Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

12889results about How to "Avoid problems" patented technology

Method and apparatus for demodulating signals in a pulse oximetry system

A method and an apparatus measure blood oxygenation in a subject. A first signal source applies a first input signal during a first time interval. A second signal source applies a second input signal during a second time interval. A detector detects a first parametric signal responsive to the first input signal passing through a portion of the subject having blood therein. The detector also detects a second parametric signal responsive to the second input signal passing through the portion of the subject. The detector generates a detector output signal responsive to the first and second parametric signals. A signal processor receives the detector output signal and demodulates the detector output signal by applying a first demodulation signal to a signal responsive to the detector output signal to generate a first output signal responsive to the first parametric signal. The signal processor applies a second demodulation signal to the signal responsive to the detector output signal to generate a second output signal responsive to the second parametric signal. The first demodulation signal and the second demodulation signal both include at least a first component having a first frequency and a first amplitude and a second component having a second frequency and a second amplitude. The second frequency is a harmonic of the first frequency. The second amplitude is related to the first amplitude to minimize crosstalk from the first parametric signal to the second output signal and to minimize crosstalk from the second parametric signal to the first output signal.
Owner:JPMORGAN CHASE BANK NA

Systems and methods for processing data flows

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
Owner:BLUE COAT SYSTEMS

Systems and methods for processing data flows

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
Owner:CA TECH INC

Smart recognition apparatus and method

InactiveUS7044949B2Avoid problemsTight optical and mechanical toleranceDiagnosticsClose-range type systemsProximateElectrosurgery
A qualifying connection for an instrument attaches to a source of electrosurgery energy and to the instrument and has first and second parts coupled to the instrument and the source, respectively. Optical couplings on the connection transmit invisible energy to identify the instrument and are proximate on the first and second parts. A light modifier on the first part is proximal to the second part for modification of radiation in the infrared wavelengths so infrared transmitters encode signals and non-contact coded proximity detectors on the second part are the coupled detectors. Mechanical attachments include conjugating male and female portions which physically extend between the parts and matingly engage. An identifying circuit couples to the second part and responds to invisible light optically communicated across the couplings for verifying the type of instrument connected by the cable to the source. A method of using the connection has steps including juxtaposing and conjugating the parts with attachments and couplings for transmitting invisible optical energy to identify the instrument. The method includes modifying the invisible optical energy with geographically disposed proximate couplings of the parts when the attachments engage and the couplings are proximate. Passing and assessing signals of the modified energy are transmitted through the connection and to an identifying circuit in the source.
Owner:COVIDIEN AG

Systems and methods for spinal fixation

Featured are a method and apparatus for fixing adjacent vertebrate of a spine that avoids the need and associated problems with prior cage or straight rod and screw systems. Methods and apparatus of the invention utilize a new implant member, which preferably is arcuate. Preferred methods of the invention for stabilizing adjacent vertebrae of the spine, include steps of providing a positioning apparatus including two guide sleeves, each guide sleeve having a long axis and locating the two guide sleeves with respect to the adjacent vertebrae such that a vertex formed by the long axis of each guide sleeve is located in the intervertebral space for the adjacent vertebrae. The method further includes forming an aperture in each of the adjacent vertebrae using the guide sleeves and inserting an implant into the apertures formed in each of the adjacent vertebrae so that the implant extends between the adjacent vertebrae and through the intervertebral space. In an alternative method a cutting fixture including a pivot arm is secured to the adjacent vertebrae and a cutting device is secured to the pivot arm. The pivot arm and cutting device are configured and arranged so that rotation of the pivot arm about a particularly located pivot point allows the cutting device to form the aperture in each of the adjacent vertebrae. Another alternative method for fixing adjacent vertebrate of a spine includes the step of forming a common channel in and between the adjacent vertebrae and inserting a biscuit implant in the common so as to bridge between the adjacent vertebrae.
Owner:K2M

Systems and methods for processing data flows

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
Owner:CA TECH INC

Systems and methods for processing data flows

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
Owner:BLUE COAT SYSTEMS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products