io Systems and methods for posterior dynamic stabilization of the spine By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Devices, systems and methods for dynamically stabilizing the spine are provided. The devices include an expandable spacer having an undeployed configuration and a deployed configuration, wherein the spacer has axial and radial dimensions for positioning between the spinous processes of adjacent vertebrae. The systems include one or more spacers and a mechanical actuation means for delivering and deploying the spacer. The methods involve the implantation of one or more spacers within the interspinous space. Full Article
io Systems and methods for the fusion of the sacral-iliac joint By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The sacral-iliac joint between an iliac and a sacrum is fused either by the creation of a lateral insertion path laterally through the ilium, through the sacral-iliac joint, and into the sacrum, or by the creation of a postero-lateral insertion path entering from a posterior iliac spine of an ilium, angling through the sacral-iliac joint, and terminating in the sacral alae. A bone fixation implant is inserted through the insertion path and anchored in the interior region of the sacrum or sacral alea to fixate the sacral-iliac joint. Full Article
io Methods and apparatuses for flow restoration and implanting members in the human body By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A medical device for blood flow restoration and/or for use as an implantable member in a human vessel includes a self-expanding member, a guidewire, and a connection mechanism. The self-expanding member includes a plurality of cells and filaments having specific ranges of thicknesses, widths, and heights. The self-expanding member can take on a volume-reduced coiled form with overlapped edges, and can generate optimal radial forces against a vessel wall and/or thrombus when deployed and expanded. Full Article
io Method and inserter for interbody fusion By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An elongate inserter has a distal end releasably connected to an expandable interbody fusion device and a proximal end including a trigger actuator. The interbody fusion device comprises a superior endplate and an inferior endplate that are movable in an expansion direction relative to each other in the intradiscal space. The inserter includes a lifting platform and an elevator that define cooperatively engaging ramps and ramps surfaces that upon operation of the trigger actuator cause the superior and inferior endplates to move relatively away from each other. A driver is supported by the inserter for pushing an insert into the expanded device between the superior and inferior endplates. Full Article
io Anchoring device and system for an intervertebral implant, intervertebral implant and implantation instrument By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Various embodiments of intervertebral implants, anchoring devices for intervertebral implants, and implantation instrumentation are provided, along with various embodiments of methods for using one or more of the devices. Some embodiments of an anchoring device have a body comprising at least one curve and a rigid plate elongated along a longitudinal axis so that its front end enters at least one vertebra while its rear end remains in the passage of an implant. In some embodiments, the plate comprises at least one longitudinal slot separating at least one posterior portion of the plate into two branches, with at least one branch comprising at least one withdrawal stop configured to retain the device in the implant. Full Article
io Medical device with orientable tip for robotically directed laser cutting and biomaterial application By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A medical device used in a medical robotic system has a conduit and an orientable tip. An optical fiber coupled to a laser source and/or a catheter coupled to one or more biomaterial sources extends through the conduit and tip so that the tip of the medical device may be robotically directed towards a target tissue for laser and/or biomaterial application as part of a medical procedure performed at a surgical site within a patient. A protective sheath covers the fiber as it extends through the conduit and tip. A first coupler adjustably secures at least the sheath to the medical device and a second coupler adjustably secures the fiber to at least the sheath. A similar dual coupler mechanism may be used to secure the sheathed catheter to the medical device. Full Article
io Optimally configuring an information landscape By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT According to an embodiment of the present invention, a system optimizes an information processing environment, and comprises at least one processor. The system collects information pertaining to operational behavior of the information processing environment and including a plurality of parameters. A neural network structure is established to associate the parameters to a desired operational performance characteristic for the information processing environment. The neural network structure is trained with the collected information from the information processing environment to produce a model for the information processing environment. The model is optimized to determine values for the parameters and the information processing environment is adjusted based on the determined parameter values to attain the desired operational performance of the information processing environment. Embodiments of the present invention further include a method and computer program product for optimizing an information processing environment in substantially the same manner described above. Full Article
io Method and apparatus for a radiolucent and MRI compatible cranial stabilization pin By www.freepatentsonline.com Published On :: Tue, 14 Jul 2015 08:00:00 EDT A substantially radiolucent cranial stabilization pin is adapted for use with a fixture for immobilizing a patient's head during a medical procedure. The pin includes a tip and a body, which are secured together to form the pin. The tip and body are constructed from non-ferrous, non-magnetic materials that are biocompatible. The tip and body are safe for use with, and compatible with, imaging techniques including MR imaging and CT imaging. In some examples the tip is a titanium insert and the body is molded within and around at least a portion of the tip. In some versions, the tip includes a hollow portion and one or more openings providing access to the hollow portion. The molded body flows into and around portions of the tip creating a secure pin suitable to withstand torque and axial forces observed in use. Full Article
io Tissue ablation system with energy distribution By www.freepatentsonline.com Published On :: Tue, 04 Aug 2015 08:00:00 EDT A microwave ablation system includes an energy source adapted to generate microwave energy and a power splitting device having an input adapted to connect to the energy source and a plurality of outputs. The plurality of outputs are configured to be coupled to a corresponding plurality of energy delivery devices. The power splitting device is configured to selectively divide energy provided from the energy source between the plurality of energy devices. Full Article
io Anterior cervical plate By www.freepatentsonline.com Published On :: Tue, 11 Aug 2015 08:00:00 EDT An anterior cervical plate system is provided. The cervical plate includes a retention ring with a deflectable flange that is upwardly spaced from the top surface of the ring and configured to prevent an inserted bone fastener from backing out of the plate. The plate includes a locking pin having a camming surface and a blocking surface. When the camming surface is moved into position adjacent to the flange, the flange is free to flex out of the way of a bone screw being inserted into or removed from the plate. When the blocking surface is positioned adjacent to the flange, outward deflection of the flange is prevented to retain the bone screw inside the plate. The locking pin is rotated through a camming surface to bring a blocking surface against the flange deflecting the flange onto the head of the bone screw. Full Article
io Heart occlusion devices By www.freepatentsonline.com Published On :: Tue, 01 Sep 2015 08:00:00 EDT The present invention is specifically directed to a heart occlusion device with a self-centering mechanism. The heart occlusion device includes two separate uniquely shaped wires 12, 14, each forming shapes that mirror the respective wire's shapes. Each wire forms half-discs or quarter-discs that together form a distal disc and a proximal disc. In other versions, the device includes four separate wires, each mirroring its neighboring wire and forming a proximal and a distal quarter-disc. In the versions with four wires, the quarter-discs of each wire together form proximal and distal discs. The distal disc and proximal disc are separated by a self-centering waist. The proximal disc is attached to a hub comprising a screw mechanism. A similar hub is optional on the distal disc. The discs further include coverings which form a sealant to occlude an aperture in a tissue. The wires forming the discs have a shape-memory capability such that they can be collapsed and distorted in a catheter during delivery but resume and maintain their intended shape after delivery. Full Article
io Communication terminal, communication system, communication method and communication program By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A communication terminal that can adjust which section of a one-time pad cipher key is used and achieve cipher communication when there is a possibility that the one-time pad cipher keys are not completely matched between communication terminals. A cipher key transfer device acquires a one-time pad cipher key from a key sharing system, divides the acquired one-time pad cipher key with a predetermined number of bits, and transfers the same to a mobile communication terminal after converting the same into one-time pad cipher key cartridges. Along with the partner's terminal, the mobile communication terminal negotiates which one-time pad cipher key cartridge will be used to perform cipher communication, decides the one-time pad cipher key cartridge to be used, and begins cipher communication. Full Article
io Mobile electronic device configured to establish secure wireless communication By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT The invention relates to a method for configuring a mobile device capable of reproducing, for a user, multimedia content previously provided by a remote content server. The invention relates to using a client installed on said electronic device to relay authentication requests between a card, preferably complying with the provisions of the Mobile Commerce Extension standard, and an authentication server that is accessible via an access point. Full Article
io System and method for remote reset of password and encryption key By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT Data is secured on a device in communication with a remote location using a password and content protection key. The device stores data encrypted using a content protection key, which itself may be stored in encrypted form using the password and a key encryption key. The remote location receives a public key from the device. The remote location uses the public key and a stored private key to generate a further public key. The further public key is sent to the device. The device uses the further public key to generate a key encryption key, which is then used to decrypt the encrypted content protection key. A new content encryption key may then be created. Full Article
io Apparatus for logging a configuration of a microprocessor system and method for logging a configuration of a microprocessor system By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT An apparatus includes a logging apparatus and a configuration apparatus. The logging apparatus has a security module operable to create a manipulation-proof log. The configuration apparatus is operable to configure a configurable microprocessor system. The configuration apparatus is further operable to be coupled to the logging apparatus in order to log a configuration of the microprocessor system using the logging apparatus. Full Article
io Network-based revocation, compliance and keying of copy protection systems By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A method of authenticating a device involves establishing a local connection between a local target device and a local source device; at the source device, obtaining credentials of the target device via the local connection; at the source device, sending the credentials to a cloud authentication server via a secure communication channel; at the cloud authentication server, checking the credentials of the target device against a database of known good devices; at the source device, receiving a message from the cloud authentication server via the secure communication channel, said message indicating that the target device is authenticated; and delivering content from the source device to the target device on the condition that the target device is authenticated. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. Full Article
io Setting in wireless communication device for encrypted communication By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A system administrator of a wireless LAN 100 manipulates a personal computer PC1 to change a WEP key. The personal computer PC1 authenticates a memory card MC as genuine under management of the system administrator. In the case of the authenticated memory card MC, changed setting information, as well as a previous WEP key before the change of the setting information, is written into the memory card MC. The system administrator then inserts this memory card MC into a memory card slot of a printer PRT1. The printer PRT1 authenticates the memory card MC as genuine under management of the system administrator. In the case of the authenticated memory card MC, the setting information is updated. This arrangement effectively relieves the user's workload in setting wireless communication devices, while ensuring the sufficiently high security. Full Article
io Device and method for obfuscating visual information By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A device is described for the hiding and subsequent recovery of visual information. The device comprises two or more tokens (1), each containing a mask (2,3) of coloured pixels (4), are overlaid (5), so that when the pixels are aligned, hidden information, invisible in the individual tokens. The hidden information consists of one or more recognisable alphabetic, numerical or pictorial characters (6). During token overlay and alignment, the information becomes recognisable because it is made up of pixels whose colour is differentiated from the other pixels in the overlay. The information is hidden by adding pixels of certain colours. When the tokens are overlaid and the pixels aligned, the added pixels are effectively subtracted, revealing the hidden information. The tokens may be printed on various media, or may be displayed on an electronic device. Full Article
io Network communications using quantum key distribution By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A method and apparatus for forming and distributing quantum encryption keys. A first quantum signal generated by a number generator in a communicator is transmitted through an aperture in the communicator to a receiving communicator. A second quantum signal is received through the aperture at the communicator from a transmitting communicator. The first quantum signal is isolated from the second quantum signal such that the first quantum signal is transmitted from the communicator in response to the first quantum signal passing through the aperture and such that the second quantum signal is received at a number detector in the communicator in response to the second quantum signal passing through the aperture. Full Article
io Private key generation apparatus and method, and storage media storing programs for executing the methods By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT Disclosed herein are a private key generation apparatus and method, and storage media storing programs for executing the methods on a computer. The private key generation apparatus includes a root private key generation unit and a sub-private key generation unit. The root private key generation unit sets a root master key and predetermined parameters capable of generating private keys, and generates a first sub-master key set capable of generating a number of private keys equal to or smaller than a preset limited number. The sub-private key generation unit generates private keys with the root private key generation unit by receiving the first sub-master key set from the root private key generation unit, to generate a private key corresponding to a user ID using the first sub-master key set, and issues the private key to a user. Full Article
io System and methods for UICC-based secure communication By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to a remote management server; receiving from the management server an authentication management function and an encryption key generator for execution by a secure element and an encryption engine for execution by a secure device processor, sending a request to establish a communication session with a remote device; and communicating with the remote device via a channel established using an application server. The secure element and the secure device processor authenticate each other using a mutual authentication keyset. The secure element, the secure device processor and the device processor each have a security level associated therewith; the security level associated with the secure device processor is intermediate between that of the secure element and that of the device processor. Other embodiments are disclosed. Full Article
io Methods for managing user information and devices thereof By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A method, non-transitory computer readable medium and application manager computing device comprises obtaining at least one cryptographic key from a request by a client computing device for a user session. User information corresponding to a user is encrypted or decrypted using the cryptographic key. The request is authenticated based on encryption or decryption of the user information. The cryptographic key is deleted after the completion or termination of the user session. Full Article
io Method and system for secured remote provisioning of a universal integrated circuit card of a user equipment By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT The present invention provides a method and system for secured remote provisioning of a universal integrated circuit card of a user equipment. A system includes a user equipment for initiating a request for remote provisioning of an universal integrated circuit card (UICC) in the user equipment, where the request for remote provisioning includes a machine identifier (MID) associated with the user equipment and a public land mobile network (PLMN) identifier (ID) associated with an network operator. The system also includes at least one shared key management server for dynamically generating security keys and an operator shared key using the security keys, the MID. Moreover, the system includes an operator network for generating a subscription key using the operator shared key and an international mobile subscriber identity (IMSI), and provisioning the IMSI in a secured manner to the UICC of the user equipment using the security keys. Full Article
io Enhancing data security using re-encryption By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A data source may be configured to provide usage data including subscriber identifiers and associated information indicative of subscriber device locations and usage. A data warehouse server may be configured to perform operations including: decrypting subscriber identifiers included in usage data received from the data source using a two-way rolling key groups algorithm; re-encrypting the subscriber identifiers decrypted from the usage data to create secure encrypted identifiers using a one-way secured encryption algorithm; and correlating the subscriber identifiers in the decrypted usage data with the corresponding re-encrypted identifiers. Full Article
io System and method for protecting information and related encryption keys By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A system apparatus and method for protecting information are provided. Embodiments of the invention may detect inactivity related to a computing device. Information and encryption key may be removed from a memory. Subsequent activity may be detected. An authentication procedure may be performed, and, contingent on authenticating a relevant entity, a master key may be generated and installed in a memory. Full Article
io Key generation techniques By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT In one or more embodiments, an integrated circuit includes a programmable memory, a key generation module and a module. The programmable memory is to maintain a first key portion. The key generation module is to generate a key using the first key portion from the programmable memory and a second key portion received via a memory interface. The module is to encrypt or decrypt data using the key. Full Article
io Method for arbitrary-precision division or modular reduction By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method in a portable data carrier for executing a cryptographic operation on security-relevant data comprises a step of determining a remainder (r) of a dividend (a) modulo a divisor (b). In so doing, the remainder (r) is determined iteratively by means of a division device of the data carrier. In each iteration there is carried out a Montgomery multiplication with the divisor (b) as the modulus and an additive linkage of an output value of the Montgomery multiplication with a coefficient (ai) derived from the dividend (a) and associated with the respective iteration. The Montgomery multiplication is carried out here by means of a multiplication device of the data carrier, preferably a corresponding coprocessor. The Montgomery multiplication of a subsequent iteration receives a result of a preceding iteration as an input value. Full Article
io Apparatus and method for generating secret key using change in wireless channel on wireless communication network By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A secret key generation apparatus and method are provided. The secret key generation apparatus includes at least one antenna, amplification/phase controllers, a transceiver, and a random signal controller. The antenna receives a wireless signal from a counterpart terminal that performs wireless communication. The amplification/phase controllers control the amplification gain and phase of the wireless signal that is received via at least one antenna. The transceiver measures the status of a wireless channel using the wireless signal having the controlled amplification gain and phase, determines parameters based on results of the measurement, and generates a secret key based on results of the determination. The random signal controller controls the amplification/phase controllers so that the amplification gain and phase are adjusted whenever the transceiver generates a secret key. Full Article
io Level-two encryption associated with individual privacy and public safety protection via double encrypted lock box By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Computationally implemented methods and systems are described herein that are designed to, among other things, receiving a level-one encrypted output of a surveillance device; encrypting at least a part of the level-one encrypted output of the surveillance device with a level-two encryption key whose decryption key is inaccessible by a level-two encryption entity; and transmitting a level-two encrypted output of the surveillance device. Full Article
io SPS authentication By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Method and apparatus for SPS authentication, for example for use with GPS, are disclosed. The method may include receiving a first set of Y codes from a plurality of satellites, generating authentication decisions using W code estimates extracted from the first set of Y codes for satellite channels corresponding to the plurality of satellites, and generating an authentication response according to authentication decisions generated for the satellite channels. Full Article
io Apparatus and method for address privacy protection in receiver oriented channels By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Disclosed is a method for address privacy protection for a first wireless device sharing a privacy key with a second wireless device. In the method, a first resolution tag is generated at the first wireless device using a pseudo-random function with the seed value and the privacy key as input arguments. The privacy key is only known to the first and second wireless devices. A privacy address is generated for the first wireless device based on the seed value and the first resolution tag. A packet is transmitted from the first wireless device to the second wireless device. The packet includes the privacy address and the first resolution tag. Full Article
io Methods and apparatus for base station assisted peer discovery through aggregation of expressions By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method, an apparatus, and a computer program product for wireless communication are provided in which a UE is equipped to generate an expression associated with a wireless device for use in a peer discovery signal, generate an expression set from the expression, a first temporal frequency, and a first time duration, and transmit the generated expression set to a base station to allow the base station to broadcast each of the expressions included in the expression set at the first temporal frequency over the first time duration. Another method, apparatus, and computer program product for wireless communication are provided in which a base station is equipped to receive an expression set from a wireless device, process the received expression set to determine each of one or more instances of an expression, and transmit each of the one or more instances of the expression. Full Article
io Managing encryption keys in a computer system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method and apparatus is disclosed for managing encryption keys in a computer system in which in response to the change of a system key the old key and new key are both maintained for subsequent use. Full Article
io Instantaneous recommendation of social interactions in a social networking system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT As a user of a social networking system views a page that includes information provided by the system, certain types of social interactions are monitored. If an interaction monitored for is detected, at least one recommendation unit is identified to present to user on the page. The recommendation unit is identified based on a description of the interaction. The recommendation unit suggests that the user perform a social interaction in the social networking system. The recommendation unit is transmitted to a device of the user and is presented to the user on the page without having to reload the entire page. Full Article
io Method and apparatus for authenticating public key without authentication server By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Provided is a method in which a first device authenticates a public key of a second device. The method includes: receiving a first value generated based on the public key of the second device and a password displayed on a screen of the second device and the public key of the second device, from the second device; generating a second value based on the public key of the second device and a password input to the first device by a user of the first device according to the password displayed on the screen of the second device; and authenticating the public key of the second device based on the first value and the second value. Full Article
io Method and system for providing conditional access to encrypted content By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method and system of providing conditional access to encrypted content includes receiving unsolicited multiply encrypted video content and first decryption data over a broadcast network. Partially decrypted video content is obtained by decrypting a first layer of encryption of the encrypted video content using the first decryption data. The partially decrypted video content is stored. A request for viewing the encrypted video content is transmitted and second decryption data is received. A second layer of encryption of the encrypted video content is decrypted using the second decryption data. Full Article
io System and method of lawful access to secure communications By www.freepatentsonline.com Published On :: Tue, 14 Jul 2015 08:00:00 EDT The present disclosure relates to systems and methods for secure communications. In some aspects, one or more values used to generate an encryption key used to encrypt a packet are stored in a header of the packet. The packet is transmitted with the encrypted data portion in a communication. In some aspects, one or more values used to generate an encryption key are received. The encryption key is regenerated using the one or more values. Full Article
io Injection moulding method for optional manufacturing of moulded parts with or without a breakthrough By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT An injection-molding method for selectively manufacturing molded parts with and without a breakthrough is disclosed. A molded part with a breakthrough is manufactured by positioning a mold core in a mold cavity, whereas a molded part without breakthrough is manufactured by removing the mold core at least partly from the mold cavity. The mold cavity delimited by a nozzle-side mold platen and an ejector-side mold platen. The mold core is movable relative to at least one of the mold platens, in particularly the nozzle-side mold platen, in an advance direction, where the mold core is closer to the nozzle-side mold platen and an opposite withdrawal direction. At least one protective measure is provided for protecting the inner surface facing the mold cavity of the respective mold platen, in particularly the nozzle-side mold platen, from adverse mechanical effects during movement of the mold core in the advance direction. Full Article
io Binder composition and method for treating particulate material By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT In accordance with this invention a binder composition for treating particulate material to form a solid aggregate matrix is prepared by providing a urea formaldehyde precondensate; a polar solvent; additional urea; an acid or salt thereof, the acid or salt thereof being selected such as to render the pH of the binder composition to a value from 2.0 to 5.3; providing a sugar; providing a binding promoter for enhancing the binding between the binder composition and the particulate material; and mixing the above so as to form a binder composition. The binder composition is mixed with particulate material and allowed to set into a solid aggregate matrix over a period of longer than 30 minutes from being mixed with the said particulate material. Full Article
io Composition and process for preparing NIR shielding masterbatch and NIR shielding masterbatch and application thereof By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT Disclosed herein is a method for preparing a near infrared shielding fiber. The method includes the steps of preparing and compounding a composition, then pelletizing the compounded composition to obtain the near-infrared shielding masterbatch, and melt spinning the near-infrared shielding masterbatch into the near-infrared shielding fiber. The composition includes at least one metallic ionic compound powder in an amount of about 1-25 wt %, a cross-linking agent in an amount of about 0.1-2 wt %, a thermoplastic polymer in an amount of about 67-98.7 wt %, a cross-linking initiator in an amount of about 0.1-1 wt %, and a dispersing agent in an amount of about 0.1-2 wt %. Full Article
io Substrate-based additive fabrication process By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT The invention relates to a substrate-based method for forming a three-dimensional object by additive fabrication by coating a liquid radiation curable resin comprising from 30 to 80 wt % of cationically curable compounds on a substrate, contacting the liquid radiation curable resin with a previously cured layer, selectively exposing the layer of liquid radiation curable layer to actinic radiation thereby forming a cured layer, separating the cured layer at the substrate, and repeating the steps a sufficient number of time in order to build up a three-dimensional object. Full Article
io Surface preparation for a microfluidic channel By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A microfluidic cartridge having a microfluidic channel may have at least one surface that has been roughened, etched or otherwise treated to alter its surface characteristics. In some instances, a microfluidic cartridge may have a microfluidic channel that is configured to provide even distribution of a lysing reagent across the channel. The surface may be roughened or etched using a laser, an abrasive, application of a solvent or in any other suitable manner. Full Article
io Nitrile rubbers which optionally contain alkylthio terminal groups and which are optionally hydrogenated By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT An improved polymerization and process method allows the production of special nitrile rubbers which are characterized by a specific anion content and an excellent storage stability and allow a particularly good vulcanization rate and moreover result in vulcanized materials that have advantageous properties, especially with regard to the contact with metal components of molded parts based on said vulcanized materials. Full Article
io Method for the production of a layered or stacked inorganic/organic composite material By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The invention relates to a method for the production of a layered or stacked inorganic/organic composite material, a predominantly inorganic material being provided and a polymer material being provided, characterized in that the predominantly inorganic material has a glass transition temperature or melting temperature lower than 500° C., that the predominantly inorganic material and the polymer material are each molten, and that the predominantly inorganic material and the polymer material are coextruded from the melt and thus form the composite material. Full Article
io Curable resin composition and short-cure method By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Disclosed herein is a method for utilizing the exothermic energy generated by a low temperature cure reaction to access a high-temperature cure reaction, which is otherwise energetically inaccessible at a chosen tool temperature, thereby producing a cured resin matrix with properties closely matching to those produced via high-temperature cure reactions but achieved via a short cure time and low cure temperature. Also disclosed is a short-cure resin composition containing: (a) at least one multifunctional epoxy resin having an epoxy functionality of greater than 1; (b) a hardener composition containing (i) at least one aliphatic or cycloaliphatic amine curing agent having one or more amino groups per molecule; (ii) at least one aromatic amine curing agent having one or more amino groups per molecule; and optionally, (iii) an imidazole as curing accelerator. The improved properties of this resin composition include being curable at a temperature of ≦120° C. for a time period of less than 10 minutes to achieve a degree of cure higher than that derived from the same composition with just (i) aliphatic/cycloaliphatic amine or (ii) aromatic amine in isolation. Full Article
io Method for producing a three-dimensional object By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method serves to produce a three-dimensional object by additive construction in direct construction sequence from solidifiable material, which is either present in the starting state in a fluid phase or can be liquefied, where multiple material components are discharged alternately in a programmable manner by means of multiple discharge units and configure different parts of the object joined to one another as a result of the discharge, where the geometric proportions obtained during discharge already correspond to the object, and because the material components form between them either edge regions merging into one another without boundaries or boundary regions of the different material components abutting one another without joining, a method and an object produced therewith can be provided, in which boundary and edge regions are formed “as if from one piece” between different material components even in the case of complex geometries. Full Article
io Injection tool for producing components by injection moulding By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An injection tool for the production of components by an injection-molding method, the injection tool including several cavities for shaping one respective product, an injection nozzle for injecting plastic materials for each cavity, and an actuating device. The injection nozzle has an injection channel which can be closed by a nozzle needle in order to control the injection process. The actuating device is arranged to move the nozzle needle in an axial direction between a first end position and a second end position, with an adjustable stop being provided which defines the first end position. Full Article
io Powder material impregnation method and method for producing fiber-reinforced composite material By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT When a molded fabric body (X) is impregnated with a powder (K) of a predetermined material, there are performed a first step of dispersing the powder (K) in a liquid to prepare a slurry, and a second step of burying the molded fabric body (X) made of fiber bundles in the slurry and vibrating the slurry by use of a predetermined vibrator (M). Furthermore, in the second step, the vibrator (M) is moved along a surface of the molded fabric body (X). As a result, it is possible to improve the rate of impregnation of the powder (K) more than that in the conventional cases, irrespective of the shape of the molded fabric body (X). Full Article
io Retardation compensators of negative C-type for liquid crystal display By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Disclosed is a negative C-type retardation compensator for a liquid crystal display. The negative C-type retardation compensator for the liquid crystal display includes polyarlate having a thio group or a sulfur oxide group in a polymer main chain thereof. Accordingly, the retardation compensator has an absolute value of negative retardation that is larger in a thickness direction that a retardation compensator which includes polyarylate having no thio group or sulfur oxide group in a polymer main chain thereof even though the retardation compensator having the thio group or sulfur oxide group and the retardation compensator having no thio group or sulfur oxide group are the same as each other in thickness. Thereby, the negative C-type retardation compensator for liquid crystal displays is capable of being desirably applied to the liquid crystal displays. Full Article
io Renewable polyester compositions having a low density By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A thermoplastic composition that contains a rigid renewable polyester and has a voided structure and low density is provided. To achieve such a structure, the renewable polyester is blended with a polymeric toughening additive to form a precursor material in which the toughening additive can be dispersed as discrete physical domains within a continuous matrix of the renewable polyester. The precursor material is thereafter stretched or drawn at a temperature below the glass transition temperature of the polyester (i.e., “cold drawn”). This creates a network of voids located adjacent to the discrete domains, which as a result of their proximal location, can form a bridge between the boundaries of the voids and act as internal structural “hinges” that help stabilize the network and increase its ability to dissipate energy. The present inventors have also discovered that the voids can be distributed in a substantially homogeneous fashion throughout the composition. Full Article