Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Tuch

Arounarith Tuch, Frankreich FR

Patent application numberDescriptionPublished
201002982212-PHENOXY NICOTINE ACID DERIVATIVE AND USE THEREOF - The present invention relates to novel 2-phenoxy-6-phenyl- and 2-phenoxy-6-pyridylnicotinic acid derivatives, to processes for their preparation, to their use for the treatment and/or prophylaxis of diseases and to their use for producing medicaments for the treatment and/or prophylaxis of diseases, preferably for the treatment and/or prophylaxis of cardiovascular disorders, especially of dyslipidemias, arteriosclerosis and heart failure.11-25-2010

David Tuch, Hertfordshire GB

Patent application numberDescriptionPublished
20150230696FIBRESCOPE FOR OPTICAL IMAGING OF RADIOPHARMACEUTICALS - An apparatus for optical imaging of Cerenkov luminescence from a region of interest on a subject subsequent to the subject receiving a dose of a radiopharmaceutical, the apparatus comprising: an imaging means capable of imaging Cerenkov photons; a fibrescope for transmitting light received at a distal end of the fibrescope to a proximal end of the fibrescope, the proximal end of the fibrescope being connected to the imaging means; and an optical shroud for surrounding the distal end of the fibrescope and for covering a region of interest.08-20-2015
20150241363SPECIMEN CHAMBER FOR OPTICAL IMAGING OF RADIOPHARMACEUTICALS - Apparatus for optical imaging of Cerenkov luminescence from an object subsequent to the object receiving a dose of a radiopharmaceutical, the apparatus comprising: a light tight enclosure within which the object can be received at a sample location; an imaging means; a means to mitigate direct particle impingement between the sample location and the imaging means; and one or more optical elements for transmitting Cerenkov photons from within the light tight enclosure to the imaging means.08-27-2015
20150373309METHOD AND APPARATUS FOR IMAGING OF LOW RADIANCE OBJECTS - An apparatus for optical imaging of a low radiance object is disclosed. The apparatus comprises a fixed polychromatic imaging device, the optical path between the polychromatic imaging device and the low radiance object being defined by a first section extending from the polychromatic imaging device to a fixed point, and a second section extending from the fixed point to the low radiance object. The apparatus also comprises a fixed high-sensitivity imaging device, the optical path between the high-sensitivity imaging device and the low radiance object being defined by a third section extending from the high-sensitivity imaging device to the fixed point, and the second section; and a focus controller arranged to control the focus of the high-sensitivity imaging device based on the focus of the polychromatic imaging device and the respective lengths of the first and third sections.12-24-2015

David Tuch, Chesham GB

Patent application numberDescriptionPublished
20150320892IMAGING FIBROSIS - The present invention provides a labelled compound suitable for use as an in vivo imaging agent. The in vivo imaging agent of the invention is useful in the in vivo diagnosis and imaging of fibrosis and in particular fibrosis in the liver. Also provided by the present invention is a method for the preparation of the labelled compound of the invention and a precursor compound useful in said method and a kit useful for carrying out said method. In addition, the present invention provides a pharmaceutical composition comprising the labelled compound of the invention as well as a method of in vivo imaging using the labelled compound of the invention, preferably as the pharmaceutical composition of the invention.11-12-2015

David Tuch, Rickmansworth GB

Patent application numberDescriptionPublished
20160097863METHOD AND APPARATUS FOR IMAGING OF RADIATION SOURCES - A fibrescope comprises a scintillator arranged to produce light of a first wavelength upon exposure to radiation; an optical system arranged to receive and direct light of the first wavelength emitted from the scintillator, the light being received at one end of the optical system, and wherein one or more elements of the optical system emits scintillation light of a second wavelength upon exposure to radiation; and an optical filter, disposed at the other end of the optical system, and arranged to transmit light of the first wavelength and block light of the second wavelength. The scintillator is chosen such that the light of the first wavelength is spectrally distinct from the light of the second wavelength.04-07-2016

Harvey Tuch, Cambridge, MA US

Patent application numberDescriptionPublished
20120151116VIRTUALIZING PROCESSOR MEMORY PROTECTION WITH "L1 ITERATE AND L2 DROP/REPOPULATE" - In a computing system including a processor and virtualization software including a guest operating system (OS) that utilizes a guest domain access control register (DACR) containing domain access information and guest page tables including first level page tables (L1 page tables) and second level page tables (L2 page tables), which guest page tables contain: (a) domain identifiers used to obtain domain access information from the guest DACR and (b) access permission information, wherein the domain access information and the access permission information are combined to provide an effective guest access permission, in accordance with one embodiment, a method for providing shadow page tables and processor DACR settings that virtualize processor memory protection includes: the virtualization software providing a shadow page table wherein: (a) domain identifiers in the shadow page table are used to identify domain access information in the processor DACR that are mapped from the domain access information in the guest DACR; and (b) access permissions in the shadow page table that are mapped from the effective access permission information in the guest page tables and guest DACR; wherein a memory management unit (MMU) in the processor traverses the shadow page table, accesses the processor DACR, and combines the mapped domain access information in the processor with the mapped access permission in the shadow page table to reflect the guest intended effective access permissions while isolating the guest from the virtualization software.06-14-2012
20120151117VIRTUALIZING PROCESSOR MEMORY PROTECTION WITH "DOMAIN TRACK" - Methods for providing shadow page tables that virtualize processor memory protection. In one embodiment, virtualization software maintains the following: (a) a mapping φ from guest domain identifier to a set of shadow L2 page tables that back guest L1 sections marked with a domain identifier; and (b) with each such shadow L2 page table, a set ω of back-pointers to “potentially referencing” shadow L1 descriptors.06-14-2012
20120151168VIRTUALIZING PROCESSOR MEMORY PROTECTION WITH "L1 ITERATE AND L2 SWIZZLE" - Methods for providing shadow page tables that virtualize processor memory protection. In one embodiment, two shadow L2 page tables are maintained for each section, for example, each 1 MB section, of guest address space covered by a shadow L1 descriptor.06-14-2012
20130054895COOPERATIVE MEMORY RESOURCE MANAGEMENT FOR VIRTUALIZED COMPUTING DEVICES - A computing device employs a cooperative memory management technique to dynamically balance memory resources between host and guest systems running therein. According to this cooperative memory management technique, memory that is allocated to the guest system is dynamically adjusted up and down according to a fairness policy that takes into account various factors including the relative amount of readily freeable memory resources in the host and guest systems and the relative amount of memory allocated to hidden applications in the host and guest systems.02-28-2013
20130054922COOPERATIVE MEMORY RESOURCE MANAGEMENT FOR VIRTUALIZED COMPUTING DEVICES - A computing device employs a cooperative memory management technique to dynamically balance memory resources between host and guest systems running therein. According to this cooperative memory management technique, memory that is allocated to the guest system is dynamically adjusted up and down according to a fairness policy that takes into account various factors including the relative amount of readily freeable memory resources in the host and guest systems and the relative amount of memory allocated to hidden applications in the host and guest systems.02-28-2013
20130145073MEMORY DEFRAGMENTATION IN A HOSTED HYPERVISOR - Machine memory fragmentation in a computer system having a host operating system and virtual machine running on a hypervisor hosted by the host operating system is reduced by having the hypervisor identify and release those machine memory pages that are more likely than others to reduce the fragmented state of the host machine memory.06-06-2013
20130185480STORAGE BALLOONING - One embodiment of the present invention provides a system for managing storage space in a mobile device. During operation, the system detects a decrease in available disk space in a host file system, wherein an image file for a guest system is stored in the host file system. In response to the detected decrease, the system increases a size of a balloon file in a storage of a guest system. The system then receives an indication of a TRIM or discard communication and intercepts the TRIM or discard communication. Next, the system determines that at least one block is free based on the intercepted TRIM or discard communication. Subsequently, the system frees a physical block corresponding to the at least one block in a storage of the host system and reduces a size of the image file for the guest system in accordance with the intercepted TRIM or discard communication.07-18-2013
20130185720USER-MODE SYSTEM-LEVEL MOBILE VIRTUALIZATION - One embodiment of the present invention provides a system that facilitates user-mode system-level virtualization in a mobile device. During operation, a hypervisor intercepts a virtual machine's attempt to access a privileged resource. The hypervisor manages the virtual machine and runs on a host system in a user mode. Furthermore, the hypervisor emulates the privileged resource using a user-mode system call provided by the host system. In addition, the hypervisor provides access to the emulated privileged resource to the virtual machine, thereby allowing the virtual machine to operate with the emulated privileged resource without directly accessing actual privileged resources on the host system.07-18-2013
20130254459BLOCK STORAGE VIRTUALIZATION ON COMMODITY SECURE DIGITAL CARDS - One embodiment of the present invention provides a system that facilitates storing an image file of a virtual machine on a potentially unprotected flash storage exhibiting sub-optimal non-sequential write performance on a mobile phone. During operation, the system stores in the flash storage data in a log-structured format and in a protected storage meta-data associated with the data stored in the flash storage. The system also checks integrity of the data stored in the flash storage using the meta-data in the protected storage.09-26-2013
20140059703Method and System to Impose Enterprise Security Mechanisms throughout a Mobile Application Lifecycle - Particular embodiments provide a method to authenticate a user of an application running on a mobile operating system (OS) installed on a mobile device, wherein the mobile OS invokes callback methods of the application upon making changes to an execution state of the application. Code embedded into the application causes the application to communicate with a management agent installed in the mobile OS upon invocation of a hooked callback method. Upon invocation of the hooked callback method, the embedded code assesses whether the user should be provided an authentication challenge prior to enabling the application to run in the foreground, and presents the authentication challenge if necessary. Finally, the embedded code returns execution control from the management agent back to the application wherein the application executes the at least one callback method prior to running in the foreground.02-27-2014
20140289510Configuration Profile Validation on iOS Based on Root Certificate Validation - An application management agent running on a wireless communications device restricts access to device functionality (e.g., applications and device features) unless the application management agent has determined that a particular configuration profile has been installed on the device (after which the application management agent permits access to device functionality, and an operating system of the device enforces policy settings specified in the configuration profile). The application management agent confirms the presence of the configuration profile by using a validation certificate to validate against a root certificate embedded in a configuration profile installed on the device. The configuration profile is configured to be non-removable, so it cannot be remove or updated, except by another configuration profile signed by the same authority. Validation against the embedded root certificate thereby implicitly confirms the presence of the configuration profile and validates the content of the configuration profile.09-25-2014
20140289511Configuration Profile Validation on iOS Using SSL and Redirect - An application management agent running on a wireless communications device restricts access to device functionality (e.g., applications and device features) unless the application management agent has determined that a particular configuration profile has been installed on the device (after which the application management agent permits access to device functionality, and an operating system of the device enforces policy settings specified in the configuration profile). The application management agent confirms the presence of the configuration profile by initiating an SSL handshake with a client certificate request for a client SSL certificate embedded in the configuration profile. Validation against the embedded client SSL certificate implicitly confirms the presence of the configuration profile and validates the content of the configuration profile.09-25-2014
20140359240VIRTUALIZING PROCESSOR MEMORY PROTECTION WITH "L1 ITERATE AND L2 DROP/REPOPULATE" - A computing system includes a guest domain access control register (DACR), and guest first and second level page tables, the page tables containing domain identifiers used to obtain domain access information and access permission information, and the domain access information and the access permission information providing an effective guest access permission. The computing system provides a shadow page table, in which domain identifiers are used to identify domain access information in a processor DACR that are mapped from domain access information in the guest DACR, and in which access permissions are mapped from effective access permission information in the guest page tables and guest DACR. A memory management unit in the processor traverses the shadow page table, accesses the processor DACR, and combines the mapped domain access information in the processor with the mapped access permission in the shadow page table to reflect the guest intended effective access permissions.12-04-2014
20150222637SECURE INTER-PROCESS COMMUNICATION AND VIRTUAL WORKSPACES ON A MOBILE DEVICE - In an example, a method of creating a secured workspace in a mobile device includes installing an application management agent on the mobile device, wherein the application management agent is configured to communicate with a remote server to obtain a security policy. The method further includes installing a wrapped enterprise application to the mobile device. The wrapped enterprise application includes code injected therein that, when executed by the mobile device, causes the mobile device to intercept at least a portion of instructions being executed by the wrapped enterprise application and to interpose alternative instructions that comply with the security policy. The method further includes communicating among the wrapped enterprise application, the application management agent, and other wrapped enterprise applications through pasteboard and uniform resource locator (URL) handlers provided by an operating system of the mobile device.08-06-2015
20150370590HYPERVISOR CONTEXT SWITCHING USING A TRAMPOLINE SCHEME IN PROCESSORS HAVING MORE THAN TWO HIERARCHICAL PRIVILEGE LEVELS - In a virtualized computer system operable in more than two hierarchical privilege levels, components of a hypervisor, which include a virtual machine kernel and virtual machine monitors (VMMs), are assigned to different privilege levels. The virtual machine kernel operates at a low privilege level to be able to exploit certain features provided by the low privilege level, and the VMMs operate at a high privilege level to support execution of virtual machines. Upon determining that a context switch from the virtual machine kernel to a VMM is to be performed, the computer system exits the low privilege level, and enters the high privilege level to execute a trampoline that supports context switches to VMMs, such as state changes, and then the VMM. The trampoline is deactivated after execution control is switched to the VMM.12-24-2015
20150370591HYPERVISOR CONTEXT SWITCHING USING A REDIRECTION EXCEPTION VECTOR IN PROCESSORS HAVING MORE THAN TWO HIERARCHICAL PRIVILEGE LEVELS - In a virtualized computer system operable in more than two hierarchical privilege levels, components of a hypervisor, which include a virtual machine kernel and virtual machine monitors (VMMs), are assigned to different privilege levels. The virtual machine kernel operates at a low privilege level to be able to exploit certain features provided by the low privilege level, and the VMMs operate at a high privilege level to support execution of virtual machines. Upon determining that a context switch from the virtual machine kernel to a VMM is to be performed, the computer system exits the low privilege level, and enters the high privilege level to execute a trampoline that supports context switches to VMMs, such as state changes, and then the VMM. The trampoline is deactivated after execution control is switched to the VMM.12-24-2015
20150370592HYPERVISOR CONTEXT SWITCHING USING TLB TAGS IN PROCESSORS HAVING MORE THAN TWO HIERARCHICAL PRIVILEGE LEVELS - In a virtualized computer system operable in more than two hierarchical privilege levels, components of a hypervisor, which include a virtual machine kernel and virtual machine monitors (VMMs), are assigned to different privilege levels. The virtual machine kernel operates at a low privilege level to be able to exploit certain features provided by the low privilege level, and the VMMs operate at a high privilege level to support execution of virtual machines. Upon determining that a context switch from the virtual machine kernel to a VMM is to be performed, the computer system exits the low privilege level, and enters the high privilege level to execute a trampoline that supports context switches to VMMs, such as state changes, and then the VMM. The trampoline is deactivated after execution control is switched to the VMM.12-24-2015
20150371036DEVICE SIMULATION IN A SECURE MODE SUPPORTED BY HARDWARE ARCHITECTURES - A secure mode of a computer system is used to provide simulated devices. In operation, if an instruction executing in a non-secure mode accesses a simulated device, then a resulting exception is forwarded to a secure monitor executing in the secure mode. Based on the address accessed by the instruction, the secure monitor identifies the device and simulates the instruction. The secure monitor executes independently of other applications included in the computer system, and does not rely on any hardware virtualization capabilities of the computer system.12-24-2015
20160028720CONFIGURATION PROFILE VALIDATION ON IOS USING SSL AND REDIRECT - An application management agent running on a wireless communications device restricts access to device functionality (e.g., applications and device features) unless the application management agent has determined that a particular configuration profile has been installed on the device (after which the application management agent permits access to device functionality, and an operating system of the device enforces policy settings specified in the configuration profile). The application management agent confirms the presence of the configuration profile by initiating an SSL handshake with a client certificate request for a client SSL certificate embedded in the configuration profile. Validation against the embedded client SSL certificate implicitly confirms the presence of the configuration profile and validates the content of the configuration profile.01-28-2016

Patent applications by Harvey Tuch, Cambridge, MA US

Ronald J. Tuch, Plymouth, MN US

Patent application numberDescriptionPublished
20080275544Medical devices for delivering a therapeutic agent and method of preparation - A method for making an intravascular stent by applying to the body of a stent a solution which includes a solvent, a polymer dissolved in the solvent and a therapeutic substance dispersed in the solvent and then evaporating the solvent. The inclusion of a polymer in intimate contact with a drug on the stent allows the drug to be retained on the stent during expansion of the stent and also controls the administration of drug following implantation. The adhesion of the coating and the rate at which the drug is delivered can be controlled by the selection of an appropriate bioabsorbable or biostable polymer and the ratio of drug to polymer in the solution. By this method, drugs such as dexamethasone can be applied to a stent, retained on a stent during expansion of the stent and elute at a controlled rate.11-06-2008
Website © 2016 Advameg, Inc.