| Patent Application Title
||Patent App Num.
| Antitheft system|| 20130120113 || 20130516 |
| In an antitheft system for preventing an equipment comprising moving objects such as electric vehicles or operating machine such as lawnmower from theft, an electronic key is prepared to be carried by an operator of the equipment and stores authenticating data for identifying the operator who carries the electronic key. An authenticator is installed at the equipment and performs authentication check as to whether the electronic key is an authorized key using stored key-checking data, when the authenticating data is outputted from the electronic key, whereas an electronic key copier is provided separately from the equipment and copies the electronic key, thereby enabling to make a copy of the electronic key without activating equipment, while ensuring to prevent the equipment from theft.
| Pipelined analog-to-digital converter|| 20130120173 || 20130516 |
| An analog-to-digital converter includes a plurality of sequentially cascaded stages, each stage including an amplifier and four copies of a circuit block including a flash and capacitors, in which the four copies of the circuit block operate interleavingly in a respective sample mode, pre-gain mode, gain mode, and reset mode of the circuit block, the copies of the circuit block in the sample mode, pre-gain mode, and reset mode are decoupled from the amplifier, and the copy of the circuit block in the gain mode is coupled to the amplifier to produce an output for a next following stage.
| Controlling rights to a drawing in a three-dimensional modeling environment|| 20130120369 || 20130516 |
| A first user having a certain set of privileges with respect to an initial three-dimensional (3D) model associates a watermark with the initial 3D model, so that the watermark is displayed whenever the initial 3D model is viewed or edited. A second user having a smaller set of privileges with respect to the initial 3D model is permitted to view, copy and/or modify the initial 3D model, but is not permitted to remove or alter the content of the watermark. The watermark is continuously displayed as the second user works with the initial 3D model. When the second user applies a change to the initial 3D model, an indication of the modifications applied by the second user is generated and stored with the model data corresponding...|
| Perfect heart: an article of manufacture and method of designing and interacting with a heart having utilitarian measurements|| 20130122239 || 20130516 |
| A design for a perfect geometric heart that has unique properties that make it more useful and practical is disclosed as well as a method for creating hearts for building mosaics and building block games, as well as a method for interacting with a set of such hearts. The top angle of the heart is designed to match the angle of the bottom of another or a similar heart. This way, a copy of the same heart can wedge to the bottom of the heart, and a first heart can wedge a second heart. In addition, an embodiment of such a heart is disclosed in which the top of the heart and the bottom have a matching 90 degree angle, can overlap top to bottom and...|
| System and method of detecting local copy number variation in dna samples|| 20130122499 || 20130516 |
| Systems and methods for measuring local copy number variation in DNA samples are provided. In particular, methods for detecting copy number variation in circulating free DNA (cfDNA) that may be used to assay for copy number variations often corresponding to cancerous cells or tumors are provided.
Subscribe to updates on this page: Copy RSS
| Assay systems for genetic analysis|| 20130122500 || 20130516 |
| The present invention provides assay systems and methods for detection of copy number variation at one or more loci and polymorphism detection at one or more loci in a mixed sample from an individual.
| Geolocation data prioritization system|| 20130122926 || 20130516 |
| Communication session data from a mobile radio communications network (100) is processed to extract substantially all communication session data relating to calls in at least two sectors of the network. This processing occurs as the communication session data becomes available, thereby providing a stream of communication session data (210). From the stream of communication session data (210), a high priority data stream (220) is created. The high priority data steam (220) comprises a minority of the communication session data for each call in the at least two sectors of the network (100). Geolocation data (230) is produced for each call. An immediately accessible copy of both the high priority data stream (220) and the geolocation data (230) is provided, for each call.
| Generation and publication of shared tagsets|| 20130123947 || 20130516 |
| Systems and methods are provided to facilitate receipt of tag requests from one or more interfaces, based upon which a single tagset is compiled at a controller comprising all the requested tags for a given update rate, whereupon the single compiled tagset is subsequently forwarded to the one or more interfaces. A controller generates a superset of tags associated with an industrial process. Each interface can request a copy of the superset, from which the required tags are selected. The controller receives the requested tags from all of the interfaces and combines the requested tags into a single tagset, for a given update rate, comprising the various parameters associated with the tags. At the selected update rate, the tagset is forwarded to the interfaces. A masterset...|
| Method to create a secondary market (exchange) using a web auction to price annuity payments|| 20130124358 || 20130516 |
| The method to create a secondary market using a web auction to price annuity payments comprises of an initial owner, a payor, an entity, an intermediary advisor, an annuity, and a lump sum of money. A plurality of payments is a fixed sum of money. The method also includes a method to create a wide area network, which comprises of a market price assessment module of web auction technology. The market price assessment module comprises of web auction technology comprises of a database module and a due diligence module. The due diligence module comprises of a buyer module, a seller module, and a bidding module. The buyer module comprises of the initial owner, the payor, and a source of funds. The seller module comprises of a...|
| Data processing service|| 20130124466 || 20130516 |
| In general, the subject matter described in this disclosure can be embodied in methods, systems, and program products. A computing system receives a first request to insert one or more first data values into a database table. The computing system identifies that first data stored by the database table is stored in a first logical partition of a logical collection of data. The logical collection of data is designated for replication among multiple data centers such that a copy of the logical collection of data is designated to be stored by each of the multiple data centers. The logical collection of data is logically partitioned into multiple logical partitions which together comprise the logical collection of data. The computing system sends, by the computing system and...|
| Data processing service|| 20130124467 || 20130516 |
| In general, the subject matter described in this disclosure can be embodied in methods, systems, and program products. A system includes a first data center, a second data center, and a third data center. The multiple data centers are configured to replicate a logical collection of data that comprises multiple logical partitions of data. The system comprises a first writing subsystem that is designated to write updates to a copy of a first logical partition of data that is stored by the first data center. The system comprises a second writing subsystem that is designated to write updates to a copy of a second logical partition of data that is stored by the second data center. The system comprises a third writing subsystem that is designated...|
| Data clustering, segmentation, and parallelization|| 20130124474 || 20130516 |
| A first set of original records is processed by a first processing entity to generate a second set of records that includes the original records and one or more copies of each original record, each original record including one or more fields. The processing of each of at least some of the original records includes: generating at least one copy of the original record, and associating a first segment value with the original record and associating a second segment value with the copy. The method also includes partitioning the second set of records among a plurality of recipient processing entities based on the segment values associated with the records in the second set, and, at each recipient processing entity, performing an operation based on one or...|
| System and method for viewer based image metadata sanitization|| 20130124480 || 20130516 |
| A request to access a file comprising content and metadata is received. In response to determining the request is from a source other than an owner of the content (or file), a copy of the content is generated and the content's metadata is modified in order to create modified metadata for the copy of the content. A Uniform Resource Locator (URL) that provides access to the copy of the content and the modified metadata is provided to the source of the request. However, in response to determining the request is from the owner of the content, a URL that provides access to the content and the metadata is provided to the owner of the content.
Subscribe to updates on this page: Copy RSS
| Methods and systems for implementing a cache model in a prefetching system|| 20130124621 || 20130516 |
| The present invention relates to systems and methods of enhancing prefetch operations. One potential method comprises fetching an object from a page on a web server. The method may further include storing, at a proxy server, caching instructions for the fetched object. The proxy server may be connected with the client and the object is cached at the client. Furthermore, the method may include identifying a prefetchable reference to the fetched object in a subsequent web page and using the caching instructions stored on the proxy server to determine if a fresh copy of the object will be requested by the client. Further, the method may include, based on the determination that the object will be requested, sending a prefetch request for the object using an...|
| Prefetching source tracks for destaging updated tracks in a copy relationship|| 20130124803 || 20130516 |
| A point-in-time copy relationship associates tracks in a source storage with tracks in a target storage. The target storage stores the tracks in the source storage as of a point-in-time. A write request is received including an updated source track for a point-in-time source track in the source storage in the point-in-time copy relationship. The point-in-time source track was in the source storage at the point-in-time the copy relationship was established. The updated source track is stored in a first cache device. A prefetch request is sent to the source storage to prefetch the point-in-time source track in the source storage subject to the write request to a second cache device. A read request is generated to read the source track in the source storage following...|
| Storage system and storage subsystem|| 20130124808 || 20130516 |
| Storage system arrangements having status information including both copy group summary status information providing a status of a group of the plurality of copy pairs, and detailed status information detailing a status of a copy pair included in the group; and wherein said status management unit monitors the status information of said plurality of copy pairs, wherein the management computer acquires, from the storage apparatus, the copy group summary status information as summary information for a group of the plurality of copy pairs having a failure status for the group, and displays said summary information on said display, if the summary information indicates a normal status, the management computer displays the summary information only; and if the summary information indicates a failure status, the management computer...|
| Using digital certificates in document distribution|| 20130124869 || 20130516 |
| One embodiment of the present invention provides a system that uses digital certificates to facilitate enforcing licensing terms for applications that manipulate documents. During operation, the system obtains a credential, wherein the credential includes a private key and a digital certificate containing a corresponding public key. This digital certificate also contains a profile specifying allowed operations which can be performed on documents signed with the credential. Next, the system digitally signs a document using the credential, so that the resulting signed document is signed with the private key and includes a copy of the digital certificate with the profile specifying the allowed operations. The certificate issuer can subsequently revoke the digital certificate (which effectively revokes the license) if teens of a license agreement associated with the...|
| Remote copy system and method|| 20130124915 || 20130516 |
| A remote copy system includes a first storage device performing data transmission/reception with a host computer, a second storage device receiving data from the first storage device, and a third storage device receiving data from the second storage device. The first storage device includes a logical volume, the second storage device includes a logical volume being a virtual volume, and the third storage device includes a logical volume. The first storage system changes the state of a first pair of the logical volumes based on the state of a second pair of the logical volumes. With such a remote copy system and a method for use therein, any data backup failure can be prevented.
| Recovering from stack corruption faults in embedded software systems|| 20130124917 || 20130516 |
| A method and system for recovering from stack-overflow or stack-underflow faults without restarting software or hardware. At every task switch operation in an application program, a portion of the memory stack is copied to a backup location, so that portion of the stack can be restored if it is subsequently corrupted by a stack-overflow or stack-underflow fault during the execution of the next task. State variable data is similarly copied to a backup location, so that it can be used to restore or estimate the output of the next task if that task experiences a fault. Techniques are disclosed for selecting which state variable data and which portion of the memory stack to copy to backup, and for detecting a stack-overflow or stack-underflow fault and restoring...|
| Feed-based promotion of service registry objects|| 20130125141 || 20130516 |
| An object is promoted by a governance domain, e.g., to a non-governance domain, by monitoring the object for a lifecycle state transition, publishing, using a processor, an alert as a feed if the monitored object transitions from one lifecycle state to another lifecycle state and exposing an application programming interface through which a production service registry obtains a copy of the monitored object. Correspondingly, a non-governance domain obtains an object through feed-based promotion by subscribing to a feed including information about lifecycle state transitions of an object of interest to the non-governance domain, where the feed is from a governance domain, monitoring the feed for alerts on the object transitioning lifecycle states, notifying a promotion handler on the non-governance domain that the object has transitioned lifecycle...|
| Digital content distribution utilizing dispersed storage|| 20130125190 || 20130516 |
| A computer includes an interface and a processing module. The processing module receives, over time and via the interface, requests to playback recorded broadcast data, wherein a single copy of the recorded broadcast data is dispersed error encoded to produce a plurality of sets of encoded data slices that is stored in a dispersed storage network (DSN). In response to the playback requests, the processing module identifies unique combinations of at least a threshold number of encoded data slices for sets of the plurality of sets of encoded data slices to produce unique copies of the recorded broadcast data. For a particular playback request, the processing module retrieves a unique copy of the unique copies of the recorded broadcast data from the DSN and outputs, via...|
| Network-based revocation, compliance and keying of copy protection systems|| 20130125225 || 20130516 |
| A method of authenticating a device involves establishing a local connection between a local target device and a local source device; at the source device, obtaining credentials of the target device via the local connection; at the source device, sending the credentials to a cloud authentication server via a secure communication channel; at the cloud authentication server, checking the credentials of the target device against a database of known good devices; at the source device, receiving a message from the cloud authentication server via the secure communication channel, said message indicating that the target device is authenticated; and delivering content from the source device to the target device on the condition that the target device is authenticated. This abstract is not to be considered limiting, since...|
| Variably controlling access to content|| 20130125248 || 20130516 |
| A software module is presented that enables a person to determine the relevance of a document while preventing the person from making a copy of the entire document. In one embodiment, this is accomplished by programmatically controlling which portions of a document will be presented to a user and which portions will not be presented to the user. In one embodiment, the software module is used in conjunction with a search engine to present a document search result.
|Optically variable devices, their production and use|| 20130114122 || 20130509 |
| Security documents often incorporate optically variable devices to prevent or hinder counterfeiters. Disclosed herein are layered optically variable devices such as colour-shift foils that employ a piezoelectric layer, and methods for their production and use. Such devices afford new techniques for a user of a security document to check quickly and easily whether the security document is a legitimate document or a counterfeit copy by placing an electrical potential difference across the security document.
|Information processing system and method of controlling the same|| 20130117223 || 20130509 |
| In an information processing system 1 including first to third storage systems 50a to 50c, the first storage system 50a performs stubbing by managing entity data of a file in the second storage apparatus 10b, migration by replicating the data of the file to the second storage apparatus 10b, and recall by writing the entity data of the file from the second storage apparatus 10b back to the first storage apparatus 10a. Moreover, the second storage system 50b performs remote copy by replicating metadata of the migrated file from the first storage apparatus 10a to the third storage apparatus 10c at timing of the migration (synchronously), and replicating the entity data of the file to the third storage apparatus 10c at timing independent of the timing...|
|Objects in a storage environment for connected applications|| 20130117319 || 20130509 |
| In one general aspect, a computer system can include instructions stored on a non-transitory computer-readable storage medium. The computer system can include an application link manager configured to receive an indicator that a first application is linked to a second application, and an object generator configured to store a copy of data from a database of the first application and represented within a user interface of the first application as a core object in a storage environment in response to the indicator that the first application is linked to the second application. The computer system can also include a database link manager configured to link a database of the second application with the core object stored in the storage environment in response to the copy of...|
|Systems, methods, and interfaces for providing electronic book versions within an access device|| 20130117655 || 20130509 |
| A method includes transmitting a first signal associated with a first version of an electronic book. The method also includes detecting an indication of a second version of the electronic book and generating, in response to detecting, and transmitting a second signal associated with an addition instruction and the second version, wherein the addition instruction is adapted to retain the first version and add the second version. Another embodiment includes receiving a copy signal associated with a copy instruction adapted to copy a first set of annotations corresponding to the first version of the electronic book. Another embodiment includes generating and transmitting a delivery signal associated with a second set of annotations and a correlation instruction adapted to correlate the second set of annotations corresponding to...|
|Intrusion prevention system (ips) mode for a malware detection system|| 20130117809 || 20130509 |
| Intrusion prevention system (IPS) mode is provided for a malware detection system. At least one staging server is provided for intercepting an incoming electronic message, making a copy of the intercepted incoming electronic message, and holding the intercepted incoming electronic message until an analysis of the copy of the intercepted incoming electronic message has been completed or until a timeout threshold has been exceeded. A malware detection system is coupled to the at least one staging server. The at least one malware detection system includes at least one decomposition server for receiving the copy of the intercepted incoming electronic message and processing the copy of the intercepted incoming electronic message to detect malware. Multiple mail queues, e.g., incoming, timeout, jail, decomposition, and outgoing, are used to...|
|Authentication system|| 20130117864 || 20130509 |
| An authentication system includes: a host device; a storage device which is electrically connected to the host device through a first interface and which is configured to store contents; and an authentication device which is electrically connected to at least one module included in the storage device and which is configured to store copy protection information for the contents.
|Electronic paper, copy controlling program and copy controlling method|| 20130106808 || 20130502 |
| Disclosed is an electronic paper, which makes it possible to suppress inappropriate operations for copying images displayed and retained on the electronic paper. The electronic paper includes: a gyro sensor and a pressure sensor; a status detecting section to determine whether or not the electronic paper currently enters into a specific status; a counting section to count a number of times the electronic paper enters into the specific status and a display controlling section to make an image display section display a document image thereon. When the status detecting section determines that the electronic paper currently enters in the specific status, and the counting section determines that the number of times the electronic paper has entered into the specific status, is equal to or lower than...|
| Iterative feedback tuning in a scanning probe microscope|| 20110016592 || 20110120 |
| A method, system, device, and software for automatically determining PI feedback parameters in a scanning probe microscopy application setup using an iterative feedback tuning process.
| Copy protection of software and/or data|| 20110016280 || 20110120 |
| Autorun functionality is incorporated into an integrated circuit memory device such as any USB peripheral, which has a memory component interfaced to a USB microcontroller. This provides autorun of one or more executables or application installers from a memory component with a USB interface without an intermediate hardware-based autorun feature. USB peripheral devices internally include a USB microcontroller that performs the functionality associated with identifying the device to a host computing device, such as a personal computer. Autorun firmware is embedded into the USB microcontroller. The autorun firmware enables autorun of an installable or executable application stored on the memory component of the USB device. The firmware acts as bridge component translating all commands and interactions between a host PC and the memory component.
| Line allocation in multi-level hierarchical data stores|| 20110016281 || 20110120 |
| A storage apparatus for storing data is disclosed. The storage apparatus comprises: a plurality of stores having storage locations for storing data items, including a level one store and a level two store the storage apparatus having a hierarchy such that in response to an access request for accessing a data item the level one store is accessed and in response to detecting that the item is not stored in the level one store the level two store is accessed. The storage apparatus is configured to store a copy of at least some items in both of the one level one store and the level two store, the storage apparatus comprising a plurality of indicator storage elements associated with a corresponding plurality of storage locations of...|
| Operating system restoration using remote backup system and local system restore function|| 20110016093 || 20110120 |
| A computer performs a backup operation copying user files and system files to a separate backup system for persistent storage. The system files include restore-point files from a system area of a source system storage device, the restore-point files created by the computer's operating system and being copies of constituent files of the operating system at a point in time. In a subsequent restoration operation, the computer is operated in a limited-functionality recovery mode including (a) executing a recovery program from a recovery storage device to restore the restore-point files from the recovery storage device to a system area of a target system storage device, and (b) executing a system restore function with selected restored restore-point files to restore the operating system. Subsequently, the computer is...|
| Methylene blue based fibred fluorescence microscopy|| 20110015529 || 20110120 |
| The invention relates to a method for the fabric using an acquisition system that includes at acquisition of in-vivo fluorescence imaging from a least one optical fibre exciting the fabric by scanning light beam. According to the invention, the system is used to detect fluorescence signals emitted by the Methylene Blue present in the fabric.
| Method for preparing gynostemma pentaphyllum extract with increasing damulin a and damulin b contents, and pharmaceutical compositions of the same for treating metabolic disease|| 20110015142 || 20110120 |
| Disclosed is an AMPK activating material used for improving and treating metabolic syndrome, in which AMPK (AMP-activated protein kinase) is a main enzyme for regulating an energy sensor and lipid/glucose metabolism in the body. The activation of AMPK inhibits the synthesis of fat and cholesterol, and accelerates the reduction of body fat and blood glucose, thereby improving obesity, diabetes, and hyperlipidaemia. The disclosed AMPK activating material contains, as active ingredients having an improving and treating effect on metabolic syndrome, including obesity, diabetes, and hyperlipidaemia, a novel compound 2α,3β,12β-trihydroxydammar-20(22)-E,24-diene-3-O-[β-D-glucopyranosyl-(1→)-β-D-glucopyranoside], named Damulin A, and a novel compound 2α,3β,12β-trihydroxydammara-20,24-diene-3-O-[β-D-glucopyranosyl-(1→)-β-D-glucopyranoside], named Damulin B. Herein, the contents of damulin A and damulin B (as active indicator ingredients for AMPK activation) can be increased by treating a Gynostemma pentaphyllum extract with high...|
| Method for determining a complete blood count on a white blood cell differential count|| 20110014645 || 20110120 |
| Systems and methods analyzing body fluids such as blood and bone marrow are disclosed. The systems and methods may utilize an improved technique for applying a monolayer of cells to a slide to generate a substantially uniform distribution of cells on the slide. Additionally aspects of the invention also relate to systems and methods for utilizing multi color microscopy for improving the quality of images captured by a light receiving device.
| Nucleic acid signal enhancement using nanoparticle-based hybridization|| 20110014609 || 20110120 |
| A method of enhancing signal detection through use of nanoparticle-conjugated nucleic acid probes is provided. Following chromosomal FISH hybridization of a target sequence with a genomic probe linked to a flag sequence, the flag sequence is hybridized to an anti-flag sequence conjugated to a nanoparticle. The enhanced fluorescent probe is then visualized using microscopy.
| Template free and polymer free metal, nanosponge and a process thereof|| 20110014300 || 20110120 |
| The present invention provides solution to the problem involved in preparation of metal nanosponges using templates and polymers. The instant invention is successful in providing a simple, template free single step process for the preparation of metal nanosponges having porous low density and high surface area. These metal nanosponges were found to be good self-supported substrates for surface-enhanced Raman spectroscopy (SERS) and have shown significant anti-bacterial activity.
| Vaccine composition containing synthetic adjuvant|| 20110014274 || 20110120 |
| Compositions and methods, including vaccines and pharmaceutical compositions for inducing or enhancing an immune response are disclosed based on the discovery of useful immunological adjuvant properties in a synthetic, glucopyranosyl lipid adjuvant (GLA) that is provided in substantially homogeneous form. Chemically defined, synthetic GLA offers a consistent vaccine component from lot to lot without the fluctuations in contaminants or activity that compromise natural-product adjuvants. Also provided are vaccines and pharmaceutical compositions that include GLA and one or more of an antigen, a Toll-like receptor (TLR) agonist, a co-adjuvant and a carrier such as a pharmaceutical carrier.
| Topical agent for dermatological use|| 20110014141 || 20110120 |
| The objective of the present invention was to enhance the skin whitening effects and blackening prevention effects and supply safe and stable topical agents for dermatological use. For that purpose 4-Hydroxyphenyl-α-D-glucopyranoside was combined with auxiliary agents such as ascorbic acid and its derivatives, crude drugs and its extracts, hydroxycarboxylic acid and its salts, oil soluble glycyrrhiza extract, gentian extract, phenol derivatives and their salts, placenta extract, kojic acid and its derivatives, glucosamine and its derivatives, azelaic acid and its derivatives, retinol and its derivatives, pyridoxin and its derivatives, tocopherol and its derivatives, chitosan and its decomposition products, caffeic acid derivatives, hydroxycinnamate and its derivatives, Umbelliferae plant extracts, mycelial cultures and their extracts, plant leaves and their extracts.
| Charging unit, manufacturing method for charging unit, process cartridge and image forming device|| 20110013928 || 20110120 |
| A charging unit is provided, the charging unit including: a charging member; and a charging member clean-up member having an elastic layer, the elastic layer containing a silicon oil, wherein a silicone concentration in analyzing the charging member by an x-ray photoelectron spectroscopy satisfies following condition: about 1 atm %≦(difference between the maximum value and the minimum value of the silicone concentration in Si2p detected by the x-ray photoelectron spectroscopy above the charging member)≦about 3 atm %.
| Method and device for providing a segmented volume data record for a virtual colonoscopy, and computer program product|| 20110013815 || 20110120 |
| A method and a device are disclosed for providing a segmented volume data record for a virtual colonoscopy, the volume data record having image information relating to the intestines of a creature, which intestines have been labeled by a first and a second contrast agent. In at least one embodiment, voxels representing the first contrast agent, voxels representing stool remains labeled by the second contrast agent and voxels representing intestinal tissue are segmented, the segmentation taking place in a volume data record recorded of the body region of the creature having the intestines, which have been labeled by a first and a second contrast agent. In at least one embodiment, at least sections of the intestinal wall are displayed on the basis of the segmentation in...|
| Use of copyright text in key derivation function|| 20110013773 || 20110120 |
| Consistent with embodiments of the present invention, systems and methods are disclosed for deriving a secure key. In some embodiments, a method for deriving a key may be provided comprising: generating a first input value; loading a first register with the first input value; generating a second input value; loading a second register with the second input value; updating the first register and the second register at the same time, where the step of updating comprises: applying a first update function to the current value of the second register to determine a third input value; applying an XOR function to the third input value and a fixed string to determine a fourth input value, wherein the fixed string contains a legal notice; incrementing an offset to...|
| Optically-readable disk with copy protection device|| 20110013503 || 20110120 |
| An optically-readable disk includes a device that disrupts readability of the disk when the disk is spun at an angular velocity substantially greater than required to play the disk in its intended playing device, or when a defined integral of velocity and time is exceeded. The device may include a fluid container that disperses a data-disruptive fluid. The device may include a membrane or layer that is disrupted when the disk is rotated above a defined angular velocity, or when a defined integral of velocity and time is exceeded. The device may include an electro-optical material that is activated by an electrical signal from a controller in response to an input from a sensor responsive to motion of the disk.
| Method for attenuated total reflection far ultraviolet spectroscopy and an apparatus for measuring concentrations therewith|| 20110013193 || 20110120 |
| In far ultraviolet spectroscopy using attenuated total reflection, total reflection light is measured by using evanescent waves of total reflection light. The penetration depth thereof is equal to or larger than 150 nm in a wavelength range in the far ultraviolet range wherein the penetration depth depends on a wavelength of the far ultraviolet light, refractive index of an object to be measured, refractive index of optical material of the probe and incident angle of the far ultraviolet light at an interface between the probe and the object. The attenuated total reflection probe is made of an optical material selected so as to have the penetration depth equal to or higher than 150 nm in far ultraviolet wavelength range, and the probe makes contact with the...|
| Cryogenically cooled superconductor gradient coil module for magnetic resonance imaging|| 20110012599 || 20110120 |
| Methods and/or apparatuses for magnetic resonance imaging (MRI) and/or magnetic resonance spectroscopy comprising a superconducting gradient coil module configured for cryogenic cooling. Such a superconducting gradient coil module may comprise a vacuum thermal isolation housing comprising a double wall hermetically sealed jacket that (i) encloses a hermetically sealed interior space having a first vacuum pressure, and (ii) substantially encloses a vacuum space having a second vacuum pressure; at least one superconductor gradient coil disposed in the vacuum space; a thermal sink member disposed in the vacuum space and in thermal contact with the at least one superconductor gradient coil; and a port configured for cryogenically cooling at least the thermal sink member.
| Semiconductor wafer, method of manufacturing a semiconductor wafer, and semiconductor device|| 20110012178 || 20110120 |
| Provided is a semiconductor wafer comprising a group 3-5 compound semiconductor layer containing arsenic; and an insulating layer that is an oxide, a nitride, or an oxynitride, wherein arsenic oxides are not detected between the semiconductor layer and the insulating layer. This semiconductor wafer may be such that, when using X-ray photoelectron spectroscopy to observe photoelectron intensity of an element existing between the semiconductor layer and the insulating layer, an oxide peak caused by oxidized arsenic is not detected on a higher bonding energy side of an element peak caused by the arsenic.
| Magnetic lens, method for focusing charged particles and charged particle energy analyzer|| 20110012018 || 20110120 |
| The invention provides a magnetic lens for generating a magnetic imaging field to focus charged particles emitted from a sample, the lens comprising a central pole piece and an outer pole piece disposed about the central pole piece, wherein the lens comprises a magnetic moveable element for movement relative to at least one of the pole pieces, whereby a focal length of the lens is variable by said movement of the magnetic moveable element, thereby enabling a zoom facility for changing the magnification of an image. The movement of the moveable element preferably changes the magnetic circuit between the pole pieces. Also provided is a method of focusing charged particles emitted from a sample and a charged particle energy analyzer, such as an imaging photoelectron spectroscopy...|
| Cryogenically cooled superconductor rf head coil array and head-only magnetic resonance imaging (mri) system using same|| 20110011102 || 20110120 |
| A cryogenically-cooled superconducting RF head-coil array which may be used in whole-body MRI scanners and/or in dedicated, head-only MRI systems. An RF head-coil array module may comprise a vacuum thermal isolation housing comprising a double wall hermetically sealed jacket that (i) encloses a hermetically sealed interior space under a vacuum condition, and (ii) substantially encloses an interior chamber region that is separate from the hermetically sealed interior space and is configured to be evacuated to a vacuum condition. A plurality of superconductor radiofrequency coils are disposed in the interior chamber region, and each radiofrequency coil is configured for at least one of generating and receiving a radiofrequency signal for at least one of magnetic resonance imaging and magnetic resonance spectroscopy. At least one thermal sink member...|
| Protected metallic tip or metallized scanning probe microscopy tip for optical applications|| 20110010808 || 20110113 |
| The present invention generally relates to a protected metallic or metallized scanning probe microscopy tip for apertureless near-field optical applications which comprise a metallic tip or a metallic structure covering a scanning probe microscopy tip, protected by an ultrathin dielectric layer. In one embodiment, the protective layer is comprised of SiOx, AI2O3, or any other hard ultrathin dielectric layer that extends the lifetime of the tip by providing mechanical, chemical, and thermal protection to the entire structure.
| Standalone solution for serial copy management system (scms) compliance|| 20110010778 || 20110113 |
| Standalone serial copy management system (SCMS) compliance with respect to distributing and receiving protected digital media is disclosed. In general, when a digital media file is selected for transfer or reception between a computing system and another device, serial copy management system copy/playback information for the digital media file is accessed. If the serial copy management system copy/playback information comprises unrestricted copy/playback information the SCMS may utilize a common transfer pathway for the transfer or reception. However, if the serial copy management system copy/playback information comprises controlled copy/playback information the SCMS utilizes a new pathway distinct from said common transfer pathway for the transfer or reception of digital media, providing complete copyright protection from point of entry. In so doing, standalone SCMS compliance uses technological measures...|
| Forensic toolkit and method for accessing data stored on electronic smart cards|| 20110010765 || 20110113 |
| A tool kit for accessing data stored on an electronic SMART card is provided, the kit comprising a SMART card reader and recorder, at least one storage card, and a control card. The card reader and recorder is operative to read and copy the electronic SMART card onto the storage card, and to read the control card, the storage card comprising a storage card security key. The control card comprises code generation means operative to generate a control card security key, copying of the electronic SMART card onto the storage card being prevented unless the control card security key is verified against the storage card security key.
| Tool and method for generating passwords|| 20110010763 || 20110113 |
| A grid is provided for creating secure and confidential passwords for use in sign-in procedures on electronic user accounts. The tool includes a grid having multiple rows and columns defining cells, with each cell having randomly assigned keyboard characters, such as letters, numbers, and symbols. A user creates a password by selecting a starting cell, and progressing in a user-selected pattern through a pre-selected number of cells. Multiple unique grids may be provided in hard copy or digital form for use in creating multiple passwords which may be created using the same or different starting cells and/or patterns.
| Methods for improving atomicity of runtime inspections|| 20110010712 || 20110113 |
| A method for achieving atomicity while inspecting a running computer process using a copy-on-write process in a supervisor to generate a copy of a target's memory page being written to, prior to executing the write, the copy along with any unwritten to memory pages in the target being mapped to a measurement agent (MA) and used to reflect the state of the target at a particular moment in time which state when observed by the MA provides an atomic runtime inspection.
| Image transfer between processing devices|| 20110010710 || 20110113 |
| Methods and devices are provided for copying an image of a medium of a first processing device to a virtual medium of a second processing device. Virtual machine configuration information may be created based on hardware configuration information from the first processing device. The image and the virtual machine configuration information may be copied, or written, to the virtual medium. Instructions may be provided to the second processing device for launching a virtual machine to execute an operating system copied from the image to the virtual medium. At least one executable application copied from the image to the virtual medium may be executed by the virtual machine launched on the second processing device. In some embodiments, the second processing device may provide remote access to the...|
| System, method, and apparatus for inline comments within electronic communications|| 20110010665 || 20110113 |
| A communication apparatus which facilitates inline comments includes a client processing unit and an electronic memory device. The client processing unit receives an electronic communication and generates a reply communication for response to the electronic communication in an inline comment mode. The reply communication includes a copy of original content from the electronic communication. The electronic memory device is coupled to the client processing unit. The electronic memory device stores a plurality of inline comment rules. The inline comment rules facilitate adjoining comment content to the copy of original content within the reply communication according to user commands. The comment content is uniquely identified from standard response content according to the inline comment rules in effect during the inline comment mode.
| Booting method and computer system using the booting method|| 20110010532 || 20110113 |
| A booting method adaptable to a computer system having a processor, a memory and a bootable medium, wherein the bootable medium has an operating system, the booting method comprises the steps of activating a basic input/output system (BIOS); reserving a reserved area in the memory according to a setting of a setting space; copying the operating system from the bootable medium to the reserved area as an operating system copy; and activating the operating system copy from the reserved area.
| Simd processor array system and data transfer method thereof|| 20110010524 || 20110113 |
| There is provided an SIMD processor array system in which data can be efficiently transferred between processor elements located at different distances. The SIMD processor array system includes a control processor (CP) that is capable of issuing a plurality of instructions at the same time, and a PE array that includes a plurality of mutually-connected processing elements (PEs) to be controlled by the CP. The CP issues an inter-PE data shift instruction to each PE. According to the inter-PE data shift instruction, each PE performs a data sending operation of copying all the contents of a transfer data storing part of an adjoining PE to a transfer data storing part (MBF) of the own PE, and a data fetch operation of copying part or all of...|
| Backup of virtual machines using cloned virtual machines|| 20110010515 || 20110113 |
| A system and method for creating a backup of a virtual machine running on a host computer is described herein. The system and method operate by creating a copy or “clone” of a virtual machine running on a first host computer on a second host machine connected thereto. After generation of the clone, a backup of the virtual hard disk of the clone can be obtained in a manner that does not consume any resources of the first host machine. The backup of the virtual hard disk of the clone can then be used as the backup of the original virtual machine.
| Copyright detection and protection system and method|| 20090328236 || 20091231 |
| A method for detecting against unauthorized transmission of digital works comprises the steps of maintaining a registry of information permitting identification of digital copyrighted works, monitoring a network for transmission of at least one packet-based digital signal, extracting at least one feature from the at least one digital signal, comparing the extracted at least one feature with registry information and applying business rules based on the comparison result.
| Data processing system, data processing method, and program|| 20090328218 || 20091231 |
| A log output device and a program are provided, which append a signature to a log, prevent an undetectable tampering (alteration, insertion, deletion, etc.), and are able to narrow tampered position if tampered. The log output device forms a log record including a data part and a hash part, and outputs to a disk; the hash part is formed by combining a hash of the data part (data hash) and a hash of the hash part of the previous record (link hash); a signature is appended to only a part of records of a hash chain; when outputting the record to the disk, a copy of the hash part of the record is maintained on a process memory; when outputting next record, the hash part of...|
| Granting least privilege access for computing processes|| 20090328180 || 20091231 |
| Embodiments provide a security infrastructure that may be configured to run on top of an existing operating system to control what resources can be accessed by an applications and what APIs an application can call. Security decisions are made by taking into account both the current thread's identity and the current thread's call chain context to enable minimal privilege by default. The current thread context is captured and a copy of it is created to be used to perform security checks asynchronously. Every thread in the system has an associated identity. To obtain access to a particular resource, all the callers on the current thread are analyzed to make sure that each caller and thread has access to that resource. Only when each caller and thread...|
| Network based management of visual art|| 20090328117 || 20091231 |
| Works of visual art are provided over a digital television provider network for local display by a user. Live or substantially live video of works of visual art may be streamed to the user's location. Alternatively, still images of the works of visual art may be captured and stored as electronic files. Network-based servers may feed the streaming video or electronic data from still images to one or more set-top boxes in a user's home for a limited period. Selectable icons permit users to select images for purchase in electronic form or in hard-copy form.
| Http based bounding storage space protocol|| 20090328060 || 20091231 |
| In a response based messaging system in which the reliability of the message transmission is supplemented by storing at both the source and destination a copy of the message, storage space is bounded. By including in the response to a message acknowledgement from the destination that the message has been received, the copy of the message stored at the source can be deleted. Furthermore, by including in the message an identifier of what message acknowledgement the source is expecting, the destination can delete from its storage medium any previously stored messages.
| Optimizing primitives in software transactional memory|| 20090328018 || 20091231 |
| A compiler is provided that determines when the use of software transactional memory (STM) primitives may be optimized with respect to a set of collectively dominating STM primitives. The compiler analysis coordinates the use of variables containing possible shadow copy pointers to allow the analysis to be performed for both direct write and buffered write STM systems. The coordination of the variables containing the possible shadow copy pointers ensures that the results of STM primitives are properly reused. The compiler analysis identifies memory accesses where STM primitives may be eliminated, combined, or substituted for lower overhead STM primitives.
| Coordinating updates to replicated data|| 20090327817 || 20091231 |
| Techniques for coordinating updates to replicated data are disclosed. For example, in a system comprised of a plurality of nodes, a method for maintaining consistent copies of data across said nodes comprises the following steps. A copy of an object o1 is maintained by a plurality of nodes. In response to a request r1 to update a copy of object o1, a message is sent to at least some of said plurality of nodes instructing a node receiving the message to invalidate its copy of object o1. In response to a node n1 receiving an invalidation message arising from r1 wherein n1 is processing another request r2 to update object o1, requests r1 and r2 are coordinated to prevent the requests from causing conflicting updates or...|
| Information recording/reproduction apparatus and system|| 20090327726 || 20091231 |
| According to one embodiment, a data transmission control section ends transmission of a title without copyright protection at time t2. When transmission time of the title exceeds prescribed time, interruption of the transmission is posted to a reception-side device, and a key discard/creation section creates a new encryption key. A copyright-protected title is transmitted to the reception-side device by using the new key.
| Process and streaming server for encrypting a data stream with bandwidth based variation|| 20090327698 || 20091231 |
| There is disclosed a process for encrypting a data stream to secure the data stream for single viewing and to protect copyrights of the data stream. Specifically, there is disclosed a process for protecting streaming multimedia, entertainment and communications in an Internet-type transmission. There is further disclosed a streaming server component operably connected with a streaming server that interacts with a client system to affect the inventive process.
| Security system for computers|| 20090327637 || 20091231 |
| A security system designed to trap computer viruses is described. The system storage has an external alarm configured to monitor the time every file takes to load by monitoring the drive activity LED of the storage device. The document storage location is hidden and can optionally be accessed via password. If a virus spends an unexpected amount of time attempting to access storage the alarm will trigger. Downloads and other untrusted files are stored in quarantine storage. Documents can only be transferred from the quarantine storage to the system storage via a copy and paste program.
| Copying workload files to a virtual disk|| 20090327632 || 20091231 |
| The present invention is directed to a system and method for transferring workload files on a host to a Virtual Machine (VM) destination disk without the need for the VM to be running. This accomplished by creating a VM disk device interface to move data from the workload files to the VM destination disk. The VM disk device interface comprises a device driver to interact with the VM destination disk and destination access software utilizing standard operating system procedures to access the VM destination disk.
| Storage system, copy control method, and copy control unit|| 20090327631 || 20091231 |
| A system and method of controlling copying including a management table for managing an update target data in a first storage volume and stored locations of before-update data of the update target data in a second storage volume, and relocating data in the second storage volume upon confirming a predetermined range of the first storage volume has been copied into the second storage volume using the management table.
| Remote copy method and remote copy system|| 20090327629 || 20091231 |
| In a configuration in which it is necessary to transfer data from a first storage system to a third storage system through a storage system between the storage systems, there is a problem that it is inevitable to give an excess logical volume to a second storage system between the storage systems. A remote copy system includes first storage system that sends and receives data to and from an information processing apparatus, a second storage system, and a third storage system. The second storage system virtually has a second storage area in which the data should be written and has a third storage area in which the data written in the second storage area and update information concerning the data are written. Data sent from the...|
| Methods and systems for management of copies of a mapped storage volume|| 20090327626 || 20091231 |
| Methods and systems for rapid creation of copies of a mapped storage volume. A new copy of a mapped storage volume is created by copying the mapping table and updating meta-data associated with the new copy and any ancestral parents thereof. The physical blocks remain untouched when creating a new copy as does any meta-data associated with the physical blocks. Rather, reference meta-data associated with each physical block is updated only in response to processing of a write request to an identified block of an identified copy of the mapped storage volume. Thus copy creation is rapid as compared to prior techniques reliant on reference counters.
| System, method and computer program product for copying data|| 20090327627 || 20091231 |
| A storage system and a method for copying data is provided. The method includes storing data at a first storage unit of a primary site, transferring the data from the first storage unit to a second storage unit of a remote site and updating shadow storage unit metadata to reflect the storing of the data at the first storage unit, and copying, in response to the updating of the shadow storage unit metadata, the data from an entity that differs from the shadow storage unit to a third storage unit.
| Asynchronous data mirroring with look-ahead synchronization record|| 20090327601 || 20091231 |
| A data storage system is provided. The system includes a primary storage subsystem, which includes first non-volatile storage media and a secondary storage subsystem, which includes second non-volatile storage media, wherein the primary storage subsystem is arranged to receive data from a host processor for writing to a specified location, and to store the data in the specified location on the first non-volatile storage media while copying the data to the second storage subsystem, which is arranged to store the data in the specified location on the second non-volatile storage media so as to create a mirror on the secondary storage subsystem of the data received by the primary storage subsystem, and wherein the primary storage subsystem is arranged to maintain a record of locations to...|
| Optimized cache coherency in a dual-controller storage array|| 20090327600 || 20091231 |
| Data is cached in a dual-controller storage array having a first cache controlled by a first controller, a second cache controlled by a second controller, and a shared array of persistent storage devices, such as disk drives. When one of the controllers receives a write request, it stores the data in persistent storage, stores a copy of that data in the first cache, and transmits identification data to the second controller that identifies the data written to persistent storage. Using the identification data, the second controller invalidates any data stored in the second cache that corresponds to the data that the first controller wrote to persistent storage. If a controller receives a read request, and the requested data is validly stored in its cache, the controller...|
| Table journaling in flash storage devices|| 20090327589 || 20091231 |
| A method of table journaling in a flash storage device comprising a volatile memory and a plurality of non-volatile data blocks is provided. The method comprises the steps of creating a first copy in a first one or more of the plurality of non-volatile data blocks of an addressing table stored in the volatile memory, writing transaction log data to a second one or more of the plurality of non-volatile data blocks, and updating the first copy of the addressing table based on changes to the addressing table stored in the volatile memory after the second one or more of the plurality of non-volatile data blocks have been filled with transaction log data.
| Copy equivalent protection using secure page flipping for software components within an execution environment|| 20090327575 || 20091231 |
| Embodiments of copy equivalent protection using secure page flipping for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor (VMM), Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise compromised operating system environment. In an embodiment, an embedded VM is allowed to directly manipulate page table mappings so that, even without running the VMM or obtaining VMXRoot privilege, the embedded VM can directly flip pages of memory into its direct/exclusive control and back. Other embodiments may be described and claimed.
| Copying entire subgraphs of objects without traversing individual objects|| 20090327377 || 20091231 |
| Copying or compacting performance in garbage collection is improved by copying a first memory area (preferably comprising multiple objects) to a second memory area without traversing individual objects in the copied memory area and adjusting all copied memory locations identified as pointers in a metadata data structure. An entire linearized subgraph of the object graph can be copied at a time.
| Method and apparatus for performing concurrent garbage collection|| 20090327374 || 20091231 |
| One embodiment of the present invention provides a system that facilitates performing concurrent garbage collection. Note that the system uses hardware-supported GC barriers. During operation, the system executes a first mutator thread. While executing the first mutator thread, the system performs a garbage-collection operation using a garbage-collector thread. Performing the garbage-collection operation involves: discovering a live object in a from-space, which is being collected; creating a copy of the live object to a to-space, where live objects are copied to during garbage collection; and replacing the live object in the from-space with a forwarding pointer which points to a location of the copy of the live object in the to-space. Note that in some embodiments, the system marks cache lines comprising the live object in from-space...|
| Method and system for copying a file using a portable electronic device|| 20090327365 || 20091231 |
| A plurality of location identifiers are stored that include a location identifier of a removable memory and a location identifier of a memory of a portable electronic device. A file is stored in a memory of the portable electronic device, where the file is associated with the location identifier of the memory. In response to a user interaction with a user interface of the portable electronic device, the location identifier of the removable memory is associated with the file, where the user interaction includes a user selection of the file to copy. In response to the associating the location identifier of the removable memory with the file, the file is copied from the memory of the portable electronic device to the removable memory.
| Systems and methods for processing electronically transmitted healthcare related transactions|| 20090327363 || 20091231 |
| Systems and methods for the processing, modifying, and/or performance of a clinical, administrative and/or financial “value-add” service to an electronic healthcare related transaction from a healthcare provider to a third party such as a pharmacy. A prescription switch provider receives an incoming transaction from a healthcare provider system. The switch provider may then parse the transaction to review or modify data contained in the transaction and/or perform a value-add service or function based on the data contained in the transaction. Alternatively, the switch provider may copy the transaction for parallel processing. The transaction may be forwarded to a third party system, and a response message from the switch provider or the third party may be transmitted to the healthcare provider system pertaining to the modified transaction...|
| Data replication feedback for transport input/output|| 20090327361 || 20091231 |
| Architecture for efficiently ensuring that data is stored to the desired destination datastore such as for replication processes. A copy of data (e.g., messages) sent to a datastore for storage is stored at an alternate location until a received signal indicates that the storage and replication was successful. As soon as the feedback signal is received, the copy is removed from the alternate location, and hence, improves input/output (I/O) and storage patterns. The feedback mechanism can also be used for monitoring the status of data transport associated with log shipping, for example, and taking the appropriate actions when storage (e.g., replication) is not being performed properly.
| Method of checking version number of encryption information, and optical disc playback device|| 20090327359 || 20091231 |
| According to an embodiment of the present invention, the version number of encryption information on the device being used can be checked easily by the user by means of an external command. If this is a defect information version number, playback is not performed, and a display that prompts updating of the encryption information is made as required.
| System and method for coordinating a point-in-time copy among multiple data providers|| 20090327355 || 20091231 |
| A system and method for coordinating a point-in-time copy (PITC) of a file or set of data distributed (e.g., striped) across multiple data providers (e.g., filers, file servers, storage arrays). A service coordinator receives a PITC request for a parent file, initializes the PITC's metadata and instructs the data providers to generate PITC subcomponents for the portions (e.g., sub-mirrors) of the file that they store. A scoreboard is created to track the status of the PITC, and includes an entry for each PITC subcomponent. Quality of service characteristics for the PITC may be copied from the parent and/or received with the request. If those characteristics cannot be attained, the PITC may be aborted. As PITC subcomponents are completed, they are returned to the service coordinator for...|
| Ensuring consistency among shared copies of a data element|| 20090327292 || 20091231 |
| Disclosed is a “light weight” protocol used to coordinate shared copies of a data element. A central repository holds a master copy of the data element. Applications “subscribe” to the data element (or to an aspect of it) by sending a message to the central repository. Whenever the data element (or aspect) is changed, applications that have subscribed to the data element (or aspect) are notified of the change. When an application wishes to change the value of a subscribed aspect, it sends an update request to the central repository. The central repository changes the master copy of the data aspect to the requested value and then informs all subscribed applications of the new data value. If two applications both wish to change the value of...|
| Primitives for software transactional memory|| 20090327291 || 20091231 |
| Software transactional memory (STM) primitives are provided that allow the results of prior open calls to be used by subsequent open calls either as-is or through another STM primitive that consumes the results of the previous invocation. The STM primitives are configured to ensure that the address of a shadow copy representing a memory location will not changed across a wide range of operations and thereby enable re-use of the shadow copy.
| Method and apparatus for searching and resource discovery in a distributed enterprise system|| 20090327250 || 20091231 |
| A method for searching and resource discovery in a distributed enterprise (DE), the method including: generating a first classifier for a first repository in the DE; generating a second classifier for a second repository in the DE, where the second classifier has a vector element identifying a location of the second repository; submitting a copy of the second classifier to a web server of the first repository; obtaining a resource at the first repository after submitting the copy of the second classifier; matching the resource to the copy of a second classifier; sending a copy of the resource to the second repository using the vector element; and storing the copy of the resource in the second repository.
| Global identity protector e-commerce payment code certified processing system|| 20090326972 || 20091231 |
| An identity theft protection system and method which employs several security features to prevent identity theft on all levels. The system employs a member's address and telephone number as a Global Identity Protector, security code and lock for social security numbers, to prevent the issuing of identity theft debit or credit cards, online and over the telephone, and mail. The locking address also prevents account hijacking, preventing checks and credit cards from being mailed to identity thieves. The address blocks fraud on anything that is mailed. The system employs a computer generated photo copy of the member's ID or drivers license, to prevent fraud on all big, and small ticket items, and preventing identity theft bank fraud on checking accounts and medical records. The system protects...|
|Percutaneous myocardial revascularization|| 20080314394 || 20081225 |
| Devices and methods for creating a series of percutaneous myocardial revascularization (PMR) channels in the heart. One method includes forming a pattern of channels in the myocardium leading from healthy tissue to hibernating tissue. Suitable channel patterns include lines and arrays. One method includes anchoring a radiopaque marker to a position in the ventricle wall, then using fluoroscopy repeatedly to guide positioning of a cutting tip in the formation of multiple channels. Another method uses radiopaque material injected into each channel formed, as a marker. Yet another method utilizes an anchorable, rotatable cutting probe for channel formation about an anchor member, where the cutting probe can vary in radial distance from the anchor. Still another method utilizes a multiple wire radio frequency burning probe, for formation...|
|Scanning probe microscopy inspection and modification system|| 20080315092 || 20081225 |
| A scanning probe microscopy (SPM) inspection and/or modification system which uses SPM technology and techniques. The system includes various types of microstructured SPM probes for inspection and/or modification of the object. The components of the SPM system include microstructured calibration structures. A probe may be defective because of wear or because of fabrication errors. Various types of reference measurements of the calibration structure are made with the probe or vice versa to calibrate it. The components of the SPM system further include one or more tip machining structures. At these structures, material of the tips of the SPM probes may be machined by abrasively lapping and chemically lapping the material of the tip with the tip machining structures.
|Infrared spectrometer|| 20080315102 || 20081225 |
| Method and apparatus for detecting, by absorption spectroscopy, an isotopic ratio of a sample, by passing first and second laser beams of different frequencies through the sample. Two IR absorption cells are used, a first containing a reference gas of known isotopic ratio and the second containing a sample of unknown isotopic ratio. An interlacer or reflective chopper may be used so that as the laser frequencies are scanned the absorption of the sample cell and the reference cell are detected alternately. This ensures that the apparatus is continuously calibrated and rejects the baseline noise when phase sensitive detection is used.
|Light emitting device|| 20080315235 || 20081225 |
| A light emitting device is provided that has a semiconductor light emitting element and a phosphor which converts a part of the luminescence spectrum emitted from the semiconductor light emitting element. The luminescence spectrum of the semiconductor light emitting element is located between a near ultraviolet region and a short-wavelength visible region, and the phosphor is made by adding a red luminescent activator to a base material of a blue luminescent phosphor. Thereby, improving the color shading generated by the dispersion of the spectra of the light emitting elements and obtaining the light emitting device having a high brightness and a good color rendering properties. With the light emitting device, it is possible to provide the light sources for the lighting apparatus of medical treatments, the...|
|Security feature for security documents|| 20080315574 || 20081225 |
| The invention relates to a security feature (8) for security documents (9), in particular bank notes. A first body colour (51) is applied in a first region (1) and a printing ink (53), in particular a day luminescent dye, is applied in an illuminating region (3). The printing ink (53) is applied outside the copy dye range of the four colour prints according to the Europe-scale or DIN-scale. According to the invention, a first mixed colour (54) of the first body colour (51) and the printing ink (53) is applied in a first overlapping region (13), and the first mixed colour (54) is arranged outside the copy dye range or in the edge region of the copy dye range, in order to increase protection against forgery.
|Biological detector and method|| 20080315875 || 20081225 |
| A biological detector includes a conduit for receiving a fluid containing one or more magnetic nanoparticle-labeled, biological objects to be detected and one or more permanent magnets or electromagnet for establishing a low magnetic field in which the conduit is disposed. A microcoil is disposed proximate the conduit for energization at a frequency that permits detection by NMR spectroscopy of whether the one or more magnetically-labeled biological objects is/are present in the fluid.
|Spectroscope and method performing spectroscopy utilizing an adaptive optical element|| 20080316484 || 20081225 |
| A spectroscope designed to utilize an adaptive optical element such as a micro mirror array (MMA) and two distinct light channels and detectors. The devices can provide for real-time and near real-time scaling and normalization of signals.
|Image processing apparatus, image processing method, and storage medium for preventing unjust copying|| 20080316516 || 20081225 |
| An image processing apparatus including an image input module configured to input a document image; a detect module configured to detect whether copy control information is provided with document image data of the document image; a transfer module configured to transfer the document image data through a network in case the detect module detects the copy control information; an edit module configured to edit the document image data, and create an edited image according to the copy control information; and an image output module configured to output the edited image.
|Device using low visibility encoded image to manage copy history|| 20080316538 || 20081225 |
| The present invention relates to an image forming device using a low visibility information embedding technique to manage a copy history of an original. The image forming device embeds history information with the use of small dots disappearing by copying, and coordinate information on a region embedded with the history information with the use of large dots not disappearing even by copying. Upon first copying, the image forming device newly creates both of the large dot coordinate information and the small dot history information, and embeds them. Upon second or later copying, the image forming device updates the history information having been read out of the original with that on the current copying, and embeds the updated history information in the history information region indicated by...|
|Apparatus and methods relating to spatially light modulated microscopy|| 20080316571 || 20081225 |
| Apparatus and methods relating to microscopes having specific control of the light that contacts a sample and/or a light detector, such as the eye of the user, a charge couple device or a video camera. The improved control includes enhanced, selective control of the angle of illumination, quantity of light and location of light reaching the sample and/or detector. The microscopes comprise one or more spatial light modulators in the illumination and/or detection light path of the microscope at one or both of the conjugate image plane of the aperture diaphragm of the objective lens and the conjugate image plane of the sample.
|Methods of programming multilevel cell nonvolatile memory|| 20080316815 || 20081225 |
| A memory system includes a first block in which data is stored with a low density and a second block in which data is stored with a high density. When data is received it is written to the first block, and in parallel some of the data is written to the second block, so that the second block is partially programmed. The second block is later fully programmed by copying additional data from the first block.
|Systems for programming multilevel cell nonvolatile memory|| 20080316816 || 20081225 |
| A memory system includes a first block in which data is stored with a low density and a second block in which data is stored with a high density. When data is received it is written to the first block, and in parallel some of the data is written to the second block, so that the second block is partially programmed. The second block is later fully programmed by copying additional data from the first block.
|Message recall using digital rights management|| 20080317228 || 20081225 |
| Email messages are recalled in accordance with restrictions attached to the message. Use of the message is limited per the restrictions. Example restrictions include printing restrictions, forwarding restrictions, exporting restrictions, copying restrictions, reading restrictions, and a expiration time of the message.
|Method and microscopy divice for the deflectometric detection of local gradients and the tree-dimensional shape of an object|| 20080317334 || 20081225 |
| The invention relates to a method and an apparatus for high-resolution deflectometric determination of the local slope and of the three-dimensional shape of an object (6). The apparatus comprises a microscopic imaging system (5, 4, 8) having a numerical aperture (sin u), a focus plane (6a) and a receiving unit (9, 10); an illuminating system (1, 3, 4, 13, 13a) having a grating generator (1) that preferably generates a sine grating (2); and a control and evaluating unit. The object (6) is located in the object space of the imaging system. The illuminating system (13, 13a), which is fashioned as an illuminating system for reflected-light objects or for transmitted-light objects, generates a series of grating images (7), which are projected as virtual images into the object...|
|Transdermal delivery system comprising glycopyrrolate to treat sialorrhea|| 20080317832 || 20081225 |
| In one aspect, the invention includes a method for treating sialorrhea, comprising the steps of identifying a patient afflicted with sialorrhea and administering a therapeutically effective amount of glycopyrrolate to the patient using a transdermal route of administration. In another aspect, the invention is a transdermal drug delivery system for treating a patient exhibiting sialorrhea, including a transdermal patch, a therapeutically effective amount of glycopyrrolate contained in the transdermal patch to alleviate sialorrhea, and a pharmaceutically acceptable carrier. The transdermal patch can be a single layer drug-in-adhesive patch, a multi-layer drug-in-adhesive patch, a matrix patch, or a reservoir patch.
|Organic compounds comprising a glycopyrrolium salt|| 20080317862 || 20081225 |
| Medicaments comprising (A) an antimuscarinic agent and (B) a corticosteroid for the treatment of inflammatory or obstructive airways diseases.
|Fast locally resolved electrochemical impedance spectroscopy in polymer electrolyte fuel cells|| 20080318089 || 20081225 |
| A fuel cell, such as a polymer electrolyte fuel cell, includes an anode reactant supply plate, an anode current collector, a cathode reactant supply plate, and a cathode current collector. At least one of the anode reactant supply plate, the cathode reactant supply plate, the anode current collector and the cathode current collector is electrically separated into a number of segments, wherein each segment of at least a subgroup of segments is separately connected to an electronic drive and analysis circuitry which performs in parallel impedance measurement in a frequency range of 0.1 mHz to 50 kHz of the respective segments.
|Methods for utilizing esr copy number changes in breast cancer treatments and prognoses|| 20080318240 || 20081225 |
| The present invention relates to methods for estimation of efficacy of therapeutic treatment of cancer patients, in particular breast cancer patients. The estimation is based on determining of the status of aberration of the estrogen receptor alpha gene (ESR1) in situ, and, optionally, the status of aberration of a gene related to ESR1. In particular, the invention relates to determining the presence or absence and, if present, the type of aberration, e.g. amplification, duplication, polyploidization, deletion or translocation of the ESR1 gene in the tumor cells of the patient. The invention further relates to a kit-in-parts comprising probes for the determining the status of aberration of ESR1 and ESR1-related genes in situ.
|Method for the analysis of liposomes|| 20080318325 || 20081225 |
| A method for the determination of the morphological integrity of a membrane of lipid vesicles, such as liposomes, using electron spin resonance (ESR) spectroscopy including the steps of: a) labeling the lipid vesicles with an ESR-active probe; b) producing a sample by introducing a quantity of the labeled lipid vesicles into a test medium; c) producing a positive control by introducing a quantity of the labeled lipid vesicles into a control medium and optionally a negative control by introducing a quantity of the ESR-active probe into the test medium; d) obtaining ESR spectra of the controls and the sample; and e) comparing ESR spectra of the sample and controls to determine relative morphological integrity. Morphological integrity of lipid vesicles may be quantitatively determined in the test...|
|High viscosity diutan gums|| 20080319186 || 20081225 |
| The production of a diutan polysaccharide exhibiting increased viscosity properties as compared with previously produced polysaccharide of the same type of repeating units. Such an improved diutan polysaccharide is produced through the generation of a derivative of Sphingomonas sp. ATCC 53159 that harbors a multicopy broad-host-range plasmid into which genes for biosynthesis of diutan polysaccharide have been cloned. The plasmid provides the capability within the host Sphingomonas strain to produce multiple copies of genes for such polysaccharide synthesis. In such a manner, a method of not just increased production of the target diutan polysaccharide, but also production of a diutan polysaccharide of improved physical properties (of the aforementioned higher viscosity) thereof is provided. Such a diutan polysaccharide has proven particularly useful as a possible viscosifier in...|
|Non-invasive in-vivo imaging of mechanoreceptors in skin using confocal microscopy|| 20080319322 || 20081225 |
| Meissner's Corpuscles (MCs) are touch-pressure sensation receptors in glabrous skin. They are imaged by reflectance confocal microscopy to provide a non-invasive, in vivo quantification of their density or size to allow screening for, diagnosis or monitoring of sensory neuropathy and other peripheral nervous system disorders related to diabetes, HIV, or other conditions.
|Surgical staple-clip and applier|| 20080319456 || 20081225 |
| A surgical staple-clip including a clip component and a securing member is used in a wide range of surgical procedures. The staple-clip may be introduced to a surgical site in an un-assembled condition through a small port or trocar. An applier for the staple-clip comprising a pair of opposed jaw-like channels is provided to position and apply the clip component and the securing member. The clip component is positioned around a target tissue and is compressed or clamped upon the tissue using only the force required for a specific surgical procedure such as occlusion, ligation or fixation. When the clip component is properly applied, the securing member is urged forward and over the clip component to secure the staple-clip. The clip component may include traction enhancement...|
|File-sharing system and method of using file-sharing system to generate single logical directory structure|| 20080320051 || 20081225 |
| The file sharing system of the present invention is able to provide a client with a single logical directory and reproduces the single logical directory in a remote site when the local site has stopped in use of a remote copy that is made between the local site and remote site. The first site provides the client with a logical directory that is constituted across respective nodes in the first site. The remote copy is executed between the first and second sites, and the data of both sites are synchronized. For the generation of the logical directory and the management of the remote copy, a common management table is used, and the management table is held by all of the nodes. In cases where the first...|
|Data storage space recovery system and method|| 20080320061 || 20081225 |
| A process of determining explicitly free data space in computer data storage systems with implicitly allocated data space through the use of information provided by a hosting computer system with knowledge of what space allocated is currently being used at the time of a query, is provided. In one embodiment, a File System (“FS”) is asked to identify clusters no longer in use which is then mapped to physical disks as visible to an Operating System (“OS”). The physical disks are mapped to simulated/virtualized volumes presented by a storage subsystem. By using server information regarding the FS, for those pages that are no longer in use, point in time copy (“PITC”) pages are marked for future PITC and will not be coalesced forward, thereby saving significant...|
|Data synchronization of multiple remote storage after remote copy suspension|| 20080320260 || 20081225 |
| A method and apparatus are provided for enhancing the performance of storage systems to allow recovery after all types of suspensions in remote copy operations. Data is synchronized after an interruption in transfer between a first storage volume of a primary storage system and a first storage volume of a secondary storage system which also includes a second storage volume. After the interruption is detected, at the primary storage system, a record is provided of the data written onto the first storage volume of the primary storage system, and at the secondary storage volume a record is provided of the data written onto the first storage volume of the secondary storage system. Then, at least a partial copy of the record of the data written onto...|
|Chip card protected against copying and method for production thereof|| 20080320264 || 20081225 |
| A chip card is protected against copying by having a data memory for storage of data that are protected, at least in a sub-region of the data memory, against alteration by users or attackers outside of a privileged group. Members of this group can write an individual identifier for this chip card into this protected memory region once, and can write a digital signature of this identifier to an arbitrary memory region of the data memory. The digital signature can be generated with the use of a secret key for which an associated public key exists with which it can be checked whether the digital signature was generated from the individual identifier with the use of a secret key.
|Selective encryption system and method for i/o operations|| 20080320316 || 20081225 |
| Upon occurrence of a trigger condition, writes of allocation units of data (including code) to a device, such as writes of blocks to a disk, are first encrypted. Each allocation unit is preferably a predetermined integral multiple number of minimum I/O units. A data structure is marked to indicate which units are encrypted. Upon reads from the device, only those allocation units marked as encrypted are decrypted. The disk protected by selective encryption is preferably the virtual disk of a virtual machine (VM). The trigger condition is preferably either that the virtual disk has been initialized or that the VM has been powered on. Mechanisms are also provided for selectively declassifying (storing in unencrypted form) already-encrypted, stored data, and for determining which data units represent public,...|
|System and method for encrypting secondary copies of data|| 20080320319 || 20081225 |
| A system and method for encrypting secondary copies of data is described. In some examples, the system encrypts a secondary copy of data after the secondary copy is created. In some examples, the system looks to information about a data storage system, and determines when and where to encrypt data based on the information.
|Pedigree analysis for software compliance management|| 20080320455 || 20081225 |
| Embodiments of the present invention address deficiencies of the art in respect to source code analysis and provide a novel and non-obvious method, system and computer program product for source code pedigree management. In one embodiment of the invention, a method for source code pedigree management can be provided. The method can include parsing source code to identify copyright rights holders for corresponding copyright constructs, rejecting copyright constructs not associated with corresponding rights holders, compiling a list of the identified copyright rights holders, corresponding copyright statements, and lists of files corresponding to each of the copyright rights holders, and displaying the compiled list.
|Radio base station and a method of operating a radio base station|| 20080320464 || 20081225 |
| The present invention relates to the operation and maintenance of radio base stations in mobile communication systems. An inventive radio base station, which can be upgraded remotely in a safe way. In one embodiment of the invention, the radio base station comprises a file system comprising different versions of files, so that an old version of a file can be reverted to should problems in the operation of the radio base station occur In another embodiment of the invention, the radio base station comprises a back-up area in which a copy of the files of the file system are stored. The back-up area is independent of the file system, so that if problems with the files in the file system are detected, the contents of the...|
|Methods of imaging in probe microscopy|| 20070295064 || 20071227 |
| In accordance with an embodiment of the invention, there is a force sensor for a probe based instrument. The force sensor can comprise a detection surface and a flexible mechanical structure disposed a first distance above the detection surface so as to form a gap between the flexible mechanical structure and the detection surface, wherein the flexible mechanical structure is configured to deflect upon exposure to an external force, thereby changing the first distance.
|Counter with communication function|| 20070295815 || 20071227 |
| A counter with communication function allows the counts of a counting mechanism to be transmitted through a communication line such as the Internet, so that no meter reading by a meter reader is required. A CPU of a control unit checks the time given in a timer and determines whether the current time and date is the date and time to transmit counts. It drives a bar code reader when it is the date and time to transmit the counts, and the bar code reader reads the counts of a counting mechanism of a copy machine and stores it in a memory. The CPU then gives a user or a management company notice of the read counts and counter information, such as a counter number, through...|
|Method for molecule examination by nmr spectroscopy|| 20070296412 || 20071227 |
| The invention relates to a method and a device for examining molecules by means of NMR spectroscopy. It is the object of the invention to be able to characterize a sample with a high resolution and comprehensively. The object is solved by a method and an associated device for examining a sample by means of nuclear magnetic spectroscopy by measuring heteronuclear and homonuclear J-couplings in a small magnetic field and by using the measured heteronuclear and homonuclear J-couplings for characterizing the sample.
|Imaging of sample using terahertz time domain spectroscopy in reflection mode to identify in a first material like normal breast tissue a second material like cancerous tissue by evaluating the phase change at the interface between the sample and a window|| 20070296957 || 20071227 |
| A method of investigating a sample (breast tissue) (27), the sample comprising at least a first material (normal breast tissue) in order to determine they presence of at least one further material (cancerous tissue), the method comprising the steps of: Irradiating the sample with electromagnetic radiation in the range from 25 GHz to 100 THz; Detecting radiation reflected from the sample; Determining a parameter related to the amplitude of the radiation, which is reflected from the sample, in the time domain; Analysing the parameter derived in step (c) in order to determine if the sample further comprises the at least one further material wherein the irradiating and reflected radiation passes through a (z-cut quartz) window member (43) having a refractive index that falls between the refractive...|
|Measuring device and method that operates according to the basic principles of confocal microscopy|| 20070296959 || 20071227 |
| A scanning system for confocal scanning of an object, comprising a light source (1), imaging optics (4) for focusing the light (5) radiated from the light source (1) onto the object (6) to be scanned, and further comprising an image detector (10) for detecting the light (7) from an object point (6′) backscattered from the object (6) and passing through the same imaging optics (4). Means (11) for varying the length of the optical path are disposed in the optical path between the aperture array (3) and the object (6), by which means the optical distance of the image plane can be modified in a specific manner, and means are provided to influence the light (5) radiated by the light source onto the object (6) and/or...|
|Laser plasma spectroscopy apparatus and method for in situ depth profiling|| 20070296966 || 20071227 |
| An in-situ laser plasma spectroscopy (LPS) system for automated near real-time elemental depth profiling of a target including: an optical source configured to generate an optical beam, wherein the optical beam is pulsed; an optical probe system configured to deliver the optical beam from the optical source to a surface of a target to generate an ablation plasma; a time resolved spectral detection system configured to generate time resolved spectral data from emission signals from the ablation plasma; and a data acquisition and processing system configured to acquire the time resolved spectral data to determine, in combination with predetermined calibration data, an absolute elemental concentration as a function of depth in near real-time.
|Analysis of component for presence, composition and/or thickness of coating|| 20070296967 || 20071227 |
| A method comprising the following steps: (a) providing a turbine component comprising a metal substrate having an external surface; and (b) analyzing the external surface by laser plasma spectroscopy to determine whether a metallic coating is present on or absent from the external surface. If a metallic coating is determined to be present on the external surface, the elemental composition, elemental concentration and/or thickness of the metallic coating present on the external surface may be determined (qualitatively and/or quantitatively) by laser plasma spectroscopy. Another method comprises the following steps: (a) providing a turbine component comprising a metal substrate having an external surface which has been subjected to treatment to remove a metallic coating applied to the external surface; and (b) analyzing the treated external surface by...|
|Recording apparatus, control method therefor, program, and computer-readable storage medium|| 20070297008 || 20071227 |
| A recording apparatus comprises a writing unit adapted to write data on a recording medium, a selection unit adapted to select data to be written on the recording medium from a storage medium configured to store a plurality of data, and a display control unit adapted to cause a display device to display a display screen concerning printing before the data selected by said selection unit is copied from the storage medium onto the recording medium, wherein said display control unit causes the display unit to display the display screen if there is a restriction on the number of times of copying of the data.
|Mastering device, disc manufacturing method, disc-shaped recording medium, disc reproduction device, and disc reproduction method|| 20070297318 || 20071227 |
| Second digital information serving as copyright protection information can be stably and reliably read without any effect of a defect or pit missing on a disk-shaped recording medium. Second digital information is recorded onto a disk-shaped recording medium by wobbling a pit sequence recorded as a first signal. The second digital information is recorded so that a plurality of bits constituting the second digital information are allocated in a unit period of an identical sync signal contained in the first signal. During playback, the plurality of bits constituting the recorded second digital information are read a plurality of times every unit period of the sync signal, and information of the read bits is then integrated. Thus, information from a large number of wobbled pits across unit...|
|Personalized cutlist creation and sharing system|| 20070297755 || 20071227 |
| Plays videos in conjunction with a “cutlist” utilized to modify the video. Videos include any visual media such as online or streaming video, broadcast television or movies, digital media files having a video component or DVDs. The videos may originate from any location such as online, on YOUTUBE.COM®, cable television, or a local resource such as a digital media file or DVD. Cutlists may include “mashups” and “cuts”. Mashups add content and include additional user generated input such as text, audio, commentary, graphics, avatar overlays, advertisements or other video. Cuts allow skipping of video and are time windows or scenes that are not to be viewed. The modified video may be viewed on any device associated with a video display. Cutlists may be shared among users...|
|Copy protection for audio, video, and/or a/v navigation data|| 20070297759 || 20071227 |
| A method for protecting against copying of audio, video, and/or A/V navigation data that can be captured by means of a data carrier of a predetermined specification that can be used by a device for reproducing audio and/or video data, such that audio, video, and/or A/V navigation data are arranged in a data structure that meets the specifications. To improve the protection of such data carriers against unauthorized copying, at least one modification of at least one portion of audio, video, and/or A/V navigation data that are to be protected is proposed in the data structure arrangement. A data carrier, which includes audio, video, and/or A/V navigation data of the carrier in a data structure arrangement that meets at least a predetermined specification, so that the...|
|Glossy image forming system and copy surface smoothing apparatus|| 20070297839 || 20071227 |
| A glossy image forming system for forming a glossy image on a recording material having a surface resin material layer, the glossy image forming system includes a fixing device for fixing an unfixed toner image formed on a surface of the recording material; a heaterless pressing device for pressing the recording material having the toner image fixed by the fixing device; a smoothing device for smoothing the surface of the recording material pressed by the pressing device with a pressure smaller than a pressure applied by the pressing device.
|Dendritic polymers with enhanced amplification and interior functionality|| 20070298006 || 20071227 |
| Dendritic polymers with enhanced amplification and interior functionality are disclosed. These dendritic polymers are made by use of fast, reactive ring-opening chemistry (or other fast reactions) combined with the use of branch cell reagents in a controlled way to rapidly and precisely build dendritic structures, generation by generation, with cleaner chemistry, often single products, lower excesses of reagents, lower levels of dilution, higher capacity method, more easily scaled to commercial dimensions, new ranges of materials, and lower cost. The dendritic compositions prepared have novel internal functionality, greater stability (e.g., thermal stability and less or no reverse Michael's reaction), and reach encapsulation surface densities at lower generations. Unexpectedly, these reactions of polyfunctional branch cell reagents with polyfunctional cores do not create cross-linked materials. Such dendritic polymers are...|
|Method of bowel cleansing|| 20070298008 || 20071227 |
| Stimulant laxative in combination with an osmotic laxative produces safe and effective bowel and colon cleansing with a reduced volume of liquid input. Administering to a patient an oral stimulant laxative, such as bisacodyl, followed, after a biologically determined interval, by a reduced volume of a PEG in water solution cleanses the bowels and colon in preparation for diagnostic colonoscopy, without the profuse uncontrollable diarrhea that typically follows either ingestion of large volume isotonic lavages, or smaller volume hypertonic lavages.
|Personal media player apparatus and method|| 20070298840 || 20071227 |
| A compact portable, self-contained digital media player is provided whose content is stored on a dedicated, removable SD card. The content is playable in a high fidelity format. The content to is write protected which results in a significant degree of copyright protection. The compactness of the player enables binding of the player with various products. The self-contained aspect of the player enables it to be instant playable.
|Ultrasound accelerated tissue engineering process|| 20070299539 || 20071227 |
| In an aspect the invention is a method of preparing a cell or tissue implant for insertion into a patient in need of treatment by obtaining a transplantable cell population, culturing the cell population in a culture media and exposing the cell population to a sonic or ultrasonic stimulation, wherein the stimulation provides a capability for an enhanced implant outcome parameter. The method provides enhanced autologous bone implant procedures by reducing the time required for a patient's own cells to sufficiently undergo osteogenesis, thereby reducing the waiting time for an autologous bone implant. The extent of osteogenesis is optionally monitored non-invasively by magnetic resonance spectroscopy.
|Electronic medical documentation and assessment system|| 20070299692 || 20071227 |
| A documentation system that allows adequate control of documentation in addition to an assessment of skills of the professionals involved includes plurality of software modules, each software module dedicated to a particular disease process or body system. Each software modules provides a checklist of assessment steps or an anatomical diagram of a particular body system or medical terminology. The medical data is accessed by inputting the abbreviations of a particular disease process or medical term displayed on an electronic device. It can then be downloaded to a PC and printed out in hard copy to be temporarily placed on the chart of the patient during an acute-episode, incident or accident or be permanently placed in the patient's chart to describe the patient's condition. In addition the...|
|Printing system, apparatus and method for automatically printing records of electronic transactions|| 20070299729 || 20071227 |
| A method and system for automatically printing a hard copy of transaction information relating to a transaction conducted electronically between a user-side and a supplier side. A control apparatus performs an operation of identifying a selected aspect of information regarding the electronic transaction to thereby generate a print apparatus which is sent to a printing apparatus which prints transaction information in response to said print request. In addition, a printer for use with the method and system is provided.
|Method for evaluating images displayed on the internet|| 20070299744 || 20071227 |
| A method that enables an internet user to determine whether an image viewed truly represents the color, clarity, and depiction of the item the image represents. A test pattern-like graphic, made up of a series of bars, shapes, lines, and shadings, is photographed or scanned alongside an item and published to the internet. The viewer compares the published graphic with a hardcopy of the same graphic. Inconsistencies in depiction between the two graphics enable the viewer to determine the extent to which the image appearing alongside the published graphic fairly represents the item the image represents. Revenue is generated through licensing of the graphic to both internet displayers and viewers as well as advertising space on the graphic. The graphic can appear in different versions and...|
|Summarization systems and methods|| 20070299859 || 20071227 |
| A server-side summarization system includes a function for acquiring material to be summarized, along with source information about the material, a converter for converting the acquired material to machine-readable form, if not in that form when acquired, a summarizer for creating a summary from the acquired material, and a storage function for storing a copy of the acquired material and the summary created as separate files, associated and cross-referenced using the source information.
|Automatically maintaining metadata in a file backup system|| 20070299888 || 20071227 |
| A technology for automatically saving an original copy of an image file in a location hidden from a user is disclosed. The technology accesses metadata associated with an image file and determines whether an original copy of the image file exists. Provided an original copy of the image file exists, an edited version of the image file along with an identifier is saved. If an original copy of the image file does not exist, an original copy of the image file is created, the original copy of the image file is stored, and an edited version of the image file along with an identifier is saved.
|Data back-up utility|| 20070299891 || 20071227 |
| A back-up utility for data based on user selectable configuration(s) is provided. A user interface enables users to define or select from default parameters for source and destination paths, frequency of back-ups, filters to be applied, and the like. Formatting, naming convention, and the like, of the source data may be modified in creating the back-up copy. Other considerations such as user credentials and permission levels may also be used to define or restrict back-up configuration parameters.
|System and method for delivering business intelligence data in a client/server architecture|| 20070299937 || 20071227 |
| A business intelligence analysis client system is used with a business intelligence analysis sever system having an object model representing one or more data sources. The client system maintains a business intelligence analysis client copy of the object model that is maintained by the server system. The client system obtains from the server system a result of the user request including update information, and updates the client copy of the object model according to the update information. The client system presents the result of the user request based on the updated client copy of the object model.
|Maintaining a change map of a block level storage device|| 20070300025 || 20071227 |
| Maintaining a change map of a block storage device includes intercepting a change message from an application. The change message is intercepted by a change tracking engine. The change message requests a change to a logical block of the block storage device. The change is recorded in a first copy of the change map. The change is recorded the change in a second copy of the change map.
|System and method for reconfiguring continuous data protection system upon volume size change|| 20070300033 || 20071227 |
| Method and system for changing size of volumes in a CDP environment. The administrator can reduce the amount of work necessary to change the size of the primary volume protected by a CDP system. The system operates in conjunction with all three implementations of the CDP, including the After-Journal(JNL), After-Journal with snapshot and Before-Journal. In the After-JNL implementation, the CDP manager writes the journal data to the JNL volume, which corresponds to the changes in the primary volume occurring after a point in time copy of the primary volume has been created in the base volume. Upon the change of the primary volume size, the CDP automatically reconfigures the related volumes used by the CDP. According to one method, CDP records a size event into the...|
|System for proximity determination|| 20070300070 || 20071227 |
| A method for determining proximity between a first device and a second device, the method comprising providing a first device storing a first device private key, the first device having an associated secure first device certificate storing secured information, the secured information comprising a first device public key corresponding to the first device private key, providing a second device storing a second device private key, the second device having an associated secure second device certificate storing secured information, the secured information comprising a second device public key corresponding to the second device private key, and a second device processing delay, providing a copy of the second device certificate to the first device, establishing a secure authenticated channel between the first device and the second device, sending...|
|Electronic documentation|| 20070300143 || 20071227 |
| An embodiment of a method includes receiving a selection of an original content item, deriving a supplemental content item from the original content item, designating a unique identifier to the supplemental content item, and inserting a reference including the unique identifier into the primary document. A system includes a candidate content item repository having one or more content items that can be included in a structured electronic document, a copy module configured to derive a base supplemental content item from a selected one of the candidate content items and further configured to designate a unique identifier for the base supplemental content item, and a document editor configured to receive the unique identifier and insert the unique identifier into a reference to the base supplemental content in...|
|Delta compression using multiple pointers|| 20070300206 || 20071227 |
| Encoding a new version of a data module includes constructing a delta data module having data for providing the new version of the data module. The delta data module may indicate an encoding for copying data at an offset from one of a number of pointers into different versions of the data module. Decoding a delta data module to provide a new version of a data module includes copying, to the new version of the data module, data relative to a target pointer when an encoding in the delta data module indicates a matching pattern relative to the target pointer, and copying, to the new version of the data module, data relative to at least one other pointer when an encoding in the delta data module...|
|Cis compound semiconductor thin-film solar cell and method of forming light absorption layer of the solar cell|| 20070289624 || 20071220 |
| The invention relates to the light absorption layer of a CIS compound semiconductor thin-film solar cell and to a method of forming the layer. The light absorption layer comprises a compound represented by Cux(In1-yGay)(Se1-zSz)2 and having a chalcopyrite type structure, the proportions of the components satisfying 0.86≦x≦0.98, 0.05≦y≦0.25, 0≦z≦0.3, x=αT+β, α=0.015y−0.00025, and β=−7.9y+1.105, provided that T (° C.) is anneal temperature and the allowable range for x is ±0.02. The layer is formed by the selenization method at a low temperature (about 500≦T≦550). As the substrate is used a soda-lime glass having a low melting point.
|Apparatus and method for absorption, emission, and scattering spectroscoy with substantially simultaneous mass spectrometry, and apparatus and method for mass spectrometry based on electrospray ionization|| 20070290129 || 20071220 |
| An ionization chamber of an analytical apparatus (10) in which high concentration test sample ions are evaporated is provided with an ion introduction control means (8) to control the quantity of the test sample ions introduced to an ion attracting electrode (9). Therefore, an analytical apparatus can be provided that is capable of substantially simultaneous mass spectrometry and absorption, emission, and scattering spectroscopy. The apparatus also includes: a low temperature bath (106) which cools the test sample solution before it is introduced to the sprayer (104); and a cooling gas introduction tube (108), constructed separately from the sprayer, which cools the sprayer and the test sample solution introduced to the sprayer (104). The inclusion enables effective restriction of test sample heating upon high voltage application. Mass...|
|System for improved optical mark recognition|| 20060289651 || 20061228 |
| An improved optical mark recognition system is disclosed. A pre-printed form including sets of answer choices to be scored is selected. A pristine copy of said form is obtained. Reference marks for said form are defined. Reference areas surrounding said reference marks, for locating reference marks on scanned copies of said form in the future, are defined. The location of answer choices on said form is defined. Subsequently, answer choices on a copy of said form are marked during the course of testing, collection of demographic information, collection of data, and so forth. If pages of said form are collected in a booklet, said pages are separated from the booklet prior to scanning by slitting said pages from the booklet spine. A marked copy of the...|
|Method for determining material interfacial and metrology information of a sample using atomic force microscopy|| 20060289749 || 20061228 |
| A method for determining interfacial information and critical dimensions of a sample using atomic force microscopy. Tip-specimen deconvolution is performed on the scan lines before the critical dimension information processing. Local maxima and minima or local slope change of each scan line are found on a plurality of scan lines. A best fit line is then found for the plurality of maxim and minima or slope change points. Two best fit lines may be found using a plurality of maxima or minima or slope change points. An intersection of the two best fit lines can be used to determine a critical dimension such as a transition point. Such a method may be used to determine a track width of a trapezoidal magnetic write head or may...|
|Nanowire based plasmonics|| 20060289761 || 20061228 |
| Nanoscaled, tunable detector devices for ultrasensitive detection of terahertz (THz) radiation based on the fabrication of one-dimensional (1D) plasma devices having clouds of strongly correlated and spatially confined electronic charge carriers are disclosed. These one-dimensional collective excitations (“plasmons”) are realized using coaxial semiconducting core-shell nanowires or by electrostatically confining a two dimensional charge to one dimension. By exploiting the properties of plasmons confined to reduced dimensions and under a selected device configuration, conventional limitations on carrier drift and transit times that dictate the speed and sensitivity of transistors can be circumvented, and detector sensitivity can be improved. 1D devices with sub-picosecond response times will be important for a range of applications in diverse areas such as remote sensing and imaging, molecular spectroscopy, biotechnology, and in a...|
|Image forming apparatus, method and computer program product capable of detecting a copy-prohibited manuscript|| 20060291002 || 20061228 |
| This patent specification describes an image forming apparatus which can effectively check and prevent the unauthorized image processing so that the obtained image data may not be different from the content which a user demands. In one example, an image forming apparatus includes a defining mechanism, a reader, a detector, a comparator, and a notifier. Then, a certain tint block pattern is detected and information of the result is notified effectively.
|Tabbed document copying systems and methods|| 20060291003 || 20061228 |
| Embodiments herein add tab information to a tab template. The tab template is then printed and inserted between pages of a printed document by the user. Then this tab template-containing document can be scanned in a single pass to identify the location of the tab template within the pages of the tab template-containing document. Thus, when the scanned document is processed through a printing device, a tabbed page is inserted at the location of the tab template in printed copies of the tab template-containing document.
|Controlling scanning and copying devices through implicit gestures|| 20060291004 || 20061228 |
| A scanning machine (10) includes a scan surface (12) for receiving a page or pages to be scanned. A motion detector (20) monitors the copy surface to detect movement of the pages. In response to detecting a cessation of motion on the scan surface, the motion detector generates a trigger signal which causes a capture circuit (30) to capture an image of a page on the scan surface. If, during the capture of the page image, the motion detector detects motion of the page, the motion detector generates an abort signal which terminates capture of the image and empties a buffer memory (32). Once cessation of motion of the page is again detected, another trigger signal is issued and another attempt is made to capture an...|
|Interference microscope, and method for operating an interference microscope|| 20060291043 || 20061228 |
| The present invention concerns an interference microscope and a method for operating an interference microscope, in particular a 4π microscope, standing wave field microscope, or I2M, I3M, or I5M microscope, at least one specimen support unit associated with the specimen being provided. For determination of the phase position of the interfering light in the specimen region, on the basis of which the interference microscope can be aligned, the interference microscope is characterized in that for determination of the illumination state in the specimen region of the interference microscope, at least one planar area of the specimen support unit is configured to be detectable by light microscopy.
|Information recording processing device, information reproduction processing device, information recording medium and method, and computer program|| 20060291357 || 20061228 |
| A device, a medium, and a method for recording and reproducing additional data difficult to analyze on an information recording medium are provided. When additional data is recorded onto the information recording medium, or additional data such for example as key information applied to a content decryption process, key generating information, content reproduction control information, or copy control information is recorded on the information recording medium, the parity of data of a recording frame in which to insert the additional data is calculated, and the value of a DC control bit in the frame in which to store the additional data is determined and set on the basis of information indicating whether the parity is even parity or odd parity and the bit value information ...|
|Information recording device, information reproducing device, information recording medium, method, and computer program|| 20060291361 || 20061228 |
| An apparatus for recording additional information hard to analyze in an information recording medium, a reproducer, a recording medium, a method, and a computer program for the same are provided. Bit values set at a plurality of DC control bit information setting positions set in a recording frame are decided based on constituent bit information of additional data, and additional data such as key information used for decoding contents is recorded in the information recording medium. In the reproducer, the additional data constituent bit information can be acquired by detecting the bit position set at a selected DC control bit storage position in the additional data-associated recording frame. With the configuration, it is possible to embed additional information such as key information used for decoding contents,...|
|System & method for fabric storage utilizing multicast with distributed intelligence|| 20060291467 || 20061228 |
| The present invention is a system utilizing multicast with distributed intelligence including an initiator device for transmitting a request, the request being addressed to a multicast group. The system also includes a switch for receiving the request from the initiator device. The switch is configured with multicast functionality for multicasting copies of the request to the multicast group. Additionally, the system includes a plurality of multicast group devices, each configured for receiving a copy of the request from the initiator device, via the switch. Each device of the plurality of multicast group devices is further configured with mapping functionality for allowing the storage device to determine a storage layout of the multicast group device. The initiator device, switch and each device of the plurality of multicast...|
|Spectroscopy-based safety system and method for a vacuum arc remelt furnace|| 20060291522 || 20061228 |
| A vacuum arc remelt furnace system that automatically monitors for electrode to crucible arcing in a VAR furnace. The vacuum arc remelt furnace system includes a crucible, an electrode provided within the crucible, and a spectrometer operatively coupled to the gap between the electrode and the crucible. The spectrometer detects the presence of one or more copper-specific light wavelengths in light that is present in the gap, and preferably generates an alarm and/or shuts the furnace down depending upon what is detected. Also, a method of operating a vacuum arc remelt furnace to automatically monitor for electrode top crucible arcing. The method includes collecting light that is present in the gap between the crucible and said electrode, and determining whether one or more copper-specific light wavelengths...|
|Method for converting non copy protected data into copy protected data|| 20060291651 || 20061228 |
| generating, at said third network location (2), said copy protected data by embedding said content data into modified data structures being implied by said modified data structure data and/or by replacing said controlling data by said modified controlling data.
|System and method for hilbert phase imaging|| 20060291712 || 20061228 |
| Hilbert phase microscopy (HPM) as an optical technique for measuring high transverse resolution quantitative phase images associated with optically transparent objects. Due to its single-shot nature, HPM is suitable for investigating rapid phenomena that take place in transparent structures such as biological cells. A preferred embodiment is used for measuring biological systems including measurements on red blood cells, while its ability to quantify dynamic processes on the millisecond scale, for example, can be illustrated with measurements on evaporating micron-size water droplets.
|Theater identification system utilizing identifiers projected through a screen|| 20060291722 || 20061228 |
| A method and a system for identifying a copy of an image sequence which is presented on a screen. At least one identifier distinct from the image sequence can be projected through the screen such that the identifier is displayed using visible light along with the image sequence. The identifier can be presented at periodic intervals and can define a theater location, a date and/or a time. A color and/or an illumination of at least a portion of the image sequence presentation can be measured. Based on the measured illumination and/or color, a projection brightness and/or color can be determined for the identifier. Also, a location on the screen through which the identifier should be projected can be determined.
|System and method for providing searchable data transport stream encryption|| 20060291803 || 20061228 |
| A packetized transport stream for protecting viewing content from unauthorized access and methods for manufacturing and using same. The transport stream includes a plurality of content frames, each having a frame header and a frame payload. Each frame header includes information for handling the content frame; whereas, the frame payload includes selected viewing content for which protection from unauthorized access is desirable. By encrypting only the frame payload, the header remains unencrypted and can be applied to prepare the encrypted frame payload for presentation. The viewing content thereby can be stored in an encrypted format and can be decrypted on-the-fly as the viewing content is needed for presentation. The combination of the unencrypted frame header and the encrypted frame payload advantageously enables the viewing content to...|
|Digital copy machine and display controlling method thereof|| 20060291889 || 20061228 |
| A digital copy machine, including a display panel to display at least one menu to allow for a setting up of a copy function and to display a layout of copy output, a display controller which changes a screen displayed on the display panel according to a selection of a user and, when a function is set up by the user, performs control to display the layout of the copy output on the display panel based on the set-up copy function.
|Composite coating for finishing of hardened steels|| 20060292399 || 20061228 |
| The present invention relates to a cutting tool insert, solid end mill, or drill, comprising a substrate and a coating. The coating is composed of one or more layers of refractory compounds of which at least one layer comprises a cubic (Me,Si)X phase, where Me is one or more of the elements Ti, V, Cr, Zr, Nb, Mo, Hf, Ta and Al, and X is one or more of the elements N, C, O or B. The ratio R=(at-% X)/(at-% Me) of the c-MeSiX phase is between 0.5 and 1.0 and X contains less than 30 at-% of O+B. This invention is particularly useful in metal machining applications where the chip thickness is small and the work material is hard e.g. copy milling using solid end...|
|Comparative genomic hybridization|| 20060292608 || 20061228 |
| Disclosed are new methods comprising the use of in situ hybridization to detect abnormal nucleic acid sequence copy numbers in one or more genomes wherein repetitive sequences that bind to multiple loci in a reference chromosome spread are either substantially removed and/or their hybridization signals suppressed. The invention termed Comparative Genomic Hybridization (CGH) provides for methods of determining the relative number of copies of nucleic acid sequences in one or more subject genomes or portions thereof (for example, a tumor cell) as a function of the location of those sequences in a reference genome (for example, a normal human genome). The intensity(ies) of the signals from each labeled subject nucleic acid and/or the differences in the ratios between different signals from the labeled subject nucleic acid...|
|Compositions and methods for detecting single gene copies in-situ|| 20060292615 || 20061228 |
| Compositions and methods are provided for detecting single copies of a gene in-situ using brightfield microscopy in detection of various target nucleic acid sequences, such as genes or nucleic acid of microorganisms in a cell. In particular, nucleic acid probes for various target nucleic acid sequences in a cell are utilized in conjunction with enzymes and their substrates to produce chromogenic composition associated with the target nucleic acid sequences in the cell.
|Spectroscopic methods for detecting and identifying chelates|| 20060292698 || 20061228 |
| Methods are provided for characterizing metal-ligand chelates using Raman spectroscopy.
|Biopolymer marker indicative of disease state having a molecular weight of 2753 daltons|| 20060292703 || 20061228 |
| The instant invention involves the use of a combination of preparatory steps in conjunction with mass spectroscopy and time-of-flight detection procedures to maximize the diversity of biopolymers which are verifiable within a particular sample. The cohort of biopolymers verified within such a sample is then viewed with reference to their ability to evidence at least one particular disease state; thereby enabling a diagnostician to gain the ability to characterize either the presence or absence of said at least one disease state relative to recognition of the presence and/or the absence of said biopolymer.
|Colonoscopy video processing for quality metrics determination|| 20060293558 || 20061228 |
| A computer-based method that allows automated measurement of a number of metrics that likely reflect the quality of a colonoscopic procedure. The method is based on analysis of a digitized video file created during colonoscopy, and produces information regarding insertion time, withdrawal time, images at the time of maximal intubation, the time and ratio of clear versus blurred or non-informative images, and a first estimate of effort performed by the endoscopist. As these metrics can be obtained automatically, the method allows future quality control in the day-to-day medical practice setting on a large scale. In addition, the method can be adapted to other healthcare procedures. The method may be useful to assess progress during colonoscopy training, or as part of endoscopic skills assessment evaluations.
|System and method for recording and auditing medical information|| 20060293924 || 20061228 |
| Systems and methods are provided for audio and video auditing and recording of medical information, particularly in a medical or other setting, and when the information is of a subject or patient. In accordance with one embodiment, the invention comprises a system having a display, a recording interface and a database storage. The display is used to display an electronic version of a questionnaire to be given to or asked by an interviewer of the subject or patient (the interviewee). A recording interface can be either audio, video, or a combination of both. Additionally, information provided by one or more measurement devices can be recorded in a database, along with a time stamp to provide an audit trail for the medical information. The database storage saves...|
|Content data reproducing apparatus|| 20060293964 || 20061228 |
| The music data (output-prohibited music data) downloaded to the client terminal 2 cannot be output until it is formally purchased. In addition, this music data can be reproduced only while the user of the client terminal 2 is being registered to pay the predetermined fixed charges. Therefore, this prevents from hurting the interests of copyright owners or the like. And the client terminal 2 can acquire music data more efficiently, since it does not have to repeat a process of downloading music data.
|Method and apparatus for dynamic renewability of content|| 20060294020 || 20061228 |
| A method and apparatus for dynamically and transparently renewing licenses associated with downloaded content. Licensing associated with content can allow the provider to retain control over the content after it has been downloaded on to the user's computer. A license file or similar licensing parameter is the key to retaining control over access to the content after it has been downloaded. The license file may also control copying of the content on to computers other than the original computer used. The dynamic renewal method will transparently renew the license files on a user's computer to allow the associated content to be used without disruption as long as the user's account is in good standing.
|Digital rights conversion system|| 20060294026 || 20061228 |
| The invention is based on the idea that a mechanism is introduced, by which it is possible to convert limited digital rights, which gives the proprietor of the digital rights access to the work a limited number of times, into an unlimited digital right, provided that the number of accesses associated with the limited light is sufficiently high. The present invention is advantageous since if a proprietor of limited rights associated with a digital content holds a sufficient number of limited rights, he/she is allowed to convert these limited rights into an unlimited right. The proprietor of the copyrighted content and/or the content distributor can thereby attract users to surf in to sites on the internet by in return offering limited digital rights to content, to...|
|Storage and utilization of slide presentation slides|| 20060294046 || 20061228 |
| Slide presentation files may be separated into one or more individual slide files, and the one or more individual slide files may be stored in a remote or local slide library. Stored individual slide files are populated with metadata for allowing subsequent search and location of individual slide files. A synchronization relationship may be established between a stored slide file and a copy of the stored slide file used in a slide presentation document. As updates are made to the stored slide file, a user of a copy of the stored slide file may be informed of and provided changes made to the original slide file via the synchronization relationship.
|Method and system for transactional fingerprinting in a database system|| 20060294057 || 20061228 |
| Transactions with respect to database operations are fingerprinted by associating transaction identifiers with logged information about those database operations. An SQL query is obtained prior to its evaluation by a database engine. A transaction identifier to be associated with the SQL query is also obtained. The SQL query is then modified to generate a modified SQL query, wherein the modified SQL query includes a WHERE clause that contains an expression that always evaluates to a logical true value, and wherein the expression contains the transaction identifier. The modified SQL query is then sent to the database engine for evaluation within the data processing system. When the processing of the modified SQL query is logged with a copy of the modified SQL query, the logged information contains...|
|Methods and systems for incorporating meta-data in document content|| 20060294139 || 20061228 |
| Systems and methods are disclosed for incorporating meta-data in document content. The disclosed systems and methods may include initiating an application program configured to generate a document. Furthermore, the disclosed systems and methods may include displaying, by the initiated application program, a property panel. The property panel may be configured to receive meta-data to be associated with the document generated by the application program. Moreover, the disclosed systems and methods may include receiving the meta-data in the property panel and copying the meta-data from the property panel to the document content.
|Providing status information about email recipients|| 20060294188 || 20061228 |
| A second email application and a third email application receive copies of an email sent by a first email application. In response to receiving the copy of the email, the second email application sends status information about the second email application to the third email application. The third email application provides an indicator that status information about the second email application is available.