y Sulfonamide derivatives of polycyclic dyes used for analytical applications By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT The invention concerns the production of quinoline compounds containing sulfonic acid groups, the said quinoline compounds and their conversion into dyes containing sulfonic acid groups. The dyes according to the invention are used especially to label analytes, for example to label biomolecules. Full Article
y L-proline and citric acid co-crystals of (2S, 3R, 4R, 5S,6R)-2-(3-((5-(4-fluorophenyl)thiopen-2-yl)methyl)4-methylphenyl)-6-(hydroxymethyl)tetrahydro-2H-pyran-3,4,5-triol By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT The present invention is directed to L-proline and citric acid co-crystals of (2S,3R,4R,5S,6R)-2-(3-((5-(4-fluorophenyl)thiophen-2-yl)methyl)-4-methylphenyl)-6-(hydroxymethyl)tetrahydro-2H-pyran-3,4,5-triol, pharmaceutical compositions containing said co-crystals and their use in the treatment glucose-related disorders such as Type 2 diabetes mellitus and Syndrome X. Full Article
y Process for manufacturing partially cross-linked alginate solution By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT Described is a microfluidic process for manufacturing partially cross-linked alginate solution, wherein the alginate solution is a homogenous liquid which exhibits an elastic response (G') which is equal to or greater than its viscous response (G″). In particular, the process may comprise microfluidic mixing of sodium alginate and calcium gluconate solutions to provide an injectable partially cross-linked alginate solution. Full Article
y Polynucleotides for use in medicine By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The invention refers to polynucleotides selected from the group consisting of a) polynucleotides encoding for the polypeptide RBM20 comprising a P638L mutation for a human polypeptide RBM20, or a P641L mutation for a rat polypeptide RBM20, b) polynucleotides with a reverse complementary sequence of the polynucleotide of a) above, and c) polynucleotides with an identity at least 50% to a polynucleotide of a) or b) above. Full Article
y Biocatalysts for ezetimibe synthesis By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The present disclosure relates to non-naturally occurring polypeptides useful for preparing Ezetimibe, polynucleotides encoding the polypeptides, and methods of using the polypeptides. Full Article
y Metabolically engineered cells for the production of resveratrol or an oligomeric or glycosidically-bound derivative thereof By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A recombinant micro-organism producing resveratrol by a pathway in which phenylalanine ammonia lyase (PAL) produces trans-cinnamic acid from phenylalanine, cinnamate 4-hydroxylase (C4H) produces 4-coumaric acid from said trans-cinnamic acid, 4-coumarate-CoA ligase (4CL) produces 4-coumaroyl CoA from said 4-coumaric acid, and resveratrol synthase (VST) produces said resveratrol from said 4-coumaroyl CoA, or in which L-phenylalanine- or tyrosine-ammonia lyase (PAL/TAL) produces 4-coumaric acid, 4-coumarate-CoA ligase (4CL) produces 4-coumaroyl CoA from said 4-coumaric acid, and resveratrol synthase (VST) produces said resveratrol from said 4-coumaroyl CoA. The micro-organism may be a yeast, fungus or bacterium including Saccharomyces cerevisiae, E. coli, Lactococcus lactis, Aspergillus niger, or Aspergillus oryzae. Full Article
y Production of glucose from starch using alpha-amylases from Bacillus subtilis By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An α-amylase from Bacillus subtilis (AmyE) produces significant amounts of glucose from various carbohydrate substrates, including vegetable starch, maltoheptaose, and maltotriose. Among other things, this advantageous property allows AmyE or variants thereof to be used in a saccharification reaction having a reduced or eliminated requirement for glucoamylase. The reduction or elimination of the glucoamylase requirement significantly improves the efficiency of the production of ethanol or high fructose corn syrup, for example. Full Article
y Cytosine analogue, a method of preparation of a cytosine analogue, a DNA methyltransferase 1 inhibitor, a method for DNA methylation inhibition, the use of the analogue in the treatment of diseases associated with deviations from normal DNA methylation By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A cytosine analog, a method of preparation of a cytosine analog, a DNA methyltransferase 1 inhibitor, and a method for DNA methylation inhibition, is provided for the treatment of diseases associated with deviations from normal DNA methylation. The analog of cytosine may be comprised of 1, N4, 5 and 6-substituted derivatives of cytosine or 5,6-dihydrocytosine, wherein the analog can be described by the chemical formula where R1 is H, R3, R4, 2'-deoxyribosyl, R4 is alkyl or aryl, X is N or C, wherein if X in the analog of formula I is N, then R5 is no substituent and if X in the analog of formula I and/or II is C or if X in the analog of formula II is N, then R5 and R6 are independently alkyl, aryl, hydroxyalkyl, aminoalkyl, hydroxyl, carboxyl, amino group, alkoxyl, aryloxyl, aminoalkyl, aminoaryl, thio group, sulfonyl, sulfinyl or halogen. Full Article
y Reduction of ALMS1 gene expression or inhibition of altröm protein to induce cardiomyocyte proliferation By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The present invention relates to the field of cardiology. More specifically, the present invention provides methods and compositions for inducing proliferation of cardiomyocytes. In a specific embodiment, a method for inducing proliferation of cardiomyocytes comprises the step of administering an effective amount of an ALMS1 inhibitor. Full Article
y 1,2,3-Triazolyl purine derivatives By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The present invention relates to novel 1,2,3-triazolyl purine derivatives. The invention also relates to using the derivatives to treat cancer and various viral infections. An example of a 1,2,3-triazolyl purine derivative of the invention is Full Article
y Synthesis and identification of novel RSK-specific inhibitors By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A composition comprising an SL0101 [kaempferol 3-O-(3″,4″-di-O-acetyl-α-L-rhamnopyranoside)] derivative compound that has enhanced ability to inhibit RSK activity, relative to the parent compound is provided. The compounds have utility for treating any disease or conditions characterized or associated with excess or undesirable RSK activity. For example the RSK inhibitors of the present invention can be used to reduce the proliferation of neoplastic cells or for inhibiting the establishment or maintenance of an intracellular pathogenic infection by pathogens whose pathogenicity derives in part from the pathogen's ability to impede endosomal/phagosomal maturation in the host cell. Full Article
y Reagents useful for synthesizing rhodamine-labeled oligonucleotides By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The present disclosure provides reagents that can be used to label synthetic oligonucleotides with rhodamine dyes or dye networks that contain rhodamine dyes. Full Article
y Functionalization and purification of molecules by reversible group exchange By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Embodiments of the present disclosure include methods and compositions for functionalizing molecules, such as oligonucleotides, with functional groups, including polyhistidine tags useful in affinity methods. Some embodiments include methods for modifying and purifying complex mixtures of molecules by exchange of functional tags. Full Article
y Method for producing cationized cellulose and method for producing cationized hydroxyalkyl cellulose By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A production method of a cationized cellulose or a cationized hydroxyalkylcellulose, including step 1 for adding a cationizing agent to cellulose and mechanically decrystallizing the cellulose and step 2 for adding a basic compound to the mixture obtained in step 1 and mechanically decrystallizing the cellulose, or a production method of a cationized cellulose or a cationized hydroxyalkylcellulose, including a step 3 for adding a basic compound to cellulose and mechanically decrystallizing the cellulose and step 4 for adding a cationizing agent to the mixture obtained in step 3 and mechanically decrystallizing the cellulose. The cellulose and the cationizing agent are allowed to react with each other in step 2 or step 4. Full Article
y Cellulose interpolymers and method of oxidation By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT This invention provides cellulose ester interpolymers, and methods of oxidizing cellulose interpolymers and cellulose ester interpolymers. The invention also provides routes to access carboxylated cellulose ester derivatives with high acid numbers wherein the carboxyl group is attached directly to the cellulose backbone by a carbon-carbon bond. Through functionalization of an intermediate aldehyde, the corresponding cationic or zwitterionic cellulose ester derivatives can also be accessed. The interpolymers of the present invention have a number of end-use applications, for example, as binder resins in various types of coating compositions and as drug delivery agents. Full Article
y Cellulose interpolymers and method of oxidation By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT This invention provides cellulose ester interpolymers, and methods of oxidizing cellulose interpolymers and cellulose ester interpolymers. The invention also provides routes to access carboxylated cellulose ester derivatives with high acid numbers wherein the carboxyl group is attached directly to the cellulose backbone by a carbon-carbon bond. Through functionalization of an intermediate aldehyde, the corresponding cationic or zwitterionic cellulose ester derivatives can also be accessed. The interpolymers of the present invention have a number of end-use applications, for example, as binder resins in various types of coating compositions and as drug delivery agents. Full Article
y Cellulose interpolymers and method of oxidation By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT This invention provides cellulose ester interpolymers, and methods of oxidizing cellulose interpolymers and cellulose ester interpolymers. The invention also provides routes to access carboxylated cellulose ester derivatives with high acid numbers wherein the carboxyl group is attached directly to the cellulose backbone by a carbon-carbon bond. Through functionalization of an intermediate aldehyde, the corresponding cationic or zwitterionic cellulose ester derivatives can also be accessed. The interpolymers of the present invention have a number of end-use applications, for example, as binder resins in various types of coating compositions and as drug delivery agents. Full Article
y Coating agent comprising hydroxyalkyl cellulose By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A coating agent containing a hydroxyalkyl cellulose in which a content of hydroxyalkoxy groups within the hydroxyalkyl cellulose is within a range of 40 to 50% by mass, preferably a coating agent containing a hydroxyalkyl cellulose in which the content of hydroxyalkoxy groups is within a range of 40 to 50% by mass and also a viscosity of 2% aqueous solution at 20° C. is within a range of 3.0 to 5.9 mPa·s; and a solid preparation coated with the coating agent. Full Article
y Electronic device provided with cryptographic circuit and method of establishing the same By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The present invention provides for an electronic device having cryptographic computation means arranged to generate cryptographic data within the device for enhancing security of communications therewith, the device including an onboard power supplying means arranged to provide for the driving of the said cryptographic computational means, and so as to provide a device by way of a manufacturing phase and a post manufacturing phase arranged for distribution and/or marketing of the device, and wherein the step of generating the cryptographic data occurs during the post manufacturing phase. Full Article
y Implementing security measures for authorized tokens used in mobile transactions By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Security measures for tokens comprise storing security rules associated with a generated token in a memory. A processor, communicatively coupled to the memory, accesses the security rules associated with the generated token and determines whether to encrypt the generated token by applying at least a portion of the security rules to the generated token. The processor encrypts the generated token. An interface, communicatively coupled to the processor, communicates the encrypted token to a mobile device associated with a user. Full Article
y Systems and methods for data security By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system comprises a basic-input-output-system (“BIOS”), a disk drive, and a security system configured to prevent unauthenticated access to the disk drive. For each of at least two users out of a plurality of users, the BIOS authenticates the user based on the user's token. The BIOS also accesses secured data based on the authentication, and provides the secured data to the security system without input from the user. Full Article
y Multiple volume encryption of storage devices using self encrypting drive (SED) By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method for encrypting data on a disk drive using self encrypting drive is provided. The method includes encryption of data chunks of a computing device. The method further includes associating the encrypted data chunks with encryption key indexes of the computing device. Moreover, the method further includes receiving the encryption key indexes for given logical block addresses of the data chunks. The method further includes determining the encryption keys to be used to encrypt the data chunks based on the encryption key indexes of the data chunks to the disk drive. Full Article
y Efficient storage of encrypted data in a dispersed storage network By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method begins with a processing module obtaining data to store and determining whether substantially similar data to the data is stored. When the substantially similar data is not stored, the method continues with the processing module generating a first encryption key based on the data, encoding the first encryption key into encoded data slices in accordance with an error coding dispersal storage function, and storing the encoded data slices in a dispersed storage network (DSN) memory. The method continues with the processing module encrypting the data using an encryption key of the substantially similar data in accordance with an encryption function to produce encrypted data, compressing the encrypted data in accordance with a compression function to produce compressed data, storing the compressed data when the substantially similar data is stored. Full Article
y Resolution programmable dynamic IR-drop sensor with peak IR-drop tracking abilities By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A data processing system on an integrated circuit includes a core that performs switching operations responsive to a system clock that draws current from the power supply network. An IR-drop detector includes a resistor ladder having outputs representative of an IR-drop caused by the core during the switching operations. The system further includes a plurality of amplifiers coupled to the outputs indicative of the IR-drop, a plurality of flip-flops coupled to the amplifiers, and a variable clock generator. The variable clock generator outputs a sampling clock comprising a group consisting of a variable phase or a variable frequency to the plurality of flip-flops. The flip-flops are triggered by the sampling clock so that the IR-drop at a time during a clock cycle of the system clock can be detected, and the peak IR-drop value for can be tracked. Full Article
y Power-saving network management server, network system, and method of determining supply of power By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A power-saving network management server, which is coupled to a network system including a network device and manages a state of power to the network device, wherein the power-saving network management server is configured to: store network configuration information and task allocation information; determine starting or stopping of the power supply to the port of the network device based on the updated network configuration information and task allocation information; store a determination result of the starting or stopping of the power supply to the port as a port determination result; and control the power supply to the port of the network device based on the port determination result. Full Article
y Energy management device and power management system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An energy management system has an application storage, an application executing unit, a plurality of network interfaces, a policy setting unit configured to set whether each application should be permitted to access each of the network interfaces, a policy storage configured to store identification information for each application set by the policy setting unit, and access permit/inhibit information showing whether the application is permitted to access each of the network interfaces, an I/F management unit managing a correspondence relationship between a network address and each of the network interfaces, and to specify a network interface used by the application executed by the application executing unit, and an access controller configured to judge whether the application executed by the application executing unit is permitted to access the network interface to be used thereby, based on the access permit/inhibit information stored in the policy storage. Full Article
y Host initiated state control of remote client in communications system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system and method for low-cost, fault tolerant, EMI robust data communications, particularly for an EV environment. A data communications method, including a) enabling a transmission of a wake signal from a host to a remote client through an isolator disposed at the remote client when the wake signal is asserted from the host at a host-portion of the isolator concurrent with a periodic enablement of a client-portion of the isolator by the remote client; and thereafter b) transmitting the wake signal from the host to the remote client through the isolator; c) controlling enablement of the client-portion responsive to the wake signal transmitted through the isolator; and thereafter d) disabling the transmission by deassertion of the wake signal at the host. Full Article
y Method and apparatus for power-efficiency management in a virtualized cluster system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method and apparatus for power-efficiency management in a virtualized cluster system. The virtualized cluster system includes a front-end physical host and at least one back-end physical host, and each of the at least one back-end physical host comprises at least one virtual machine and a virtual machine manager. Flow characteristics of the virtualized cluster system are detected at a regular time cycle, then a power-efficiency management policy is generated for each of the at least one back-end physical host based on the detected flow characteristics, and finally the power-efficiency management policies are performed. The method can detect the real-time flow characteristics of the virtualized cluster system and make the power-efficiency management policies thereupon to control the power consumption of the system and perform admission control on the whole flow, thereby realizing optimal power saving while meeting the quality of service requirements. Full Article
y Power shifting in multicore platforms by varying SMT levels By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Power consumption in a microprocessor platform is managed by setting a peak power level for power consumed by a multi-core microprocessor platform executing multi-threaded applications. The multi-core microprocessor platform contains a plurality of physical cores, and each physical core is configurable into a plurality of logical cores. A simultaneous multithreading level in at least one physical core is adjusted by changing the number of logical cores on that physical core in response to a power consumption level of the multi-core microprocessor platform exceeding the peak power level. Performance and power data based on simultaneous multi-threading levels are used in selecting the physical core to be adjusted. Full Article
y Methods and apparatuses for controlling the temperature of a data processing system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Methods and apparatuses to manage working states of a data processing system. At least one embodiment of the present invention includes a data processing system with one or more sensors (e.g., physical sensors such as tachometer and thermistors, and logical sensors such as CPU load) for fine grain control of one or more components (e.g., processor, fan, hard drive, optical drive) of the system for working conditions that balance various goals (e.g., user preferences, performance, power consumption, thermal constraints, acoustic noise). In one example, the clock frequency and core voltage for a processor are actively managed to balance performance and power consumption (heat generation) without a significant latency. In one example, the speed of a cooling fan is actively managed to balance cooling effort and noise (and/or power consumption). Full Article
y Multi-cluster processing system and method of operating the same By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A multi-cluster processing system and a method of operating a multi-cluster processing system are provided. The multi-cluster processing system includes: a first cluster including a plurality of first-type cores: a second cluster including a plurality of second-type cores; and a control unit configured to monitor loads of the first-type cores and the second-type cores, wherein when utilization of at least one of enabled first-type cores exceeds a predetermined threshold utilization of each of the first-type cores, the control unit enables at least one of disabled first-type cores in a first mode, and the control unit enables at least one of the disabled second-type cores and disables the first cluster in a second mode, wherein an amount of computation per unit of time of each of the second-type cores is greater than an amount of computation per unit of time of each of the first-type cores. Full Article
y Image forming apparatus, system-on-chip (SoC) unit, and driving method thereof By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An image forming apparatus is connected to a host device including first and second power domains which are separately supplied with power and includes first and second memories to be disposed in the second power domain, a main controller disposed in the first power domain and to perform a control operation using the first memory in a normal mode, and a sub-controller disposed in the second power domain and perform a control operation using the second memory in a power-saving mode, where when the normal mode is changed to the power-saving mode a power supply to the first power domain is shut off, the first memory operates in a self-refresh mode, and the main controller copies central processing unit (CPU) context information into a context storage unit, and when the power-saving mode is changed to the normal mode, the main controller is booted using the CPU context information stored in the context storage unit. Full Article
y Power supply control system, method, and computer program product By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT According to an embodiment, a control system includes a detector, an estimating unit, a determining unit, and a controller. The detector detects an idle state. The estimating unit estimates an idle period. When the idle state is detected, the determining unit determines whether a first power consumption when writeback of data which needs to be written back to a main storage device is performed and supply of power to a cache memory is stopped, is larger than a second power consumption when writeback of the data is not performed and supply of power is continued for the idle period. The controller stops the supply of power to the cache memory when the first power consumption is determined to be smaller than the second power consumption and continues the supply of power when the first power consumption is determined to be larger than the second power consumption. Full Article
y Security enclave processor power control By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access to the SEP may be strictly controlled by hardware. For example, a mechanism in which the CPUs/APs can only access a mailbox location in the SEP is described. The CPU/AP may write a message to the mailbox, which the SEP may read and respond to. The SEP may include one or more of the following in some embodiments: secure key management using wrapping keys, SEP control of boot and/or power management, and separate trust zones in memory. Full Article
y Memory controller with transaction-queue-monitoring power mode circuitry By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An integrated-circuit memory controller outputs to a memory device a first signal in a first state to enable operation of synchronous data transmission and reception circuits within the memory device. A transaction queue within the memory controller stores memory read and write requests that, to be serviced, require operation of the synchronous data transmission and reception circuits, respectively, within the memory device. Power control circuitry within the memory controller determines that the transaction queue has reached a predetermined state and, in response, outputs the first signal to the memory device in a second state to disable operation of the synchronous data transmission and reception circuits within the memory device. Full Article
y Methods, systems, apparatuses, and computer-readable media for waking a SLIMbus without toggle signal By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Arrangements for restarting data transmission on a serial low-power inter-chip media bus (SLIMbus) are presented. A clock signal may be provided in an active mode to a component communicatively coupled with the SLIMbus. Immediately prior to the clock signal in the active mode being provided, the clock signal may have been in a paused mode. While the clock signal was in the paused mode at least until the clock signal is provided in the active mode, the data line may have been inactive (e.g., a toggle on the data line may not have been present). Frame synchronization data for a frame may be transmitted. The frame synchronization data for the frame, as received by the component, may not match expected frame synchronization data. Payload data may be transmitted as part of the frame to the component, wherein the payload data is expected to be read properly by the component. Full Article
y Experiment manager for manycore systems By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An execution environment may have a monitoring, analysis, and feedback loop that may configure and tune the execution environment for currently executing workloads. A monitoring or instrumentation system may collect operational and performance data from hardware and software components within the system. A modeling system may create an operational model of the execution environment, then may determine different sets of parameters for the execution environment. A feedback loop may change various operational characteristics of the execution environment. The monitoring, analysis, and feedback loop may optimize the performance of a computer system for various metrics, including throughput, performance, energy conservation, or other metrics based on the applications that are currently executing. The performance model of the execution environment may be persisted and applied to new applications to optimize the performance of applications that have not been executed on the system. Full Article
y Network security appliance By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Methods, devices, and systems that may be used to secure networked devices are provided. One method includes receiving, at a security device, encrypted configuration data from a management server connected to a data network, from packets addressed to a networked device. The method further includes managing, by the security device, packets between the networked device and other devices accessible through a network based upon the configuration data. The method further includes sending, by the security device, a plurality of encrypted heartbeat messages to the management server utilizing an address associated with the networked device as the originating address for packets in which the encrypted heartbeat messages are transmitted. Full Article
y Method for operating invisible system services on android platform By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method for operating an invisible system service on Android platform is disclosed. The method for operating system services on Android platform includes selectively registering a created system service in a context manager according to a type of the created system service, where the type of the system service comprises a first type for permitting access from an outside and a second type for not permitting access from the outside, and the selectively registering comprises registering in the context manager the created system service belonging to the first type and not registering in the context manager the created system service belonging to the second type. Full Article
y Variable domain resource data security for data processing systems By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The variable domain data access control system and method described herein use the same variable domain to describe a data security model and a variable domain data model, such as a product configuration model. A variable domain is a set of resource data that can be described using a logical relationship data structure. The variable domain utilizes logical relationship expressions, such as a Boolean logic language, to define resource data in terms of parts, rules and/or attributes, and any other property that can be accessed for viewing, manipulation, or other purposes. The data security model represents an access control list (ACL) that includes security attributes as resource data and uses the same data structure and logical relationship expressions as an associated variable domain data model. An application, such as a configuration engine, can be used to create controlled access to the variable domain data model using the data security model. Full Article
y Managing physical presence across multiple blades By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method uses a firmware interface setup program for a selected compute node (“node”) to cause a firmware interface to enable a trusted platform module (TPM) on the selected node to receive a physical presence (PP) signal. The selected node is selected from a plurality of nodes within a multi-node chassis, wherein each node includes a firmware interface and a TPM. A device within the multi-node chassis is manually actuated to transmit a PP signal to each of the plurality of nodes, such that each node receives the PP signal. The PP signal is asserted to the TPM of the selected node in response to both enabling the TPM of the selected node to be able to receive the PP signal and receiving the PP signal. Still further, the method allows modification of a security setting of the selected node in response to the TPM receiving the PP signal. Full Article
y System, method, and device for delivering communications and storing and delivering data By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is verified, optionally through a downloaded authentication driver. After verifying the wrap, the wrap is opened and a sister of the executable controller is installed into the platform memory to cooperate with the executable controller. Additionally or alternatively, the authentication driver may cooperate with the executable controller. The executable controller allows the platform processor to access data secured in a vault and/or verify the platform to create a connection to a connection server. Full Article
y Secured wireless access system and related method By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The disclosure is directed to a system and method for establishing a secured wireless connection allowing the exchange of information between a wireless device and aircraft equipment. The secured wireless access system may require a user controlling the wireless device to interact with an onboard interface to initiate a connection. The user may be further required to enter a randomly generated security passcode to pair the mobile device to the aircraft equipment. Further security measures may be implemented, such as tiered user access levels restricting certain equipment and/or information based upon a user identity of the user requesting access. Full Article
y Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method By www.freepatentsonline.com Published On :: Tue, 22 Sep 2015 08:00:00 EDT A system is disclosed comprising multiple sets of client computers each client computer having installed thereon an application program The application program comprising client computer specific log-in information, a database system coupled to the set of client computers via a network. The database system having a log-in component for logging-in the client computers, and being partitioned into multiple relational databases each one of which is assigned to one set of the sets of client computers. Each database further storing encrypted data items, each data item being encrypted with one of the user or user-group specific cryptographic keys, the key identifier of the cryptographic key with which one of the data items is encrypted being stored in the database as an attribute of the one of the encrypted data items. The log-in component comprising assignment information indicative of the assignment of the databases to the set of client computers. Full Article
y Biometric attribute anomaly detection system with adjusting notifications By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system, methods and server for monitoring health and safety of individuals in a population and sending alert notifications when exceptions are detected include comparing biometric data obtained from the individuals to a biometric model generated for the individual through computer-learning methods. Biometric data may be gathered by wireless biometric sensor devices which transmit biometric data to receiver devices, which relay the biometric data to a server. The biometric model may be maintained in the server and include nominal and threshold biometric parameters for each individual based on biometric sensor data gathered or analyzed over a period of time. An alert may be issued by the server when an individual's biometric data is outside a threshold in the biometric model. The transmitted alert may depend upon the nature of the exception, user settings and past notification experience. Alerts may be escalated when not answered within defined durations. Full Article
y Diagnostic radio frequency identification sensors and applications thereof By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An integrated passive wireless chip diagnostic sensor system is described that can be interrogated remotely with a wireless device such as a modified cell phone incorporating multi-protocol RFID reader capabilities (such as the emerging Gen-2 standard) or Bluetooth, providing universal easy to use, low cost and immediate quantitative analyses, geolocation and sensor networking capabilities to users of the technology. The present invention can be integrated into various diagnostic platforms and is applicable for use with low power sensors such as thin films, MEMS, electrochemical, thermal, resistive, nano or microfluidic sensor technologies. Applications of the present invention include on-the-spot medical and self-diagnostics on smart skin patches, Point-of-Care (POC) analyses, food diagnostics, pathogen detection, disease-specific wireless biomarker detection, remote structural stresses detection and sensor networks for industrial or Homeland Security using low cost wireless devices such as modified cell phones. Full Article
y Monitoring or feedback systems and methods By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The present invention generally relates to systems and methods for monitoring and/or providing feedback for drugs or other pharmaceuticals taken by a subject. In one aspect, the present invention is directed to devices and methods for determining a species within the skin of a subject; and producing feedback to a subject based on the determination of the species. The feedback may be, for example, visual, audible, tactile, a change in temperature, etc. In some cases, information regarding the determination of the species may be transmitted to another entity, e.g., a health care provider, a computer, a relative, etc., which may then provide feedback to the subject in some fashion. In some cases, the feedback may be directly indicative of the species, e.g., whether the species is present, the concentration of the species, whether a by-product of a reaction involving the species is present, whether a compound affected by the species is present, etc. However, the feedback may also be indirect in some embodiments. For example, the subject may be presented with an external reward, e.g., based on the determination of the species within the skin. For instance, a reward such as cash, coupons, songs, discounts, personal items, etc., may be offered based on the level of compliance of the subject. Still other aspects of the invention are generally directed to kits involving such devices (with or without the drug to be monitored), methods of promoting such systems, or the like. Full Article
y System and method for detecting and preventing drowsiness By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system for preventing drowsiness in a driver by employing a thermal grill. The system includes a detection module and an intervention module. The detection module monitors a driver's parameters to determine whether the driver is drowsy. If the driver is determined to be drowsy, the intervention module activates a thermal grill with interlaced hot and cold regions. This activation causes the hot regions to approach one temperature and the cold regions to approach another. Additionally, this activation leads to an uncomfortable sensation for the driver, alerts the driver, and prevents the driver from getting drowsy. Full Article
y Method and system for determining treatments by modifying patient-specific geometrical models By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Systems and methods are disclosed for evaluating cardiovascular treatment options for a patient. One method includes creating a three-dimensional model representing a portion of the patient's heart based on patient-specific data regarding a geometry of the patient's heart or vasculature; and for a plurality of treatment options for the patient's heart or vasculature, modifying at least one of the three-dimensional model and a reduced order model based on the three-dimensional model. The method also includes determining, for each of the plurality of treatment options, a value of a blood flow characteristic, by solving at least one of the modified three-dimensional model and the modified reduced order model; and identifying one of the plurality of treatment options that solves a function of at least one of: the determined blood flow characteristics of the patient's heart or vasculature, and one or more costs of each of the plurality of treatment options. Full Article
y System and method for automatic detection of a plurality of SPO2 time series pattern types By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The disclosed embodiments relate to pulse oximetry. An exemplary pulse oximeter comprises a probe that is adapted to be attached to a body part of a patient to create a signal indicative of an oxygen saturation of blood of the patient, and a processor that is adapted to receive the signal produced by the probe, to calculate an SPO2 value based on the signal, to detect a plurality of pattern types of SPO2 indicative of pathophysiologic events, and to produce an output indicative of a detected one of the plurality of pattern types. Full Article