compound through the catheter to the treatment site. | 08-12-2010 |
20100331763 | ULTRASOUND CATHETER WITH EMBEDDED CONDUCTORS - An ultrasound catheter comprises an elongate tubular body is disclosed. The elongate tubular body has a proximal region and a distal region opposite the proximal region. The tubular body defines a central lumen having a central lumen surface that is electrically conductive. The ultrasound catheter further comprises an elongate, hollow inner core extending through the central lumen and has an inner core outer surface that is electrically conductive. The ultrasound catheter further comprises an ultrasound radiating member positioned within the distal region of the tubular body and between the tubular body and the inner core, such that the tubular body conductive surface and the inner core conductive surface are both in electrical contact with the ultrasound radiating member. The ultrasound catheter further comprises an insulating sleeve positioned between the tubular body and the inner core in a region proximal to the ultrasound radiating member. | 12-30-2010 |
20120253237 | CATHETER WITH MULTIPLE ULTRASOUND RADIATING MEMBERS - A method of delivery ultrasonic energy and a therapeutic compound to a treatment site and an ultrasonic catheter system are disclosed. The ultrasonic catheter system comprises a tubular body having a proximal end, a distal end and a treatment zone located between the distal end and the proximal end, a fluid delivery lumen, at least one ultrasound radiating element positioned in the treatment zone, wiring electrically coupled to the at least one ultrasound radiating element and extending through the tubular body and terminating at a connector, and a control system comprising external circuitry and an isolation pod that is configured to be electrically connected to the connector, the isolation pod being positioned between the tubular body and the external system and comprising an isolation barrier and circuitry for driving the ultrasound radiating element. | 10-04-2012 |
20140249453 | CATHETER WITH MULTIPLE ULTRASOUND RADIATING MEMBERS - A method of delivery ultrasonic energy and a therapeutic compound to a treatment site and an ultrasonic catheter system are disclosed. The ultrasonic catheter system comprises a tubular body having a proximal end, a distal end and a treatment zone located between the distal end and the proximal end, a fluid delivery lumen, at least one ultrasound radiating element positioned in the treatment zone, wiring electrically coupled to the at least one ultrasound radiating element and extending through the tubular body and terminating at a connector, and a control system comprising external circuitry and an isolation pod that is configured to be electrically connected to the connector, the isolation pod being positioned between the tubular body and the external system and comprising an isolation barrier and circuitry for driving the ultrasound radiating element. | 09-04-2014 |
Patent application number | Description | Published |
20090089082 | GET PREP QUESTIONS TO ASK DOCTOR - The claimed subject matter provides a system and/or a method that facilitates dynamically providing a question to ask a medical professional during an appointment. An interface can receive a portion of medical data. A counselor component can generate a question based on the portion of medical data, wherein the question is generated to elicit an answer from a medical professional during an appointment. Moreover, the counselor component can dynamically generate a second question directed toward the medical professional based upon at least one of the answer or a value of information (VOI) computation. | 04-02-2009 |
20090268945 | ARCHITECTURE FOR CONTROLLING A COMPUTER USING HAND GESTURES - Architecture for implementing a perceptual user interface. The architecture comprises alternative modalities for controlling computer application programs and manipulating on-screen objects through hand gestures or a combination of hand gestures and verbal commands. The perceptual user interface system includes a tracking component that detects object characteristics of at least one of a plurality of objects within a scene, and tracks the respective object. Detection of object characteristics is based at least in part upon image comparison of a plurality of images relative to a course mapping of the images. A seeding component iteratively seeds the tracking component with object hypotheses based upon the presence of the object characteristics and the image comparison. A filtering component selectively removes the tracked object from the object hypotheses and/or at least one object hypothesis from the set of object hypotheses based upon predetermined removal criteria. | 10-29-2009 |
20100138798 | System and method for executing a game process - A 3-D imaging system for recognition and interpretation of gestures to control a computer. The system includes a 3-D imaging system that performs gesture recognition and interpretation based on a previous mapping of a plurality of hand poses and orientations to user commands for a given user. When the user is identified to the system, the imaging system images gestures presented by the user, performs a lookup for the user command associated with the captured image(s), and executes the user command(s) to effect control of the computer, programs, and connected devices. | 06-03-2010 |
20100146455 | Architecture For Controlling A Computer Using Hand Gestures - Architecture for implementing a perceptual user interface. The architecture comprises alternative modalities for controlling computer application programs and manipulating on-screen objects through hand gestures or a combination of hand gestures and verbal commands. The perceptual user interface system includes a tracking component that detects object characteristics of at least one of a plurality of objects within a scene, and tracks the respective object. Detection of object characteristics is based at least in part upon image comparison of a plurality of images relative to a course mapping of the images. A seeding component iteratively seeds the tracking component with object hypotheses based upon the presence of the object characteristics and the image comparison. A filtering component selectively removes the tracked object from the object hypotheses and/or at least one object hypothesis from the set of object hypotheses based upon predetermined removal criteria. | 06-10-2010 |
20100146464 | Architecture For Controlling A Computer Using Hand Gestures - Architecture for implementing a perceptual user interface. The architecture comprises alternative modalities for controlling computer application programs and manipulating on-screen objects through hand gestures or a combination of hand gestures and verbal commands. The perceptual user interface system includes a tracking component that detects object characteristics of at least one of a plurality of objects within a scene, and tracks the respective object. Detection of object characteristics is based at least in part upon image comparison of a plurality of images relative to a course mapping of the images. A seeding component iteratively seeds the tracking component with object hypotheses based upon the presence of the object characteristics and the image comparison. A filtering component selectively removes the tracked object from the object hypotheses and/or at least one object hypothesis from the set of object hypotheses based upon predetermined removal criteria. | 06-10-2010 |
20100151946 | SYSTEM AND METHOD FOR EXECUTING A GAME PROCESS - A 3-D imaging system for recognition and interpretation of gestures to control a computer. The system includes a 3-D imaging system that performs gesture recognition and interpretation based on a previous mapping of a plurality of hand poses and orientations to user commands for a given user. When the user is identified to the system, the imaging system images gestures presented by the user, performs a lookup for the user command associated with the captured image(s), and executes the user command(s) to effect control of the computer, programs, and connected devices. | 06-17-2010 |
20100153399 | WINDOW GROUPiNG - A framework is provided for obtaining window information. The window information can be applied to different assignment models to assign windows to different groups. A group may correspond to a task being performed by a user. The window information can be semantic or temporal information captured as window events and properties of windows whose events are captured. Temporal information can be information about switches between windows. Semantic information can be window titles. Temporal information, semantic information, or both, can be used to assign windows to groups. | 06-17-2010 |
20110264484 | ACTIVITY-CENTRIC GRANULAR APPLICATION FUNCTIONALITY - A system that can enable the atomization of application functionality in connection with an activity-centric system is provided. The system can be utilized as a programmatic tool that decomposes an application's constituent functionality into atoms thereafter monitoring and aggregating atoms with respect to a particular activity. In doing so, the functionality of the system can be scaled based upon complexity and needs of the activity. Additionally, the system can be employed to monetize the atoms or activity capabilities based upon respective use. | 10-27-2011 |
20130190089 | System and method for execution a game process - A 3-D imaging system for recognition and interpretation of gestures to control a computer. The system includes a 3-D imaging system that performs gesture recognition and interpretation based on a previous mapping of a plurality of hand poses and orientations to user commands for a given user. When the user is identified to the system, the imaging system images gestures presented by the user, performs a lookup for the user command associated with the captured image(s), and executes the user command(s) to effect control of the computer, programs, and connected devices. | 07-25-2013 |
20130275911 | WINDOW GROUPING - A framework is provided for obtaining window information. The window information can be applied to different assignment models to assign windows to different groups. A group may correspond to a task being performed by a user. The window information can be semantic or temporal information captured as window events and properties of windows whose events are captured. Temporal information can be information about switches between windows. Semantic information can be window titles. Temporal information, semantic information, or both, can be used to assign windows to groups. | 10-17-2013 |
Patent application number | Description | Published |
20090237220 | RFID TAGS WITH POWER RECTIFIERS THAT HAVE BIAS - A system and method for generating a rectified signal in a RFID tag. An alternating signal is received by the RFID tag, and a first phase of the alternating signal is coupled to a gate and to a first non-controlling terminal of a first switching transistor. The non-controlling terminal of the first switching transistor is one of a source and a drain of the first switching transistor. A first bias voltage is applied between the first non-controlling terminal and the gate of the first switching transistor and a rectified voltage is received between the first non-controlling terminal and a second non-controlling terminal of the first switching transistor. | 09-24-2009 |
20100270382 | PACKAGED RFID IC WITH INTEGRATED ANTENNA - A precursor for a Radio Frequency Identification (RFID) tag includes a conductive lead frame with at least three segments, an RFID Integrated Circuit (IC) with at least two antenna terminals, and at least two jumpers. The RFID IC is mounted on at least one of the segments. The antenna terminals are electrically coupled to at least two of the segments, and the jumpers electrically couple the segments such that the coupled segments form a two-turn coil between the antenna terminals of the RFID IC. | 10-28-2010 |
20140070010 | RFID INTEGRATED CIRCUITS WITH ANTENNA CONTACTS ON MULTIPLE SURFACES - Embodiments are directed to a Radio Frequency Identification (RFID) integrated circuit (IC) having a first circuit block electrically coupled to first and second antenna contacts. The first antenna contact is disposed on a first surface of the IC and the second antenna contact is disposed on a second surface of the IC different from the first surface. The first and second antenna contacts are electrically disconnected from each other. | 03-13-2014 |
20140073071 | RFID INTEGRATED CIRCUITS WITH ANTENNA CONTACTS ON MULTIPLE SURFACES - Embodiments are directed to a Radio Frequency Identification (RFID) integrated circuit (IC) having a first circuit block electrically coupled to first and second antenna contacts. The first antenna contact is disposed on a first surface of the IC and the second antenna contact is disposed on a second surface of the IC different from the first surface. The first and second antenna contacts are electrically disconnected from each other. | 03-13-2014 |
20140144992 | RFID INTEGRATED CIRCUITS AND TAGS WITH ANTENNA CONTACTS ON MULTIPLE SURFACES - Embodiments are directed to a Radio Frequency Identification (RFID) integrated circuit (IC) having a first circuit block electrically coupled to first and second antenna contacts. The first antenna contact is disposed on a first surface of the IC and the second antenna contact is disposed on a second surface of the IC different from the first surface. The first and second antenna contacts are electrically disconnected from each other. | 05-29-2014 |
20150227832 | RFID INTEGRATED CIRCUITS WITH ANTENNA CONTACTS ON MULTIPLE SURFACES - Embodiments are directed to a Radio Frequency Identification (RFID) integrated circuit (IC) having a first circuit block electrically coupled to first and second antenna contacts. The first antenna contact is disposed on a first surface of the IC and the second antenna contact is disposed on a second surface of the IC different from the first surface. The first and second antenna contacts are electrically disconnected from each other. | 08-13-2015 |
20150248604 | RFID INTEGRATED CIRCUITS AND TAGS WITH ANTENNA CONTACTS ON MULTIPLE SURFACES - Embodiments are directed to a Radio Frequency Identification (RFID) integrated circuit (IC) having a first circuit block electrically coupled to first and second antenna contacts. The first antenna contact is disposed on a first surface of the IC and the second antenna contact is disposed on a second surface of the IC different from the first surface. The first and second antenna contacts are electrically disconnected from each other. | 09-03-2015 |