Thanos
Chris Thanos, Cumberland, RI US
Patent application number | Description | Published |
---|---|---|
20090214660 | ENCAPSULATION SYSTEM - The present invention is directed to a composition comprising high mannuronic acid-containing alginate and a polycation having a polydispersity index of less than 1.5. The composition is particularly useful for making biocompatible microcapsules containing living cells for allo- or xeno-transplantation. Such microcapsules have enhanced durability and can maintain their structural and functional integrity over long periods of time compared to prior art alginate microcapsules. | 08-27-2009 |
Christopher Thanos, Cumberland, RI US
Patent application number | Description | Published |
---|---|---|
20090075375 | CHOROID PLEXUS PREPARATION AND USES THEREOF - The present invention is directed to the use of choroids plexus cells and/or choroids plexus conditioned media for enhancing the growth, survival and/or maintenance of function of non-choroid plexus cells grown in long term or short term culture. | 03-19-2009 |
20110166218 | METHODS FOR MICRONIZATION OF HYDROPHOBIC DRUGS - The invention involves methods and products related to the micronization of hydrophobic drugs. A method of micronizing hydrophobic drugs using a set of solutions including an aqueous solution is provided. The invention also relates to products of micronized hydrophobic drugs and related methods of use. | 07-07-2011 |
20110177025 | WOUND HEALING - The invention relates to methods and compositions for improving wound healing and in particular for preventing scar formation and thus loss of function that can occur in injured tissues during the natural wound healing process. Particularly, although by no means exclusively, the invention relates to the healing of chronic wounds such as diabetic ulcers. | 07-21-2011 |
Christopher Thanos, Cranston, RI US
Patent application number | Description | Published |
---|---|---|
20080286864 | Choroid Plexus Preparation and Uses Thereof - The present invention is directed to the use of choroid plexus cells and/or choroid plexus conditioned media for enhancing the growth, survival and/or maintenance of function of non-choroid plexus cells grown in long term or short term culture. | 11-20-2008 |
Daniel Thanos, Markham CA
Patent application number | Description | Published |
---|---|---|
20140283047 | INTELLIGENT CYBERPHYSICAL INTRUSION DETECTION AND PREVENTION SYSTEMS AND METHODS FOR INDUSTRIAL CONTROL SYSTEMS - The embodiments described herein include a system and a method. In one embodiment, a system includes a device monitoring component configured to measure control system behavior and an intrusion prevention system communicatively coupled to the device monitoring component and a communications network. The intrusion prevention system includes a control system analysis component configured to analyze the control system behavior measured by the device monitoring component against a first rule set to determine whether an anomaly, an intrusion, or both are present. | 09-18-2014 |
Daniel Thanos, Mississauga CA
Patent application number | Description | Published |
---|---|---|
20090217385 | Cryptographic control for mobile storage means - A system and method that regulates the various operations between computing stations and storage devices. Storage devices are the storage means that are contained upon devices that are able to have data stored upon them. Any operation that involves or may lead to the exchange or accessing of content (data) between a storage device and computing station may be regulated by means of a policy which comprise a set of rules. Rules may be defined according to specific criteria, including the type of storage device, the type of content, the attributes of the content, and other attributes associated with the storage device and/or the content. The policy will be dynamically installed upon a computing station for specific user(s) and will regulate the data operations that may take place between the computing stations and storage devices based on evaluation of the policy. Based on the evaluation of the policy, the requested operation is permitted, restricted in some areas, or denied. | 08-27-2009 |
20100058072 | CONTENT CRYPTOGRAPHIC FIREWALL SYSTEM - A system and method that regulates the various operations between computing stations and storage or content. Any operation that involves or may lead to the exchange or accessing of content (data) between storage or hosting content container and computing station may be regulated by means of a policy which comprise a set of rules. Rules may be defined according to specific criteria, including the type of storage, the type of content, the attributes of the content, and other attributes associated with the storage device and/or the content. The policy will be dynamically installed/updated upon a computing station for specific User(s) and will regulate the data operations that may take place between the computing stations and storage or content based on evaluation of the policy. Based on the evaluation of the policy, the requested operation is permitted, restricted in some areas, or denied. | 03-04-2010 |
Daniel Thanos, Stoufville CA
Patent application number | Description | Published |
---|---|---|
20150229516 | SYSTEMS AND METHODS FOR TOUCH-LESS COMMISSIONING OF INTELLIGENT ELECTRONIC DEVICES - The subject matter disclosed herein relates to intelligent electronic devices (IEDs), and, more specifically, to systems and methods for initial configuration or commissioning of IEDs after installation. In an embodiment, a system includes an intelligent electronic device (IED) configuring system having an IED that is configured with a wireless network configuration prior to deployment that enables the IED to automatically connect to a particular wireless network when it is detected. The IED configuring system also includes an IED configuring device configured to host the particular wireless network according to the wireless network configuration of the IED. Furthermore, the IED configuring device is configured to communicate a plurality of configuration settings to the IED via the wireless network to commission the IED once the IED has connected to the wireless network. | 08-13-2015 |
Daniel Thanos, Stouffville CA
Patent application number | Description | Published |
---|---|---|
20110208849 | METHOD AND SYSTEM FOR SECURITY MAINTENANCE IN A NETWORK - A system and method for monitoring a network and detecting network vulnerabilities is provided. A communication associated with one or more programs is issued to one or more devices in a network and the response from the devices is detected and analyzed. Based on the analysis, a device response is identified as a threat response if it represents at least an alert, an unexpected response or a response time-out indicating that the device did not response to the communication. The vulnerability of the network is determined based on the threat responses of the devices. | 08-25-2011 |
20130086635 | SYSTEM AND METHOD FOR COMMUNICATION IN A NETWORK - A method for providing secure communication in an electrical power distribution network includes detecting an enhanced threat level in the electrical power distribution network. A plurality of configuration command messages including information related to a common configuration command are received. The common configuration commands are certified if the plurality of configuration command messages have originated from a threshold number of command sites. The method further includes executing the certified configuration command. | 04-04-2013 |
20130086680 | SYSTEM AND METHOD FOR COMMUNICATION IN A NETWORK - A method for providing secure communication in an electrical power distribution network includes detecting an enhanced threat level in the electrical power distribution network. A threshold number of different configuration command shadows are received and processed to generate a configuration command data. A verified configuration command data is generated by comparing the configuration command data with a stored configuration commands and a verified configuration command related to the verified configuration command data is executed. | 04-04-2013 |
20140277801 | WIRELESS COMMUNICATION SYSTEMS AND METHODS FOR INTELLIGENT ELECTRONIC DEVICES - The embodiments described herein provide a system including an intelligent electronic device (IED) comprising a first processor configured to communicate control commands to power equipment, receive measurements from the power equipment, use a secure wireless system to send data to an access point, wherein the data includes the measurements, and use the secure system to communicate with a management device, via the access point, to receive configuration information, command information, or any combination thereof. | 09-18-2014 |
Daniel Thanos, Ontario CA
Patent application number | Description | Published |
---|---|---|
20120151589 | INTELLIGENT SYSTEM AND METHOD FOR MITIGATING CYBER ATTACKS IN CRITICAL SYSTEMS THROUGH CONTROLLING LATENCY OF MESSAGES IN A COMMUNICATIONS NETWORK - A system and method are provided for controlling the latency of messages to enable a network of devices to detect and respond to potential malware. The system and method receiving a message at a device and determining whether the message represents potential malware and requires a delay to allow time to detect and respond to potential malware. The amount of the delay associated with the message is determined and the message is processed based on the delay amount. | 06-14-2012 |
20150199530 | Systems and Methods With Cryptography and Tamper Resistance Software Security - Provided is an arbitrary automation system for secure communications. The system includes a utility device configured for processing critical data associated with the arbitrary automation system, the critical data being structured in accordance with utility device access levels. Also included is a key management module for (i) providing a data protection key (DPK) for protecting the critical data in accordance with each of the utility device access levels and (ii) generating a user key encryption key (UKEK) for encrypting the DPK based upon the device access levels. The system additionally includes a software module configured for masking an execution state of software within the utility device and the key management module via principles of evasion and resistance. | 07-16-2015 |