l Flame retardant cellulose By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Flame retardant cellulose is prepared comprising cellulose fibers and an organophosphate compound bonded to the cellulose fibers. Accordingly, the bonded phosphate-functional group provides the cellulose fibers with pendant phosphate ester functionality. Numerous phosphate derivatives can be envisaged that will accomplish the intended task. Full Article
l Cellulose interpolymers and method of oxidation By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT This invention provides cellulose ester interpolymers, and methods of oxidizing cellulose interpolymers and cellulose ester interpolymers. The invention also provides routes to access carboxylated cellulose ester derivatives with high acid numbers wherein the carboxyl group is attached directly to the cellulose backbone by a carbon-carbon bond. Through functionalization of an intermediate aldehyde, the corresponding cationic or zwitterionic cellulose ester derivatives can also be accessed. The interpolymers of the present invention have a number of end-use applications, for example, as binder resins in various types of coating compositions and as drug delivery agents. Full Article
l Cellulose interpolymers and method of oxidation By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT This invention provides cellulose ester interpolymers, and methods of oxidizing cellulose interpolymers and cellulose ester interpolymers. The invention also provides routes to access carboxylated cellulose ester derivatives with high acid numbers wherein the carboxyl group is attached directly to the cellulose backbone by a carbon-carbon bond. Through functionalization of an intermediate aldehyde, the corresponding cationic or zwitterionic cellulose ester derivatives can also be accessed. The interpolymers of the present invention have a number of end-use applications, for example, as binder resins in various types of coating compositions and as drug delivery agents. Full Article
l Cellulose interpolymers and method of oxidation By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT This invention provides cellulose ester interpolymers, and methods of oxidizing cellulose interpolymers and cellulose ester interpolymers. The invention also provides routes to access carboxylated cellulose ester derivatives with high acid numbers wherein the carboxyl group is attached directly to the cellulose backbone by a carbon-carbon bond. Through functionalization of an intermediate aldehyde, the corresponding cationic or zwitterionic cellulose ester derivatives can also be accessed. The interpolymers of the present invention have a number of end-use applications, for example, as binder resins in various types of coating compositions and as drug delivery agents. Full Article
l Coating agent comprising hydroxyalkyl cellulose By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A coating agent containing a hydroxyalkyl cellulose in which a content of hydroxyalkoxy groups within the hydroxyalkyl cellulose is within a range of 40 to 50% by mass, preferably a coating agent containing a hydroxyalkyl cellulose in which the content of hydroxyalkoxy groups is within a range of 40 to 50% by mass and also a viscosity of 2% aqueous solution at 20° C. is within a range of 3.0 to 5.9 mPa·s; and a solid preparation coated with the coating agent. Full Article
l Methods and compositions for extraction and storage of nucleic acids By www.freepatentsonline.com Published On :: Tue, 02 Jun 2015 08:00:00 EDT The present disclosure generally relates to solid matrices for the extraction, stabilization, and storage of nucleic acids, particularly RNA, in a dry format under ambient conditions for a prolonged period of time. Methods for extracting, collecting, and recovering nucleic acids from the solid compositions are also described. Full Article
l Electronic device provided with cryptographic circuit and method of establishing the same By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The present invention provides for an electronic device having cryptographic computation means arranged to generate cryptographic data within the device for enhancing security of communications therewith, the device including an onboard power supplying means arranged to provide for the driving of the said cryptographic computational means, and so as to provide a device by way of a manufacturing phase and a post manufacturing phase arranged for distribution and/or marketing of the device, and wherein the step of generating the cryptographic data occurs during the post manufacturing phase. Full Article
l Implementing security measures for authorized tokens used in mobile transactions By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Security measures for tokens comprise storing security rules associated with a generated token in a memory. A processor, communicatively coupled to the memory, accesses the security rules associated with the generated token and determines whether to encrypt the generated token by applying at least a portion of the security rules to the generated token. The processor encrypts the generated token. An interface, communicatively coupled to the processor, communicates the encrypted token to a mobile device associated with a user. Full Article
l Multiple volume encryption of storage devices using self encrypting drive (SED) By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method for encrypting data on a disk drive using self encrypting drive is provided. The method includes encryption of data chunks of a computing device. The method further includes associating the encrypted data chunks with encryption key indexes of the computing device. Moreover, the method further includes receiving the encryption key indexes for given logical block addresses of the data chunks. The method further includes determining the encryption keys to be used to encrypt the data chunks based on the encryption key indexes of the data chunks to the disk drive. Full Article
l Drawing power over network cable By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A source device to provide power through a network cable and a user device is to draw power from the network cable. A database is to store a parameter associated with the user device. The source device is to access the stored parameter based on receipt of information related to the user device and is to compare at least one of a current power drawn and an additional power requested by the user device to a power limit of the user device based on the accessed parameters. The source device is to send a power message to the user device based on the comparison, the power message to relate to an amount of the power the user device is to draw. Full Article
l Resolution programmable dynamic IR-drop sensor with peak IR-drop tracking abilities By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A data processing system on an integrated circuit includes a core that performs switching operations responsive to a system clock that draws current from the power supply network. An IR-drop detector includes a resistor ladder having outputs representative of an IR-drop caused by the core during the switching operations. The system further includes a plurality of amplifiers coupled to the outputs indicative of the IR-drop, a plurality of flip-flops coupled to the amplifiers, and a variable clock generator. The variable clock generator outputs a sampling clock comprising a group consisting of a variable phase or a variable frequency to the plurality of flip-flops. The flip-flops are triggered by the sampling clock so that the IR-drop at a time during a clock cycle of the system clock can be detected, and the peak IR-drop value for can be tracked. Full Article
l Power-saving network management server, network system, and method of determining supply of power By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A power-saving network management server, which is coupled to a network system including a network device and manages a state of power to the network device, wherein the power-saving network management server is configured to: store network configuration information and task allocation information; determine starting or stopping of the power supply to the port of the network device based on the updated network configuration information and task allocation information; store a determination result of the starting or stopping of the power supply to the port as a port determination result; and control the power supply to the port of the network device based on the port determination result. Full Article
l Host initiated state control of remote client in communications system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system and method for low-cost, fault tolerant, EMI robust data communications, particularly for an EV environment. A data communications method, including a) enabling a transmission of a wake signal from a host to a remote client through an isolator disposed at the remote client when the wake signal is asserted from the host at a host-portion of the isolator concurrent with a periodic enablement of a client-portion of the isolator by the remote client; and thereafter b) transmitting the wake signal from the host to the remote client through the isolator; c) controlling enablement of the client-portion responsive to the wake signal transmitted through the isolator; and thereafter d) disabling the transmission by deassertion of the wake signal at the host. Full Article
l Method and apparatus for power-efficiency management in a virtualized cluster system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method and apparatus for power-efficiency management in a virtualized cluster system. The virtualized cluster system includes a front-end physical host and at least one back-end physical host, and each of the at least one back-end physical host comprises at least one virtual machine and a virtual machine manager. Flow characteristics of the virtualized cluster system are detected at a regular time cycle, then a power-efficiency management policy is generated for each of the at least one back-end physical host based on the detected flow characteristics, and finally the power-efficiency management policies are performed. The method can detect the real-time flow characteristics of the virtualized cluster system and make the power-efficiency management policies thereupon to control the power consumption of the system and perform admission control on the whole flow, thereby realizing optimal power saving while meeting the quality of service requirements. Full Article
l Power shifting in multicore platforms by varying SMT levels By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Power consumption in a microprocessor platform is managed by setting a peak power level for power consumed by a multi-core microprocessor platform executing multi-threaded applications. The multi-core microprocessor platform contains a plurality of physical cores, and each physical core is configurable into a plurality of logical cores. A simultaneous multithreading level in at least one physical core is adjusted by changing the number of logical cores on that physical core in response to a power consumption level of the multi-core microprocessor platform exceeding the peak power level. Performance and power data based on simultaneous multi-threading levels are used in selecting the physical core to be adjusted. Full Article
l Methods and apparatuses for controlling the temperature of a data processing system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Methods and apparatuses to manage working states of a data processing system. At least one embodiment of the present invention includes a data processing system with one or more sensors (e.g., physical sensors such as tachometer and thermistors, and logical sensors such as CPU load) for fine grain control of one or more components (e.g., processor, fan, hard drive, optical drive) of the system for working conditions that balance various goals (e.g., user preferences, performance, power consumption, thermal constraints, acoustic noise). In one example, the clock frequency and core voltage for a processor are actively managed to balance performance and power consumption (heat generation) without a significant latency. In one example, the speed of a cooling fan is actively managed to balance cooling effort and noise (and/or power consumption). Full Article
l Power management of multiple compute units sharing a cache By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT We report methods, integrated circuit devices, and fabrication processes relating to power management transitions of multiple compute units sharing a cache. One method includes indicating that a first compute unit of a plurality of compute units of an integrated circuit device is attempting to enter a low power state, determining if the first compute unit is the only compute unit of the plurality in a normal power state, and in response to determining the first compute unit is the only compute unit in the normal power state: saving a state of a shared cache unit of the integrated circuit device, flushing at least a portion of a cache of the shared cache unit, repeating the flushing until either a second compute unit exits the low power state or the cache is completely flushed, and permitting the first compute unit to enter the low power state. Full Article
l Multi-cluster processing system and method of operating the same By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A multi-cluster processing system and a method of operating a multi-cluster processing system are provided. The multi-cluster processing system includes: a first cluster including a plurality of first-type cores: a second cluster including a plurality of second-type cores; and a control unit configured to monitor loads of the first-type cores and the second-type cores, wherein when utilization of at least one of enabled first-type cores exceeds a predetermined threshold utilization of each of the first-type cores, the control unit enables at least one of disabled first-type cores in a first mode, and the control unit enables at least one of the disabled second-type cores and disables the first cluster in a second mode, wherein an amount of computation per unit of time of each of the second-type cores is greater than an amount of computation per unit of time of each of the first-type cores. Full Article
l Power supply control system, method, and computer program product By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT According to an embodiment, a control system includes a detector, an estimating unit, a determining unit, and a controller. The detector detects an idle state. The estimating unit estimates an idle period. When the idle state is detected, the determining unit determines whether a first power consumption when writeback of data which needs to be written back to a main storage device is performed and supply of power to a cache memory is stopped, is larger than a second power consumption when writeback of the data is not performed and supply of power is continued for the idle period. The controller stops the supply of power to the cache memory when the first power consumption is determined to be smaller than the second power consumption and continues the supply of power when the first power consumption is determined to be larger than the second power consumption. Full Article
l Security enclave processor power control By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access to the SEP may be strictly controlled by hardware. For example, a mechanism in which the CPUs/APs can only access a mailbox location in the SEP is described. The CPU/AP may write a message to the mailbox, which the SEP may read and respond to. The SEP may include one or more of the following in some embodiments: secure key management using wrapping keys, SEP control of boot and/or power management, and separate trust zones in memory. Full Article
l Memory controller with transaction-queue-monitoring power mode circuitry By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An integrated-circuit memory controller outputs to a memory device a first signal in a first state to enable operation of synchronous data transmission and reception circuits within the memory device. A transaction queue within the memory controller stores memory read and write requests that, to be serviced, require operation of the synchronous data transmission and reception circuits, respectively, within the memory device. Power control circuitry within the memory controller determines that the transaction queue has reached a predetermined state and, in response, outputs the first signal to the memory device in a second state to disable operation of the synchronous data transmission and reception circuits within the memory device. Full Article
l Methods, systems, apparatuses, and computer-readable media for waking a SLIMbus without toggle signal By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Arrangements for restarting data transmission on a serial low-power inter-chip media bus (SLIMbus) are presented. A clock signal may be provided in an active mode to a component communicatively coupled with the SLIMbus. Immediately prior to the clock signal in the active mode being provided, the clock signal may have been in a paused mode. While the clock signal was in the paused mode at least until the clock signal is provided in the active mode, the data line may have been inactive (e.g., a toggle on the data line may not have been present). Frame synchronization data for a frame may be transmitted. The frame synchronization data for the frame, as received by the component, may not match expected frame synchronization data. Payload data may be transmitted as part of the frame to the component, wherein the payload data is expected to be read properly by the component. Full Article
l Network security appliance By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Methods, devices, and systems that may be used to secure networked devices are provided. One method includes receiving, at a security device, encrypted configuration data from a management server connected to a data network, from packets addressed to a networked device. The method further includes managing, by the security device, packets between the networked device and other devices accessible through a network based upon the configuration data. The method further includes sending, by the security device, a plurality of encrypted heartbeat messages to the management server utilizing an address associated with the networked device as the originating address for packets in which the encrypted heartbeat messages are transmitted. Full Article
l Method for operating invisible system services on android platform By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method for operating an invisible system service on Android platform is disclosed. The method for operating system services on Android platform includes selectively registering a created system service in a context manager according to a type of the created system service, where the type of the system service comprises a first type for permitting access from an outside and a second type for not permitting access from the outside, and the selectively registering comprises registering in the context manager the created system service belonging to the first type and not registering in the context manager the created system service belonging to the second type. Full Article
l Contactless authentication of optical disk drives By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An optical disc drive (ODD) includes a radio-frequency identification (RFID) reader. The reader includes a circuit and a coil antenna which has a rotational symmetry with respect to a rotation axis of a motor, shaft and turntable of the ODD. The coil antenna can be secured to a wall of a housing of the ODD or around the motor and/or shaft. The reader can read an RFID tag on an optical disc. The RFID tag includes a circuit and a coil antenna which has a rotational symmetry with respect to the disc. As a result, the RFID tag can be read while the disc is rotating. A magnetic insulating material such as a ferrite polymer composite film is used to magnetically insulate the coil antenna. An authentication code can be read from the RFID tag to control access to content of the optical disc. Full Article
l Variable domain resource data security for data processing systems By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The variable domain data access control system and method described herein use the same variable domain to describe a data security model and a variable domain data model, such as a product configuration model. A variable domain is a set of resource data that can be described using a logical relationship data structure. The variable domain utilizes logical relationship expressions, such as a Boolean logic language, to define resource data in terms of parts, rules and/or attributes, and any other property that can be accessed for viewing, manipulation, or other purposes. The data security model represents an access control list (ACL) that includes security attributes as resource data and uses the same data structure and logical relationship expressions as an associated variable domain data model. An application, such as a configuration engine, can be used to create controlled access to the variable domain data model using the data security model. Full Article
l Apparatus for controlling processor execution in a secure environment By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Various embodiments described herein relate to apparatus for executing software in a secure computing environment. A secure processor can be used and configured to request a context swap from a first context to a second context when switching execution from a first portion of software to a second portion of software. A context manager, which can be in communication with the secure processor, can be configured to receive and initiate a requested context swap. A trust vector verifier, which can be in communication with the secure processor and the context manager, can be configured to load a trust vector descriptor upon command from a context manager. Full Article
l Enabling web page tracking By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Methods are provided for tracking data corresponding to a mobile device that accesses a web page. Once a mobile device is registered with a network, the mobile device is instructed to request permission before accessing a web page. An access request is received, and based on a user profile, the access request is approved such that the mobile device may access the web page. Access data that corresponds to the mobile device accessing the web page is collected so that it can be added to and stored in a database. Full Article
l Managing physical presence across multiple blades By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method uses a firmware interface setup program for a selected compute node (“node”) to cause a firmware interface to enable a trusted platform module (TPM) on the selected node to receive a physical presence (PP) signal. The selected node is selected from a plurality of nodes within a multi-node chassis, wherein each node includes a firmware interface and a TPM. A device within the multi-node chassis is manually actuated to transmit a PP signal to each of the plurality of nodes, such that each node receives the PP signal. The PP signal is asserted to the TPM of the selected node in response to both enabling the TPM of the selected node to be able to receive the PP signal and receiving the PP signal. Still further, the method allows modification of a security setting of the selected node in response to the TPM receiving the PP signal. Full Article
l Method of processing data to enable external storage thereof with minimized risk of information leakage By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method is provided to process data so that the data can be externally stored with minimized risk of information leakage. A framework (virtual execution framework) based on virtual machines (VMs) is utilized as a substitute for a trusted institution. Encryption of consolidated data can reduce risk of information leakage and enhance security. Since the virtual execution framework can control connection and direction of communication, financial institutions are allowed to apply encryption to data on their own, which makes the data further appropriate for external storage. By allowing financial institutions to apply their own decryption, it is possible to prevent one of two financial institutions from retrieving externally stored data into the external execution framework without intervention of the other. Additionally, associated acting subjects can be provided with freedom depending on the degree of information leakage risk. Full Article
l System, method, and device for delivering communications and storing and delivering data By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is verified, optionally through a downloaded authentication driver. After verifying the wrap, the wrap is opened and a sister of the executable controller is installed into the platform memory to cooperate with the executable controller. Additionally or alternatively, the authentication driver may cooperate with the executable controller. The executable controller allows the platform processor to access data secured in a vault and/or verify the platform to create a connection to a connection server. Full Article
l Secured wireless access system and related method By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The disclosure is directed to a system and method for establishing a secured wireless connection allowing the exchange of information between a wireless device and aircraft equipment. The secured wireless access system may require a user controlling the wireless device to interact with an onboard interface to initiate a connection. The user may be further required to enter a randomly generated security passcode to pair the mobile device to the aircraft equipment. Further security measures may be implemented, such as tiered user access levels restricting certain equipment and/or information based upon a user identity of the user requesting access. Full Article
l Method for controlling content and digital device using the same By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method and device for controlling content that includes plural display pages in a sequence, the method including: displaying a current page included in the content; receiving a user input to or above a display screen of the display unit for changing from the current page to another page of the content; extracting fingerprint information from the user input; determining whether the content of the another page is or is not accessible based on the extracted fingerprint information; if all of the content of the another page is determined to be accessible based on the extracted fingerprint information, displaying the another page; and if any of the content of the another page is determined not to be accessible based on the extracted fingerprint information, displaying a page following the current page without displaying content of the another page that was determined not to be accessible. Full Article
l Apparatus and method for managing power of an electronic appliance By www.freepatentsonline.com Published On :: Tue, 21 Jul 2015 08:00:00 EDT There is provided a power management apparatus including: a managed appliance registering unit carrying out authentication on an electronic appliance connected to a power network and registering an electronic appliance for which the authentication has succeeded as a managed appliance, a control unit controlling operation of the managed appliance and supplying of power to the managed appliance, a managed appliance information acquiring unit acquiring, from the managed appliance, as managed appliance information, at least any of appliance information including identification information that is unique to the electronic appliance, information indicating an operation state of the electronic appliance, information indicating an usage state of the electronic appliance and power information of the electronic appliance, and an appliance state judging unit judging a state of the managed appliance based on the managed appliance information acquired by the managed appliance information acquiring unit. Full Article
l Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method By www.freepatentsonline.com Published On :: Tue, 22 Sep 2015 08:00:00 EDT A system is disclosed comprising multiple sets of client computers each client computer having installed thereon an application program The application program comprising client computer specific log-in information, a database system coupled to the set of client computers via a network. The database system having a log-in component for logging-in the client computers, and being partitioned into multiple relational databases each one of which is assigned to one set of the sets of client computers. Each database further storing encrypted data items, each data item being encrypted with one of the user or user-group specific cryptographic keys, the key identifier of the cryptographic key with which one of the data items is encrypted being stored in the database as an attribute of the one of the encrypted data items. The log-in component comprising assignment information indicative of the assignment of the databases to the set of client computers. Full Article
l Biometric attribute anomaly detection system with adjusting notifications By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system, methods and server for monitoring health and safety of individuals in a population and sending alert notifications when exceptions are detected include comparing biometric data obtained from the individuals to a biometric model generated for the individual through computer-learning methods. Biometric data may be gathered by wireless biometric sensor devices which transmit biometric data to receiver devices, which relay the biometric data to a server. The biometric model may be maintained in the server and include nominal and threshold biometric parameters for each individual based on biometric sensor data gathered or analyzed over a period of time. An alert may be issued by the server when an individual's biometric data is outside a threshold in the biometric model. The transmitted alert may depend upon the nature of the exception, user settings and past notification experience. Alerts may be escalated when not answered within defined durations. Full Article
l Diagnostic radio frequency identification sensors and applications thereof By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An integrated passive wireless chip diagnostic sensor system is described that can be interrogated remotely with a wireless device such as a modified cell phone incorporating multi-protocol RFID reader capabilities (such as the emerging Gen-2 standard) or Bluetooth, providing universal easy to use, low cost and immediate quantitative analyses, geolocation and sensor networking capabilities to users of the technology. The present invention can be integrated into various diagnostic platforms and is applicable for use with low power sensors such as thin films, MEMS, electrochemical, thermal, resistive, nano or microfluidic sensor technologies. Applications of the present invention include on-the-spot medical and self-diagnostics on smart skin patches, Point-of-Care (POC) analyses, food diagnostics, pathogen detection, disease-specific wireless biomarker detection, remote structural stresses detection and sensor networks for industrial or Homeland Security using low cost wireless devices such as modified cell phones. Full Article
l Slice view By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method, apparatus, article of manufacture, and computer program product display multiple slices of a three-dimensional body in a computer drawing application. A first view of a 3D body is displayed. One or more slice sketches are defined on the first view. A single slice view of the three dimensional body is displayed. The single slice view simultaneously depicts all of the slices with a zero-depth representation of each slice. Full Article
l Method and system for determining treatments by modifying patient-specific geometrical models By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Systems and methods are disclosed for evaluating cardiovascular treatment options for a patient. One method includes creating a three-dimensional model representing a portion of the patient's heart based on patient-specific data regarding a geometry of the patient's heart or vasculature; and for a plurality of treatment options for the patient's heart or vasculature, modifying at least one of the three-dimensional model and a reduced order model based on the three-dimensional model. The method also includes determining, for each of the plurality of treatment options, a value of a blood flow characteristic, by solving at least one of the modified three-dimensional model and the modified reduced order model; and identifying one of the plurality of treatment options that solves a function of at least one of: the determined blood flow characteristics of the patient's heart or vasculature, and one or more costs of each of the plurality of treatment options. Full Article
l Region-growing algorithm By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A region growing algorithm for controlling leakage is presented including a processor configured to select a starting point for segmentation of data, initiate a propagation process by designating adjacent voxels around the starting point, determine whether any new voxels are segmented, count and analyze the segmented new voxels to determine leakage levels, and identify and record segmented new voxels from a previous iteration when the leakage levels exceed a predetermined threshold. The processor is further configured to perform labeling of the segmented new voxels of the previous iteration, select the segmented new voxels from the previous iteration when the leakage levels fall below the predetermined threshold, and create a voxel list based on acceptable segmented voxels found in the previous iteration. Full Article
l System and method for automatic detection of a plurality of SPO2 time series pattern types By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The disclosed embodiments relate to pulse oximetry. An exemplary pulse oximeter comprises a probe that is adapted to be attached to a body part of a patient to create a signal indicative of an oxygen saturation of blood of the patient, and a processor that is adapted to receive the signal produced by the probe, to calculate an SPO2 value based on the signal, to detect a plurality of pattern types of SPO2 indicative of pathophysiologic events, and to produce an output indicative of a detected one of the plurality of pattern types. Full Article
l Analyte monitoring device and methods of use By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An analyte monitor includes a sensor, a sensor control unit, and a display unit. The sensor has, for example, a substrate, a recessed channel formed in the substrate, and conductive material disposed in the recessed channel to form a working electrode. The sensor control unit typically has a housing adapted for placement on skin and is adapted to receive a portion of an electrochemical sensor. The sensor control unit also includes two or more conductive contacts disposed on the housing and configured for coupling to two or more contact pads on the sensor. A transmitter is disposed in the housing and coupled to the plurality of conductive contacts for transmitting data obtained using the sensor. The display unit has a receiver for receiving data transmitted by the transmitter of the sensor control unit and a display coupled to the receiver for displaying an indication of a level of an analyte. The analyte monitor may also be part of a drug delivery system to alter the level of the analyte based on the data obtained using the sensor. Full Article
l Analyte sensors comprising hydrogel membranes By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Generally, embodiments of the present disclosure relate to analyte determining methods and devices (e.g., electrochemical analyte monitoring systems) that have improved signal response and stability by inclusion of a coating including a hydrogel, a crosslinker, and a swelling modulator, where the coating is disposed proximate to a working electrode of in vivo and/or in vitro analyte sensors, e.g., continuous and/or automatic in vivo monitoring using analyte sensors and/or test strips. Also provided are systems and methods of using the, for example electrochemical, analyte sensors in analyte monitoring. Full Article
l Reference electrodes having an extended lifetime for use in long term amperometric sensors By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The present application provides Ag/AgCl based reference electrodes having an extended lifetime that are suitable for use in long term amperometric sensors. Electrochemical sensors equipped with reference electrodes described herein demonstrate considerable stability and extended lifetime in a variety of conditions. Full Article
l Device and method for electroimpedance tomography By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A device for electroimpedance tomography with an electrode belt (2), which has electrodes (E1 . . . E16), wherein at least two groups (5, 6) of electrodes located next to each other are formed and the electrodes of one group are contacted with at least one, multiwire feed cable (7, 8). For a reduced noise level during data acquisition, provisions are made for at least one electrode (E9) of two mutually adjacently located electrodes (E8, E9) of two different groups (5, 6) to have an additional electrode feed line (15), which is led over the feed cable (7) of the adjacent group (5). Full Article
l MRI-guided localization and/or lead placement systems, related methods, devices and computer program products By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT MRI compatible localization and/or guidance systems for facilitating placement of an interventional therapy and/or device in vivo include: (a) a mount adapted for fixation to a patient; (b) a targeting cannula with a lumen configured to attach to the mount so as to be able to controllably translate in at least three dimensions; and (c) an elongate probe configured to snugly slidably advance and retract in the targeting cannula lumen, the elongate probe comprising at least one of a stimulation or recording electrode. In operation, the targeting cannula can be aligned with a first trajectory and positionally adjusted to provide a desired internal access path to a target location with a corresponding trajectory for the elongate probe. Automated systems for determining an MR scan plane associated with a trajectory and for determining mount adjustments are also described. Full Article
l Determining and placing spinal implants or prostheses By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A procedure and system for determining and placing spinal implants or prostheses includes measuring a change in position of vertebrae at an affected level of a patient's spine from a first position where the patient reports greatest pain at the affected level, to a second position where the patient reports least pain at the affected level. Spinal implants or prostheses are selected so as to urge the affected level of the spine toward the second position and away from the first position when the implants are placed at the affected level. In one embodiment, an implant device is formed by one or more inflatable balloons that are placed at determined locations inside a disc space at the affected level. When the balloons are inflated, vertebrae above and below the balloons are urged toward the second position and away from the first position at the affected level. Full Article
l Velocity measurement of MR-imaged fluid flows By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Velocity of MR-imaged fluid flows is measured. Data representing a measure of distance traveled by flowing fluid appearing in at least two MR images of a subject's tissue taken at different respective imaging times is generated. Data representing at least one fluid velocity measurement of the flowing fluid is generated by calculating at least one instance of distance traveled by the fluid divided by elapsed time during travel based on different respective imaging times. Data representing at least one fluid velocity measurement is then output to at least one of: (a) a display screen, (b) a non-transitory data storage medium, and (c) a remotely located site. Full Article
l System and method for fiducial deployment via slotted needle By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Embodiments include a fiducial deployment system and method for use thereof. A fiducial may include one or more protuberances configured to engage one or more slots in a needle of the system. The needle may be configured to deliver a plurality of fiducials to a target location in serial fashion, one at a time. In certain embodiments, echogenic placement of fiducials may present certain advantages. Full Article
l Three dimensional imaging of veins By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A three dimensional imaging system includes a first laser emitting light at a first wavelength, and a scanner for scanning the laser light in a pattern on the target area. A photo detector receives light reflected from the target area as a contrasted vein image, resulting from differential absorption and reflection therein of the first wavelength of light. The intensity of the first laser is incrementally increased, and the photo detector thereby receives a plurality of contrasted vein images, each being at incrementally distinct depths beneath the target skin surface. Image processing is performed on the plurality of vein images to successively layer the veins in the images according to their depth, to create a single processed vein image. A second laser emitting a second wavelength of light is used in combination with the scanner to project the processed vein image onto the target area to overlay the veins therein. Full Article