Patent application number | Description | Published |
20100124849 | Electrical Box - In one embodiment, an electrical box can comprise: a container formed from a base having sides extending therefrom to define a cavity; a cover configured to cover the cavity when in a closed position; and a female electrical connector disposed in the cavity when the cover is in the closed position. A socket of the female electrical connector can be capable of receiving a male electrical connector. Even when the electrical box is connected to live wiring, when the cover is in an open position, current cannot flow to the socket, and when the cover is in a closed position, current can flow to the socket. In another embodiment, an electrical box can comprise: a container; a cover configured to cover the cavity when in a closed position; and a female electrical connector physically connected to the cover such that the female electrical connector moves as the cover is opened. | 05-20-2010 |
20100265715 | Adjustable, Outdoor Light Unit, and Method for Making and Using the Same - In one embodiment, a light comprises: a body portion, a base, and an electrical power cord connected to the body and capable of establishing electrical communication between the light source and an electricity source. The body portion can comprise a lens, a light source, a reflector, a body connection, and a focusing element. The focusing element can be configured to create relative movement between the light source and the reflector, such that, when in use, a spread of a light beam from the light source can be adjusted. The base comprise can comprise a mounting element and a base connector capable of connecting to the body connection. | 10-21-2010 |
20110117760 | ELECTRICAL BOX - In one embodiment, a female electrical connector comprises a socket having slots and electrical contacts. At least one of the electrical contacts can be movable between an open electrical circuit position where the electrical contacts are not in electrical communication and the socket is electrically inactive and a closed electrical circuit position where the electrical contacts are in electrical communication and the socket is electrically active. In one embodiment, an electrical box can comprise a container formed from a base having sides extending therefrom to define a cavity and the female electrical connector. | 05-19-2011 |
Patent application number | Description | Published |
20100280104 | METHODS AND KITS FOR DIAGNOSIS AND TREATMENT OF CELL-CELL JUNCTION RELATED DISORDERS - We have discovered that loss of Filamin A function results in weakened cell-cell junctions and vascular defects in genetically engineered mice. In addition, we have shown that patients with mutations in the gene coding for Filamin A exhibit high rates of cardiovascular disorders. On the basis of this discovery, the present invention features methods and kits for diagnosis of cell-cell junction related disorders (e.g., atherosclerosis, aortic aneurysm, or any disease described herein), as well as screening methods | 11-04-2010 |
20110236953 | EMBRYONIC CEREBROSPINAL FLUID (e-CSF), PROTEINS FROM e-CSF, AND RELATED METHODS AND COMPOSITIONS - We have performed a proteomic analysis of embryonic cerebrospinal fluid (e-CSF) in human and rats. Based on this discovery, the invention features methods and compositions for cell culture including components of e-CSF or fragments thereof. Also provided are methods for extraction of e-CSF. | 09-29-2011 |
20130288993 | METHOD FOR DIAGNOSIS AND METHOD OF TREATMENT OF AUTISM SPECTRUM DISORDERS AND INTELLECTUAL DISABILITY - We provide a set of novel mutations in HIST3H3, AMT, GLDC and PEX7 genes which we have discovered as causative of some autism spectrum disorders and/or intellectual disability after analysis of families with more than one affected child and with consanguineous parents. Based on some of these mutations, we also provide novel treatment options for autism spectrum disorders and/or intellectual disability wherein the novel mutations have been diagnosed. The invention is based on the discovery that certain specific mutations, particularly when present in a homozygous, compound heterozygous, or trans heterozygous combinations, result in a phenotype of an autism spectrum disorder and/or intellectual disability. Some mutations also cause the disorder or disease as heterozygous mutation. | 10-31-2013 |
Patent application number | Description | Published |
20110040216 | Exoskeletons for running and walking - An exoskeleton worn by a human user consists of a rigid pelvic harness, worn about the waist of the user, and exoskeleton leg structures, each of which extends downwardly alongside one of the human user's legs. The leg structures include hip, knee, and ankle joints connected by adjustable length thigh and shin members. The hip joint that attaches the thigh structure to the pelvic harness includes a passive spring or an active actuator to assist in lifting the exoskeleton and the human user with respect to the ground surface upon which the user is walking and to propel the exoskeleton and human user forward. A controllable damper operatively arrests the movement of the knee joint at controllable times during the walking cycle and a spring located at the ankle and foot member stores and releases energy during walking. | 02-17-2011 |
20150173993 | SOFT EXOSUIT FOR ASSISTANCE WITH HUMAN MOTION - In at least one aspect, there is provided a system for generating force about one or more joints including a soft exosuit having a plurality of anchor elements and at least one connection element disposed between the plurality of anchor elements. The system also includes at least one sensor to determine a force the at least one connection element or at least one of the plurality of anchor elements and to output signals relating to the force, at least one actuator configured to change a tension in the soft exosuit and at least one controller configured to receive the signals output from the at least one sensor and actuate the at least one actuator responsive to the received signals. | 06-25-2015 |
20150321339 | SOFT EXOSUIT FOR ASSISTANCE WITH HUMAN MOTION - In at least one aspect, there is provided a system for generating force about one or more joints including a soft exosuit having a plurality of anchor elements and at least one connection element disposed between the plurality of anchor elements. The system also includes at least one sensor to determine a force the at least one connection element or at least one of the plurality of anchor elements and to output signals relating to the force, at least one actuator configured to change a tension in the soft exosuit and at least one controller configured to receive the signals output from the at least one sensor and actuate the at least one actuator responsive to the received signals. | 11-12-2015 |
20160030073 | SYSTEM AND METHOD FOR LAPAROSCOPIC MORCELLATOR - Embodiments of the invention provide a laparoscopic morcellating device and method for removing tissue from a body cavity. The morcellating device includes a containment mechanism having an aperture, a cutting mechanism designed to fit into an interior space of the containment mechanism and a retractor mechanism that is coupled to the cutting mechanism. The containment mechanism and cutting mechanism combination surrounds the tissue and the aperture of the containment mechanism is closed around the tissue. The morcellating device further includes a motor for actuating the retractor such that the cutting mechanism constricts and morcellates the tissue. The laparoscopic morcellating device further allows for torque balancing of the retractor mechanism, gas flow regulation of the body cavity, and safety feedback mechanisms that can alert the surgeon. | 02-04-2016 |
20160107309 | Soft Exosuit for Assistance with Human Motion - A motion control system includes an actuator having an actuation member, the actuation member having a proximal end attached to the actuator on a first side of a joint and a distal end attached to an anchor element attachment point on a second side of the joint. A first sensor is configured to output signals defining a gait cycle and a second sensor is configured to output signals representing a tensile force in the at least one actuation member. A controller receives the output signals from the sensors and actuates the actuator, during a first portion of the gait cycle, to apply a force greater than a predetermined threshold tensile force to the anchor element attachment point via the actuation member to generate a beneficial moment about the joint and to automatically actuate the actuator. | 04-21-2016 |
Patent application number | Description | Published |
20090222878 | SYSTEMS AND METHODS FOR A SECURE GUEST ACCOUNT - An embodiment relates generally to a method of creating a secure environment in a computer device. The method includes providing a secure guest account in a multi-user operating system and enforcing a policy on the secure account to allow a user to log-in to the secure guest account while preventing access at least one network port of the computer device. The method also includes enforcing a rule to allow the secure guest account access to an application and the at least one network port. | 09-03-2009 |
20100131559 | ISOLATING AN EXECUTION CONTAINER IN A SYSTEM WITH MANDATORY ACCESS CONTROL (MAC) - Preventing a process from traversing back a directory tree through its parent directories is described. In a system with a program executing in a path container, an access permission rule applicable to the instance of the program prevents the program from traversing the tree structure back through its parent directories towards an absolute root directory. The access permission rule may be a rule in an instance of a security policy applicable to the particular path container from which the process is executing. | 05-27-2010 |
20100132011 | Mechanism to Implement Security in Process-Based Virtualization - In one embodiment, a mechanism to implement security in process-based virtualization is disclosed. In one embodiment, a method includes maintaining a security policy for a process-based virtualization system, initializing a virtual machine (VM) in the process-based virtualization system, assigning a security label to the VM, and enforcing the security policy on the VM based on the security label of the VM in order to isolate the VM from other VM's in the process-based virtualization system. | 05-27-2010 |
20100132012 | MERGING MANDATORY ACCESS CONTROL (MAC) POLICIES IN A SYSTEM WITH MULTIPLE EXECUTION CONTAINERS - Application of a local instance of a general security policy is described. In a system with an instance of a program executing in a path container, a security policy applicable the the instance of the program is managed locally for the path container. The path container provides a confined execution environment for the program instance, and the security policy defines permitted operations for the program an all its instances. The instance of the security policy is associated with the path container, which allows the program instance to “see” management within the path container as though with the security policy, while entities having permissions outside the path container “see” the program instance limited to the path container and its associated security policy instance. | 05-27-2010 |
20100132013 | RELIABLY TERMINATING PROCESSES IN A SYSTEM WITH CONFINED EXECUTION ENVIRONMENTS - Terminating a process executing within a container is described. An access restriction applicable to the process is temporarily modified with a policy change that prevents creating new processes within the container. The policy change prevents operations that would allow processes within the container from performing a fork operation, or otherwise spawning new processes within the container. The policy change may be, for example, applied by means of a rule added or removed from an access restriction policy. While the processes are prevented from creating new processes, one specified process or all processes within the container are terminated. After termination of the process(es), the policy change can be reversed, allowing normal use of the container. | 05-27-2010 |
20110047613 | SYSTEMS AND METHODS FOR PROVIDING AN ISOLATED EXECUTION ENVIRONMENT FOR ACCESSING UNTRUSTED CONTENT - A sandbox tool can cooperate with components of a secure operating system to create an isolated execution environment for accessing untrusted content without exposing other processes and resources of the computing system to the untrusted content. The sandbox tool can allocate resources (storage space, memory, etc) of the computing system, which are necessary to access the untrusted content, to the isolated execution environment, and apply security polices of the operating system to the isolated execution environment such that untrusted content running in the isolated execution environment can only access the resources allocated to the isolated execution environment. | 02-24-2011 |
20110154431 | SYSTEMS AND METHODS FOR PROVIDING MULTIPLE ISOLATED EXECUTION ENVIRONMENTS FOR SECURELY ACCESSING UNTRUSTED CONTENT - A sandbox tool can create and maintain multiple isolated execution environments, simultaneously. The sandbox tool can assign a unique security label to each isolated execution environment. In order to ensure the security labels are unique, the sandbox tool, for each security label, can bind a communication socket in an abstract name space of the operating system with a name that is the same as the security label. If the operating system returns an error that the name for the communication socket is already in use, the sandbox tool can determine that the security label is already in use by another isolated execution environment or other process. | 06-23-2011 |
20110296487 | SYSTEMS AND METHODS FOR PROVIDING AN FULLY FUNCTIONAL ISOLATED EXECUTION ENVIRONMENT FOR ACCESSING CONTENT - A sandbox tool can cooperate with components of a secure operating system to create an isolated execution environment for accessing content without exposing other processes and resources of the computing system to the untrusted content. The sandbox tool can create the isolated execution environment with an assigned security context of the secure operating system. The security context can define the security policies applied by the operating system to the isolated execution environment, thereby, defining the levels of access the isolated execution environment has to the resources of the computing system. | 12-01-2011 |
20120167048 | SYSTEMS AND METHODS FOR BUILDING SOFTWARE PACKAGES IN SECURE DEVELOPMENT ENVIRONMENTS - The mock tool can be configured to create a mock execution environment for building software packages. The mock execution environment is isolated from resources of the computing system supporting the mock execution environment and other mock execution environments. Further, the mock execution environment can be created to simulate disabling on any features of the operating system supporting the mock execution environment that could cause problems in the building the software packages. | 06-28-2012 |
20120167157 | SYSTEMS AND METHODS FOR SECURE SOFTWARE DEVELOPMENT ENVIRONMENTS - The mock tool can be configured to create a mock execution environment for supporting software development processes. The mock execution environment is isolated from resources of the computing system supporting the mock execution environment and other mock execution environments. Further, the mock execution environment can be created to simulate disabling on any features of the operating system supporting the mock execution environment that could cause problems in the software development process. | 06-28-2012 |
20130086623 | SYSTEMS AND METHODS FOR ESTABLISHING ISOLATION BETWEEN CONTENT HOSTING SERVICES EXECUTING ON COMMON SUPPORT SERVER - Embodiments relate to systems and methods for establishing isolation between content hosting services executing on a common support server. In aspects, a server virtualization platform can operate on a common physical support server to instantiate, configure, and operate a set of virtual servers. The set of virtual servers can, for instance, be used to run independent Web sites or other locations or services. The data available to each process on each virtual server can be encoded using an SELinux™ label including an MCS (multi-category security) category or categories uniquely identifying that process. Isolation of the potentially sensitive data for multiple Web sites and/or their content hosted on a common physical server can therefore be enforced, since each process operating on each virtual server is restricted to only access and manipulate data objects or other entities having matching MCS category information identified on that baremetal support server. | 04-04-2013 |
20130227561 | Mechanism for Applying a Custom Security Type Label to Multi-Tenant Applications of a Node in a Platform-as-a-Service (PaaS) Environment - A mechanism for applying security category labels to multi-tenant applications of a node in a PaaS environment is disclosed. A method of embodiments includes receiving, by a virtual machine (VM) executing on a computing device, a custom security type label (STL) and a custom security policy associated with the custom STL, the custom STL and associated custom security policy applied to one or more multi-tenant applications executed by the VM. The method further include receiving a request to initialize an application on the VM, the request identifying the custom STL as an STL to apply to the application, assigning a local UID maintained by the VM to the application, recording a mapping of the assigned local UID to the custom STL, assigning the custom STL to files of the application, and assigning the custom STL to a running process of the application. | 08-29-2013 |
20130227635 | Mechanism for Applying Security Category Labels to Multi-Tenant Applications of a Node in a Platform-as-a-Service (PaaS) Environment - A mechanism for applying security category labels to multi-tenant applications of a node in a PaaS environment is disclosed. A method of embodiments includes generating, by a virtual machine (VM), a unique security category label (SCL) for each local user identification (UID) maintained by the VM, assigning, for each local UID maintained by the VM, the unique SCL associated with the local UID to one or more Internet Protocol (IP) addresses mapped to the local UID, receiving a request to initialize an application on the VM, assigning a local UID of the local UIDs maintained by the VM to the application, assigning files of the application the unique SCL associated with the local UID of the application, and assigning the unique SCL associated with the local UID of the application to a running process of the application. | 08-29-2013 |
20130332981 | METHOD AND SYSTEM FOR EXTENDING SELINUX POLICY WITH ENFORCEMENT OF FILE NAME TRANSLATIONS - An operating system identifies a request of a process to create, in a file system of the computing device, a new object, the new object having a name. The operating system identifies a policy rule applicable to the new object using a label of the process, a label of a parent object pertaining to the new object, a class of the new object, and the name of the new object. The operating system creates a label for the new object using the applicable policy rule and associates the new object with the associated label. | 12-12-2013 |
20140075495 | METHOD AND SYSTEM FOR FACILITATING SECURE FILE CREATION USING SELINUX POLICIES - An operating system identifies a request of a process to create, in a file system of the computing device, a new object. The operating system creates an object label for the new object, identifies one or more security policy rules applicable to the process, and verifies whether the process is authorized to create the new object with the object label in the file system of the computing device using the applicable security policy rules. When the process is authorized to create the new object with the object label, the operating system creates the new object with the object label in the file system of the computing device. When the process is not authorized to create the new object with the object label, an error message is generated. | 03-13-2014 |
20140215202 | EXTENSION OF A PLATFORM CONFIGURATION REGISTER WITH A KNOWN VALUE - A computing system calculates a hash value of binary of a component of the computing system using a hash function and determines whether a signature that is associated with the binary of the component is valid. A trusted platform module in the computing system extends a platform configuration register value in the trusted platform module using a known value that is associated with the binary if the signature is valid. | 07-31-2014 |
20150304357 | EXTENDING SELINUX POLICY WITH ENFORCEMENT OF FILE NAME TRANSLATIONS - An operating system identifies a request of a process to create a new object with a name in a file system of the processing device. The operating system identifies a policy rule applicable to the new object in view of at least the name of the new object. The operating system creates a label for the new object using the applicable policy rule and associates the new object with the created label. | 10-22-2015 |
Patent application number | Description | Published |
20090240284 | STABILIZATION RODS - A rod, such as that used for spinal stabilization, made of both metal material and elastomeric material. The rod may have a metal infrastructure, which may be non-cylindrical, to provide a desired stiffness for bending in at least one direction and may also have metal exterior surfaces for engaging metal components of spinal fixation locking mechanisms. In addition, the elastomeric material may only partially circumferentially encapsulate the metal material so that the metal material forms part of the surface of the rod. | 09-24-2009 |
20100023061 | LOCKING MECHANISM WITH TWO-PIECE WASHER - Locking mechanisms and methods of fixation, such as the fixation of a fixation device like a bone screw and of a rod to the spine. The locking mechanism includes a body, a rod seat and a set screw. The rod seat is configured to separate into two pieces when the rod exerts force on the top portion of the washer and the set screw limits movement of the washer toward the bottom of the locking mechanism. | 01-28-2010 |
20100152787 | SPINAL FIXATION ASSEMBLY - A locking mechanism ( | 06-17-2010 |
20100160980 | SPINAL FIXATION ASSEMBLY - A locking mechanism ( | 06-24-2010 |
20110196430 | SPINAL FIXATION ASSEMBLY WITH INTERMEDIATE ELEMENT - A novel locking mechanism including a body and intermediate element and a method for locking the relative positions of a rod and a screw. The intermediate element is adapted to receive a rod and a head of a screw and is located between the rod and the head of the screw. The intermediate element has a non-circular shape such that at least one large non-contact area exists when the intermediate element is in contact with the head of the screw and the locking mechanism is fully engaged. The body is adapted to maintain the orientation of the non-circular intermediate element with respect to the body. The body also has at least one structure defining at least one distinct temporary stopping point for the intermediate element above the final locking position. | 08-11-2011 |
20130090690 | Dynamic Rod Assembly - A dynamic rod assembly, such as that used for spinal stabilization, made of a number of interlocking segments whereby a limited amount of relative motion is permitted between each pair of adjacent segments. The dynamic rod assembly may also incorporate a separate central element that extends at least partially through a central channel within the interlocking segments to prevent the interlocking segments from disengaging while adding to the desired bending properties of the dynamic rod assembly. | 04-11-2013 |
20150313601 | MINIMALLY INVASIVE SURGICAL CLIP APPLIER - A surgical clip applier having an adjustable jaw open dimension, including an instrument body having jaws at a distal end and an actuator at a proximal end; an actuator shaft movable longitudinally relative to the instrument body to transmit actuating force from the actuator to the jaws; and an adjusting member threadedly engaged with the actuator shaft and configured to engage the instrument body at a jaw open position, wherein rotation of the adjusting member relative to the actuating shaft moves the adjusting member longitudinally relative to the actuating shaft to adjust a jaw open position of the jaws when the adjusting member contacts the instrument body. | 11-05-2015 |
Patent application number | Description | Published |
20090142336 | METABOLIC REGULATORS AND USES THEREOF - The present invention relates to metabolic regulators that affect metabolic function, for example metabolic regulators that affect muscle mass, muscle regeneration, muscle hypertrophy, fat mass, insulin and glucose sensitivity, angiogenesis and cardiovascular function. In particular, the present invention relates to modulating metabolic function by administering an effective amount of a pharmaceutical composition comprising an agent, where the agent activates or inhibits the activity and/or gene expression of the metabolic regulator. The metabolic regulators of the present invention are, for example MSP1 (2160028F08Rik; SEQ ID NO: 16); MSP2 (2310043I08Rik; SEQ ID NO: 17); MSP3 (NM_026754;1 110017116Rik; SEQ ID NO: 1); MSP4 (4732466D17Rik; SEQ BD NO: 18); MSP 5 (NM_024237; 1600015H20Rik; SEQ ID NO: 12); Ins16 (AF_156094; SEQ ID NO: 20). The present invention also provides methods to screen for agents that affect the metabolic regulators of the present invention. | 06-04-2009 |
20090326053 | DIAGNOSTIC USES OF FOLLISTATIN-LIKE 1 - The present invention generally relates to methods, systems and computer readable media for the diagnosis and/or prognosis of a cardiac stress and/or skeletal muscle stress in a subject. In particular, in one embodiment, the methods, systems and computer readable media detect a level of Fstl expression, such as Fstl1 polypeptide or mRNA expression in a biological sample obtained from a subject, where a high level relative to a reference Fstl expression level is indicative of a subject having, or is at risk of cardiac stress and/or skeletal muscle stress. In such embodiments, the method futher comprises administering or undertaking an appropriate therapy in a subject identified to have or be at risk of cardiac stress and/or skeletal muscle stress. Another aspect of the present invention relates to the methods, systems and computer readable media detect a level of Fstl expression, such as Fstl1 polypeptide or mRNA expression in a biological sample obtained from a subject where a low level relative to a reference Fstl expression level is indicative of a subject having, or is at risk of diabetes and/or metabolic dysfunction. In such embodiments, the method futher comprises administering or undertaking an appropriate therapy in a subject identified to have or be at risk of diabetes and/or metabolic dysfunction. | 12-31-2009 |
20100227817 | METABOLIC AND CARDIOPROTECTION BY THE MYOKINE FOLLISTATIN-LIKE 1 POLYPEPTIDE - Described herein are methods and compositions related to the discovery that the Follistatin-like 1 protein (Fstl-1) has metabolic and cardioprotective effects in vivo. Fstl-1 and portions and derivatives or variants thereof can be used to treat or prevent metabolic diseases or disorders and to treat or prevent cardiac damage caused by interrupted cardiac muscle blood supply. | 09-09-2010 |
20110191871 | METHODS TO IDENTIFY FACTORS ASSOCIATED WITH MUSCLE GROWTH AND USES THEREOF - The present invention relates to methods to identify factors associated with muscle growth, angiogenesis, obesity, insulin sensitivity body weight, fat mass, muscle mass and cardiovascular function. In particular, the methods of the present invention relates to assays to identify such factors using a transgenic animal model and/or a cell-based assay. | 08-04-2011 |
20110274689 | COMPOUNDS AND METHODS TO MEASURE METABOLIC FUNCTION AND RESTORE NORMAL METABOLIC FUNCTION - The invention relates to treatment to restore normal metabolic function, including but not limited to normal glucose levels. The invention in one embodiment contemplates methods of reducing elevated glucose levels in subjects with elevated glucose levels by administering a composition comprising at least a portion of human Sfrp5. The invention in one embodiment contemplates methods of reducing elevated glucose levels in subjects with elevated glucose levels by administering a composition comprising an inhibitor of Wnt5a, including but not limited to an antibody inhibitor. | 11-10-2011 |
20130035282 | METABOLIC AND CARDIOPROTECTION BY THE MYOKINE FOLLISTATIN-LIKE 1 POLYPEPTIDE - Described herein are methods and compositions related to the discovery that the Follistatin-like 1 protein (Fstl-1) has metabolic and cardioprotective effects in vivo. Fstl-1 and portions and derivatives or variants thereof can be used to treat or prevent metabolic diseases or disorders and to treat or prevent cardiac damage caused by interrupted cardiac muscle blood supply. | 02-07-2013 |
20140335108 | UTILITY OF INSULIN-LIKE 6 (INSL6) FOR THE TREATMENT OF AUTOIMMUNE DISEASES - The present invention is directed to compositions and methods to treat an autoimmune disease in a subject, comprising an insulin-like 6 (Insl6) agent, such as an Insl6 polypeptide or variant or fragment thereof, or a nucleic acid encoding Insl6 poly peptide or variant or fragment thereof. Aspects of the present invention relate to use of Insl6 agents to reduce T-regulatory (Treg) cells in the subject and to reduce pro-inflammatory cytokines in a subject with an autoimmune disease such as a muscle autoimmune disease. The present invention also relates to methods and kits for the treatment of autoimmune diseases in a subject, and methods to diagnose a subject with an autoimmune disease such as myositis. | 11-13-2014 |