Patent application number | Description | Published |
20110099376 | SYSTEMS AND METHODS FOR AUTHENTICATING AN ELECTRONIC TRANSACTION - Systems and methods for authenticating a request between a client computer and a transaction server are provided. An application request, comprising an identity of a user originating the request, is received at an application server from the client. The application server constructs a signing key based on (i) the identity of the user making the request, (ii) a time based salt value, (iii) a secret shared between the application and transaction servers and, optionally, (iv) an identifier of the distributor or developer of the application. The signing key is embedded in an unbranded version of the application thereby branding the application. The branded application can sign a request with the signing key and submit the signed request to the transaction server with the identity of the user and the identifier of the distributor or developer of the application. | 04-28-2011 |
20130019098 | SYSTEMS AND METHODS FOR AUTHENTICATING AN ELECTRONIC TRANSACTION - Systems and methods for authenticating a request between a client computer and a transaction server are provided. An application request, comprising an identity of a user originating the request, is received at an application server from the client. The application server constructs a signing key based on (i) the identity of the user making the request, (ii) a time based salt value, (iii) a secret shared between the application and transaction servers and, optionally, (iv) an identifier of the distributor or developer of the application. The signing key is embedded in an unbranded version of the application thereby branding the application. The branded application can sign a request with the signing key and submit the signed request to the transaction server with the identity of the user and the identifier of the distributor or developer of the application. | 01-17-2013 |
Patent application number | Description | Published |
20090307106 | PERFORMING AUTOMATICALLY AUTHORIZED PROGRAMMATIC TRANSACTIONS - Techniques are described for facilitating interactions between computing systems, such as by performing transactions between parties that are automatically authorized via a third-party transaction authorization system. In some situations, the transactions are programmatic transactions involving the use of fee-based Web services by executing application programs, with the transaction authorization system authorizing and/or providing payments in accordance with private authorization instructions previously specified by the parties. The authorization instructions may include predefined instruction rule sets that regulate conditions under which a potential transaction can be authorized, with the instruction rule sets each referenced by an associated reference token. After one or more of the parties to a potential transaction supply reference tokens for the parties, the transaction authorization system can determine whether to authorize the transaction based on whether the instruction rule sets associated with the reference tokens are compatible or otherwise satisfied. | 12-10-2009 |
20090307107 | PERFORMING AUTOMATICALLY AUTHORIZED PROGRAMMATIC TRANSACTIONS - Techniques are described for facilitating interactions between computing systems, such as by performing transactions between parties that are automatically authorized via a third-party transaction authorization system. In some situations, the transactions are programmatic transactions involving the use of fee-based Web services by executing application programs, with the transaction authorization system authorizing and/or providing payments in accordance with private authorization instructions previously specified by the parties. The authorization instructions may include predefined instruction rule sets that regulate conditions under which a potential transaction can be authorized, with the instruction rule sets each referenced by an associated reference token. After one or more of the parties to a potential transaction supply reference tokens for the parties, the transaction authorization system can determine whether to authorize the transaction based on whether the instruction rule sets associated with the reference tokens are compatible or otherwise satisfied. | 12-10-2009 |
20090307134 | PERFORMING AUTOMATICALLY AUTHORIZED PROGRAMMATIC TRANSACTIONS - Techniques are described for facilitating interactions between computing systems, such as by performing transactions between parties that are automatically authorized via a third-party transaction authorization system. In some situations, the transactions are programmatic transactions involving the use of fee-based Web services by executing application programs, with the transaction authorization system authorizing and/or providing payments in accordance with private authorization instructions previously specified by the parties. The authorization instructions may include predefined instruction rule sets that regulate conditions under which a potential transaction can be authorized, with the instruction rule sets each referenced by an associated reference token. After one or more of the parties to a potential transaction supply reference tokens for the parties, the transaction authorization system can determine whether to authorize the transaction based on whether the instruction rule sets associated with the reference tokens are compatible or otherwise satisfied. | 12-10-2009 |
20090307135 | PERFORMING AUTOMATICALLY AUTHORIZED PROGRAMMATIC TRANSACTIONS - Techniques are described for facilitating interactions between computing systems, such as by performing transactions between parties that are automatically authorized via a third-party transaction authorization system. In some situations, the transactions are programmatic transactions involving the use of fee-based Web services by executing application programs, with the transaction authorization system authorizing and/or providing payments in accordance with private authorization instructions previously specified by the parties. The authorization instructions may include predefined instruction rule sets that regulate conditions under which a potential transaction can be authorized, with the instruction rule sets each referenced by an associated reference token. After one or more of the parties to a potential transaction supply reference tokens for the parties, the transaction authorization system can determine whether to authorize the transaction based on whether the instruction rule sets associated with the reference tokens are compatible or otherwise satisfied. | 12-10-2009 |
20120296827 | PERFORMING AUTOMATICALLY AUTHORIZED PROGRAMMATIC TRANSACTIONS - Techniques are described for facilitating interactions between computing systems, such as by performing transactions between parties that are automatically authorized via a third-party transaction authorization system. In some situations, the transactions are programmatic transactions involving the use of fee-based Web services by executing application programs, with the transaction authorization system authorizing and/or providing payments in accordance with private authorization instructions previously specified by the parties. The authorization instructions may include predefined instruction rule sets that regulate conditions under which a potential transaction can be authorized, with the instruction rule sets each referenced by an associated reference token. After one or more of the parties to a potential transaction supply reference tokens for the parties, the transaction authorization system can determine whether to authorize the transaction based on whether the instruction rule sets associated with the reference tokens are compatible or otherwise satisfied. | 11-22-2012 |
20130205010 | WORKLOAD PATTERNS FOR REALISTIC LOAD RECREATION IN PERFORMANCE TESTING - Various technologies related to uniform resource locator (URL) sequence patterns are described. Such patterns can be used to determine a distribution of a mix of the URL sequence patterns occurring within given URL sequences. A production environment URL log can be analyzed using the technologies described herein to recreate a production environment load in a test environment. Transaction sequences and strongly coupled relationships can be supported. | 08-08-2013 |
20130238504 | PERFORMING AUTOMATICALLY AUTHORIZED PROGRAMMATIC TRANSACTIONS - Techniques are described for facilitating interactions between computing systems, such as by performing transactions between parties that are automatically authorized via a third-party transaction authorization system. In some situations, the transactions are programmatic transactions involving the use of fee-based Web services by executing application programs, with the transaction authorization system authorizing and/or providing payments in accordance with private authorization instructions previously specified by the parties. The authorization instructions may include predefined instruction rule sets that regulate conditions under which a potential transaction can be authorized, with the instruction rule sets each referenced by an associated reference token. After one or more of the parties to a potential transaction supply reference tokens for the parties, the transaction authorization system can determine whether to authorize the transaction based on whether the instruction rule sets associated with the reference tokens are compatible or otherwise satisfied. | 09-12-2013 |
Patent application number | Description | Published |
20110172700 | SYSTEM AND METHOD FOR TREATING ISCHEMIC STROKE - A thromboembolic removal system for treating ischemic stroke, including a guide and occlusion catheter, a delivery and aspiration catheter, an aspiration pump, a thromboembolic receiver, and a thromboembolic separator. | 07-14-2011 |
20110253525 | THIN FILM SHAPE MEMORY ALLOY DEVICE AND METHOD - A thin film device, such as an intravascular stent, is disclosed. The device is formed of a seamless expanse of thin-film (i) formed of a sputtered nitinol shape memory alloy, defining, in an austenitic state, an open, interior volume, having a thickness between 0.5-50 microns, having an austenite finish temperature A | 10-20-2011 |
20120116440 | SYSTEM AND METHOD FOR TREATING ISCHEMIC STROKE - A thromboembolic removal system for treating ischemic stroke, including a guide and occlusion catheter, a delivery and aspiration catheter, an aspiration pump, a thromboembolic receiver, and a thromboembolic separator. | 05-10-2012 |
20120150147 | SYSTEM AND METHOD FOR TREATING ISCHEMIC STROKE - A system for restoring blood flow through an occluded vessel in the cerebrovasculature is disclosed. The system includes a tubular element constructed of shape memory material eccentrically mounted on the distal end of an introducer. The walls of the tubular element are defined by standards and connectors, and the standards are oriented at an angle to the longitudinal axis of the tubular element. A method of manufacture of the system includes cutting a tube of shape memory material, conferring a twist on the cut tube, and heat setting the tube. The method further includes affixing the shape set tube to an introducer. A method of treatment using the system is also described. | 06-14-2012 |
20130261730 | ANEURYSM OCCLUSION SYSTEM AND METHOD - An aneurysm occlusion system includes a device positionable within a cerebral blood vessel covering a neck of an aneurysm on the blood vessel. The device includes an expandable tubular element having a lumen surrounded by a sidewall including a plurality of gaps. When expanded, the tubular element includes longitudinal standards arrayed helically in a proximal to distal direction. The standards support struts and the gaps are defined between adjacent struts and are sufficiently large to permit delivery of embolic coils or other embolic materials therethrough. | 10-03-2013 |
20140155931 | SYSTEM AND METHOD FOR TREATING ISCHEMIC STROKE - A thromboembolic removal system for treating ischemic stroke, including a guide and occlusion catheter, a delivery and aspiration catheter, an aspiration pump, a thromboembolic receiver, and a thromboembolic separator. | 06-05-2014 |
20140180377 | ANEURYSM OCCLUSION SYSTEM AND METHOD - An aneurysm occlusion system includes devices positionable within a cerebral blood vessel covering a neck of an aneurysm in the blood vessel. A component device includes an expandable tubular body, an expandable anchor, and a link connecting the body to the anchor. One or more devices deployed using a method according to the invention includes a novel feature that guarantees that the distal high coverage segment aligns with the neck of the aneurysm. A single device or multiple devices, used in conjunction with an embolic material or coil, may be combined to form a system according to the invention. When positioned and deployed strategically either alone or with a second device utilizing a method according to the invention, the system has a high coverage region covering a neck of an aneurysm, and a gap between the system and healthy vessel. The system and method prevent blood flow into an aneurysm while permitting blood flow through healthy vessel. | 06-26-2014 |
Patent application number | Description | Published |
20110282969 | METHOD AND SYSTEM FOR EXCHANGING INFORMATION BETWEEN BACK-END AND FRONT-END SYSTEMS - A system for exchanging information content between a back-end system within a restricted access environment and an end-user includes a front-end system and a manager node outside of the restricted environment, and an access node within the restricted environment. The front-end system executes a mini-application to output query data. The manager node receives the query data and applies business logic and connection parameters to generate a request for the information content in a first format. The manager node communicates the request to the access node in the first format. The access node converts the request to a second format particular to the back-end system, and conveys the request to the back-end system. Responses containing the information content are received at the access node from the back-end system. The access node converts the responses to the first format and sends information content contained in the responses to the front-end system via the manager node. | 11-17-2011 |
20130197931 | PREDICTIVE MEDICATION SAFETY - Methods for facilitating safe use of a medical item are provided. In one aspect, a method includes receiving a first identifier for a medical entity located in an institution. The medical entity includes at least one of a patient, medical device, medical location, or medical item. The method also includes receiving a second identifier for a first course of action associated with the medical entity. The method further includes generating, based on a history of the medical entity and the first course of action associated with the medical entity, a second course of action for the medical entity, and providing a notification to a device indicating the second course of action. Systems and machine-readable media are also provided. | 08-01-2013 |
20130204433 | PATIENT-SPECIFIC MEDICATION MANAGEMENT SYSTEM - Systems for use with a medical device for reducing medication errors are provided. In one aspect, a system includes a medical device that is configurable with operating limit parameters for providing medication to a patient, and a limiting system. The limiting system includes a memory that includes patient-specific information for the patient and a database includes acceptable operating parameters for providing the medication to the patient using the medical device, and a processor. The processor is configured to compare the acceptable operating parameters with the patient-specific information, and provide a modification of the operating limit parameters for providing the medication to the patient based on the comparison of the acceptable operating parameters with the patient-specific information. Methods and machine-readable media are also provided. | 08-08-2013 |
20130318152 | METHOD AND SYSTEM FOR EXCHANGING INFORMATION BETWEEN BACK-END AND FRONT-END SYSTEMS - A system for exchanging information content between a back-end system within a restricted access environment and an end-user includes a front-end system and a manager node outside of the restricted environment, and an access node within the restricted environment. The front-end system executes a mini-application to output query data, wherein the mini-application is created using a mini-application designer, builder and plugin. The manager node receives the query data and applies business logic and connection parameters to generate a request for the information content in a first format. The manager node communicates the request to the access node in the first format. The access node converts the request to a second format particular to the back-end system, and conveys the request to the back-end system. Responses are received at the access node from the back-end system, converted to the first format and sent to the front-end system. | 11-28-2013 |
20140006041 | TRACKING VENTILATOR INFORMATION FOR REPORTING A VENTILATOR-ASSOCIATED EVENT | 01-02-2014 |
20150250948 | PATIENT-SPECIFIC MEDICATION MANAGEMENT SYSTEM - Systems for use with a medical device for reducing medication errors are provided. In one aspect, a system includes a medical device that is configurable with operating limit parameters for providing medication to a patient, and a limiting system. The limiting system includes a memory that includes patient-specific information for the patient and a database includes acceptable operating parameters for providing the medication to the patient using the medical device, and a processor. The processor is configured to compare the acceptable operating parameters with the patient-specific information, and provide a modification of the operating limit parameters for providing the medication to the patient based on the comparison of the acceptable operating parameters with the patient-specific information. Methods and machine-readable media are also provided. | 09-10-2015 |
Patent application number | Description | Published |
20120017046 | UNIFIED MANAGEMENT OF STORAGE AND APPLICATION CONSISTENT SNAPSHOTS - A storage management application of a storage array is operable to create a new volume on the storage device array, and to automatically configure, responsive to user selection of an application protection profile, data protection services for application data to be stored on the volume, and/or, responsive to user selection of an application performance profile, application specific performance parameters. The application protection profile specifies scheduling and replication of snapshots for application data to be stored on the volume, and the application performance profile specifies performance parameters such as setting a block size, enabling or modifying a data caching algorithm, turning on or modifying data compression, etc. The scheduling, replication and/or application performance may be managed by a daemon associated with the storage management application which communicates with an agent associated with an application server on which the application executes. | 01-19-2012 |
20150067413 | METHODS FOR TRANSITIONING CONTROL BETWEEN TWO CONTROLLERS OF A STORAGE SYSTEM - Described herein are methods for transitioning control between a first and second controller of a storage system. In such transition, the first controller transmits a message to a memory element shared by the first and second controllers, the message capable of notifying the second controller of an imminent failure of the first controller. The second controller receives the message from the shared memory element, the message notifying the second controller of an imminent failure of the first controller. Subsequent to transmitting the message to the shared memory element, the first controller becomes unavailable to facilitate access to the storage devices of the storage system. Subsequent to receiving the message from the shared memory element, the second controller becomes available to facilitate access to the storage devices of the storage system. | 03-05-2015 |
20150067414 | METHODS FOR TRANSITIONING CONTROL BETWEEN TWO CONTROLLERS OF A STORAGE SYSTEM - Described herein are techniques for transitioning control between a first and second controller of a storage system. In such transition, the first controller transmits a message to a memory element shared by the first and second controllers, the message capable of notifying the second controller of an imminent failure of the first controller. The second controller receives the message from the shared memory element, the message notifying the second controller of an imminent failure of the first controller. Subsequent to transmitting the message to the shared memory element, the first controller becomes unavailable to facilitate access to the storage devices of the storage system. Subsequent to receiving the message from the shared memory element, the second controller becomes available to facilitate access to the storage devices of the storage system. | 03-05-2015 |
Patent application number | Description | Published |
20140007195 | User Authentication of Applications on Third-Party Devices Via User Devices | 01-02-2014 |
20140215006 | TECHNIQUES FOR CONTACT EXPORTING - Techniques for contact exploring are described. An apparatus may comprise a web component and a data retrieval component. The web component may be operative to receive a remote command from a web server, and to transmit a plurality of contacts to the web serve. The data retrieval component operative to retrieve the plurality of contacts from a contacts storage on the device in response to the received remote command. Other embodiments are described. | 07-31-2014 |
20150201033 | CONTENT SPECIFIC ROUTER CACHING - A method of operating a router is disclosed. The method may include updating a data object to or from a router cache of the router. For example, the router may store or distribute the data object by determining whether a client device in a local network established by the router stores a version of the data object different from a version on the router cache. For another example, the router may store the data object based on a cacheable tag associated with the data object, the cacheable tag indicating that the data object is intended by a content server system to be cached in the router cache. | 07-16-2015 |
20150237044 | User Authentication of Applications on Third-Party Devices Via User Devices - In one embodiment, a first computing device receives an access token from a second computing device, the access token being generated by the second computing device for a specific software application executing on a specific computing device; stores the access token; receives a request for the access token from a software application executing on a third computing device; verifies whether the software application is the same as the specific software application and the third computing device is the same as the specific computing device for which the access token is generated; and sends the access token to the third computing device only when the software application is the same as the specific software application and the third computing device is the same as the specific computing device for which the access token is generated. | 08-20-2015 |
Patent application number | Description | Published |
20150038211 | SYSTEM AND METHOD FOR ALLOWING PLAYERS TO PLAY MATCHING GAMES HAVING PATHS FORMED BETWEEN SYMBOLS - A method for allowing players to play a bingo-type game with a gaming system is described herein. The method includes displaying the bingo-type game on the display device, randomly selecting a plurality of player symbols, randomly selecting a plurality of game symbols, determining if each one of the plurality of game symbols matches a corresponding one of the plurality of player symbols, and determining a game outcome of the bingo-type game as a function of the matched player symbols. The method also includes determining if a triggering condition occurs in the game outcome and responsively providing an award to the player if the triggering condition occurs. The triggering condition is defined as a path extending between the origin symbol and the destination symbol and including at least one matched player symbol. | 02-05-2015 |
20150141110 | SYSTEM AND METHOD FOR ALLOWING PLAYERS TO PLAY MATCHING GAMES HAVING SYMBOL GROUPS - A system for allowing players to play a bingo-type game with a user computing device is described herein. The system includes a database including a plurality of bingo symbols and a system controller coupled to the database. The system controller is configured to receive a request from a player to play the bingo-type game and responsively display the bingo-type game on the at least one user computing device. The system controller is configured to determine a plurality of symbol groups included in the bingo-type game, randomly select a set of bingo symbols, and displays the selected set of bingo symbols with respect to the symbol grid. Each symbol group includes a predefined set of bingo symbols. The set of bingo symbols including a bingo symbol selected from each one of the symbol groups. Each bingo symbol in the set of bingo symbols is displayed simultaneously. | 05-21-2015 |
20150141111 | SYSTEM AND METHOD FOR ALLOWING PLAYERS TO PLAY MATCHING GAMES WITH CARD SYMBOLS - A system for allowing players to play a bingo-type game is described herein. The system includes a system controller that is coupled to a plurality of user computing devices. The system controller is configured to display the bingo-type game including a plurality of symbol positions being displayed in a grid. Each symbol position is associated with a card symbol. The system controller randomly selects a plurality of player symbols, displays the player symbols in the symbol positions, randomly selects a plurality of bingo symbols, determines if each one of the plurality of bingo symbols matches a corresponding one of the plurality of player symbols, identifies each card symbol associated with each matched player symbol, determines a combination formed by each of the identified card symbols, and provides the player an award if the determined combination of card symbols forms a winning combination. | 05-21-2015 |