Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 153. Отображено 153.
09-09-1999 дата публикации

Modified kaolins

Номер: AU0000709995B2
Принадлежит:

Подробнее
13-02-2018 дата публикации

Data loss prevention for mobile computing devices

Номер: US0009894079B2
Принадлежит: McAfee, LLC, MCAFEE LLC

System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy.

Подробнее
10-07-2001 дата публикации

System and method for producing folded articles

Номер: US0006258017B1
Автор: Balbir Singh, SINGH BALBIR
Принадлежит: Ethicon, ETHICON INC, ETHICON

A system (10) for producing folded articles includes a cutting station (58) operable to segment a fabric web (42) into a continuous stream of individual web segments (86). The system also includes a rotary folder (96) comprising a plurality of folding rollers (104, 106). The rotary folder (96) rotates about an axis spaced apart from axes of the folding rollers (104, 106). The rotary folder (96) is operable to receive the web segments (86) at a first location and fold the web segments one or more times while rotating from the first location to a second location about the rotary folder (96) axis. The system further includes a transfer station (62) operable to receive the folded web segments (86) from the rotary folder (96) at the second location and deliver the folded web segments (86) to a third location.

Подробнее
10-11-2016 дата публикации

Using Trusted Platform Module To Build Real Time Indicators of Attack Information

Номер: US20160330193A1
Принадлежит: McAfee LLC

Managed devices containing a Trusted Platform Module (TPM) to provide a trusted environment generate a device certificate at initialization of the TPM and send the device certificate to a management console for storing in a certificate database. Upon detecting a file of interest, the TPM signs the file, adding to a signature list created by previous managed devices. The signature list can be used to analyze the spread of the file across the system of managed devices, including tracking the file to the first managed device to have had a copy, without requiring real-time access to the managed devices during the spread of the file. In some embodiments, additional security measures may be taken responsive to determining the first managed device and the path the file has taken across the system of managed devices.

Подробнее
09-08-2011 дата публикации

All weather absorbent towel dispenser

Номер: US0007992745B2

A water resistant absorbent towel dispenser. The dispenser includes a container having top, bottom and side walls housing a supply of absorbent towels, and an exterior handle for facilitating transport of the dispenser. The top wall includes a finger-accessible opening through which absorbent towels may be withdrawn. In certain embodiments, the top wall is convex upwardly, but is flexible to enable it to be depressed when dispensers are stacked vertically so as to come into load bearing contact with the towel supply. In some embodiments, the top and bottom walls have interlocking configurations to add lateral stability to vertically stacked dispensers.

Подробнее
18-04-2013 дата публикации

SYSTEM AND METHOD FOR PROFILE BASED FILTERING OF OUTGOING INFORMATION IN A MOBILE ENVIRONMENT

Номер: US20130097652A1
Принадлежит: McAfee, Inc.

A system and method in one embodiment includes modules for detecting an access request by an application to access information in a mobile device, determining that the application is a potential threat according to at least one policy filter, and blocking a send request by the application to send the information from the mobile device without a user's consent. More specific embodiments include user selecting the information through a selection menu on a graphical user interface that includes information categories pre-populated by an operating system of the mobile device, and keywords that can be input by the user. Other embodiments include queuing the send request in a queue with other requests, and presenting an outbox comprising the queue to the user to choose to consent to the requests. The outbox includes graphical elements configured to permit the user to selectively consent to any requests in the queue.

Подробнее
30-04-2009 дата публикации

METHOD AND SYSTEM FOR SIMULATING A MULTI-QUEUE SCHEDULER USING A SINGLE QUEUE ON A PROCESSOR

Номер: US20090113432A1
Принадлежит:

A method and system for scheduling tasks on a processor, the tasks being scheduled by an operating system to run on the processor in a predetermined order, the method comprising identifying and creating task groups of all related tasks; assigning the tasks in the task groups into a single common run-queue; selecting a task at the start of the run-queue; determining if the task at the start of the run-queue is eligible to be run based on a pre-defined timeslice allocated and on the presence of older starving tasks on the runqueue; executing the task in the pre-defined time slice; associating a starving status to all unexecuted tasks and running all until all tasks in the run-queue complete execution and the run-queue become empty.

Подробнее
17-04-2001 дата публикации

Process for forming alumino-silicate derivatives

Номер: US0006218329B1

A process for the preparation of an amorphous alumino-silicate derivative which involves reacting a solid corresponding starting material with MOH where M is alkali metal or ammonium cation. The solid corresponding starting material may be selected from montmorillonite, kaolin, natural zeolite (e.g., clinoliptolite/heulandite) as well as illite, palygorskite and saponite and additional reactant MX wherein X is halide may be utilized in conjunction with MOH. The invention also includes alumino-silicate derivatives of the general formula MpAlqSi2Or(OH)sXt.uH2O as well as alumino-silicate derivatives of the general formula MpAlqSi2Or(OH)s.uH2O.

Подробнее
10-12-2009 дата публикации

Memory Access Control

Номер: US20090307442A1
Автор: Balbir Singh
Принадлежит:

An embodiment of a method of controlling memory access includes an initial step of receiving a first request to control memory access. The embodiment of the method also includes the step of creating an instance of a data structure based on the first request. In addition to the previous two steps the embodiment of the method also includes the steps of receiving a second request to access a memory, and examining the instance of the data structure to determine whether the memory can be accessed.

Подробнее
18-07-2017 дата публикации

Adaptive run-time advertisements

Номер: US0009710817B2
Принадлежит: MICROSOFT TECHNOLOGY LICENSING, LLC

Systems, computer-implemented methods and computer-storage media are provided for presenting customizable advertisements to a user. Advertising is customized through the use of user-specific or user-relevant data. Items such as keywords, profile data, and application data are received and are then used to retrieve customizations. These customizations are stored by a server or group of servers that the vendor makes available to the advertising provider. Items that could further identify adaptations desirable for advertising, such as a user profile, may be sent to the vendor's server as well. The adaptations take forms that include pictures, text, graphics, links, audio, and video files. Systems that comprise an advertising server, a vendor server, and a client application used for completing the above method, as well as computer-readable media necessary at each device to accomplish the customizations, are also described.

Подробнее
20-12-2012 дата публикации

REDUCING DATA TRANSFER OVERHEAD DURING LIVE MIGRATION OF A VIRTUAL MACHINE

Номер: US20120324443A1

A computer-implemented method is provided for reducing network traffic associated with live migration. The method comprises selecting a virtual machine on a first physical host for migration to a second physical host, and providing each application running in the selected virtual machine with notification that the migration has started. In response to receiving the notification that the migration has started, each application reducing the number of memory pages in use during the migration. The selected virtual machine and each application is then migrated from the first physical host to the second physical host, wherein the migration of each application includes migration of the reduced number of memory pages. Non-limiting examples of methods that may be used to reduce the number of memory pages includes identifying memory that contains garbage, reducing the size of the heap, increasing the pause time used for garbage collection, deferring just-in-time compilation of hot methods, and releasing caches and buffers.

Подробнее
29-09-2011 дата публикации

ENABLING ELECTRONIC DOCUMENTS FOR LIMITED-CAPABILITY COMPUTING DEVICES

Номер: US20110239101A1
Принадлежит: Microsoft Corporation

System(s), method(s), and/or techniques (tools) are described that enable electronic document functionality for a limited-capability computing device. The tools may enable a computing device with limited display capabilities to present and enable navigation through nested items or hierarchical view levels of an electronic document. The tools may also build renderable view information by which a device may enable electronic document functionality based on the capabilities of that device.

Подробнее
10-05-2016 дата публикации

Dynamic instrumentation

Номер: US0009336001B2

Techniques for dynamic instrumentation are provided. A method for instrumentation preparation may include obtaining address data of an original instruction in an original instruction stream, obtaining kernel mode data comprising a kernel breakpoint handler, obtaining user mode data comprising a user breakpoint handler, allocating a page of a process address space, creating a trampoline, associating the trampoline with a breakpoint instruction, and replacing the original instruction with the breakpoint instruction. A method for instrumentation may include detecting the breakpoint instruction, calling the kernel breakpoint handler, modifying an instruction pointer via the kernel breakpoint handler such that the instruction pointer points to the trampoline, and executing the trampoline. The system for instrumentation may include a breakpoint setup module and a breakpoint execution module for respectively setting up and completing instrumentation involving the trampoline.

Подробнее
02-02-2021 дата публикации

Detection of malicious invocation of application program interface calls

Номер: US0010909236B2
Принадлежит: McAfee, LLC, MCAFEE LLC

Particular embodiments described herein provide for an electronic device that includes a binder kernel driver. The binder kernel driver can be configured to receive an application program interface (API) call, extract metadata from the API call, determine that the API call should be hooked based on the extracted metadata, and hook the API call.

Подробнее
28-06-2016 дата публикации

Interaction between ads and applications

Номер: US0009378512B2

Various technologies, methods, systems, processes, and compositions of matter pertaining to advertisements, and advertisement interactions with users and applications may be described. A single advertisement may be selected for a user based on a single lookup of the user profile at an advertisement server. The advertisement server may send a single adget to the user. This single adget is then seamlessly used on multiple devices. Each device may automatically select a different View of the advertisement. Each device may automatically render a different Actions as supported by a device.

Подробнее
05-01-2021 дата публикации

Return oriented programming attack protection

Номер: US0010885183B2

A computer implemented method for preventing return-oriented programming (ROP) attacks includes registering one or more critical regions, wherein a critical region corresponds to an address that has been selected to be monitored for potential ROP attacks, identifying one or more critical functions, wherein a critical function corresponds to a function that has been selected to be analyzed as a potential ROP threat, instrumenting the one or more critical regions with ROP protection mechanisms, detecting a critical function execution attempt on one or more of the identified critical regions, determining whether values associated with the critical function match corresponding expected values, and, responsive to determining that values associated with the critical function do not match expected values, activating a return-oriented programming protection mechanism.

Подробнее
14-02-2012 дата публикации

Simulating a multi-queue scheduler using a single queue on a processor

Номер: US0008117621B2

A method and system for scheduling tasks on a processor, the tasks being scheduled by an operating system to run on the processor in a predetermined order, the method comprising identifying and creating task groups of all related tasks; assigning the tasks in the task groups into a single common run-queue; selecting a task at the start of the run-queue; determining if the task at the start of the run-queue is eligible to be run based on a pre-defined timeslice allocated and on the presence of older starving tasks on the runqueue; executing the task in the pre-defined time slice; associating a starving status to all unexecuted tasks and running all until all tasks in the run-queue complete execution and the run-queue become empty.

Подробнее
10-04-2008 дата публикации

ALL WEATHER ABSORBENT TOWEL DISPENSER

Номер: US20080083772A1
Принадлежит: Sellars Absorbent Materials, Inc.

A water resistant absorbent towel dispenser. The dispenser includes a container having top, bottom and side walls housing a supply of absorbent towels, and an exterior handle for facilitating transport of the dispenser. The top wall includes a finger-accessible opening through which absorbent towels may be withdrawn. In certain embodiments, the top wall is convex upwardly, but is flexible to enable it to be depressed when dispensers are stacked vertically so as to come into load bearing contact with the towel supply. In some embodiments, the top and bottom walls have interlocking configurations to add lateral stability to vertically stacked dispensers.

Подробнее
22-12-2011 дата публикации

METADATA-ENABLED DYNAMIC UPDATES OF ONLINE ADVERTISEMENTS

Номер: US20110313848A1
Принадлежит: MICROSOFT CORPORATION

Systems, methods, and computer media for dynamically updating online advertisements and providing updated online advertisements are provided. An object-oriented online advertisement is provided that has properties inherited from an advertisement class. The inherited properties include metadata fields and corresponding metadata values. The metadata fields and values determine the content, appearance, behavior, and other characteristics of the online advertisement when it is published on a web page. Changes to or addition or deletion of metadata fields and values in an advertisement class or subclass are communicated to the online advertisements, and the metadata of the advertisements are updated to reflect the changes.

Подробнее
07-06-2012 дата публикации

DYNAMICALLY SCALABLE PER-CPU COUNTERS

Номер: US20120144170A1
Автор: Balbir Singh, SINGH BALBIR

Embodiments include a reference counting system and method for a multiprocessor system including distributed per-CPU counters having a dynamically variable batch size. A global counter is dynamically updated as each per-CPU counter reaches its associated batch size. An initial batch size provides a desired scalability. The batch size is automatically reduced as the global count approaches a predefined target, to increase the accuracy of the global count. Counting can be performed atomically using architecturally supported atomic operations. Using synchronized counters, counting can be done with a lock held by each processor to provide the necessary mutual exclusion for performing the atomic operations. 1. A multiprocessor computer system , comprising:a plurality of processors;a plurality of local counters, each local counter uniquely associated with one of the processors, each local counter for counting the occurrences of a processor event of the associated processor;a global counter for dynamically totaling the processor events counted by the local counters; anda controller in communication with the plurality of local counters and the global counter, the controller including control logic for updating the global counter in response to a local counter reaching a batch size and control logic for dynamically varying the batch size of one or more of the local counters according to the value of the global counter.2. The multiprocessor system of claim 1 , wherein the control logic for dynamically varying the batch size comprises:control logic for dynamically decreasing the batch size as a function of the difference between a target value for the global counter and a current value of the global counter.3. The multiprocessor system of claim 2 , wherein the control logic for dynamically decreasing the batch size as a function of the difference between a target value for the global counter and a current value of the global counter comprises control logic for decreasing the ...

Подробнее
02-07-2019 дата публикации

Detection of malicious invocation of application program interface calls

Номер: US0010339303B2
Принадлежит: McAfee, LLC, MCAFEE LLC

Particular embodiments described herein provide for an electronic device that includes a binder kernel driver. The binder kernel driver can be configured to receive an application program interface (API) call, extract metadata from the API call, determine that the API call should be hooked based on the extracted metadata, and hook the API call.

Подробнее
02-04-2015 дата публикации

INTERACTIVE HOST-AWARE CONTENT

Номер: US20150095164A1
Принадлежит:

Embodiments of the invention provide a method and system, for enabling an advertisement to interact with a software application. This can include receiving advertising content that is to be hosted by a software application. The advertising content can include an advertisement to be presented as well as an object that includes product information. The object can be interacted with by the software application. The product information relates to a product offering that is being promoted by the advertisement. The method further includes presenting the advertisement within the software application, and enabling the software application to utilize the product information in a presentation that becomes part of a work of the software application. The software application can be used to modify imported product information. Links to the outside world enable dynamic updating of even the imported product information, and also enable transactions to be performed that are associated with the advertisement. 1. A computer-implemented method integrating product information into a software application to facilitate content interaction with a software application based on attributes of a user , the method comprising: (1) product information associated with the product-offering content that facilitates an integration of the product information into a work of the software application; and', '(2) transaction-initiation information that enables a transaction associated with the product-offering content to be initiated from within the work;, 'communicating content to a remote computing device, the content including a product-offering content and an object that includes,'}such that a recipient of the product-offering content is enabled to utilize the software application to interact with the product information by acting on the product-offering content to import the product information into the software application;wherein the product-offering content is variable according to attributes of ...

Подробнее
06-12-2007 дата публикации

ELECTRONIC CONTROL FOR HEAVY DUTY TRUCK COMPRESSED AIR CHARGING SYSTEM

Номер: US20070277900A1
Принадлежит: PACCAR INC

A method of charging a compressed air storage tank for a vehicle increases the pressure in the storage tank from a first pressure to a second pressure. The method includes determining the first pressure according to a first detected vehicle engine load, and starting the charge cycle when the pressure detected in the storage tank is at least as low as the first pressure. The method further includes determining the second pressure according to a second detected vehicle engine load, and stopping the charge cycle when the pressure detected in the storage tank is at least as high as the second pressure.

Подробнее
12-07-2011 дата публикации

Electronic control for heavy duty truck compressed air charging system

Номер: US0007976285B2
Принадлежит: PACCAR Inc, PACCAR INC

A method of charging a compressed air storage tank for a vehicle increases the pressure in the storage tank from a first pressure to a second pressure. The method includes determining the first pressure according to a first detected vehicle engine load, and starting the charge cycle when the pressure detected in the storage tank is at least as low as the first pressure. The method further includes determining the second pressure according to a second detected vehicle engine load, and stopping the charge cycle when the pressure detected in the storage tank is at least as high as the second pressure.

Подробнее
09-10-2018 дата публикации

Data loss prevention for mobile computing devices

Номер: US0010097561B2
Принадлежит: McAfee, LLC, MCAFEE LLC

System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy.

Подробнее
03-03-2005 дата публикации

All weather absorbent towel dispenser

Номер: US20050046314A1
Принадлежит:

A water resistant absorbent towel dispenser. The dispenser includes a container having top, bottom and side walls housing a supply of absorbent towels, and an exterior handle for facilitating transport of the dispenser. The top wall includes a finger-accessible opening through which absorbent towels may be withdrawn. In certain embodiments, the top wall is convex upwardly, but is flexible to enable it to be depressed when dispensers are stacked vertically so as to come into load bearing contact with the towel supply. In some embodiments, the top and bottom walls have interlocking configurations to add lateral stability to vertically stacked dispensers.

Подробнее
08-04-2014 дата публикации

System and method for critical address space protection in a hypervisor environment

Номер: US0008694738B2

A system and method in one embodiment includes modules for detecting an access attempt to a critical address space (CAS) of a guest operating system (OS) that has implemented address space layout randomization in a hypervisor environment, identifying a process attempting the access, and taking an action if the process is not permitted to access the CAS. The action can be selected from: reporting the access to a management console of the hypervisor, providing a recommendation to the guest OS, and automatically taking an action within the guest OS. Other embodiments include identifying a machine address corresponding to the CAS by forcing a page fault in the guest OS, resolving a guest physical address from a guest virtual address corresponding to the CAS, and mapping the machine address to the guest physical address.

Подробнее
13-11-2001 дата публикации

Seizure and movement monitoring apparatus

Номер: US0006315740B1
Автор: Balbir Singh, SINGH BALBIR
Принадлежит: SINGH BALBIR

An apparatus for accurately monitoring motor movements attributable to seizures and convulsions of patients having epilepsy or other seizure disorders, and motor movements attributable to periodic leg movements, tremors, respiration, mechanical cardiac functions, or any other motorics during periods of sleep. This monitoring function is achieved without attaching any detection apparatus to the patient. Embodiments measure patient movements essentially by relating mattress displacement to such motor movements. The preferred embodiment is constructed with a geophone configuration intended to receive an analog signal corresponding to mattress movement and to communicate this signal to an electrically interconnected detection assembly for monitoring and recording the patient's pattern of body movements. Other suitable movement sensing devices such as devices based upon piezoelectric, fiber optics, microwave, infrared, and ultrasound phenomena may be used either in addition to or instead of ...

Подробнее
25-12-2003 дата публикации

Seizure and movement monitoring

Номер: US20030236474A1
Автор: Balbir Singh
Принадлежит:

An apparatus and method for monitoring movements of a patient is provided. If movements of the patient are detected to exceed predetermined thresholds, then a detector assembly determines that a seizure condition is present, and an alarm may be generated. In one arrangement, a sensor assembly includes one or more sound detectors to detect sound cause by patient movement. The detector assembly monitors the movement of the patient for determining if an abnormal movement or seizure condition is present. In another arrangement, an image sensor is used. A detector assembly monitors images produced by the image sensor to determine if the movements exceed predetermined thresholds. Other types of sensors can be used in other arrangements. The sensors can either be placed on a surface common to the patient or they can be attached to the patient.

Подробнее
20-10-2020 дата публикации

Using trusted platform module to build real time indicators of attack information

Номер: US0010812466B2
Принадлежит: McAfee, LLC, MCAFEE LLC

Managed devices containing a Trusted Platform Module (TPM) to provide a trusted environment generate a device certificate at initialization of the TPM and send the device certificate to a management console for storing in a certificate database. Upon detecting a file of interest, the TPM signs the file, adding to a signature list created by previous managed devices. The signature list can be used to analyze the spread of the file across the system of managed devices, including tracking the file to the first managed device to have had a copy, without requiring real-time access to the managed devices during the spread of the file. In some embodiments, additional security measures may be taken responsive to determining the first managed device and the path the file has taken across the system of managed devices.

Подробнее
06-04-2004 дата публикации

Curable adhesive splints and methods

Номер: US0006716186B1

Curable adhesive splints, methods of manufacturing the splints and methods of using the splints are disclosed. The splints include a curable splinting layer and an exposed pressure sensitive adhesive proximate a first major side of the splinting layer. The pressure sensitive adhesive is used to secure the curable layer in position to provide the desired immobilization. The curable splinting layer may be of any material that can be shaped and cured to provide the desired level of stiffness required for immobilization, such as, e.g., moisture-curable splinting material, etc. The curable adhesive splints may be molded or formed to a desired shape while still providing the stiffness required for immobilization after curing.

Подробнее
20-08-2015 дата публикации

SYSTEM AND METHOD FOR PROFILE BASED FILTERING OF OUTGOING INFORMATION IN A MOBILE ENVIRONMENT

Номер: US20150237011A1
Принадлежит:

A system and method in one embodiment includes modules for detecting an access request by an application to access information in a mobile device, determining that the application is a potential threat according to at least one policy filter, and blocking a send request by the application to send the information from the mobile device without a user's consent. More specific embodiments include user selecting the information through a selection menu on a graphical user interface that includes information categories pre-populated by an operating system of the mobile device, and keywords that can be input by the user. Other embodiments include queuing the send request in a queue with other requests, and presenting an outbox comprising the queue to the user to choose to consent to the requests. The outbox includes graphical elements configured to permit the user to selectively consent to any requests in the queue. 1. A non-transitory computer-readable storage medium comprising logic that includes code for execution and when executed on a processor configures the processor to perform operations comprising:detecting an access request by an application to access information in a mobile device;determining whether the information being requested by the access request matches a category of information described by at least one policy filter;flagging the application as a potential threat in response to determining that the information being requested by the access request matches the category of information described by the at least one policy filter, wherein the application is allowed to access the information matching the category of information even though the application is flagged; andin response to flagging the application, blocking send requests by the flagged application to send the information matching the category of information from the mobile device without user's consent.2. The non-transitory computer-readable storage medium of claim 1 , further comprising ...

Подробнее
17-05-2012 дата публикации

Organizing Memory for Effective Memory Power Management

Номер: US20120124269A1

A kernel of the operating system reorganizes a plurality of memory units into a plurality of virtual nodes in a virtual non-uniform memory access architecture in response to receiving a configuration of the plurality of memory units from a firmware. A subsystem of the operating system determines an order of allocation of the plurality of virtual nodes calculated to maintain a maximum number of the plurality of memory units devoid of references. The memory controller transitions one or more memory units into a lower power state in response to the one or more memory units being devoid of one or more references for the period of time. 1. A method comprising:determining, by a subsystem of an operating system, an order of allocation of a plurality of virtual nodes calculated to maintain a maximum number of a plurality of memory units devoid of references;allocating the plurality of virtual nodes in the order of allocation; andtransitioning, by a memory controller, one or more memory units into a lower power state in response to the one or more memory units being devoid of one or more references for a period of time.2. The method of further comprising:identifying, by a firmware, a plurality of memory units in a memory hardware, wherein each of the plurality of memory units is a portion of the memory hardware configured for power management by the memory controller of the memory hardware in response to the portion of the memory hardware being devoid of references for the period of time;identifying, by the firmware, a configuration of the plurality of memory units;sending, by the firmware, the configuration to the operating system;reorganizing, by a kernel of the operating system, the plurality of memory units into the plurality of virtual nodes in a virtual non-uniform memory access architecture in response to receiving the configuration;migrating data, by the subsystem, from a number of memory units in a number of virtual nodes to a one or more other memory units in one ...

Подробнее
11-09-2012 дата публикации

Dynamically patching computer code using breakpoints

Номер: US0008266597B2

A first section of executable computer code of a computer program is dynamically patched by performing the following. A breakpoint is inserted at the first section of executable computer code. During execution of the computer program, an instruction counter is incremented on an instruction-by-instruction basis through the computer program. The instruction counter indicates a current instruction of the computer program being executed. The breakpoint where the instruction counter points to the first section of executable computer code is encountered, which results in a breakpoint handler being called. The breakpoint handler changes the instruction pointer to instead point to a second section of executable computer code. The second section of executable computer code is a patched version of the first section of executable computer code. Upon the breakpoint handler returning, the second section of executable computer code is executed in lieu of the first section of executable computer code.

Подробнее
02-12-2014 дата публикации

Reducing data transfer overhead during live migration of a virtual machine

Номер: US0008904384B2

A computer-implemented method is provided for reducing network traffic associated with live migration. The method comprises selecting a virtual machine on a first physical host for migration to a second physical host, and providing each application running in the selected virtual machine with notification that the migration has started. In response to receiving the notification that the migration has started, each application reducing the number of memory pages in use during the migration. The selected virtual machine and each application is then migrated from the first physical host to the second physical host, wherein the migration of each application includes migration of the reduced number of memory pages. Non-limiting examples of methods that may be used to reduce the number of memory pages includes identifying memory that contains garbage, reducing the size of the heap, increasing the pause time used for garbage collection, deferring just-in-time compilation of hot methods, and releasing ...

Подробнее
07-03-2024 дата публикации

DATA PLANE TECHNIQUES FOR SUBSTRATE MANAGED CONTAINERS

Номер: US20240080277A1
Принадлежит: Oracle International Corporation

Techniques discussed herein include providing a cloud computing environment in which applications are deployed by a deployment orchestrator using virtual-machine-based virtualization with a static pool of computing nodes (e.g., substrate nodes, overlay nodes) and container-based virtualization with a dynamic pool of computing nodes (e.g., nodes managed by a container orchestration platform). Components of a data plane may be used to deploy containers to micro-virtual machines. A container runtime interface (CRI) may receive a deployment request from the deployment orchestrator. A container networking interface of the data plane may configure network connections and allocate an IP address for the container. A container runtime of the data pane may generate and configure the container with the IP address and run the container within a micro-virtual machine that is compatible with the container orchestration platform.

Подробнее
24-03-2016 дата публикации

NON-INVASIVE WHITELISTING

Номер: US20160088011A1
Принадлежит:

In an example, there is disclosed a security architecture for enhanced, non-invasive whitelisting of executable objects. When an executable object tries to perform an action, a security engine seamlessly intercepts the action and determines whether the action is whitelisted, blacklisted, or graylisted, assigning the action a corresponding security score. Whitelisted actions may be allowed, blacklisted actions may be disallowed, and graylisted actions may require additional verification from a user. Because the score is assigned to the combination of the executable object and the action, false positives may be avoided, such as those that may occur when an executable object is prefetched but has not yet tried to perform any useful work. 1. A computing device comprising:a storage containing an executable object; and detecting that the executable object has attempted to perform an action;', 'intercepting the action;', 'assigning a reputation to the action; and', 'acting on the reputation., 'one or more logic elements comprising a security engine operable for2. The computing device of claim 1 , wherein acting on the reputation comprises permitting the executable object to perform the action.3. The computing device of claim 1 , wherein acting on the reputation comprises blocking the executable object from performing the action.4. The computing device of claim 1 , wherein acting on the reputation comprises providing a warning to a user.5. The computing device of claim 1 , wherein acting on the reputation comprises receiving a user decision related to the action.6. The computing device of claim 5 , wherein the reputation engine is further operable for caching the user decision.7. The computing device of claim 1 , wherein assigning a reputation to the action comprises using heuristics.8. The computing device of claim 1 , wherein assigning a reputation to the action comprises:identifying the object's type;calculating a checksum for the object; andextracting object attributes. ...

Подробнее
10-07-2014 дата публикации

DATA LOSS PREVENTION FOR MOBILE COMPUTING DEVICES

Номер: US20140194094A1
Принадлежит:

System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy. 125-. (canceled)26. At least one machine accessible storage medium having instructions stored thereon , the instructions when executed on a machine , cause the machine to:intercept a system call involving photograph data to a kernel of a mobile computing device;identify a location-based data loss prevention (DLP) policy applicable to use of the photograph data, based at least in part on a detected location of the mobile computing device; andperform an action on the intercepted system call based at least in part on the location-based DLP policy and the location of the mobile computing device.27. The storage medium of claim 26 , wherein attempts to output the photograph data while the mobile computing device is located outside of a particular geographic location are blocked based on the location-based DLP policy.28. The storage medium of claim 26 , wherein the kernel is a Linux kernel and the particular system call is intercepted by a Linux Security Module (LSM).29. The storage medium of claim 26 , wherein the agent is an application installed on the mobile computing device.30. The storage medium of claim 29 , wherein the agent interfaces with a remote security server for policy information corresponding to the mobile computing device.31. The storage medium of claim 26 , wherein the agent logic is included in a security module interfacing with the kernel.32. The storage medium of claim 26 , wherein the particular system call includes at least one of an output of the photograph data utilizing SMS claim 26 , email claim 26 , near field communication (NFC) claim 26 , Bluetooth claim 26 , and WiFi ...

Подробнее
25-08-2009 дата публикации

All weather absorbent towel dispenser

Номер: US0007578414B2

A water resistant absorbent towel dispenser. The dispenser includes a container having top, bottom and side walls housing a supply of absorbent towels, and an exterior handle for facilitating transport of the dispenser. The top wall includes a finger-accessible opening through which absorbent towels may be withdrawn. In certain embodiments, the top wall is convex upwardly, but is flexible to enable it to be depressed when dispensers are stacked vertically so as to come into load bearing contact with the towel supply. In some embodiments, the top and bottom walls have interlocking configurations to add lateral stability to vertically stacked dispensers.

Подробнее
08-12-2015 дата публикации

Enabling electronic documents for limited-capability computing devices

Номер: US0009210234B2

System(s), method(s), and/or techniques (tools) are described that enable electronic document functionality for a limited-capability computing device. The tools may enable a computing device with limited display capabilities to present and enable navigation through nested items or hierarchical view levels of an electronic document. The tools may also build renderable view information by which a device may enable electronic document functionality based on the capabilities of that device.

Подробнее
14-08-2018 дата публикации

Non-invasive whitelisting

Номер: US0010050993B2
Принадлежит: McAfee, LLC, MCAFEE LLC

In an example, there is disclosed a security architecture for enhanced, non-invasive whitelisting of executable objects. When an executable object tries to perform an action, a security engine seamlessly intercepts the action and determines whether the action is whitelisted, blacklisted, or graylisted, assigning the action a corresponding security score. Whitelisted actions may be allowed, blacklisted actions may be disallowed, and graylisted actions may require additional verification from a user. Because the score is assigned to the combination of the executable object and the action, false positives may be avoided, such as those that may occur when an executable object is prefetched but has not yet tried to perform any useful work.

Подробнее
29-12-2020 дата публикации

Return oriented programming attack protection

Номер: US0010878081B2

A computer implemented method for preventing return-oriented programming (ROP) attacks includes registering one or more critical regions, wherein a critical region corresponds to an address that has been selected to be monitored for potential ROP attacks, identifying one or more critical functions, wherein a critical function corresponds to a function that has been selected to be analyzed as a potential ROP threat, instrumenting the one or more critical regions with ROP protection mechanisms, detecting a critical function execution attempt on one or more of the identified critical regions, determining whether values associated with the critical function match corresponding expected values, and, responsive to determining that values associated with the critical function do not match expected values, activating a return-oriented programming protection mechanism.

Подробнее
17-10-2013 дата публикации

CONTROL OF JAVA RESOURCE RUNTIME USAGE

Номер: US20130275965A1

A method for providing control of Java resource runtime usage may include establishing communication with one or more Java virtual machines (JVMs) forming a hive via a hive communication channel where the hive comprises a plurality of JVMs configured to enable utilization of at least one shared resource, receiving, via the hive communication channel, environmental information indicative of hive activity relative to the at least one shared resource from at least one of the one or more JVMs, and adapting, via processing circuitry, operations associated with use of the at least one shared resource based on the environmental information.

Подробнее
12-09-2019 дата публикации

DETECTION OF MALICIOUS INVOCATION OF APPLICATION PROGRAM INTERFACE CALLS

Номер: US20190278908A1
Принадлежит: McAfee, LLC

Particular embodiments described herein provide for an electronic device that includes a binder kernel driver. The binder kernel driver can be configured to receive an application program interface (API) call, extract metadata from the API call, determine that the API call should be hooked based on the extracted metadata, and hook the API call.

Подробнее
22-12-2016 дата публикации

DETECTION OF MALICIOUS INVOCATION OF APPLICATION PROGRAM INTERFACE CALLS

Номер: US20160371484A1
Принадлежит: McAfee LLC

Particular embodiments described herein provide for an electronic device that includes a binder kernel driver. The binder kernel driver can be configured to receive an application program interface (API) call, extract metadata from the API call, determine that the API call should be hooked based on the extracted metadata, and hook the API call.

Подробнее
29-07-2010 дата публикации

LOCAL TARGETING ENGINE

Номер: US20100191599A1
Принадлежит: Microsoft Corporation

Technology is described for local ad targeting. An engine executing on a client computing device may select ads based on rules that can be modified without modifying the engine. The engine can select from advertisements stored locally based on data discovered at the client computing device, such as by observing the user's actions, stored documents, state of the client computing device and/or its peripherals, etc. The technology can employ plug-ins to extend functionality provided by the engine. The technology can include a plug-in manager that manages plug-ins. The technology can also download and manage rules. Each rule can specify what actions to take, such as when an event occurs. When a component of the operating system observes an event, the engine (or a rule executor component associated with the engine) executes each related rule. The technology can thus select ads based on arbitrary events of the operating system, applications, or other components.

Подробнее
10-11-2015 дата публикации

Preserving, from resource management adjustment, portions of an overcommitted resource managed by a hypervisor

Номер: US0009183061B2

Methods, apparatuses, and computer program products for preserving, from resource management adjustment, portions of an overcommitted resource managed by a hypervisor are provided. Embodiments include identifying, by the hypervisor, a privileged guest from among a plurality of guests of the hypervisor; identifying, by the hypervisor, portions of the overcommitted resource that are allocated to the privileged guest; and preventing, by the hypervisor, resource management adjustment to the identified portions of the overcommitted resource that are allocated to the privileged guest.

Подробнее
15-03-2007 дата публикации

Sessions and session states

Номер: US20070061467A1
Принадлежит: Microsoft Corporation

Systems and/or methods (“tools”) are described that enable application-specific session states in a single session, a network entity to be brought down without data loss, additional privacy for session states, continuity when a session state's version differs from that of the session state's network application, cessation of unnecessary roundtrips attempting to fetch session states, and other techniques. Some of these techniques may be enabled with a data structure having a single binary large object having application-specific identifiers for portions of the binary large object, version identifiers for those portions, a client token indicating the client associated with session states in the binary large object, and a session identifier indicating the session in which these session states exist.

Подробнее
14-05-2002 дата публикации

System and method for producing folded articles

Номер: US0006385946B1
Автор: Balbir Singh, SINGH BALBIR
Принадлежит: Ethicon, ETHICON INC, ETHICON

A system for producing folded articles includes a cutting station (56) operable to segment a fabric web (42, 44) into a continuous stream of individual web segments (74, 76). The system also includes a first folding station (58) operable to fold each of the web segments (74, 76). The system further includes a spacing station (88) operable to receive the stream of web segments (74, 76) from the folding station (58) and deliver the stream of web segments (74, 76) at a predetermined spacing to correspond with a packaging registration.

Подробнее
03-11-2015 дата публикации

Preserving, from resource management adjustment, portions of an overcommitted resource managed by a hypervisor

Номер: US0009176787B2

Methods, apparatuses, and computer program products for preserving, from resource management adjustment, portions of an overcommitted resource managed by a hypervisor are provided. Embodiments include identifying, by the hypervisor, a privileged guest from among a plurality of guests of the hypervisor; identifying, by the hypervisor, portions of the overcommitted resource that are allocated to the privileged guest; and preventing, by the hypervisor, resource management adjustment to the identified portions of the overcommitted resource that are allocated to the privileged guest.

Подробнее
29-12-2016 дата публикации

DATA LOSS PREVENTION FOR MOBILE COMPUTING DEVICES

Номер: US20160381037A1
Принадлежит:

System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy. 1. At least one machine accessible storage medium having instructions stored thereon , the instructions when executed on a machine , cause the machine to:intercept a system call involving photograph data to a kernel of a mobile computing device;identify a location-based data loss prevention (DLP) policy applicable to use of the photograph data, based at least in part on a detected location of the mobile computing device; andperform an action on the intercepted system call based at least in part on the location-based DLP policy and the location of the mobile computing device.2. The storage medium of claim 1 , wherein attempts to output the photograph data while the mobile computing device is located outside of a particular geographic location are blocked based on the location-based DLP policy.3. The storage medium of claim 1 , wherein the kernel is a Linux kernel and the particular system call is intercepted by a Linux Security Module (LSM).4. The storage medium of claim 1 , wherein the agent is an application installed on the mobile computing device.5. The storage medium of claim 4 , wherein the agent interfaces with a remote security server for policy information corresponding to the mobile computing device.6. The storage medium of claim 1 , wherein the agent logic is included in a security module interfacing with the kernel.7. The storage medium of claim 1 , wherein the particular system call includes at least one of an output of the photograph data utilizing SMS claim 1 , email claim 1 , near field communication (NFC) claim 1 , Bluetooth claim 1 , and WiFi functionality of the mobile ...

Подробнее
04-09-2001 дата публикации

System and method for producing folded articles

Номер: US0006283905B1
Автор: Balbir Singh, SINGH BALBIR
Принадлежит: Ethicon, ETHICON INC, ETHICON

A system (10) for producing folded articles includes a cutting station (58) operable to segment a fabric web (42) into a continuous stream of individual web segments (86). The system also includes a rotary folder (96) comprising a plurality of folding rollers (104, 106). The rotary folder (96) rotates about an axis spaced apart from axes of the folding rollers (104, 106). The rotary folder (96) is operable to receive the web segments (86) at a first location and fold the web segments one or more times while rotating from the first location to a second location about the rotary folder (96) axis. The system further includes a transfer station (62) operable to receive the folded web segments (86) from the rotary folder (96) at the second location and deliver the folded web segments (86) to a third location.

Подробнее
17-10-2013 дата публикации

CONTROL OF JAVA RESOURCE RUNTIME USAGE

Номер: US20130275976A1
Принадлежит:

A method for providing control of Java resource runtime usage may include establishing communication with one or more Java virtual machines (JVMs) forming a hive via a hive communication channel where the hive comprises a plurality of JVMs configured to enable utilization of at least one shared resource, receiving, via the hive communication channel, environmental information indicative of hive activity relative to the at least one shared resource from at least one of the one or more JVMs, and adapting, via processing circuitry, operations associated with use of the at least one shared resource based on the environmental information. 1. A method comprising:establishing communication with one or more Java virtual machines (JVMs) forming a hive via a hive communication channel, the hive comprising a plurality of JVMs configured to enable utilization of at least one shared resource;receiving, via the hive communication channel, environmental information indicative of hive activity relative to the at least one shared resource from at least one of the one or more JVMs; andadapting, via processing circuitry, operations associated with use of the at least one shared resource based on the environmental information.2. The method of claim 1 , further comprising establishing communication with one or more external agents via the hive communication channel.3. The method of claim 2 , wherein establishing communication with the one or more external agents comprises establishing communication with a workload manager claim 2 , a hypervisor or a live migration tool.4. The method of claim 1 , wherein receiving environmental information indicative of hive activity comprises receiving information indicative of allocation of shared memory resources or information indicative of allocation of shared processing resources.5. The method of claim 1 , wherein receiving environmental information indicative of hive activity comprises receiving information indicative of garbage collection state.6 ...

Подробнее
21-02-2013 дата публикации

Preserving, From Resource Management Adjustment, Portions Of An Overcommitted Resource Managed By A Hypervisor

Номер: US20130047152A1

Methods, apparatuses, and computer program products for preserving, from resource management adjustment, portions of an overcommitted resource managed by a hypervisor are provided. Embodiments include identifying, by the hypervisor, a privileged guest from among a plurality of guests of the hypervisor; identifying, by the hypervisor, portions of the overcommitted resource that are allocated to the privileged guest; and preventing, by the hypervisor, resource management adjustment to the identified portions of the overcommitted resource that are allocated to the privileged guest. 16-. (canceled)7. An apparatus for preserving , from resource management adjustment , portions of an overcommitted resource managed by a hypervisor , the apparatus comprising a computer processor , a computer memory operatively coupled to the computer processor , the computer memory having disposed within it computer program instructions that when executed by the computer processor cause the apparatus to carry out the steps of:identifying, by the hypervisor, a privileged guest from among a plurality of guests of the hypervisor;identifying, by the hypervisor, portions of the overcommitted resource that are allocated to the privileged guest; andpreventing, by the hypervisor, resource management adjustment to the identified portions of the overcommitted resource that are allocated to the privileged guest.8. The apparatus of wherein preventing resource management adjustment to the identified portions of the overcommitted resource that are allocated to the privileged guest includes marking as non-swappable claim 7 , by the hypervisor claim 7 , memory pages allocated to the identified privileged guest.9. The apparatus of wherein preventing resource management adjustment to the identified portions of the overcommitted resource that are allocated to the privileged guest includes preventing claim 7 , by the hypervisor claim 7 , issuance of a memory balloon request to the identified privileged guest. ...

Подробнее
16-08-2011 дата публикации

Enabling electronic documents for limited-capability computing devices

Номер: US0008001459B2

System(s), method(s), and/or techniques (tools) are described that enable electronic document functionality for a limited-capability computing device. The tools may enable a computing device with limited display capabilities to present and enable navigation through nested items or hierarchical view levels of an electronic document. The tools may also build renderable view information by which a device may enable electronic document functionality based on the capabilities of that device.

Подробнее
26-04-2016 дата публикации

Data loss prevention for mobile computing devices

Номер: US0009326134B2
Принадлежит: McAfee Inc., MCAFEE INC, MCAFEE, INC., MCAFEE INC.

System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy.

Подробнее
30-07-2002 дата публикации

System and method for producing coreless fabric rolls

Номер: US0006425547B1
Автор: Balbir Singh, SINGH BALBIR
Принадлежит: Ethicon, ETHICON INC, ETHICON

A system for producing coreless fabric rolls includes a feed station (12) operable to supply a leading edge of a fabric web (24) from a parent roll (18). The system includes a first tucking station (132) operable to position the leading edge of the fabric web (24) adjacent one of a plurality of spindles (48, 50, 52) coupled to a turret (46). The system also includes a winding station (38) comprising a winding roller (36). The winding station (38) is operable to receive the leading edge in a nip defined by the spindle (48, 50, 52) and the winding roller (36) and wind the fabric web (24) into a fabric roll about the spindle (48, 50, 52). The system also includes a cutting station (40) operable to separate the fabric roll from a remaining portion of the fabric web (24). The system also includes a second tucking station (42) operable to receive the spindle (48, 50, 52) from the winding station (36) and wind a trailing edge of the fabric roll about the fabric roll.

Подробнее
13-03-2001 дата публикации

Alumino-silicate derivatives

Номер: US0006200919B1

The formation of new materials in the form of alumino-silicate derivatives from 2:1 layer clay materials which are obtained by the chemical modification of 2:1 layer clay minerals by reaction with a salt having the formula MX wherein M is ammonium ion or alkali metal cation and X is a halide. The new materials have the following characteristics: (a) an amorphous x-ray diffraction signal manifest as a broad hump using x-ray powder diffraction between 22° and 32° 2theta using CuKalpha radiation; and (b) the presence of primarily tetrahedrally coordinated aluminum.

Подробнее
17-04-2003 дата публикации

Apparatus and method for longitudinal folding

Номер: US20030073559A1
Автор: Balbir Singh
Принадлежит: Nike Inc

An apparatus and method is disclosed useful for folding materials, particularly fabrics that are fragile such as medical gauze. The apparatus in its simplest embodiment comprises a roller and a disk which is in communication with the roller. In operation, the material to be folded first is drawn between the roller and disk and then drawn against the disk to form a fold.

Подробнее
07-03-2024 дата публикации

CONTROL PLANE TECHNIQUES FOR SUBSTRATE MANAGED CONTAINERS

Номер: US20240080242A1
Принадлежит: Oracle International Corporation

Techniques discussed herein include providing a cloud computing environment in which applications are deployed using virtual-machine-based virtualization with a static pool of computing nodes (e.g., substrate nodes, overlay nodes) and container-based virtualization with a dynamic pool of computing nodes (e.g., nodes managed by a container orchestration platform). The control plane functionality may be invoked by a deployment orchestrator (e.g., using a client of the container orchestration platform). In some embodiments, the control plane may include a set of applications that are configured to communicate with core services for certificate generation and rotation, namespace and quota management, metric monitoring and alarming, node authentication, and cluster membership management.

Подробнее
07-06-2007 дата публикации

Enabling electronic documents for limited-capability computing devices

Номер: US20070130500A1
Принадлежит: Microsoft Corporation

System(s), method(s), and/or techniques (“tools”) are described that enable electronic document functionality for a limited-capability computing device. The tools may enable a computing device with limited display capabilities to present and enable navigation through nested items or hierarchical view levels of an electronic document. The tools may also build renderable view information by which a device may enable electronic document functionality based on the capabilities of that device.

Подробнее
01-11-2012 дата публикации

ADVERTISEMENT STORAGE AND RETRIEVAL

Номер: US20120278173A1
Принадлежит: Microsoft Corporation

Architecture for finding and browsing advertisements presented to a user. In general, the user is able to save advertisements, distribute/share saved advertisements and/or advertisements in the user history, and distribute/share advertisements via existing communication modalities (e.g., email, SMS (short message service), social networks, messaging, etc.). The architecture provides a website the user can access to view the user history of advertisements, coupons, and offers that were presented to the user. Saved advertisements can be made available only for the duration of that particular campaign, beyond which the advertisements can be grayed out and purged with user consent. Additionally, all the advertisements can be published via one or more websites, store advertisements locally on a device, store advertisements in the cloud, and synchronize advertisements across different devices.

Подробнее
11-04-2013 дата публикации

SYSTEM AND METHOD FOR CRITICAL ADDRESS SPACE PROTECTION IN A HYPERVISOR ENVIRONMENT

Номер: US20130091318A1
Принадлежит: McAfee, Inc.

A system and method in one embodiment includes modules for detecting an access attempt to a critical address space (CAS) of a guest operating system (OS) that has implemented address space layout randomization in a hypervisor environment, identifying a process attempting the access, and taking an action if the process is not permitted to access the CAS. The action can be selected from: reporting the access to a management console of the hypervisor, providing a recommendation to the guest OS, and automatically taking an action within the guest OS. Other embodiments include identifying a machine address corresponding to the CAS by forcing a page fault in the guest OS, resolving a guest physical address from a guest virtual address corresponding to the CAS, and mapping the machine address to the guest physical address. 1. A method comprising:detecting an access attempt to a critical address space (CAS) of a guest operating system (OS) in a hypervisor environment comprising a hypervisor, wherein address space layout randomization (ASLR) is implemented by the guest OS;identifying a process attempting the access; andtaking an action if the process is not permitted to access the CAS.2. The method of claim 1 , wherein the detecting the access attempt comprises:generating page table entries (PTEs) for pages corresponding to the CAS in a shadow page table of the hypervisor;marking the PTEs such that the access attempt results in a page fault.3. The method of claim 1 , wherein the identifying the process attempting the access comprises reading a CR3 register corresponding to the process.4. The method of claim 1 , wherein the action is selected from:reporting the access to a management console of the hypervisor;providing a recommendation to the guest OS; andautomatically taking an action within the guest OS.5. The method of claim 4 , wherein the reporting the access to a management console of the hypervisor includes flagging a status of the guest OS as infected.6. The method of ...

Подробнее
17-12-2009 дата публикации

Dynamically Patching Computer Code Using Breakpoints

Номер: US20090313611A1

A first section of executable computer code of a computer program is dynamically patched by performing the following. A breakpoint is inserted at the first section of executable computer code. During execution of the computer program, an instruction counter is incremented on an instruction-by-instruction basis through the computer program. The instruction counter indicates a current instruction of the computer program being executed. The breakpoint where the instruction counter points to the first section of executable computer code is encountered, which results in a breakpoint handler being called. The breakpoint handler changes the instruction pointer to instead point to a second section of executable computer code. The second section of executable computer code is a patched version of the first section of executable computer code. Upon the breakpoint handler returning, the second section of executable computer code is executed in lieu of the first section of executable computer code.

Подробнее
25-10-2012 дата публикации

DYNAMICALLY SCALABLE PER-CPU COUNTERS

Номер: US20120272246A1
Автор: Balbir Singh, SINGH BALBIR

Embodiments include a multiprocessing method including obtaining a local count of a processor event at each of a plurality of processors in a multiprocessor system. A total count of the processor event is dynamically updated to include the local count at each processor having reached an associated batch size. The batch size associated with one or more of the processors is dynamically varied according to the value of the total count.

Подробнее
09-09-2014 дата публикации

Dynamic instrumentation

Номер: US0008832666B2

A method and system for instrumentation are provided along with a method for instrumentation preparation. The method for instrumentation preparation may comprise obtaining address data of an original instruction in an original instruction stream, obtaining kernel mode data comprising a kernel breakpoint handler, obtaining user mode data comprising a user breakpoint handler, allocating a page of a process address space, creating a trampoline, associating the trampoline with a breakpoint instruction, and replacing the original instruction with the breakpoint instruction. The method for instrumentation may comprise detecting the breakpoint instruction, calling the kernel breakpoint handler, modifying an instruction pointer via the kernel breakpoint handler such that the instruction pointer points to the trampoline, and executing the trampoline. The system for instrumentation may comprise a breakpoint setup module and a breakpoint execution module for respectively setting up and completing ...

Подробнее
29-12-2011 дата публикации

INTERACTION BETWEEN ADS AND APPLICATIONS

Номер: US20110320956A1
Принадлежит: MICROSOFT CORPORATION

Various technologies, methods, systems, processes, and compositions of matter pertaining to advertisements, and advertisement interactions with users and applications may be described. A single advertisement may be selected for a user based on a single lookup of the user profile at an advertisement server. The advertisement server may send a single adget to the user. This single adget is then seamlessly used on multiple devices. Each device may automatically select a different View of the advertisement. Each device may automatically render a different Actions as supported by a device.

Подробнее
26-05-2015 дата публикации

System and method for profile based filtering of outgoing information in a mobile environment

Номер: US0009043918B2

A system and method in one embodiment includes modules for detecting an access request by an application to access information in a mobile device, determining that the application is a potential threat according to at least one policy filter, and blocking a send request by the application to send the information from the mobile device without a user's consent. More specific embodiments include user selecting the information through a selection menu on a graphical user interface that includes information categories pre-populated by an operating system of the mobile device, and keywords that can be input by the user. Other embodiments include queuing the send request in a queue with other requests, and presenting an outbox comprising the queue to the user to choose to consent to the requests. The outbox includes graphical elements configured to permit the user to selectively consent to any requests in the queue.

Подробнее
28-05-2002 дата публикации

Process and apparatus for forming dual compartment pouches from a continuous web

Номер: US0006395317B1
Принадлежит: Mars Incorporated, MARS INC, MARS INCORPORATED

The present invention is directed to process and apparatus for forming a dual compartment package. The process includes forming an elongated rectangular U-shaped package having an inside and outside wall configured to form an open top end, and an inside and outside wall configured to form an open bottom end. The U-shaped package is filled with product. A zipper assembly having inter-locking members is separated into a first zipper component and a second zipper component. The first zipper component is attached to the inner side of the open top end walls thereby sealing the top end to the first zipper component. The open bottom end walls are placed adjacent the first zipper component, and the second zipper component is reattached to the first zipper component thereby locking the open bottom end walls between the inter-locking members of the zipper assembly. The U-shaped package forms two compartments that are separately filled with a product, in which the product is dispensed from the bottom ...

Подробнее
17-05-2018 дата публикации

DATA LOSS PREVENTION FOR MOBILE COMPUTING DEVICES

Номер: US20180139211A1
Принадлежит:

System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy. 125-. (canceled)26. A non-transitory , machine-readable medium encoded with logic that , when executed by a processor , causes the processor to perform a method comprising:monitoring system calls to a kernel of a mobile computing device;intercepting a particular system call relating to input/output (I/O) functionality of the mobile computing device;identifying a data loss prevention (DLP) policy applicable to the particular system call; andperforming an action on the particular system call based at least in part on the DLP policy.27. The medium of claim 26 , the method further comprising:querying an agent on the mobile computing device for DLP policies applicable to the particular system call; andreceiving a result from the agent that identifies whether DLP policies apply to the particular system call.28. The medium of claim 27 , wherein the result from the agent identifies that no DLP policies or permissive DLP policies apply to the particular system call claim 27 , and the action includes passing the particular system call to the kernel for processing.29. The medium of claim 27 , wherein the result from the agent identifies one or more DLP policies applicable to the particular system call claim 27 , and the action includes a DLP enforcement action.30. The medium of claim 29 , wherein the DLP enforcement action includes disallowing the particular system call.31. The medium of claim 29 , wherein the DLP enforcement action includes modifying data to be input or output in connection with the particular system call.32. The medium of claim 29 , wherein the DLP enforcement action includes causing ...

Подробнее
18-04-2013 дата публикации

SYSTEM AND METHOD FOR PROVIDING THRESHOLD LEVELS ON PRIVILEGED RESOURCE USAGE IN A MOBILE NETWORK ENVIRONMENT

Номер: US20130097203A1
Принадлежит: McAfee, Inc.

A system and method in one embodiment includes modules for detecting a request by an application in a mobile device to access a privileged resource, determining a cumulative usage of the privileged resource by the application, and performing an action according to a rule if a predefined threshold level of usage triggers the action based on the cumulative usage. More specific embodiments include blocking the request, and sending a notification to a user and updating a rules database to modify the predefined threshold level of usage associated with the rule. Other embodiments include monitoring permissions of the application to the privileged resource, and removing any permissions that have not been used for a predefined time period, logging the request into a log in a utilization database, reading the log, collating information in the log, and analyzing the log. 1. A method comprising:detecting a request by an application in a mobile device to access a privileged resource;determining a cumulative usage of the privileged resource by the application; andperforming an action according to a rule if a predefined threshold level of usage triggers the action based on the cumulative usage.2. The method of claim 1 , wherein the action includes:blocking the request; andsending a notification to a user.3. The method of claim 1 , wherein the action includes updating a rules database to modify the predefined threshold level of usage associated with the rule.4. The method of claim 1 , wherein the predefined threshold level of usage triggers the action if the cumulative usage occurs within a predefined amount of time.5. The method of claim 1 , wherein the predefined threshold level of usage triggers the action if the cumulative usage exceeds the predefined threshold level of usage.6. The method of claim 1 , further comprising:monitoring permissions of the application to the privileged resource; andremoving any permissions that have not been used for a predefined time period.7. The ...

Подробнее
03-10-2017 дата публикации

Prevention of forgery of web requests to a server

Номер: US0009780951B2

Technologies for prevention of forgery of a network communication request to a server include a system for security of a network communication request. The system includes a communication module configured to receive the network communication request from a client. The network communication request may have a content parameter. The communication module may be configured to generate a string of content parameters comprising the content parameters and a hash of the content parameter, and communicate portions of a result of the network communication request to the client incorporating the encrypted string of content parameters. Furthermore, the communication module may receive a subsequent request from the client. The subsequent request may be associated with the network communication request. As a result of authenticating the subsequent request, the communication module may complete the network communication request.

Подробнее
04-11-2014 дата публикации

Control of Java resource runtime usage

Номер: US0008881151B2

A method for providing control of Java resource runtime usage may include establishing communication with one or more Java virtual machines (JVMs) forming a hive via a hive communication channel where the hive comprises a plurality of JVMs configured to enable utilization of at least one shared resource, receiving, via the hive communication channel, environmental information indicative of hive activity relative to the at least one shared resource from at least one of the one or more JVMs, and adapting, via processing circuitry, operations associated with use of the at least one shared resource based on the environmental information.

Подробнее
26-10-2004 дата публикации

System and method for producing folded articles

Номер: US0006808478B1
Автор: Balbir Singh, SINGH BALBIR
Принадлежит: Ethicon, ETHICON INC

A system (10) for producing folded articles includes a cutting station (58) operable to segment a fabric web (42) into a continuous stream of individual web segments (86). The system also includes a rotary folder (96) comprising a plurality of folding rollers (104, 106). The rotary folder (96) rotates about an axis spaced apart from axes of the folding rollers (104, 106). The rotary folder (96) is operable to receive the web segments (86) at a first location and fold the web segments one or more times while rotating from the first location to a second location about the rotary folder (96) axis. The system further includes a transfer station (62) operable to receive the folded web segments (86) from the rotary folder (96) at the second location and deliver the folded web segments (86) to a third location.

Подробнее
04-11-2014 дата публикации

Control of java resource runtime usage

Номер: US0008881149B2

A method for providing control of Java resource runtime usage may include establishing communication with one or more Java virtual machines (JVMs) forming a hive via a hive communication channel where the hive comprises a plurality of JVMs configured to enable utilization of at least one shared resource, receiving, via the hive communication channel, environmental information indicative of hive activity relative to the at least one shared resource from at least one of the one or more JVMs, and adapting, via processing circuitry, operations associated with use of the at least one shared resource based on the environmental information.

Подробнее
07-11-2017 дата публикации

Metadata-enabled dynamic updates of online advertisements

Номер: US0009811835B2

Systems, methods, and computer media for dynamically updating online advertisements and providing updated online advertisements are provided. An object-oriented online advertisement is provided that has properties inherited from an advertisement class. The inherited properties include metadata fields and corresponding metadata values. The metadata fields and values determine the content, appearance, behavior, and other characteristics of the online advertisement when it is published on a web page. Changes to or addition or deletion of metadata fields and values in an advertisement class or subclass are communicated to the online advertisements, and the metadata of the advertisements are updated to reflect the changes.

Подробнее
21-02-2013 дата публикации

Preserving, From Resource Management Adjustment, Portions Of An Overcommitted Resource Managed By A Hypervisor

Номер: US20130047159A1

Methods, apparatuses, and computer program products for preserving, from resource management adjustment, portions of an overcommitted resource managed by a hypervisor are provided. Embodiments include identifying, by the hypervisor, a privileged guest from among a plurality of guests of the hypervisor; identifying, by the hypervisor, portions of the overcommitted resource that are allocated to the privileged guest; and preventing, by the hypervisor, resource management adjustment to the identified portions of the overcommitted resource that are allocated to the privileged guest. 1. A method of preserving , from resource management adjustment , portions of an overcommitted resource managed by a hypervisor , the method comprising:identifying, by the hypervisor, a privileged guest from among a plurality of guests of the hypervisor;identifying, by the hypervisor, portions of the overcommitted resource that are allocated to the privileged guest; andpreventing, by the hypervisor, resource management adjustment to the identified portions of the overcommitted resource that are allocated to the privileged guest.2. The method of wherein preventing resource management adjustment to the identified portions of the overcommitted resource that are allocated to the privileged guest includes marking as non-swappable claim 1 , by the hypervisor claim 1 , memory pages allocated to the identified privileged guest.3. The method of wherein preventing resource management adjustment to the identified portions of the overcommitted resource that are allocated to the privileged guest includes preventing claim 1 , by the hypervisor claim 1 , issuance of a memory balloon request to the identified privileged guest.4. The method of wherein preventing resource management adjustment to the identified portions of the overcommitted resource that are allocated to the privileged guest includes preventing claim 1 , by the hypervisor claim 1 , migration of the identified privileged guest.5. The method of ...

Подробнее
28-03-2019 дата публикации

RETURN ORIENTED PROGRAMMING ATTACK PROTECTION

Номер: US20190095612A1
Автор: Singh Balbir
Принадлежит:

A computer implemented method for preventing return-oriented programming (ROP) attacks includes registering one or more critical regions, wherein a critical region corresponds to an address that has been selected to be monitored for potential ROP attacks, identifying one or more critical functions, wherein a critical function corresponds to a function that has been selected to be analyzed as a potential ROP threat, instrumenting the one or more critical regions with ROP protection mechanisms, detecting a critical function execution attempt on one or more of the identified critical regions, determining whether values associated with the critical function match corresponding expected values, and, responsive to determining that values associated with the critical function do not match expected values, activating a return-oriented programming protection mechanism. 1. A computer implemented method for preventing return-oriented programming (ROP) attacks , the method comprising:registering one or more critical regions, wherein a critical region corresponds to an address that has been selected to be monitored for potential ROP attacks;identifying one or more critical functions, wherein a critical function corresponds to a function that has been selected to be analyzed as a potential ROP threat;instrumenting the one or more critical regions with ROP protection mechanisms;detecting a critical function execution attempt on one or more of the identified critical regions;determining whether values associated with the critical function match corresponding expected values; andresponsive to determining that values associated with the critical function do not match expected values, activating a return-oriented programming protection mechanism.2. The computer implemented method of claim 1 , wherein a critical function is a function that impacts system behavior.3. The computer implemented method of claim 1 , wherein activating a return-oriented programming protection mechanisms ...

Подробнее
28-03-2019 дата публикации

RETURN ORIENTED PROGRAMMING ATTACK PROTECTION

Номер: US20190095613A1
Автор: Singh Balbir
Принадлежит:

A computer implemented method for preventing return-oriented programming (ROP) attacks includes registering one or more critical regions, wherein a critical region corresponds to an address that has been selected to be monitored for potential ROP attacks, identifying one or more critical functions, wherein a critical function corresponds to a function that has been selected to be analyzed as a potential ROP threat, instrumenting the one or more critical regions with ROP protection mechanisms, detecting a critical function execution attempt on one or more of the identified critical regions, determining whether values associated with the critical function match corresponding expected values, and, responsive to determining that values associated with the critical function do not match expected values, activating a return-oriented programming protection mechanism. 1. A computer implemented method for preventing return-oriented programming (ROP) attacks , the method comprising:registering one or more critical regions, wherein a critical region corresponds to an address that has been selected to be monitored for potential ROP attacks;identifying one or more critical functions, wherein a critical function corresponds to a function that has been selected to be analyzed as a potential ROP threat;instrumenting the one or more critical regions with ROP protection mechanisms;detecting a critical function execution attempt on one or more of the identified critical regions;determining whether values associated with the critical function match corresponding expected values; andresponsive to determining that values associated with the critical function do not match expected values, activating a return-oriented programming protection mechanism.2. The computer implemented method of claim 1 , wherein a critical function is a function that impacts system behavior.3. The computer implemented method of claim 1 , wherein activating a return-oriented programming protection mechanisms ...

Подробнее
31-07-2014 дата публикации

ELECTRONIC DATA SHARING DEVICE AND METHOD OF USE

Номер: US20140215212A1
Принадлежит:

An electronic data sharing device for sharing user related information with users of other electronic data sharing devices, the electronic data sharing device comprising: a data exchange initiation device arranged to detect the initiation of a data exchange request; a tag generation module configured to generate a tag in preparation for the initiation of a data exchange routine, a communication module configured to exchange the tag generated on the electronic data sharing device with a tag generated by a further electronic data sharing device, wherein the exchanged tags enable user related information associated with respective users of the electronic data sharing devices to be subsequently accessed via a communication means by users who have previously initiated the data exchange request, wherein the electronic data sharing device is configured to exchange the tags in order to provide subsequent access to the user related information without requiring, before use of the device, any user related configuration or data entry associated with the device or service. 1. An electronic data sharing device for sharing user related information with users of other electronic data sharing devices , the electronic data sharing device comprising:a data exchange initiation device arranged to detect the initiation of a data exchange request;a tag generation module configured to generate a tag in preparation for the initiation of a data exchange routine; anda communication module configured to exchange the tag generated on the electronic data sharing device with a tag generated by a further electronic data sharing device;wherein the exchanged tags enable user related information associated with respective users of the electronic data sharing devices to be subsequently accessed via a communication means by users who have previously initiated the data exchange request,wherein the electronic data sharing device is configured to exchange the tags in order to provide subsequent access to ...

Подробнее
07-08-2014 дата публикации

Electronic data sharing device and method of use

Номер: US20140222504A1
Принадлежит: BLENDOLOGY Ltd

A method of enabling selected users to share contact information, comprising the steps of: an issuing entity issuing, electronic data sharing devices that are either free, subsidized, or bundled with other products or services to a plurality of selected users for the purposes of sharing user related information, wherein the user related information is shared a) between two or more of the users, between one or more of the users and the issuing entity, or with other parties authorized by the users or entity, and b) based on a preliminary, user-to-user initiated, exchange of data between two or more of the electronic data sharing devices or one or more of the electronic data sharing devices and a static or mobile hub configured to operate in the same manner as an electronic data sharing device; a server retrieving the exchanged data from the electronic devices, and providing the exchanged data to the issuing entity to enable the issuing entity to perform one or more of the following steps: i) identify the user related data associated with the users; ii) match users with users they exchanged data with; iii) analyze the user related data to determine one or more of: demographic information associated with the users; network inter-relationships of users; networking trends.

Подробнее
07-08-2014 дата публикации

ELECTRONIC DATA SHARING DEVICE AND METHOD OF USE

Номер: US20140223177A1
Принадлежит: BLENDOGY LIMITED

An electronic data sharing device configured to exchange a first tag with a corresponding tag from a further electronic data sharing device, wherein the first and second tags provide information that enables respective users of the electronic data sharing devices to share information via a server enabled internet-connected software system associated with the electronic data sharing devices, wherein the electronic data sharing device is either configured with a pre-shared key or is able to encrypt a session key, wherein the pre-shared key or session key are used to generate tags to ensure that: the electronic data sharing device and tags can only be made use of by the server. 1. An electronic data sharing device configured to exchange a first tag with a corresponding tag from a further electronic data sharing device ,wherein the first and second tags provide information that enables respective users of the electronic data sharing devices to share information via a server enabled internet-connected software system associated with the electronic data sharing devices, andwherein the electronic data sharing device is either configured with a pre-shared key or is able to encrypt a session key, wherein the pre-shared key or session key are used to generate tags to ensure thatthe electronic data sharing device and tags can only be made use of by the server.2. The electronic data sharing device of claim 1 , wherein the electronic data sharing device is a personal portable electronic device or static or mobile electronic device offering a public service or used for a purpose other than as a personal device.3. (canceled)4. The electronic data sharing device of claim 1 , wherein the further electronic data sharing device is a personal portable electronic device or a static or mobile electronic device offering a public service or used for a purpose other than as a personal device.5. (canceled)6. The electronic data sharing device of further configured to generate the tags using ...

Подробнее
18-09-2014 дата публикации

Prevention of Forgery of Web Requests to a Server

Номер: US20140281492A1
Принадлежит:

Technologies for prevention of forgery of a network communication request to a server include a system for security of a network communication request. The system includes a communication module configured to receive the network communication request from a client. The network communication request may have a content parameter. The communication module may be configured to generate a string of content parameters comprising the content parameters and a hash of the content parameter, and communicate portions of a result of the network communication request to the client incorporating the encrypted string of content parameters. Furthermore, the communication module may receive a subsequent request from the client. The subsequent request may be associated with the network communication request. As a result of authenticating the subsequent request, the communication module may complete the network communication request. 1. A system for security of a network communication request comprising a communication module configured to:receive the network communication request from a client, the network communication request having a content parameter;generate a string of content parameters comprising the content parameters and a hash of the content parameter;encrypt the string of content parameters;communicate portions of a result of the network communication request to the client incorporating the encrypted string of content parameters;receive a subsequent request from the client, the subsequent request associated with the network communication request; andas a result of authenticating the subsequent request, complete the network communication request.2. The system of claim 1 , wherein authenticating the subsequent request comprises verifying that the encrypted string of content parameters returns with the subsequent request.3. The system of claim 1 , wherein the network communication request is a web request.4. The system of claim 1 , wherein the session variable is further ...

Подробнее
25-09-2014 дата публикации

ELECTRONIC DATA SHARING DEVICE AND METHOD OF USE

Номер: US20140287688A1
Принадлежит: BLENDOLOGY LIMITED

An electronic data sharing device for sharing user related information with users of other functionally similar electronic data sharing devices, the electronic data sharing device configured to: generate a temporary, non-unique, identification tag to identify the electronic data sharing device, transmit from the electronic data sharing device the generated identification tag via a wireless medium, receive at the electronic data sharing device a further identification tag generated by a further electronic data sharing device, and generate an alert on the electronic data sharing device when the transmission and reception of the identification tags coincide to indicate that the further electronic data sharing device is in the vicinity. 154-. (canceled)55. An electronic data sharing device for sharing user related information with users of other functionally similar electronic data sharing devices , the electronic data sharing device configured to:generate a temporary, non-unique, identification tag to identify the electronic data sharing device,transmit from the electronic data sharing device the generated identification tag via a wireless medium,receive at the electronic data sharing device a further identification tag generated by a further electronic data sharing device, andgenerate an alert on the electronic data sharing device when the transmission and reception of the identification tags coincide to indicate that the further electronic data sharing device is in the vicinity.56. The electronic data sharing device of further configured to:operate in a transmit mode, wherein the device is configured to transmit the generated identification tag for a first pre-determined duration within a first pre-determined period; andoperate in a receive mode, wherein the device is configured to receive a further temporary, non-unique, identification tag generated by another electronic data sharing device for a second pre-determined duration within a second predetermined period.57 ...

Подробнее
30-10-2014 дата публикации

DYNAMIC INSTRUMENTATION

Номер: US20140325193A1
Автор: Singh Balbir, Soni Maneesh
Принадлежит:

Techniques for dynamic instrumentation are provided. A method for instrumentation preparation may include obtaining address data of an original instruction in an original instruction stream, obtaining kernel mode data comprising a kernel breakpoint handler, obtaining user mode data comprising a user breakpoint handler, allocating a page of a process address space, creating a trampoline, associating the trampoline with a breakpoint instruction, and replacing the original instruction with the breakpoint instruction. A method for instrumentation may include detecting the breakpoint instruction, calling the kernel breakpoint handler, modifying an instruction pointer via the kernel breakpoint handler such that the instruction pointer points to the trampoline, and executing the trampoline. The system for instrumentation may include a breakpoint setup module and a breakpoint execution module for respectively setting up and completing instrumentation involving the trampoline. 15.-. (canceled)6. A method comprising:creating a trampoline associated with a breakpoint instruction, the trampoline comprising a copy of an original instruction in an original instruction stream, a set of instructions for saving register states and stack data of the original instruction, and a set of instructions for restoring the register states and the stack data of the original instruction;detecting the breakpoint instruction;calling a kernel breakpoint handler;modifying an instruction pointer via the kernel breakpoint handler such that the instruction pointer points to the trampoline; andexecuting the trampoline by operation of one or more processors, wherein executing the trampoline comprises executing the original instruction.78.-. (canceled)9. The method according to claim 6 , wherein executing the trampoline further comprises at least one of saving the register states and the stack data of the original instruction and restoring the register states and the stack data of the original ...

Подробнее
10-12-2015 дата публикации

SOLID OXIDE FUEL SYSTEM

Номер: US20150357665A1
Принадлежит:

A system and method satisfies temperature and pressure requirements of solid oxide fuel cell system in a manner that increases the overall efficiency and decreases the overall weight of system. The system and method include a secondary blower for boosting air stream pressure level sufficient for operation of a reformer that is designed to minimize pressure drop; an integrated heat exchanger for recovering heat from exhaust and comprising multiple flow fields for ensuring inlet temperature requirements of a solid oxide fuel cell are met; and a thermal enclosure for separating hot zone components from cool zone components for increasing thermal efficiency of the system and better thermal management. 1. A system comprising:a solid oxide fuel cell having a cathode flow field, an anode flow field, and an exhaust flow field, the cathode flow field and the anode flow field configured to direct exhaust from the cathode flow field and the anode flow field to the exhaust flow field;a heat exchanger having a cathode heat exchanger flow field, an anode heat exchanger flow field, and a portion of the exhaust flow field;a fuel reformer configured to generate a reformate stream;a first blower configured to receive air from an air source and generate a first fluid stream at a first pressure level, wherein a first portion of the first fluid stream is directed to the cathode heat exchanger flow field and the cathode flow field; anda second blower configured to receive a second portion of the first fluid stream and generate a second fluid stream at a second pressure level that is greater than the first pressure level, wherein a first portion of the second fluid stream is directed to the fuel reformer to generate the reformate stream, the reformate stream having at least a portion that is directed from the fuel reformer to the anode flow field.2. The system of claim 1 , wherein the first pressure level is sufficient to overcome a pressure drop across the cathode heat exchanger flow ...

Подробнее
10-07-2008 дата публикации

A process utilizing natural carbon-13 isotope for identification of early breakthrough of injection water in oil wells

Номер: CA2674127A1

This invention relates to a process utilizing natural carbon-13 isotope for identification of early breakthrough of injection water in oil wells. All natural water sources are labeled by unique ratios of carbon isotopes (13C/12C). Following the requirements of the invention, the carbon isotope ratio for oil bearing formation water and for local aquifer water which is to be injected in to the oil reservoir rock is determined. The carbon isotope ratio of the produced water from the selected oil wells is then monitored periodically. When the carbon isotope ratio of the produced (oil well) water shows deviation from the formation water value and tends towards injection water value, then the early breakthrough phenomenon of injection water is identified. Thus the contrast in natural carbon isotope ratios of injection water, formation water and produced water from selected oil wells serve as tracer in the identification of "Early Breakthrough" phenomenon of injection water and its movement.

Подробнее
30-12-1997 дата публикации

Processo para formar derivados de aluminio-silicato

Номер: BR9509505A
Принадлежит: Univ Queensland

Подробнее
17-08-2000 дата публикации

Boil-in-bag package

Номер: CA2362342A1
Принадлежит: Individual

A boil-in-bag package (10) for the storage and cooking of food items includes an elongated rectangular shaped bag (912) having an inside (14) and outside wall (16), a closed top end (18) and open bottom end (20). A handle section (24) is adjacent the top end of the bag section, with the handle section having an upper (26) and lower (28) portion and first (30) and second (32) side. The upper portion (26) of the handle section includes an opening sized and shaped for receiving a lifting utensil. A sealing/release mechanism (34) is positioned on the handle section (24) and is configured to releaseably close the open bottom end (20) of the elongated bag section contiguous with the handle section thereby forming a U-shaped package (12) configured to allow a through-flow of fluid between the inside walls (14) of the U-shaped package (12). The sealing/release mechanism (34) is further configured to allow for the release of the open bottom end (20) from the handle section (24) without contacting the elongated bag section.

Подробнее
14-07-2015 дата публикации

A process utilizing natural carbon-13 isotope for identification of early breakthrough of injection water in oil wells

Номер: CA2674127C

This invention relates to a process utilizing natural carbon-13 isotope for identification of early breakthrough of injection water in oil wells. All natural water sources are labeled by unique ratios of carbon isotopes (13C/12C). Following the requirements of the invention, the carbon isotope ratio for oil bearing formation water and for local aquifer water which is to be injected in to the oil reservoir rock is determined. The carbon isotope ratio of the produced water from the selected oil wells is then monitored periodically. When the carbon isotope ratio of the produced (oil well) water shows deviation from the formation water value and tends towards injection water value, then the early breakthrough phenomenon of injection water is identified. Thus the contrast in natural carbon isotope ratios of injection water, formation water and produced water from selected oil wells serve as tracer in the identification of "Early Breakthrough" phenomenon of injection water and its movement.

Подробнее
01-10-1997 дата публикации

Alumino-silicate derivatives

Номер: EP0797541A1
Принадлежит: University of Queensland UQ

The formation of new materials in the form of alumino-silicate derivatives from 2:1 layer clay minerals which are obtained by the chemical modification of 2:1 layer clay minerals by reaction with a salt having the formula MX where M is ammonium ion or alkali metal cation and X is halide. The new materials have the following characteristics: (a) an amorphous X-ray diffraction signal manifest as a broad hump using X-ray powder diffraction between 22° and 32° 2υ using CuKα radiation; and (b) the presence of primarily tetrahedrally co-ordinated aluminium.

Подробнее
29-11-1996 дата публикации

Phenylethanolamine compounds, their bioprecursors, preparation process therefor, intermediaries, pharmaceutical composition which contains them thereof and treatment method therefor

Номер: RO111569B1
Принадлежит: Ici Plc

Compounds of the formula (I): <CHEM> and bioprecursors and pharmaceutically acceptable salts thereof are described as beta 3-adrenoceptor agonists having anti-obesity, hypoglycaemic and related therapeutic utilities. Processes for their preparation are described as are compositions containing them.

Подробнее
16-04-1991 дата публикации

Phenyl ethers

Номер: CA1283122C
Принадлежит: Imperial Chemical Industries Ltd

ABSTRACT PHENYL ETHERS The invention concerns a series of novel phenoxyacetic acid ethers (and pharmaceutically acceptable salts thereof) of the formula I in which R1 is H or F, R2 and R3 are H or (1-3C)alkyl, Z is CH2OH or a group -Co.R4 in which R4 is OH, NH2 or (1-6C)alkoxy. The invention also includes pharmaceutical compositions for use in treating obesity and related conditions and provided processes for the manufacture of the novel ethers.

Подробнее
29-11-1992 дата публикации

Chemical compounds

Номер: CA2068377A1

ABSTRACT Compounds of the formula (I):

Подробнее
21-03-2002 дата публикации

METHOD FOR PRODUCING ALUMOSILICATE DERIVATIVES

Номер: DE69525373D1
Принадлежит: University of Queensland UQ

Подробнее
15-04-1980 дата публикации

Traveling cutter assembly

Номер: US4197774A
Принадлежит: Scott Paper Co

A cutting assembly of the type useable for severing a sheet into desired lengths. The assembly includes an elongate track having a slot extending through an upper wall thereof for slidably receiving and retaining a cutter slide therein. The track has upper surface segments that are roughened; preferably with laterally extending grooves spaced along a major portion of the elongate slot. A cutter slide moveable within the slot has a top member overlying the cutting element and extending beyond the element both laterally and in the direction in which the slide is moveable so as to overlie the roughened surface segments of the track. The top member has an extremely smooth stationary lower surface in the regions overlying the roughened track surfaces. This lower surface is adapted to engage a sheet positioned across the slot in overlying relationship with the roughened track surfaces and to press the sheet into engagement with the roughened surfaces for preventing relative sliding movement between the sheet and the track as the cutter slide is moved over the sheet to sever it.

Подробнее
11-11-1993 дата публикации

4-[2-(2-hydroxy-2-phenylethylamino)ethyl]phenylacetic acid as beta3-adrenoceptor-agonist

Номер: CA2111967A1
Принадлежит: Individual

2111967 9322277 PCTABScor01 Compounds of formula (I), and in vivo hydrolysable esters and pharmaceutically acceptable salts thereof are described as .beta.3-adrenoceptor agonists having anti-obesity, hypoglycaemic, and related therapeutic utilities. Processes for their preparation are described as are compositions containing them.

Подробнее
30-12-1997 дата публикации

Kaolin derivatives

Номер: BR9509504A
Принадлежит: Univ Queensland

Подробнее
17-01-2013 дата публикации

An electronic data sharing device and method of use

Номер: CA2878751A1
Принадлежит: BLENDOLOGY Ltd

An electronic data sharing device for sharing user related information with users of other electronic data sharing devices, the electronic data sharing device comprising: a data exchange initiation device arranged to detect the initiation of a data exchange request; a tag generation module configured to generate a tag in preparation for the initiation of a data exchange routine, a communication module configured to exchange the tag generated on the electronic data sharing device with a tag generated by a further electronic data sharing device, wherein the exchanged tags enable user related information associated with respective users of the electronic data sharing devices to be subsequently accessed via a communication means by users who have previously initiated the data exchange request, wherein the electronic data sharing device is configured to exchange the tags in order to provide subsequent access to the user related information without requiring, before use of the device, any user related configuration or data entry associated with the device or service.

Подробнее
05-05-1981 дата публикации

Web rewinder turret swing control

Номер: US4265409A
Автор: Balbir Singh, Jon N. Cox
Принадлежит: Scott Paper Co

An apparatus that controls the swinging of a frame (50) and the rotation of a turret (52) in an automatic web rewinding machine. The frame (50) is pivotally mounted in the machine and a turret (52) including a plurality of rotatable mandrel assemblies (56) is mounted for rotation within the frame (50). The control apparatus includes an indexing device (66) having an output shaft (70) that undergoes intermittent rotation in response to continuous rotation of an input shaft (68). One drive means (80), coupled and responsive to the output shaft (70) of the indexing device (66) provides intermittent rotation of the turret (52). A second drive means (78) is provided to control the rotation of the cam (60) in order to minimize the overlap of the rotation of the cam (60) with the dwell time of the turret (52). The optimum condition occurs when the cam (60) rotates only when the turret (52) is indexing and when the cam (60) does not rotate at all while the turret (52) is dwelling. This optimum condition is achieved by having the second drive means (78) also coupled and responsive to the output shaft (70) of the indexing device (66) for providing the intermittent rotation of cam (60) in synchronism with the rotation of the turret (52).

Подробнее
26-10-2011 дата публикации

Interactive host-aware advertising

Номер: ZA201006091B
Принадлежит: Microsoft Corp

Подробнее
31-03-1993 дата публикации

Amide derivatives.

Номер: MY102866A
Принадлежит: Ici Plc

THE INVENTION CONCERNS NOVEL PHENOXYACETIC ACID AMIDE DERIVATIVES OF THE FORMULA I (AND PHARMACEUTICALLY ACCEPTABLE SALTS THEREOF) IN WHICH R1 IS HYDROGEN OR FLUORO, R2 IS PHENYL, CYCLOALKYL, ALKYL OR ALKENYL AS DEFINED HEREIN, AND R3 IS HYDROGEN, METHYL OR ETHYL, OR R2 AND R3 TOGETHER FORM POLYMETHYLENE AS DEFINED HEREIN. THE INVENTION ALSO INCLUDES PHARMACEUTICAL COMPOSITIONS CONTAINING THE AMIDE DERIVATIVES, MEANS FOR THE MANUFACTURE OF THE SAID DERIVATIVES AND FOR THEIR USE IN THE TREATMENT OF OBESITY AND RELATED CONDITIONS AND OR IN THE MANUFACTURE OF NOVEL MEDICAMENTS.

Подробнее
06-09-2005 дата публикации

Modified kaolins

Номер: CA2234914C
Принадлежит: University of Queensland UQ

A process for the preparation of a modified kaolin from a kaolin group mineral which includes expansion and contraction of layers of the kaolin group mineral. The layers comprising one Si-tetrahedral sheet and one Al-octahedral sheet. The expansion and contraction may be initiated by initial intercalation of a reagent which can penetrate kaolin layers to reach an interlayer region therebetween to form an intercalate. Subsequently, the intercalation may be followed by de-intercalation which involves removal of the reagent. By the above process, there is provided crystalline modified kaolins having the following properties: (i) an increased interlayer space compared to corresponding kaolin group minerals; (ii) an increased susceptibility to intercalation by cations, anions or salts compared to corresponding kaolin group minerals; and (iii) an increased exfoliated morphology compared to corresponding kaolin group minerals.

Подробнее
03-03-2005 дата публикации

MODIFIED CAOLINE

Номер: DE69631492T2
Принадлежит: University of Queensland UQ

Подробнее
01-11-1992 дата публикации

CHEMICAL COMPOUNDS.

Номер: MX9202502A
Принадлежит: Ici Plc

Подробнее
31-12-2002 дата публикации

IMMUNOPOTATION INDUCED BY QUITOSAN

Номер: PT789590E
Принадлежит: Zonagen Inc

Подробнее
08-10-2009 дата публикации

Interactive host-aware advertising

Номер: US20090254846A1
Принадлежит: Microsoft Corp

Embodiments of the invention provide a method, system, and media for enabling an advertisement to interact with a software application. This can include receiving advertising content that is to be hosted by a software application. The advertising content can include an advertisement to be presented as well as an object that includes product information. The object can be interacted with by the software application. The product information relates to a product offering that is being promoted by the advertisement. The method further includes presenting the advertisement within the software application, and enabling an interaction method with the software application such that the product information is utilized by the software application to present a presentation that becomes part of a work of the software application. The software application can then be used to modify imported product information. Links to the outside world enable dynamic updating of even the imported product information, and also enable transactions to be performed that are associated with the advertisement.

Подробнее
08-09-1994 дата публикации

Chemical compounds

Номер: AU652826B2
Принадлежит: Zeneca Ltd

Подробнее
02-12-1992 дата публикации

2-hydroxy-2-phenylethylamine derivatives as beta-3-adrenoceptor agonists

Номер: IE921447A1
Принадлежит: Zeneca Ltd

Compounds of the formula (I): and bioprecursors and pharmaceutically acceptable salts thereof are described as beta 3-adrenoceptor agonists having anti-obesity, hypoglycaemic and related therapeutic utilities. Processes for their preparation are described as are compositions containing them.

Подробнее
28-11-2000 дата публикации

Boil-in-bag package

Номер: US6153232A
Принадлежит: Uncle Bens Inc

A boil-in-bag package for the storage and cooking of food items includes an elongated rectangular shaped bag having an inside and an outside wall, a closed top end and an open bottom end. A handle section is adjacent the top end of the bag section, with the handle section having an upper and a lower portion and a first and second side. The upper portion of the handle section includes an opening sized and shaped for receiving a lifting utensil. A sealing/release mechanism is positioned on the handle section and is configured to releaseably close the open bottom end of the elongated bag section contiguous with the handle section thereby forming a U-shaped package configured to allow a through-flow of fluid between the inside walls of the U-shaped package. The sealing/release mechanism is further configured to allow for the release of the open bottom end from the handle section without contacting the elongated bag section.

Подробнее
05-11-1990 дата публикации

Compounds

Номер: CA2015705A1
Принадлежит: Imperial Chemical Industries Ltd

A B S T R A C T Compounds of the formula (I):

Подробнее
20-06-1996 дата публикации

Alumino-silicate derivatives

Номер: CA2201926A1
Принадлежит: Individual

The formation of new materials in the form of alumino-silicate derivatives from 2:1 layer clay minerals which are obtained by the chemical modification of 2:1 layer clay minerals by reaction with a salt having the formula MX where M is ammonium ion or alkali metal cation and X is halide. The new materials have the following characteristics: (a) an amorphous X-ray diffraction signal manifest as a broad hump using X-ray powder diffraction between 22· and 32· 2.theta. using CuK.alpha. radiation; and (b) the presence of primarily tetrahedrally co-ordinated aluminium.

Подробнее
16-07-1987 дата публикации

AMIDDERIVAT.

Номер: FI873154A0
Принадлежит: Ici Plc

The invention concerns novel phenoxyacetic acid amide derivative of the formula I <CHEM> (and pharmaceutically acceptable salts thereof) in which R<1> is hydrogen or fluoro, R<2> is phenyl, cyclo-alkyl, alkyl or alkenyl as defined herin, and R<3> is hydrogen, methyl or ethyl, or R<2> and R<3> together form polymethylene as defined herein. The invention also includes pharmaceutical compositions containing the amide derivatives, means for the manufacture of the said derivatives and for their use in the treatment of obesity and related conditions and/or in the manufacture of novel medicaments.

Подробнее
31-12-2003 дата публикации

Seizure and movement monitoring

Номер: CA2465121A1
Автор: Balbir Singh
Принадлежит: Individual

An apparatus and method for monitoring movements of a patient is provided. If movements of the patient are detected to exceed predetermined thresholds, then a detector assembly determines that a seizure condition is present, and an alarm may be generated. In one arrangement, a sensor assembly includes one or more sound detectors to detect sound cause by patient movement. The detector assembly monitors the movement of the patient for determining if an abnormal movement or seizure condition is present. In another arrangement, an image sensor is used. A detector assembly monitors images produced by the image sensor to determine if the movements exceed predetermined thresholds. Other types of sensors can be used in other arrangements. The sensors can either be placed on a surface common to the patient or they can be attached to the patient.

Подробнее
05-02-1987 дата публикации

Phenyl ethers

Номер: AU6002986A
Принадлежит: Imperial Chemical Industries Ltd

Подробнее
27-05-2016 дата публикации

An electronic data sharing device and method of use

Номер: NZ620648B2
Принадлежит: BLENDOLOGY LIMITED

Disclosed an electronic data sharing device configured to exchange a first tag with a corresponding tag from a further electronic data sharing device. The first and second tags provide information that enables respective users of the electronic data sharing devices to share information via a server (1) enabled internet-connected software system associated with the electronic data sharing devices. The electronic data sharing device is either configured with a pre-shared key or is able to encrypt a session key and the pre-shared key or session key are used to generate tags to ensure that. The electronic data sharing device and tags can only be made use of by the server (1). (1) enabled internet-connected software system associated with the electronic data sharing devices. The electronic data sharing device is either configured with a pre-shared key or is able to encrypt a session key and the pre-shared key or session key are used to generate tags to ensure that. The electronic data sharing device and tags can only be made use of by the server (1).

Подробнее
01-11-2000 дата публикации

ALUMINO-SILICATE DERIVATIVES.

Номер: ES2149377T3
Принадлежит: University of Queensland UQ

LA FORMACION DE NUEVOS MATERIALES EN FORMA DE DERIVADOS DE ALUMINOSILICATO A PARTIR DE MINERALES DE ARCILLA EN CAPA 2:1 QUE SE OBTIENEN MODIFICANDO QUIMICAMENTE LOS MINERALES DE ARCILLA EN CAPA 2:1 POR LA REACCION CON UNA SAL QUE TIENE LA FORMULA MX, DONDE M ES UN ION DE AMONIO O UN CATION DE METAL ALCALINO Y X ES UN HALURO. LOS NUEVOS MATERIALES TIENEN LAS SIGUIENTES CARACTERISTICAS: (A) UNA SEÑAL DE DIFRACCION DE RAYOS X AMORFA MANIFESTADA COMO UN MAXIMO DE CURVA ANCHO UTILIZANDO LA DIFRACCION EN POLVO POR RAYOS X ENTRE 22 (GRADOS) Y 32 (GRADOS) 2{TH} UTILIZANDO UNA RADIACION CUK{AL}; Y B) LA PRESENCIA DE ALUMINIO TETRAHEDRICAMENTE COORDINADO. THE FORMATION OF NEW MATERIALS IN THE FORM OF ALUMINOSILICATE DERIVATIVES FROM CLAY MINERALS IN LAYER 2: 1 WHICH ARE OBTAINED BY CHEMICALLY MODIFYING CLAY MINERALS IN LAYER 2: 1 BY REACTION WITH A SALT THAT HAS THE FORMULA MX, WHERE M IT'S AN AMMONIUM ION OR ALKALINE METAL CATION AND X IS A HALIDE. THE NEW MATERIALS HAVE THE FOLLOWING CHARACTERISTICS: (A) A SIGNAL OF X-RAY DIFFACTION AMORPHA MANIFESTED AS A MAXIMUM WIDTH CURVE USING THE X-RAY POWDER DIFFACTION BETWEEN 22 (DEGREES) AND 32 (DEGREES) 2 {TH} UTILITY CUK {AL} RADIATION; AND B) THE PRESENCE OF TETRAHEDRICALLY COORDINATED ALUMINUM.

Подробнее
31-01-2002 дата публикации

Apparatus and method for longitudinal folding

Номер: WO2002008104A2
Автор: Balbir Singh
Принадлежит: ETHICON, INC.

An apparatus and method is disclosed useful for folding materials, particularly fabrics that are fragile such as medical gauze. The apparatus in its simplest embodiment comprises a roller (10) and a disk (20) which is in communication with the roller (10). In operation, the material (30) to be folded first is drawn between the roller (10) and disk (20) and then drawn against the disk (20) to form a fold.

Подробнее
14-10-2004 дата публикации

Fill and form with multiple flat packages.

Номер: MXPA98008068A
Автор: Balbir Singh
Принадлежит: JOHNSON & JOHNSON

Un paquete para contener un exhibir una pluralidad de articulos planos empacados por separado; comprende una envoltura de papel que se pliega en una bolsa autoestable y que contiene los articulos en relacion apilada en paralelo. Los bordes superiores de los paquetes sobresalen preferiblemente arriba de la parte superior de la bolsa para su facil remocion de la misma. Preferiblemente, la bolsa se forma plegando un esbozo de material de abastecimiento de papel alrededor de una pila de los articulos.

Подробнее
27-05-2002 дата публикации

Arrangement for achieving a coreless paper roll

Номер: AU2001217096A1
Автор: Balbir Singh Gill
Принадлежит: Balbir Singh Gill

Подробнее
26-10-1995 дата публикации

2-Hydroxy-2-phenylethylamine derivatives as beta-3 adrenoceptor agonists.

Номер: DE69204906D1
Принадлежит: Zeneca Ltd

Подробнее
04-10-1990 дата публикации

2-hydroxy-3-phenoxypropylamine.

Номер: DE3673722D1
Принадлежит: Imperial Chemical Industries Ltd

Подробнее
28-07-2016 дата публикации

Detection of malicious invocation of application program interface calls

Номер: WO2016118145A1
Принадлежит: MCAFEE, INC.

Particular embodiments described herein provide for an electronic device that includes a binder kernel driver. The binder kernel driver can be configured to receive an application program interface (API) call, extract metadata from the API call, determine that the API call should be hooked based on the extracted metadata, and hook the API call.

Подробнее
01-10-1987 дата публикации

PHARMACEUTICAL COMPOSITIONS

Номер: DE3709552A1
Принадлежит: Imperial Chemical Industries Ltd

Подробнее
03-03-2021 дата публикации

Detection of malicious invocation of application program interface calls

Номер: EP3248132B1
Принадлежит: McAfee LLC

Подробнее
20-06-1996 дата публикации

Alumino-silicate derivatives

Номер: WO1996018576A1
Принадлежит: The University of Queensland

The formation of new materials in the form of alumino-silicate derivatives from 2:1 layer clay minerals which are obtained by the chemical modification of 2:1 layer clay minerals by reaction with a salt having the formula MX where M is ammonium ion or alkali metal cation and X is halide. The new materials have the following characteristics: (a) an amorphous X-ray diffraction signal manifest as a broad hump using X-ray powder diffraction between 22° and 32° 2υ using CuKα radiation; and (b) the presence of primarily tetrahedrally co-ordinated aluminium.

Подробнее
12-04-2005 дата публикации

Boil-in-bag package

Номер: CA2362342C
Принадлежит: Uncle Bens Inc

A boil-in-bag package (10) for the storage and cooking of food items includes an elongated rectangular shaped bag (912) having an inside (14) and outside wall (16), a closed top end (18) and open bottom end (20). A handle section (24) is adjacent the top end of the bag section, with the handle section having an upper (26) and lower (28) portion and first (30) and second (32) side. The upper portion (26) of the handle section includes an opening sized and shaped for receiving a lifting utensil. A sealing/release mechanism (34) is positioned on the handle section (24) and is configured to releaseably close the open bottom end (20) of the elongated bag section contiguous with the handle section thereby forming a U-shaped package (12) configured to allow a through-flow of fluid between the inside walls (14) of the U-shaped package (12). The sealing/release mechanism (34) is further configured to allow for the release of the open bottom end (20) from the handle section (24) without contacting the elongated bag section.

Подробнее
12-02-1998 дата публикации

Alumino-silicate derivatives

Номер: AU686895B2
Принадлежит: University of Queensland UQ

Подробнее
08-02-1996 дата публикации

2-Hydroxy-2-phenylethylamine derivatives as beta-3-adrenoceptor agonists.

Номер: DE69204906T2
Принадлежит: Zeneca Ltd

Подробнее
07-10-1999 дата публикации

Low bandwidth aal5 data communication system

Номер: CA2266782A1

A low bandwidth data message is transferred between at least two entities in an ATM network by packaging the massage into an AAL5 frame and then segmenting the frame into at least one ATM cell for transmission across a virtual channel. A receiving entity performs a substantially reverse operation in order to retrieve the message. Low bandwidth data may comprise data transfer at a rate of 1-5Mb per second, and preferably 2 Mb per second or data transferred at a rate of 1% or less of an operating speed of a processor in an ATM entity.

Подробнее
28-08-1992 дата публикации

Method for producing 2-hydroxi-2-phenyl-ethyl-amino compounds

Номер: HU9201610D0
Принадлежит: Ici Plc

Compounds of the formula (I): <CHEM> and bioprecursors and pharmaceutically acceptable salts thereof are described as beta 3-adrenoceptor agonists having anti-obesity, hypoglycaemic and related therapeutic utilities. Processes for their preparation are described as are compositions containing them.

Подробнее
09-05-1990 дата публикации

Amide derivatives

Номер: EP0254532B1
Принадлежит: Imperial Chemical Industries Ltd

The invention concerns novel phenoxyacetic acid amide derivative of the formula I <CHEM> (and pharmaceutically acceptable salts thereof) in which R<1> is hydrogen or fluoro, R<2> is phenyl, cyclo-alkyl, alkyl or alkenyl as defined herin, and R<3> is hydrogen, methyl or ethyl, or R<2> and R<3> together form polymethylene as defined herein. The invention also includes pharmaceutical compositions containing the amide derivatives, means for the manufacture of the said derivatives and for their use in the treatment of obesity and related conditions and/or in the manufacture of novel medicaments.

Подробнее
17-05-1967 дата публикации

Naphthalene derivatives

Номер: GB1069411A
Принадлежит: Imperial Chemical Industries Ltd

Racemic compounds of the general formula <FORM:1069411/C2/1> (wherein R1 stands for a hydrogen atom or C1- 6 alkyl radical and R2 stands for a C1- 6 alkyl radical) and their acid addition salts are prepared by (a) reducing 2-naphthylglyoxal or its hydrate in the presence of a compound of the formula <FORM:1069411/C2/2> (wherein E stands for the CO or CHOH group); or (b) reducing a compound of the formula <FORM:1069411/C2/3> optionally followed in either case by salt formation. The compounds of the invention are useful in the treatment or prophylaxis of heart diseases and in the treatment of hypertension and phaeochromocytoma; they may be administered in the form of pharmaceutical preparations containing them together with a diluent or carrier.

Подробнее
04-02-1987 дата публикации

2-Hydroxy-3-phenoxypropyl amines

Номер: EP0210849A1
Принадлежит: Imperial Chemical Industries Ltd

The invention concerns a series of phenoxyacetic acid ethers (and pharmaceutically acceptable salts thereof) of the formula Iin which R<sub>1</sub> is H or F,R<sup>2</sup> and R<sup>3</sup> are H or alkyl, Z is CH<sub>2</sub>OH or a group -CO.R<sup>4</sup> in which R<sup>4</sup> is OH, NH<sub>2</sub> or alkoxy. The invention also includes pharmaceutical compositions for use in treating obesity and related conditions and provides processes for the manufacture of the ethers.

Подробнее
28-02-2002 дата публикации

Winding unit for paper rolls

Номер: WO2002016240A1
Автор: Balbir Singh Gill
Принадлежит: Balbir Singh Gill

A paper roll winding unit, where from a paper roll a paper web (1) is conveyed for rewinding in order to form a smaller diameter roll size (6). The winding unit has a revolver type winding device (3) including several winding arm systems (2), the arms (2) of which are rotating arms and directly about these arms (2) paper web (1) is wound in a certain station in its turn, said arms being detachable from and returnable to winding device (3) and detachable filled up roll (6) and that paper web (1) can be fed at standard speed (non-stop) to winding device (3) regardless of its arrival at the winding station of the next winding arm (2).

Подробнее
29-10-2019 дата публикации

An electronic data sharing device and method of use

Номер: CA2878751C
Принадлежит: BLENDOLOGY Ltd

An electronic data sharing device for sharing user related information with users of other electronic data sharing devices, the electronic data sharing device comprising: a data exchange initiation device arranged to detect the initiation of a data exchange request; a tag generation module configured to generate a tag in preparation for the initiation of a data exchange routine, a communication module configured to exchange the tag generated on the electronic data sharing device with a tag generated by a further electronic data sharing device, wherein the exchanged tags enable user related information associated with respective users of the electronic data sharing devices to be subsequently accessed via a communication means by users who have previously initiated the data exchange request, wherein the electronic data sharing device is configured to exchange the tags in order to provide subsequent access to the user related information without requiring, before use of the device, any user related configuration or data entry associated with the device or service.

Подробнее
06-12-1990 дата публикации

Amide derivatives

Номер: AU604027B2
Принадлежит: Imperial Chemical Industries Ltd

The invention concerns novel phenoxyacetic acid amide derivative of the formula I <CHEM> (and pharmaceutically acceptable salts thereof) in which R<1> is hydrogen or fluoro, R<2> is phenyl, cyclo-alkyl, alkyl or alkenyl as defined herin, and R<3> is hydrogen, methyl or ethyl, or R<2> and R<3> together form polymethylene as defined herein. The invention also includes pharmaceutical compositions containing the amide derivatives, means for the manufacture of the said derivatives and for their use in the treatment of obesity and related conditions and/or in the manufacture of novel medicaments.

Подробнее
15-02-2004 дата публикации

Modifizierte kaoline

Номер: ATE258844T1
Принадлежит: Univ Queensland

Подробнее
01-11-1992 дата публикации

Compuestos quimicos.

Номер: MX9202501A
Принадлежит: Ici Plc

Подробнее
20-04-2023 дата публикации

System and method for providing audio and image data

Номер: US20230119950A1
Принадлежит: Individual

The present disclosure generally relates to a system and method for providing audio and image data. The system and method may receive blurbs from users that include audio and image data. The exemplary disclosed system and method may prioritize or push a given blurb based on consumption by other users. The exemplary disclosed system and method may further prioritize or push a given blurb based on an aggregate metric based on consumption and engagement by other users.

Подробнее
30-01-1992 дата публикации

Amide derivatives

Номер: AU5992790A
Принадлежит: Imperial Chemical Industries Ltd

Подробнее
22-02-1999 дата публикации

Paperirullien kelausyksikkö

Номер: FI990366A0
Автор: Balbir Singh Gill
Принадлежит: Balbir Singh Gill

Подробнее
15-11-2006 дата публикации

Härtbare, haftschienen und verfahren zu ihrer herstellung

Номер: ATE343992T1
Принадлежит: 3M Innovative Properties Co

Подробнее