en Ozonolysis operations for generation of reduced and/or oxidized product streams By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT The present invention relates to methods for safe and efficient use of hydrogen and oxygen in ozonolysis operations. The invention also relates to an ozonolysis process involving elements of both reductive and oxidative ozonolysis which are integrated in a continuous process. In one embodiment, the ozonolysis process of the present invention uses hydrogen and/or oxygen generated from water and electricity, which may be recycled to generate water and/or electricity. Full Article
en Process for the (AMM)oxidation of lower molecular weight alkanes and alkenes By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A process for producing unsaturated carboxylic acids or unsaturated nitriles by vapor phase oxidation reaction of their corresponding C3 to C5 alkanes, C3 to C5 alkenes, and mixtures thereof, as a hydrocarbon starting material, wherein the process performance is monitored and the path of gasses through catalyst beds is altered. Improved catalyst lifetimes may be achieved. Full Article
en Methods for production of high concentration of arginine bicarbonate solution at high pressure By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT Methods of producing arginine bicarbonate solutions in very high concentrations including reacting an arginine slurry containing a first portion of arginine with a source of carbon dioxide gas at elevated pressure and temperature, adding subsequent portions of arginine to the resulting solution and further reacting with compressed carbon dioxide until a final solution containing in excess of 50% by weight are provided which include preparing an arginine solution by subjecting an arginine water slurry to elevated pressure and temperature and reacting the arginine solution with a source of carbon dioxide gas to form a solution comprising arginine and bicarbonate anion and recovering arginine bicarbonate from the solution. Full Article
en Method for producing reduced coenzyme Q10, method for stabilizing same, and composition comprising same By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An object of the present invention is to provide a substance characterized by ability to reduce oxidized coenzyme Q10 and ability to stabilize reduced coenzyme Q10, which contains nutrients, has a favorable taste, and is excellent in general versatility, and a method for using the same. The present invention relates to a method for producing reduced coenzyme Q10 comprising reducing oxidized coenzyme Q10 with a particular amino acid. The present invention also relates to a method for stabilizing reduced coenzyme Q10 in the presence of a particular amino acid and a composition stabilized by the method. Full Article
en Hydrocarboxylation of aqueous formaldehyde using a dehydrating recycle stream to decrease water concentration By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Disclosed is a process for the production and purification of glycolic acid or glycolic acid derivatives by the carbonylation of aqueous formaldehyde. The water in the hydrocarboxylation zone is reduced via reaction with the ester bonds in a recycle stream comprising glycolic acid oligomers and/or methyl glycolate oligomers. Full Article
en Nucleic acids targeting TCTP for use in the treatment of chemo- or hormone-resistant cancers By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT The present invention concerns a TCTP antagonist, in particular a nucleic acid targeting an m RNA encoding Translationally-Controlled Tumor Protein (TCTP), wherein said nucleic acid is capable of reducing the amount of TCTP in cells, for use in the treatment or prevention of hormone-independent cancer or chemo-resistant cancer, such as an androgen-independent prostate cancer. Full Article
en Antisense modulation of PTP1B expression By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT Provided herein are methods, compounds, and compositions for reducing expression of PTP1B mRNA and protein in an animal. Such methods, compounds, and compositions are useful to treat, prevent, delay, or ameliorate metabolic disease, for example, diabetes, or a symptom thereof. Full Article
en Method to determine responsiveness of cancer to epidermal growth factor receptor targeting treatments By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT Disclosed herein are methods and reagents for determining the responsiveness of cancer to an epidermal growth factor receptor (EGFR) targeting treatment. The detection of these mutations will allow for the administration of gefitinib, erlotinib and other tyrosine kinase inhibitors to those patients most likely to respond to the drug. Full Article
en Compositions and methods for silencing SMAD4 By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT The present invention provides compositions comprising therapeutic nucleic acids such as interfering RNA (e.g., dsRNA such as siRNA) that target SMAD4 gene expression, lipid particles comprising one or more (e.g., a cocktail) of the therapeutic nucleic acids, methods of making the lipid particles, and methods of delivering and/or administering the lipid particles (e.g., for treating anemia of inflammation in humans). Full Article
en Antisense oligonucleotides for inducing exon skipping and methods of use thereof By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT An antisense molecule capable of binding to a selected target site to induce exon skipping in the dystrophin gene, as set forth in SEQ ID NO: 1 to 202. Full Article
en L-proline and citric acid co-crystals of (2S, 3R, 4R, 5S,6R)-2-(3-((5-(4-fluorophenyl)thiopen-2-yl)methyl)4-methylphenyl)-6-(hydroxymethyl)tetrahydro-2H-pyran-3,4,5-triol By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT The present invention is directed to L-proline and citric acid co-crystals of (2S,3R,4R,5S,6R)-2-(3-((5-(4-fluorophenyl)thiophen-2-yl)methyl)-4-methylphenyl)-6-(hydroxymethyl)tetrahydro-2H-pyran-3,4,5-triol, pharmaceutical compositions containing said co-crystals and their use in the treatment glucose-related disorders such as Type 2 diabetes mellitus and Syndrome X. Full Article
en Metabolically engineered cells for the production of resveratrol or an oligomeric or glycosidically-bound derivative thereof By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A recombinant micro-organism producing resveratrol by a pathway in which phenylalanine ammonia lyase (PAL) produces trans-cinnamic acid from phenylalanine, cinnamate 4-hydroxylase (C4H) produces 4-coumaric acid from said trans-cinnamic acid, 4-coumarate-CoA ligase (4CL) produces 4-coumaroyl CoA from said 4-coumaric acid, and resveratrol synthase (VST) produces said resveratrol from said 4-coumaroyl CoA, or in which L-phenylalanine- or tyrosine-ammonia lyase (PAL/TAL) produces 4-coumaric acid, 4-coumarate-CoA ligase (4CL) produces 4-coumaroyl CoA from said 4-coumaric acid, and resveratrol synthase (VST) produces said resveratrol from said 4-coumaroyl CoA. The micro-organism may be a yeast, fungus or bacterium including Saccharomyces cerevisiae, E. coli, Lactococcus lactis, Aspergillus niger, or Aspergillus oryzae. Full Article
en Cytosine analogue, a method of preparation of a cytosine analogue, a DNA methyltransferase 1 inhibitor, a method for DNA methylation inhibition, the use of the analogue in the treatment of diseases associated with deviations from normal DNA methylation By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A cytosine analog, a method of preparation of a cytosine analog, a DNA methyltransferase 1 inhibitor, and a method for DNA methylation inhibition, is provided for the treatment of diseases associated with deviations from normal DNA methylation. The analog of cytosine may be comprised of 1, N4, 5 and 6-substituted derivatives of cytosine or 5,6-dihydrocytosine, wherein the analog can be described by the chemical formula where R1 is H, R3, R4, 2'-deoxyribosyl, R4 is alkyl or aryl, X is N or C, wherein if X in the analog of formula I is N, then R5 is no substituent and if X in the analog of formula I and/or II is C or if X in the analog of formula II is N, then R5 and R6 are independently alkyl, aryl, hydroxyalkyl, aminoalkyl, hydroxyl, carboxyl, amino group, alkoxyl, aryloxyl, aminoalkyl, aminoaryl, thio group, sulfonyl, sulfinyl or halogen. Full Article
en RNA antagonists targeting GLI2 for the treatment of leukemia By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The present invention relates to oligomer compounds (oligomers) for the treatment and prevention of acute myeloid leukemia, which target GLI2 mRNA in a cell, leading to reduced expression of GLI2. Full Article
en RNAi-mediated inhibition of frizzled related protein-1 for treatment of glaucoma By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT RNA interference is provided for inhibition of Frizzled Related Protein-1 mRNA expression, in particular, for treating patients having glaucoma or at risk of developing glaucoma. Full Article
en Reduction of ALMS1 gene expression or inhibition of altröm protein to induce cardiomyocyte proliferation By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The present invention relates to the field of cardiology. More specifically, the present invention provides methods and compositions for inducing proliferation of cardiomyocytes. In a specific embodiment, a method for inducing proliferation of cardiomyocytes comprises the step of administering an effective amount of an ALMS1 inhibitor. Full Article
en Synthesis and identification of novel RSK-specific inhibitors By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A composition comprising an SL0101 [kaempferol 3-O-(3″,4″-di-O-acetyl-α-L-rhamnopyranoside)] derivative compound that has enhanced ability to inhibit RSK activity, relative to the parent compound is provided. The compounds have utility for treating any disease or conditions characterized or associated with excess or undesirable RSK activity. For example the RSK inhibitors of the present invention can be used to reduce the proliferation of neoplastic cells or for inhibiting the establishment or maintenance of an intracellular pathogenic infection by pathogens whose pathogenicity derives in part from the pathogen's ability to impede endosomal/phagosomal maturation in the host cell. Full Article
en Reagents useful for synthesizing rhodamine-labeled oligonucleotides By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The present disclosure provides reagents that can be used to label synthetic oligonucleotides with rhodamine dyes or dye networks that contain rhodamine dyes. Full Article
en Coating agent comprising hydroxyalkyl cellulose By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A coating agent containing a hydroxyalkyl cellulose in which a content of hydroxyalkoxy groups within the hydroxyalkyl cellulose is within a range of 40 to 50% by mass, preferably a coating agent containing a hydroxyalkyl cellulose in which the content of hydroxyalkoxy groups is within a range of 40 to 50% by mass and also a viscosity of 2% aqueous solution at 20° C. is within a range of 3.0 to 5.9 mPa·s; and a solid preparation coated with the coating agent. Full Article
en Implementing security measures for authorized tokens used in mobile transactions By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Security measures for tokens comprise storing security rules associated with a generated token in a memory. A processor, communicatively coupled to the memory, accesses the security rules associated with the generated token and determines whether to encrypt the generated token by applying at least a portion of the security rules to the generated token. The processor encrypts the generated token. An interface, communicatively coupled to the processor, communicates the encrypted token to a mobile device associated with a user. Full Article
en Multiple volume encryption of storage devices using self encrypting drive (SED) By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method for encrypting data on a disk drive using self encrypting drive is provided. The method includes encryption of data chunks of a computing device. The method further includes associating the encrypted data chunks with encryption key indexes of the computing device. Moreover, the method further includes receiving the encryption key indexes for given logical block addresses of the data chunks. The method further includes determining the encryption keys to be used to encrypt the data chunks based on the encryption key indexes of the data chunks to the disk drive. Full Article
en Discarding sensitive data from persistent point-in-time image By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A network storage server implements a method to discard sensitive data from a Persistent Point-In-Time Image (PPI). The server first efficiently identifies a dataset containing the sensitive data from a plurality of datasets managed by the PPI. Each of the plurality of datasets is read-only and encrypted with a first encryption key. The server then decrypts each of the plurality of datasets, except the dataset containing the sensitive data, with the first encryption key. The decrypted datasets are re-encrypted with a second encryption key, and copied to a storage structure. Afterward, the first encryption key is shredded. Full Article
en Efficient storage of encrypted data in a dispersed storage network By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method begins with a processing module obtaining data to store and determining whether substantially similar data to the data is stored. When the substantially similar data is not stored, the method continues with the processing module generating a first encryption key based on the data, encoding the first encryption key into encoded data slices in accordance with an error coding dispersal storage function, and storing the encoded data slices in a dispersed storage network (DSN) memory. The method continues with the processing module encrypting the data using an encryption key of the substantially similar data in accordance with an encryption function to produce encrypted data, compressing the encrypted data in accordance with a compression function to produce compressed data, storing the compressed data when the substantially similar data is stored. Full Article
en Method and apparatus for power management according to a situation mode By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The disclosure discloses a power management method, for setting a power supply arrangement of an electronic device intelligently, comprising providing at least two sensors, corresponding to at least one threshold respectively; detecting a state of the electronic device for generating a detecting signal respectively; comparing the at least two detecting signals with the at least one threshold corresponding to the at least two sensors respectively; generating at least two situation signals when the at least two detecting signals meet the at least one threshold corresponding to the at least two sensors respectively; looking up a look-up table according to the at least two detecting signals for generating a control command; and writing in at least one independent bit of a register according to the control command for changing or maintaining a power supply arrangement of at least one peripheral component. Full Article
en Resolution programmable dynamic IR-drop sensor with peak IR-drop tracking abilities By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A data processing system on an integrated circuit includes a core that performs switching operations responsive to a system clock that draws current from the power supply network. An IR-drop detector includes a resistor ladder having outputs representative of an IR-drop caused by the core during the switching operations. The system further includes a plurality of amplifiers coupled to the outputs indicative of the IR-drop, a plurality of flip-flops coupled to the amplifiers, and a variable clock generator. The variable clock generator outputs a sampling clock comprising a group consisting of a variable phase or a variable frequency to the plurality of flip-flops. The flip-flops are triggered by the sampling clock so that the IR-drop at a time during a clock cycle of the system clock can be detected, and the peak IR-drop value for can be tracked. Full Article
en Power-saving network management server, network system, and method of determining supply of power By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A power-saving network management server, which is coupled to a network system including a network device and manages a state of power to the network device, wherein the power-saving network management server is configured to: store network configuration information and task allocation information; determine starting or stopping of the power supply to the port of the network device based on the updated network configuration information and task allocation information; store a determination result of the starting or stopping of the power supply to the port as a port determination result; and control the power supply to the port of the network device based on the port determination result. Full Article
en Energy management device and power management system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An energy management system has an application storage, an application executing unit, a plurality of network interfaces, a policy setting unit configured to set whether each application should be permitted to access each of the network interfaces, a policy storage configured to store identification information for each application set by the policy setting unit, and access permit/inhibit information showing whether the application is permitted to access each of the network interfaces, an I/F management unit managing a correspondence relationship between a network address and each of the network interfaces, and to specify a network interface used by the application executed by the application executing unit, and an access controller configured to judge whether the application executed by the application executing unit is permitted to access the network interface to be used thereby, based on the access permit/inhibit information stored in the policy storage. Full Article
en Host initiated state control of remote client in communications system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system and method for low-cost, fault tolerant, EMI robust data communications, particularly for an EV environment. A data communications method, including a) enabling a transmission of a wake signal from a host to a remote client through an isolator disposed at the remote client when the wake signal is asserted from the host at a host-portion of the isolator concurrent with a periodic enablement of a client-portion of the isolator by the remote client; and thereafter b) transmitting the wake signal from the host to the remote client through the isolator; c) controlling enablement of the client-portion responsive to the wake signal transmitted through the isolator; and thereafter d) disabling the transmission by deassertion of the wake signal at the host. Full Article
en Method and apparatus for power-efficiency management in a virtualized cluster system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method and apparatus for power-efficiency management in a virtualized cluster system. The virtualized cluster system includes a front-end physical host and at least one back-end physical host, and each of the at least one back-end physical host comprises at least one virtual machine and a virtual machine manager. Flow characteristics of the virtualized cluster system are detected at a regular time cycle, then a power-efficiency management policy is generated for each of the at least one back-end physical host based on the detected flow characteristics, and finally the power-efficiency management policies are performed. The method can detect the real-time flow characteristics of the virtualized cluster system and make the power-efficiency management policies thereupon to control the power consumption of the system and perform admission control on the whole flow, thereby realizing optimal power saving while meeting the quality of service requirements. Full Article
en Processor bridge power management By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A power controller can set the power state of a processor bridge based on which processor modules are in a communicative state. In addition, for a power state where selected processor modules are expected to be non-communicative, the power controller can set the supplied voltage to have a reduced voltage guard band as compared to other power states. These power management techniques can reduce the power consumed by the processor. Full Article
en Power management of multiple compute units sharing a cache By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT We report methods, integrated circuit devices, and fabrication processes relating to power management transitions of multiple compute units sharing a cache. One method includes indicating that a first compute unit of a plurality of compute units of an integrated circuit device is attempting to enter a low power state, determining if the first compute unit is the only compute unit of the plurality in a normal power state, and in response to determining the first compute unit is the only compute unit in the normal power state: saving a state of a shared cache unit of the integrated circuit device, flushing at least a portion of a cache of the shared cache unit, repeating the flushing until either a second compute unit exits the low power state or the cache is completely flushed, and permitting the first compute unit to enter the low power state. Full Article
en Security enclave processor power control By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access to the SEP may be strictly controlled by hardware. For example, a mechanism in which the CPUs/APs can only access a mailbox location in the SEP is described. The CPU/AP may write a message to the mailbox, which the SEP may read and respond to. The SEP may include one or more of the following in some embodiments: secure key management using wrapping keys, SEP control of boot and/or power management, and separate trust zones in memory. Full Article
en Identification and management of unsafe optimizations By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Techniques for implementing identification and management of unsafe optimizations are disclosed. A method of the disclosure includes receiving, by a managed runtime environment (MRE) executed by a processing device, a notice of misprediction of optimized code, the misprediction occurring during a runtime of the optimized code, determining, by the MRE, whether a local misprediction counter (LMC) associated with a code region of the optimized code causing the misprediction exceeds a local misprediction threshold (LMT) value, and when the LMC exceeds the LMT value, compiling, by the MRE, native code of the optimized code to generate a new version of the optimized code, wherein the code region in the new version of the optimized code is not optimized. Full Article
en Experiment manager for manycore systems By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An execution environment may have a monitoring, analysis, and feedback loop that may configure and tune the execution environment for currently executing workloads. A monitoring or instrumentation system may collect operational and performance data from hardware and software components within the system. A modeling system may create an operational model of the execution environment, then may determine different sets of parameters for the execution environment. A feedback loop may change various operational characteristics of the execution environment. The monitoring, analysis, and feedback loop may optimize the performance of a computer system for various metrics, including throughput, performance, energy conservation, or other metrics based on the applications that are currently executing. The performance model of the execution environment may be persisted and applied to new applications to optimize the performance of applications that have not been executed on the system. Full Article
en Contactless authentication of optical disk drives By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An optical disc drive (ODD) includes a radio-frequency identification (RFID) reader. The reader includes a circuit and a coil antenna which has a rotational symmetry with respect to a rotation axis of a motor, shaft and turntable of the ODD. The coil antenna can be secured to a wall of a housing of the ODD or around the motor and/or shaft. The reader can read an RFID tag on an optical disc. The RFID tag includes a circuit and a coil antenna which has a rotational symmetry with respect to the disc. As a result, the RFID tag can be read while the disc is rotating. A magnetic insulating material such as a ferrite polymer composite film is used to magnetically insulate the coil antenna. An authentication code can be read from the RFID tag to control access to content of the optical disc. Full Article
en Apparatus for controlling processor execution in a secure environment By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Various embodiments described herein relate to apparatus for executing software in a secure computing environment. A secure processor can be used and configured to request a context swap from a first context to a second context when switching execution from a first portion of software to a second portion of software. A context manager, which can be in communication with the secure processor, can be configured to receive and initiate a requested context swap. A trust vector verifier, which can be in communication with the secure processor and the context manager, can be configured to load a trust vector descriptor upon command from a context manager. Full Article
en Enabling web page tracking By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Methods are provided for tracking data corresponding to a mobile device that accesses a web page. Once a mobile device is registered with a network, the mobile device is instructed to request permission before accessing a web page. An access request is received, and based on a user profile, the access request is approved such that the mobile device may access the web page. Access data that corresponds to the mobile device accessing the web page is collected so that it can be added to and stored in a database. Full Article
en Managing physical presence across multiple blades By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method uses a firmware interface setup program for a selected compute node (“node”) to cause a firmware interface to enable a trusted platform module (TPM) on the selected node to receive a physical presence (PP) signal. The selected node is selected from a plurality of nodes within a multi-node chassis, wherein each node includes a firmware interface and a TPM. A device within the multi-node chassis is manually actuated to transmit a PP signal to each of the plurality of nodes, such that each node receives the PP signal. The PP signal is asserted to the TPM of the selected node in response to both enabling the TPM of the selected node to be able to receive the PP signal and receiving the PP signal. Still further, the method allows modification of a security setting of the selected node in response to the TPM receiving the PP signal. Full Article
en Method of processing data to enable external storage thereof with minimized risk of information leakage By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method is provided to process data so that the data can be externally stored with minimized risk of information leakage. A framework (virtual execution framework) based on virtual machines (VMs) is utilized as a substitute for a trusted institution. Encryption of consolidated data can reduce risk of information leakage and enhance security. Since the virtual execution framework can control connection and direction of communication, financial institutions are allowed to apply encryption to data on their own, which makes the data further appropriate for external storage. By allowing financial institutions to apply their own decryption, it is possible to prevent one of two financial institutions from retrieving externally stored data into the external execution framework without intervention of the other. Additionally, associated acting subjects can be provided with freedom depending on the degree of information leakage risk. Full Article
en Method for controlling content and digital device using the same By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method and device for controlling content that includes plural display pages in a sequence, the method including: displaying a current page included in the content; receiving a user input to or above a display screen of the display unit for changing from the current page to another page of the content; extracting fingerprint information from the user input; determining whether the content of the another page is or is not accessible based on the extracted fingerprint information; if all of the content of the another page is determined to be accessible based on the extracted fingerprint information, displaying the another page; and if any of the content of the another page is determined not to be accessible based on the extracted fingerprint information, displaying a page following the current page without displaying content of the another page that was determined not to be accessible. Full Article
en Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method By www.freepatentsonline.com Published On :: Tue, 22 Sep 2015 08:00:00 EDT A system is disclosed comprising multiple sets of client computers each client computer having installed thereon an application program The application program comprising client computer specific log-in information, a database system coupled to the set of client computers via a network. The database system having a log-in component for logging-in the client computers, and being partitioned into multiple relational databases each one of which is assigned to one set of the sets of client computers. Each database further storing encrypted data items, each data item being encrypted with one of the user or user-group specific cryptographic keys, the key identifier of the cryptographic key with which one of the data items is encrypted being stored in the database as an attribute of the one of the encrypted data items. The log-in component comprising assignment information indicative of the assignment of the databases to the set of client computers. Full Article
en Diagnostic radio frequency identification sensors and applications thereof By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An integrated passive wireless chip diagnostic sensor system is described that can be interrogated remotely with a wireless device such as a modified cell phone incorporating multi-protocol RFID reader capabilities (such as the emerging Gen-2 standard) or Bluetooth, providing universal easy to use, low cost and immediate quantitative analyses, geolocation and sensor networking capabilities to users of the technology. The present invention can be integrated into various diagnostic platforms and is applicable for use with low power sensors such as thin films, MEMS, electrochemical, thermal, resistive, nano or microfluidic sensor technologies. Applications of the present invention include on-the-spot medical and self-diagnostics on smart skin patches, Point-of-Care (POC) analyses, food diagnostics, pathogen detection, disease-specific wireless biomarker detection, remote structural stresses detection and sensor networks for industrial or Homeland Security using low cost wireless devices such as modified cell phones. Full Article
en System and method for detecting and preventing drowsiness By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system for preventing drowsiness in a driver by employing a thermal grill. The system includes a detection module and an intervention module. The detection module monitors a driver's parameters to determine whether the driver is drowsy. If the driver is determined to be drowsy, the intervention module activates a thermal grill with interlaced hot and cold regions. This activation causes the hot regions to approach one temperature and the cold regions to approach another. Additionally, this activation leads to an uncomfortable sensation for the driver, alerts the driver, and prevents the driver from getting drowsy. Full Article
en Method and system for determining treatments by modifying patient-specific geometrical models By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Systems and methods are disclosed for evaluating cardiovascular treatment options for a patient. One method includes creating a three-dimensional model representing a portion of the patient's heart based on patient-specific data regarding a geometry of the patient's heart or vasculature; and for a plurality of treatment options for the patient's heart or vasculature, modifying at least one of the three-dimensional model and a reduced order model based on the three-dimensional model. The method also includes determining, for each of the plurality of treatment options, a value of a blood flow characteristic, by solving at least one of the modified three-dimensional model and the modified reduced order model; and identifying one of the plurality of treatment options that solves a function of at least one of: the determined blood flow characteristics of the patient's heart or vasculature, and one or more costs of each of the plurality of treatment options. Full Article
en Analyte sensors comprising hydrogel membranes By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Generally, embodiments of the present disclosure relate to analyte determining methods and devices (e.g., electrochemical analyte monitoring systems) that have improved signal response and stability by inclusion of a coating including a hydrogel, a crosslinker, and a swelling modulator, where the coating is disposed proximate to a working electrode of in vivo and/or in vitro analyte sensors, e.g., continuous and/or automatic in vivo monitoring using analyte sensors and/or test strips. Also provided are systems and methods of using the, for example electrochemical, analyte sensors in analyte monitoring. Full Article
en Reference electrodes having an extended lifetime for use in long term amperometric sensors By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The present application provides Ag/AgCl based reference electrodes having an extended lifetime that are suitable for use in long term amperometric sensors. Electrochemical sensors equipped with reference electrodes described herein demonstrate considerable stability and extended lifetime in a variety of conditions. Full Article
en MRI-guided localization and/or lead placement systems, related methods, devices and computer program products By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT MRI compatible localization and/or guidance systems for facilitating placement of an interventional therapy and/or device in vivo include: (a) a mount adapted for fixation to a patient; (b) a targeting cannula with a lumen configured to attach to the mount so as to be able to controllably translate in at least three dimensions; and (c) an elongate probe configured to snugly slidably advance and retract in the targeting cannula lumen, the elongate probe comprising at least one of a stimulation or recording electrode. In operation, the targeting cannula can be aligned with a first trajectory and positionally adjusted to provide a desired internal access path to a target location with a corresponding trajectory for the elongate probe. Automated systems for determining an MR scan plane associated with a trajectory and for determining mount adjustments are also described. Full Article
en Velocity measurement of MR-imaged fluid flows By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Velocity of MR-imaged fluid flows is measured. Data representing a measure of distance traveled by flowing fluid appearing in at least two MR images of a subject's tissue taken at different respective imaging times is generated. Data representing at least one fluid velocity measurement of the flowing fluid is generated by calculating at least one instance of distance traveled by the fluid divided by elapsed time during travel based on different respective imaging times. Data representing at least one fluid velocity measurement is then output to at least one of: (a) a display screen, (b) a non-transitory data storage medium, and (c) a remotely located site. Full Article
en System and method for fiducial deployment via slotted needle By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Embodiments include a fiducial deployment system and method for use thereof. A fiducial may include one or more protuberances configured to engage one or more slots in a needle of the system. The needle may be configured to deliver a plurality of fiducials to a target location in serial fashion, one at a time. In certain embodiments, echogenic placement of fiducials may present certain advantages. Full Article
en Biopsy marker with in situ-generated imaging properties By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An intracorporeal marker, for marking a site within living tissue of a host, includes an outer body portion of biodegradable material. An inner body portion is located in the outer body portion. The inner body portion includes biological material that becomes calcified in the living tissue of the host over time. An agent interacts with the biological material to promote calcification of the biological material of the inner body portion in the living tissue of the host. Full Article