Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

4484results about How to "Avoid access" patented technology

Flexible instrument

A remote control flexible instrument system, employing a shaft which supports a tool, is described in which the has proximal and distal ends with at least a portion thereof extending through a lumen of the human body so as to locate the shaft at an internal target site. A master station including an input device provides control of the instrument situated at a slave station. The master station can control at least one degree-of-freedom of the flexible instrument. A controller intercouples the master and slave stations and is operated in accordance with a computer algorithm that receives a command from the input device for controlling at least one degree-of-freedom of the catheter so as to respond in accordance with action at the input device. The flexible instrument further comprises a controlled flexible segment along the shaft, for controlled bending at the flexible segment to guide the shaft and to dispose the tool at an operative site.
Owner:HANSEN MEDICAL INC

Flexible instrument

A remote control flexible instrument system, employing a shaft which supports a tool, is described in which the has proximal and distal ends with at least a portion thereof extending through a lumen of the human body so as to locate the shaft at an internal target site. A master station including an input device provides control of the instrument situated at a slave station. The master station can control at least one degree-of-freedom of the flexible instrument. A controller intercouples the master and slave stations and is operated in accordance with a computer algorithm that receives a command from the input device for controlling at least one degree-of-freedom of the catheter so as to respond in accordance with action at the input device. The flexible instrument further comprises a controlled flexible segment along the shaft, for controlled bending at the flexible segment to guide the shaft and to dispose the tool at an operative site.
Owner:AURIS HEALTH INC

System and method for access management and security protection for network accessible computer services

InactiveUS20100251329A1Detection problemGrows and shrinks capacity and bandwidth capacityMemory loss protectionError detection/correctionTraffic capacityService provision
A method for providing access management and security protection to a computer service includes providing a computer service that is hosted at one or more servers and is accessible to clients via a first network, providing a second network that includes a plurality of traffic processing nodes and providing means for redirecting network traffic from the first network to the second network. Next, redirecting network traffic targeted to access the computer service via the first network to a traffic processing node of the second network via the means for redirecting network traffic. Next, inspecting and processing the redirected network traffic by the traffic processing node and then routing only redirected network traffic that has been inspected, processed and approved by the traffic processing node to access the computer service via the second network.
Owner:YOTTAA

Method and system for data backup

Embodiments of the present invention are directed to Web-Services-based data backup and data-archiving applications that provide remote data backup and data archiving to private individuals, small businesses, and other organizations that need reliable, secure, geographically remote, and cost-effective data backup, data archiving, and backed-up and archived-data retrieval. In one embodiment of the present invention, a private or small-business client contracts with a service provider for data-backup and data-archiving services. The service provider, in turn, contracts with a remote data-storage facility to provide secure, reliable data backup and data archiving to the personal or small-business client. A client-side application is downloaded to the client computer and configured to allow the client to store locally encrypted data at the remote, data-storage facilities. Neither the service provider nor the data-storage facility can decrypt or otherwise access the information stored by the client. In addition, the encryption key or encryption keys used by the client to encrypt the data for remote storage are securely stored at the remote, data-storage facility for subsequent recovery by the client, should the client suffer damage or loss to a local computer system. However, the client encryption key is stored in a doubly encrypted fashion, preventing access to the client's encryption key by either the service provider or the data-storage facility. Certain embodiments of the present invention also provide local indexing for remotely stored, encrypted data and efficient storage of updates to already remotely stored data.
Owner:CARBONITE GMBH

Printing a gambling ticket using a mobile device

A system for printing a gambling ticket on a print medium, the system comprising: a mobile telecommunications device which comprises: a printer module to print the ticket on the print medium; and, a sensor module to sense a print media identifier of the print medium.
Owner:SILVERBROOK RES PTY LTD

Touch Gesture Actions From A Device's Lock Screen

Embodiments enable a mobile device to execute an action analogous to a user-defined action in response to receipt of a gesture analogous to a user-defined gesture. In a first embodiment, a computer-implemented method executes an action on a mobile device. A lock screen view is displayed on the mobile device to prevent unauthorized and inadvertent access to the mobile device's data. While the mobile device is locked, a touch gesture having a pre-defined shape is detected on a touch screen of the mobile device independently of the initial position of the touch gesture on the touch screen. In response to detection of the touch gesture, a particular action is executed on the mobile device while the mobile device stays locked. The particular action determined according to the pre-defined shape. In this way, detection of the touch gesture causes the particular action to execute while keeping the mobile device locked.
Owner:GOOGLE LLC

Modular assembly for a portable hemodialysis system

A modular assembly for a portable hemodialysis system may include a dialysis unit, e.g., that contains suitable components for performing hemodialysis, such as a dialyzer, one or more pumps to circulate blood through the dialyzer, a source of dialysate, and one or more pumps to circulate the dialysate through the dialyzer, and a power unit having a housing that contains suitable components for providing operating power to the pumps of the dialysis unit. The power unit may be selectively connected to the dialysis unit and provide power (e.g., pneumatic power in the form of pressure and / or vacuum) to the dialysis unit for the pumps when connected to the dialysis unit, but may be incapable of providing power to the dialysis unit when disconnected from the dialysis unit. The dialysis unit and the power unit are sized and weighted to each be carried by hand by a human.
Owner:DEKA PROD LLP

Systems and methods for authorizing, authenticating and accounting users having transparent computer access to a network using a gateway device

A system and method for authorizing, authenticating and accounting users having transparent access to a destination network, wherein the users otherwise have access to a home network through home network settings resident on the user's computers, and wherein the users can access the destination network without altering the home network settings and without installing software on the user's computer. The system includes a gateway device for receiving a request from a user for access to the destination network, and means for identifying an attribute associated with the user based upon a packet received by the gateway device, wherein the packet is transmitted from the user's computer, and wherein the user's computer is configured for accessing the home network.
Owner:NOMADIX INC

Enclosure for a portable hemodialysis system

An enclosure for containing a portable hemodialysis unit includes a housing suitable to support components for performing hemodialysis including a dialyzer, one or more pumps to circulate blood through the dialyzer, a source of dialysate, and one or more pumps to circulate the dialysate through the dialyzer. The housing may have a front panel at which blood circuit connections and dialysate fluidic connections are located, e.g., blood line connections for patient blood access, connections for a reagent supply, dialyzer connections for both blood flow and dialysate, etc. The enclosure may also include a pair of vertical, side-by-side doors hingedly mounted to the housing. With the doors in the closed position, access to the patient access and dialysate fluidic connections may be blocked, and the doors may allow for the retention of heat in the housing suitable for disinfection during a disinfection cycle.
Owner:DEKA PROD LLP

Security method and apparatus for controlling the data exchange on handheld computers

A method and system for protecting portable computer data from unauthorized transfer or using portable computers to download unauthorized data. The invention is applicable to any computer capable of transferring data, but in one embodiment a portable computer is described. Authorization is enabled by an interface permitting synchronization of the portable computer with a host computer by authentication of the particular portable computer identity. For instance, in one embodiment, when a portable computer is docked with a compatible interface connected to a host desktop computer, it is sensed and identified by the interface. If the particular portable computer identity is authenticated as authorized for that desktop, then synchronization will be enabled by the interface. The computers may then transfer data. However, if the identity is not an authorized one, then authentication will not occur, synchronization is correspondingly disabled, and data transfer is prevented. Various systems can enable the identity authentication.
Owner:ACCESS

Apparatus and method for moving and copying rights objects between device and portable storage device

A method and apparatus for copying or moving a rights object having right information regarding digital contents between a device and a portable storage device to copy or move the digital contents there between are provided. According to the method and apparatus, the digital works can be prevented from being recklessly and randomly copied and moved, and therefore, copyright can be protected. In addition, data loss or unauthorized access can be prevented.
Owner:SAMSUNG ELECTRONICS CO LTD

Thin walled, two component cartridge casing

A cartridge or ammunition casing is made of two components, one forming the outer casing sleeve and head end and the other comprising a plug seated within the head end to protect the outer casing material from propellant gases. The outer cylindrical sidewall and end panel of the casing may be made of a material selected from the group consisting of stainless steel, steel, pre-coated carbon steel, brass or brass-type alloys, aluminum, hardened aluminum alloys, and suitable polymeric plastic material such as nylon derivatives and VECTRA™. The inner plug may be made of a material selected from the group consisting of aluminum, brass, steel, stainless steel, and suitable polymeric materials.
Owner:TECH CORPORATION CO LTD

Air trap for a medical infusion device

An air trap for a blood circuit and method for removing air from blood in a dialysis unit. The air trap may include a blood inlet supply line, a blood outlet supply line, and a container having an approximately spherical internal wall, an inlet at a top end of the container connected to the blood inlet supply line, and an outlet at a bottom end of the container connected to the blood outlet supply line. The inlet may be offset from a vertical axis of the approximately spherical internal wall such that blood entering the container is directed to flow in a spiral-like path. The inlet port may be arranged to introduce blood into the container in a direction that is approximately tangential to the approximately spherical inner wall of the container and / or in a direction that is approximately perpendicular to the vertical axis of the container.
Owner:DEKA PROD LLP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products