Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 128. Отображено 128.
10-05-2018 дата публикации

Secure token distribution

Номер: AU2016365425A1
Принадлежит: FPA Patent Attorneys Pty Ltd

A method for utilizing a registration authority to facilitate a certificate signing request is disclosed. In at least one embodiment, a registration authority computer may receive a certificate signing request associated with a token requestor. The registration authority may authenticate the identity of the token requestor and forward the certificate signing request to a certificate authority computer. A token requestor ID and a signed certificate may be provided by the certificate authority computer and forwarded to the token requestor. The token requestor ID may be utilized by the token requestor to generate digital signatures for subsequent token-based transactions.

Подробнее
24-10-2013 дата публикации

SYSTEMS AND METHODS FOR FACILITATING A TRANSACTION USING A VIRTUAL CARD ON A MOBILE DEVICE

Номер: CA0002909081A1
Принадлежит: PERRY + CURRIER

Systems and methods are provided for facilitating contactless payment using cloud- based wallet containing payment credentials (e.g. Visa, Mastercard, American Express) using a near field communication (NFC)-capable device and payment gateway servers. A user can use their existing payment card, herein referred to as a funding card, for contactless payments. A second payment card, herein referred to as a virtual card, is generated. The virtual card is associated with the funding card on a payment gateway server. The virtual card is used on a NFC-enabled mobile device. When a payment is initiated, the virtual card data is sent through the NFC system from a point of sale terminal. This information is sent to the payment gateway server, which retrieves the funding card to make the payment. The funding card, not the virtual card, is used to transfer the money to make payment.

Подробнее
16-05-2007 дата публикации

Shift register engine

Номер: TW0200719219A
Принадлежит:

A micro-code engine with a linear shift register comprises at least one shift register and an execution unit. The shift registers contain a plurality of data cells, each of which store at least one data value. The shift register is operable to shift the data values from a first data cell to a second data cell as new data is input into the shift register. The execution unit is electrically coupled to the linear shift register such that when the execution unit performs an algorithm, the execution unit uses the data value stored in the second data cell as an operand. After the execution unit substantially completes the algorithm, the linear shift register shifts a new data value into the second data cell. In response to the linear shift register shifting new data into the second data cell, the execution unit re-performs the algorithm.

Подробнее
08-06-2017 дата публикации

SECURE TOKEN DISTRIBUTION

Номер: CA0003003287A1
Принадлежит: VISA INTERNATIONAL SERVICE ASSOCIATION

A method for utilizing a registration authority to facilitate a certificate signing request is disclosed. In at least one embodiment, a registration authority computer may receive a certificate signing request associated with a token requestor. The registration authority may authenticate the identity of the token requestor and forward the certificate signing request to a certificate authority computer. A token requestor ID and a signed certificate may be provided by the certificate authority computer and forwarded to the token requestor. The token requestor ID may be utilized by the token requestor to generate digital signatures for subsequent token-based transactions.

Подробнее
04-10-2018 дата публикации

STATIC TOKEN SYSTEMS AND METHODS FOR REPRESENTING DYNAMIC REAL CREDENTIALS

Номер: US20180285875A1
Принадлежит: VISA INTERNATIONAL SERVICE ASSOCIATION

Systems and methods are provided for pre-provisioning a first device with a token. The token on the first device may be linked to any real credential using an application on a second device. Because the token may be maintained using the second device, the first device may be a “dumb” device while the second device is a “smart” device. The real credential may be changed and updated on the second device, such that the same token is linked to different real credentials at different times. An identifier may be assigned to the first device and stored in association with its provisioned token in a token vault. The identifier may be used by a user to register and activate the token with the application on the second device.

Подробнее
29-10-2020 дата публикации

Systems and methods for device push provisioning

Номер: AU2017206119B2
Принадлежит: FPA Patent Attorneys Pty Ltd

Techniques for provisioning access data may include receiving, by a first application installed on a communication device, user input selecting an account to provision to a second application installed on the communication device. The first application may invoke the second application and send a session identifier (ID) to the second application. The second application may send a user ID associated with the second application, a device ID, and the session ID to the first application. The first application may then generate encrypted provisioning request data and send the encrypted provisioning request data to the second application. The second application may send the encrypted provisioning request data to a remote server computer to request access data that can be used to access a resource. The second application may receive the access data provided by the remote server computer based on validation of the encrypted provisioning request data.

Подробнее
10-01-2011 дата публикации

SECURE BILLING SYSTEM AND METHOD FOR A MOBILE DEVICE

Номер: CA0002692677A1
Принадлежит:

Подробнее
01-08-2019 дата публикации

Static token systems and methods for representing dynamic real credentials

Номер: AU2018243809A1
Принадлежит: Phillips Ormonde Fitzpatrick

Systems and methods are provided for pre-provisioning a first device with a token. The token on the first device may be linked to any real credential using an application on a second device. Because the token may be maintained using the second device, the first device may be a "dumb" device while the second device is a "smart" device. The real credential may be changed and updated on the second device, such that the same token is linked to different real credentials at different times. An identifier may be assigned to the first device and stored in association with its provisioned token in a token vault. The identifier may be used by a user to register and activate the token with the application on the second device.

Подробнее
04-03-2011 дата публикации

SYSTEM AND METHOD FOR AUTHENTICATING TRANSACTIONS THROUGH A MOBILE DEVICE

Номер: CA0002724297A1
Принадлежит:

Systems and methods are provided for authenticating a transaction through a mobile device. During registration, the mobile device receives a payment ID of a payment account and a supplemental ID for verifying the payment ID, and transmitting the same to a merchant server. The merchant server sends the payment ID and the supplemental ID to a verification module to verify the IDs. Upon the merchant server receiving a verification result, a mobile device ID is generated and stored on the mobile device and stored on the merchant server in association with the payment ID. In a transaction, a user only needs to enter the supplemental ID into the mobile device, as the supplemental ID and mobile device ID can be sent to the merchant server to retrieve the associated payment ID. This information is sufficient to authenticate and execute the transaction.

Подробнее
24-08-2011 дата публикации

SYSTEM AND METHOD FOR AUTHENTICATING TRANSACTIONS THROUGH A MOBILE DEVICE

Номер: CA0002743035A1
Принадлежит: Xtreme Mobility Inc

A user may claim to have not made or allowed a transaction and that the transaction was made in error. Where it appears the user has not authorized the transaction, the funds of the transaction are returned to the user, or are charged back. Systems and methods provide a way to confirm whether or not a transaction was actually authorized by the user, thereby settling a chargeback dispute for a previously executed transaction. The method comprises receiving the dispute regarding the transaction including associated transaction data, and retrieving a digital signature associated with the transaction data, the digital signature computed by signing the transaction data. The digital signature is then verified using a public key, wherein the public key corresponds to a private key stored on a mobile device. It is then determined whether or not the transaction is fraudulent based on a verification result of the digital signature.

Подробнее
14-10-2014 дата публикации

SYSTEM AND METHOD FOR INITIATING TRANSACTIONS ON A MOBILE DEVICE

Номер: CA0002748481C
Принадлежит: XTREME MOBILITY INC., XTREME MOBILITY INC

Systems and methods are provided for providing a more seamless purchasing experience using a mobile device. The mobile device acquires data, such a barcode image, an image of an object or text, or audio data. A non-limiting example of a barcode is a Quick Response (QR) barcode. The acquired data is then used to obtain a network address of a payment website or webpage, which allows a user to make a purchase for a given product or service. The mobile device then launches the payment website or webpage. A user can enter into the mobile device, through the payment website or webpage, a supplemental ID used for authenticating the transaction.

Подробнее
14-01-2010 дата публикации

SECURE WIRELESS DEPOSIT SYSTEM AND METHOD

Номер: CA0002730175A1
Принадлежит: Xtreme Mobility Inc

A system and method is provided for registering a user or a wireless device and executing a transaction of funds from a third party account to a prepaid account. The wireless device is in secure communication with an administrating server over a network. The administrating server is in communication with a third party entity, via a third party entity server, as well as with a prepaid server. In the initial registration process, the user provides the credentials for accessing the third party account using the wireless device. The credentials are stored on the wireless device, administrating server, or both. In subsequent transactions, the user enters in the amount to be deposited into the prepaid account and the credentials are automatically retrieved from storage for authentication. If authenticated, the transaction is executed by the administrating server.

Подробнее
23-02-2017 дата публикации

Authenticating transactions using a mobile device identifier

Номер: AU2011342282B2
Принадлежит: FPA Patent Attorneys Pty Ltd

Systems and methods are provided for authenticating a transaction through a mobile device. During registration, the mobile device receives a payment ID of a payment account and a supplemental ID for verifying the payment ID, and transmits the same to a payment gateway. The payment gateway sends the payment ID and the supplemental ID to a verification module to verify the IDs. After the payment gateway receives a verification result, a mobile device ID is generated and stored on the mobile device and stored on the payment gateway in association with the payment ID. In a transaction, a user only needs to enter the supplemental ID into the mobile device, as the supplemental ID and mobile device ID can be sent to the payment gateway to retrieve the associated payment ID. This information is sufficient to authenticate and execute the transaction.

Подробнее
05-07-2018 дата публикации

Systems and methods for device push provisioning

Номер: AU2017206119A1
Принадлежит: FPA Patent Attorneys Pty Ltd

Techniques for provisioning access data may include receiving, by a first application installed on a communication device, user input selecting an account to provision to a second application installed on the communication device. The first application may invoke the second application and send a session identifier (ID) to the second application. The second application may send a user ID associated with the second application, a device ID, and the session ID to the first application. The first application may then generate encrypted provisioning request data and send the encrypted provisioning request data to the second application. The second application may send the encrypted provisioning request data to a remote server computer to request access data that can be used to access a resource. The second application may receive the access data provided by the remote server computer based on validation of the encrypted provisioning request data.

Подробнее
01-08-2013 дата публикации

Authenticating transactions using a mobile device identifier

Номер: AU2011342282A1
Принадлежит:

Systems and methods are provided for authenticating a transaction through a mobile device. During registration, the mobile device receives a payment ID of a payment account and a supplemental ID for verifying the payment ID, and transmits the same to a payment gateway. The payment gateway sends the payment ID and the supplemental ID to a verification module to verify the IDs. After the payment gateway receives a verification result, a mobile device ID is generated and stored on the mobile device and stored on the payment gateway in association with the payment ID. In a transaction, a user only needs to enter the supplemental ID into the mobile device, as the supplemental ID and mobile device ID can be sent to the payment gateway to retrieve the associated payment ID. This information is sufficient to authenticate and execute the transaction.

Подробнее
03-10-2017 дата публикации

SECURE BILLING SYSTEM AND METHOD FOR A MOBILE DEVICE

Номер: CA0002692677C

A system and method are provided for scheduling the payments of bills. An authorization server is provided to be in communication with one or more payment servers and a mobile device. The authorization server receives bills from a billing account, and each of the payment servers can make payments to the billing account. A mobile billing manager, residing on at least the mobile device, detects a new bill and then displays a graphical user interface (GUI) on the mobile device. Through the GUI, selection inputs are received, the selection inputs being associated with paying a first amount at a first date from a first payment account. Based on the payment schedule, the mobile billing manager, through the authorization server, instructs the payment server to make payments.

Подробнее
22-04-2021 дата публикации

Secure Token Distribution

Номер: US20210119990A1
Принадлежит: VISA INTERNATIONAL SERVICE ASSOCIATION

A method for utilizing a registration authority to facilitate a certificate signing request is disclosed. In at least one embodiment, a registration authority computer may receive a certificate signing request associated with a token requestor. The registration authority may authenticate the identity of the token requestor and forward the certificate signing request to a certificate authority computer. A token requestor ID and a signed certificate may be provided by the certificate authority computer and forwarded to the token requestor. The token requestor ID may be utilized by the token requestor to generate digital signatures for subsequent token-based transactions.

Подробнее
23-07-2019 дата публикации

System and method for secured communications between a mobile device and a server

Номер: US0010360561B2

The present systems and methods provide for secured communication between a mobile device and a server/gateway. The systems and methods can be used, for example, as a way to confirm whether or not a transaction was actually authorized by the user, thereby settling a chargeback dispute for a previously executed transaction. The method comprises receiving the dispute regarding the transaction including associated transaction data, and retrieving a digital signature associated with the transaction data, the digital signature computed by signing the transaction data. The digital signature is then verified using a public key, wherein the public key corresponds to a private key stored on a mobile device. It is then determined whether or not the transaction is fraudulent based on a verification result of the digital signature.

Подробнее
25-02-2021 дата публикации

Systems and methods for device push provisioning

Номер: AU2021200521A1
Принадлежит:

A method comprising: receiving, by a server computer from a first application via a second application on a mobile device, encrypted provisioning request data including an account ID of an account to provision, a user ID, and a device ID in encrypted form; 5 validating, by the server computer, the encrypted provisioning request data; and transmitting, by the server computer to the second application on the mobile device, access data based on validation of the encrypted provisioning request data, wherein the second application stores the access data.

Подробнее
08-06-2017 дата публикации

SECURE TOKEN DISTRIBUTION

Номер: US20170163629A1
Принадлежит:

A method for utilizing a registration authority to facilitate a certificate signing request is disclosed. In at least one embodiment, a registration authority computer may receive a certificate signing request associated with a token requestor. The registration authority may authenticate the identity of the token requestor and forward the certificate signing request to a certificate authority computer. A token requestor ID and a signed certificate may be provided by the certificate authority computer and forwarded to the token requestor. The token requestor ID may be utilized by the token requestor to generate digital signatures for subsequent token-based transactions. 1. A computer-implemented method , comprising:receiving, at a registration authority computer, a certificate signing request from a token requestor computer;authenticating, by the registration authority computer, a token requestor associated with the token requestor computer;transmitting the certificate signing request to a certificate authority computer;receiving, from the certificate authority computer, a token requestor identifier (ID) assigned to the token requestor and a signed certificate; andtransmitting, the signed certificate and the token requestor ID to the token requestor computer, wherein receipt of the token requestor ID by the token requestor computer enables the token requestor computer to generate digital signatures for subsequent token-based transactions.2. The computer-implemented method of claim 1 , wherein the token requestor ID is generated by the certificate authority computer in response to receiving the certificate signing request from the registration authority computer.3. The computer-implemented method of claim 1 , wherein authenticating the token requestor comprises verifying information of the certificate signing request against stored information associated with the token requestor.4. The computer-implemented method of claim 1 , wherein the certificate signing request is ...

Подробнее
26-03-2019 дата публикации

Systems and methods for device push provisoning

Номер: US10243958B2

Techniques for provisioning access data may include receiving, by a first application installed on a communication device, user input selecting an account to provision to a second application installed on the communication device. The first application may invoke the second application and send a session identifier (ID) to the second application. The second application may send a user ID associated with the second application, a device ID, and the session ID to the first application. The first application may then generate encrypted provisioning request data and send the encrypted provisioning request data to the second application. The second application may send the encrypted provisioning request data to a remote server computer to request access data that can be used to access a resource. The second application may receive the access data provided by the remote server computer based on validation of the encrypted provisioning request data.

Подробнее
23-06-2016 дата публикации

SYSTEM AND METHOD FOR SECURED COMMUNICATIONS BETWEEN A MOBILE DEVICE AND A SERVER

Номер: US20160180343A1
Принадлежит:

The present systems and methods provide for secured communication between a mobile device and a server/gateway. The systems and methods can be used, for example, as a way to confirm whether or not a transaction was actually authorized by the user, thereby settling a chargeback dispute for a previously executed transaction. The method comprises receiving the dispute regarding the transaction including associated transaction data, and retrieving a digital signature associated with the transaction data, the digital signature computed by signing the transaction data. The digital signature is then verified using a public key, wherein the public key corresponds to a private key stored on a mobile device. It is then determined whether or not the transaction is fraudulent based on a verification result of the digital signature. 1. A method for authenticating a transaction on a mobile device , the mobile device having stored thereon a mobile device ID , the method performed on the mobile device comprising:the mobile device receiving a supplemental ID for verifying a payment ID, the supplemental ID comprising biometric data comprising at least one of fingerprint data, iris data, and retina data;the mobile device sending the supplemental ID and the mobile device ID to a payment gateway, the payment gateway having stored thereon the payment ID and the mobile device ID in association with each other; andthe mobile device receiving from the payment gateway a confirmation that the transaction is complete.2. The method of wherein the supplemental ID comprises encoded data derived from a fingerprint.3. The method of wherein the supplemental ID comprises an image of a fingerprint.4. The method of wherein receiving the supplemental ID comprises receiving fingerprint data claim 1 , obtaining a cryptographic hash using the fingerprint data claim 1 , locally verifying the cryptographic hash on the mobile device claim 1 , and at least one of using the cryptographic hash as the ...

Подробнее
14-05-2015 дата публикации

SYSTEMS AND METHODS FOR FACILITATING A TRANSACTION USING A VIRTUAL CARD ON A MOBILE DEVICE

Номер: US2015134540A1
Принадлежит:

Systems and methods are provided for facilitating contactless payment using cloud-based wallet containing payment credentials (e.g. Visa, Mastercard, American Express) using a near field communication (NFC)-capable device and payment gateway servers. A user can use their existing payment card, herein referred to as a funding card, for contactless payments. A second payment card, herein referred to as a virtual card, is generated. The virtual card is associated with the funding card on a payment gateway server. The virtual card is used on a NFC-enabled mobile device. When a payment is initiated, the virtual card data is sent through the NFC system from a point of sale terminal. This information is sent to the payment gateway server, which retrieves the funding card to make the payment. The funding card, not the virtual card, is used to transfer the money to make payment.

Подробнее
29-09-2020 дата публикации

SECURE REMOTE TOKEN RELEASE WITH ONLINE AUTHENTICATION

Номер: SG11202008451RA
Автор: LAW SIMON, LAW, Simon
Принадлежит:

Подробнее
30-05-2018 дата публикации

SECURE TOKEN DISTRIBUTION

Номер: SG11201803192WA
Принадлежит:

Подробнее
06-10-2016 дата публикации

AUTHENTICATION SYSTEMS AND METHODS FOR CREDENTIAL ACTIVATION AND PROVISIONING

Номер: US20160292686A1
Принадлежит:

Authentication systems and methods are provided for credential activation and/or provisioning. A transaction is made by a transaction processor to a user's credential account that contains a value and an activation code. The user retrieves the activation code from his or her account and provides it to the transaction processor. If the activation codes match, the credential may be activated. 1. A method comprising:receiving, by a server computer, a request to activate a credential, wherein the credential allows access to a resource by a user;performing, by the server computer, a first authentication process of the user;determining, by the server computer, that a second authentication process of the user is necessary; generating, by the server computer, an authorization request message comprising a value and an activation code;', 'sending, by the server computer, the authorization request message to an authorizing entity computer associated with the credential;', 'receiving, by the server computer, an authorization response message approving of the authorization request message;', 'sending, by the server computer, a notification message notifying the user to retrieve the activation code;', 'receiving, by the server computer, the activation code; and', 'determining, by the server computer, that the received activation code matches the generated activation code; and, 'performing, by the server computer, the second authentication process of the user, wherein the second authentication process comprisesafter performing the second authentication process of the user, activating the credential.2. The method of claim 1 , wherein the credential is a token.3. The method of claim 1 , wherein activating the credential comprises provisioning the credential to a device operated by the user.4. The method of claim 1 , further comprising:sending, by the server computer, an activation message notifying the user that the credential is activated.5. The method of claim 1 , wherein the ...

Подробнее
14-06-2012 дата публикации

SYSTEM AND METHOD FOR INITIATING TRANSACTIONS ON A MOBILE DEVICE

Номер: US20120150750A1
Принадлежит: Xtreme Mobility Inc.

Systems and methods are provided for providing a more seamless purchasing experience using a mobile device. The mobile device acquires data, such a barcode image, an image of an object or text, or audio data. A non-limiting example of a barcode is a Quick Response (QR) barcode. The acquired data is then used to obtain a network address of a payment website or webpage, which allows a user to make a purchase for a given product or service. The mobile device then launches the payment website or webpage. A user can enter into the mobile device, through the payment website or webpage, a supplemental ID used for authenticating the transaction. 1. A method for displaying a webpage on a mobile device , the webpage for facilitating a transaction , the method comprising:the mobile device acquiring data related to a product or a service;the mobile device obtaining a network address from the data, the network address of the webpage for facilitating the transaction to purchase the product or the service; andthe mobile device displaying the webpage using the network address.2. The method of further comprising claim 1 , the mobile device receiving a supplemental ID through the webpage claim 1 , the supplemental ID for verifying a payment ID of a payment account used to purchase the product or the service.3. The method of further comprising claim 1 , the mobile device generating a digital signature and the mobile device sending the digital signature and a mobile device ID to a payment gateway to authenticate the transaction.4. The method of further comprising claim 1 , the mobile device receiving at least one selection to modify one or more parameters associated with the transaction.5. The method of wherein the one or more parameters includes the quantity of the product to be purchased.6. The method of wherein the mobile device uses the data to search for the network address in a database claim 1 , the database associating identifications of products or services with network ...

Подробнее
13-08-2019 дата публикации

Secure multi-party protocol

Номер: US0010382409B2

A requestor and a responder may conduct secure communication by making API calls based on a secure multi-party protocol. The requestor may send a request data packet sent in a API request to the responder, where the request data packet can include at least a control block that is asymmetrically encrypted and a data block that is symmetrically encrypted. The responder may return a response data packet to the requestor, where the response data packet can include at least a control block and a data block that are both symmetrically encrypted. The requestor and the responder may derive the keys for decrypting the encrypted portions of the request and response data packets based on some information only known to the requestor and the responder. The secure multi-party protocol forgoes the need to store and manage keys in a hardware security module.

Подробнее
15-06-2021 дата публикации

Secure multi-party protocol

Номер: US0011038853B2

A requestor and a responder may conduct secure communication by making API calls based on a secure multi-party protocol. The requestor may send a request data packet sent in a API request to the responder, where the request data packet can include at least a control block that is asymmetrically encrypted and a data block that is symmetrically encrypted. The responder may return a response data packet to the requestor, where the response data packet can include at least a control block and a data block that are both symmetrically encrypted. The requestor and the responder may derive the keys for decrypting the encrypted portions of the request and response data packets based on some information only known to the requestor and the responder. The secure multi-party protocol forgoes the need to store and manage keys in a hardware security module.

Подробнее
01-06-2011 дата публикации

Secure wireless deposit system and method

Номер: CN0102084384A
Принадлежит:

A system and method is provided for registering a user or a wireless device and executing a transaction of funds from a third party account to a prepaid account. The wireless device is in secure communication with an administrating server over a network. The administrating server is in communication with a third party entity, via a third party entity server, as well as with a prepaid server. In the initial registration process, the user provides the credentials for accessing the third party account using the wireless device. The credentials are stored on the wireless device, administrating server, or both. In subsequent transactions, the user enters in the amount to be deposited into the prepaid account and the credentials are automatically retrieved from storage for authentication. If authenticated, the transaction is executed by the administrating server.

Подробнее
08-09-2005 дата публикации

Shift register engine

Номер: US2005198090A1
Принадлежит:

A micro-code engine with a linear shift register comprises at least one shift register and an execution unit. The shift registers contain a plurality of data cells, each of which store at least one data value. The shift register is operable to shift the data values from a first data cell to a second data cell as new data is input into the shift register. The execution unit is electrically coupled to the linear shift register such that when the execution unit performs an algorithm, the execution unit uses the data value stored in the second data cell as an operand. After the execution unit substantially completes the algorithm, the linear shift register shifts a new data value into the second data cell. In response to the linear shift register shifting new data into the second data cell, the execution unit re-performs the algorithm.

Подробнее
18-02-2014 дата публикации

System and method for authenticating transactions through a mobile device

Номер: US0008655782B2

A user may claim to have not made or allowed a transaction and that the transaction was made in error. Where it appears the user has not authorized the transaction, the funds of the transaction are returned to the user, or are charged back. Systems and methods provide a way to confirm whether or not a transaction was actually authorized by the user, thereby settling a chargeback dispute for a previously executed transaction. The method comprises receiving the dispute regarding the transaction including associated transaction data, and retrieving a digital signature associated with the transaction data, the digital signature computed by signing the transaction data. The digital signature is then verified using a public key, wherein the public key corresponds to a private key stored on a mobile device. It is then determined whether or not the transaction is fraudulent based on a verification result of the digital signature.

Подробнее
06-06-2019 дата публикации

SYSTEMS AND METHODS FOR DEVICE PUSH PROVISIONING

Номер: US20190173883A1
Принадлежит:

Techniques for provisioning access data may include receiving, by a first application installed on a communication device, user input selecting an account to provision to a second application installed on the communication device. The first application may invoke the second application and send a session identifier (ID) to the second application. The second application may send a user ID associated with the second application, a device ID, and the session ID to the first application. The first application may then generate encrypted provisioning request data and send the encrypted provisioning request data to the second application. The second application may send the encrypted provisioning request data to a remote server computer to request access data that can be used to access a resource. The second application may receive the access data provided by the remote server computer based on validation of the encrypted provisioning request data. 120.-. (canceled)21. A method comprising:receiving, by a server computer from a first application via a second application on a mobile device, encrypted provisioning request data including an account ID of an account to provision, a user ID, and a device ID in encrypted form;validating, by the server computer, the encrypted provisioning request data; andtransmitting, by the server computer to the second application on the mobile device, access data based on validation of the encrypted provisioning request data, wherein the second application stores the access data.22. The method of claim 21 , wherein the first application received user input selecting the account to provision to the second application claim 21 , and in response to receiving the selection of the account to provision claim 21 , the first application invoked the second application claim 21 , and the second application sent the user ID claim 21 , the user ID associated with the second application claim 21 , and the device ID to the first application claim 21 , ...

Подробнее
18-02-2021 дата публикации

SECURE REMOTE TOKEN RELEASE WITH ONLINE AUTHENTICATION

Номер: US20210051012A1
Принадлежит:

A system and techniques are described herein for providing authentication. The technique includes registering user authentication data such as biometrics data with a communication device. The authentication data is linked to an account or service provider, and is used to verify the identity of the user when accessing the account. The communication device may obtain a public/private key pair, for which the pubic key may be stored on a secure remote server. When the user attempts to access the account or service provider, the user may provide the authentication data to authenticate the user to the communication device. Thereafter, the communication device may sign an authentication indicator using the private key and send the authentication indicator to the secure remote server. Upon verification of the signature using the public key, the secure remote server may grant access to the user, for example, by releasing a token. 1. A computer-implemented method comprising:receiving, at a secure remote transaction server from a client device, a request to enroll an account;verifying, by the secure remote transaction server, that the client device has authority to access the account;storing, by the secure remote transaction server, at least a public key of a cryptographic key pair in association with the account, wherein at least a private key of the cryptographic key pair is stored on the client device in association with the account; andgenerating, by the secure remote transaction server, a token to be associated with the account, the token being stored in association with the account.2. The computer-implemented method of claim 1 , further comprising:receiving, by the secure remote transaction server from an access device, a request to complete a transaction in association with the account, the request including a signed authentication indicator;verifying, by the secure remote transaction server, the authentication indicator using the public key stored in association with ...

Подробнее
28-01-2021 дата публикации

SECURE TOKEN DISTRIBUTION

Номер: SG10202012073XA
Принадлежит:

Подробнее
25-05-2017 дата публикации

SECURE MULTI-PARTY PROTOCOL

Номер: US20170149740A1
Принадлежит:

A requestor and a responder may conduct secure communication by making API calls based on a secure multi-party protocol. The requestor may send a request data packet sent in a API request to the responder, where the request data packet can include at least a control block that is asymmetrically encrypted and a data block that is symmetrically encrypted. The responder may return a response data packet to the requestor, where the response data packet can include at least a control block and a data block that are both symmetrically encrypted. The requestor and the responder may derive the keys for decrypting the encrypted portions of the request and response data packets based on some information only known to the requestor and the responder. The secure multi-party protocol forgoes the need to store and manage keys in a hardware security module. 1. A method for securing communications between a first computer and a second computer , the method comprising:receiving, by the second computer from the first computer over a communications network, a request data packet, the request data packet including a control block comprising a symmetric key, and a data block encrypted with the symmetric key, wherein the control block is encrypted with a public key of a public-private key pair;decrypting, by the second computer, the control block with a private key of the public-private key pair;extracting, by the second computer, the symmetric key from the control block; anddecrypting, by the second computer, the encrypted data block with the extracted symmetric key.2. The method of claim 1 , wherein the symmetric key is an ephemeral key.3. The method of claim 1 , wherein the symmetric key is generated using a shared secret and a variable datum previously supposed by the second computer.4. The method of claim 3 , wherein the variable datum is a salt.5. The method of claim 1 , wherein the data block is a first data block claim 1 , the control block is a first control block claim 1 , the ...

Подробнее
29-10-2020 дата публикации

SECURE AUTHENTICATION SYSTEM AND METHOD

Номер: SG11202009000YA
Автор: LAW SIMON, LAW, Simon
Принадлежит:

Подробнее
14-03-2017 дата публикации

System and method for initiating transactions on a mobile device

Номер: US0009596237B2

Systems and methods are provided for providing a more seamless purchasing experience using a mobile device. The mobile device acquires data, such a barcode image, an image of an object or text, or audio data. A non-limiting example of a barcode is a Quick Response (QR) barcode. The acquired data is then used to obtain a network address of a payment website or webpage, which allows a user to make a purchase for a given product or service. The mobile device then launches the payment website or webpage. A user can enter into the mobile device, through the payment website or webpage, a supplemental ID used for authenticating the transaction.

Подробнее
14-06-2012 дата публикации

System and Method for Authenticating Transactions Through a Mobile Device

Номер: US20120150742A1
Принадлежит: Xtreme Mobility Inc.

A user may claim to have not made or allowed a transaction and that the transaction was made in error. Where it appears the user has not authorized the transaction, the funds of the transaction are returned to the user, or are charged back. Systems and methods provide a way to confirm whether or not a transaction was actually authorized by the user, thereby settling a chargeback dispute for a previously executed transaction. The method comprises receiving the dispute regarding the transaction including associated transaction data, and retrieving a digital signature associated with the transaction data, the digital signature computed by signing the transaction data. The digital signature is then verified using a public key, wherein the public key corresponds to a private key stored on a mobile device. It is then determined whether or not the transaction is fraudulent based on a verification result of the digital signature. 1. A system for authenticating a transaction on a mobile device , the system comprising:a mobile device in communication with a payment gateway, the payment gateway in communication with a verification module; the mobile device is configured to receive at least a payment ID of a payment account and a supplemental ID for verifying the payment ID, and transmit the payment ID and supplemental ID to the payment gateway;', 'the payment gateway is configured to send the payment ID and the supplemental ID to the verification module, the verification module configured to verify the supplemental ID and the payment ID; and,', 'at least one of the mobile device and the payment gateway configured to, upon the payment gateway receiving a verification result from the verification module that the payment ID and the supplemental ID are successfully verified, generate a mobile device ID, the mobile device ID stored on the mobile device and stored on the payment gateway in association with the payment ID; and,, 'wherein in a registration process the mobile device is ...

Подробнее
14-01-2010 дата публикации

SECURE WIRELESS DEPOSIT SYSTEM AND METHOD

Номер: US2010010932A1
Принадлежит:

A system and method is provided for registering a user or a wireless device and executing a transaction of funds from a third party account to a prepaid account. The wireless device is in secure communication with an administrating server over a network. The administrating server is in communication with a third party entity, via a third party entity server, as well as with a prepaid server. In the initial registration process, the user provides the credentials for accessing the third party account using the wireless device. The credentials are stored on the wireless device, administrating server, or both. In subsequent transactions, the user enters in the amount to be deposited into the prepaid account and the credentials are automatically retrieved from storage for authentication. If authenticated, the transaction is executed by the administrating server.

Подробнее
25-10-2007 дата публикации

Central processing unit having a micro-code engine

Номер: US2007250684A1
Принадлежит:

A digital camera having a central processing unit with an embedded micro-code engine comprises a system memory capable of storing an instruction, at least one CPU execution unit electrically coupled with the system memory, and at least one micro-code engine electrically coupled with the CPU execution unit. The at least one CPU execution unit receive and decodes the instruction stored in the system memory. In response to the decoded instruction, the CPU execution unit sends commands and instruction parameters to at least one of an arithmetic logic unit of the CPU execution unit and the micro-code engine to execute the instruction. Typically the at least one CPU execution unit and the at least one micro-code engine operate in synchronization to execute the instruction.

Подробнее
13-07-2017 дата публикации

SYSTEMS AND METHODS FOR DEVICE PUSH PROVISIONING

Номер: US20170201520A1
Принадлежит:

Techniques for provisioning access data may include receiving, by a first application installed on a communication device, user input selecting an account to provision to a second application installed on the communication device. The first application may invoke the second application and send a session identifier (ID) to the second application. The second application may send a user ID associated with the second application, a device ID, and the session ID to the first application. The first application may then generate encrypted provisioning request data and send the encrypted provisioning request data to the second application. The second application may send the encrypted provisioning request data to a remote server computer to request access data that can be used to access a resource. The second application may receive the access data provided by the remote server computer based on validation of the encrypted provisioning request data. 1. A communication device comprising:a processor; and receiving, by a first application installed on the communication device, user input selecting an account to provision to a second application installed on the communication device;', 'in response to receiving the selection of the account to provision, invoking, by the first application, the second application and sending a session identifier (ID) to the second application;', 'sending, by the second application, a user ID associated with the second application, a device ID, and the session ID to the first application;', 'generating, by the first application, encrypted provisioning request data including an account ID of the account to provision, the user ID, and the device ID;', 'sending, by the first application, the encrypted provisioning request data to the second application;', 'sending, by the second application, the encrypted provisioning request data to a remote server computer;', 'receiving, by the second application, access data provided by the remote server computer ...

Подробнее
02-02-2021 дата публикации

Secure token distribution

Номер: US0010911429B2

A method for utilizing a registration authority to facilitate a certificate signing request is disclosed. In at least one embodiment, a registration authority computer may receive a certificate signing request associated with a token requestor. The registration authority may authenticate the identity of the token requestor and forward the certificate signing request to a certificate authority computer. A token requestor ID and a signed certificate may be provided by the certificate authority computer and forwarded to the token requestor. The token requestor ID may be utilized by the token requestor to generate digital signatures for subsequent token-based transactions.

Подробнее
24-10-2019 дата публикации

SECURE MULTI-PARTY PROTOCOL

Номер: US20190327210A1
Принадлежит: VISA INTERNATIONAL SERVICE ASSOCIATION

A requestor and a responder may conduct secure communication by making API calls based on a secure multi-party protocol. The requestor may send a request data packet sent in a API request to the responder, where the request data packet can include at least a control block that is asymmetrically encrypted and a data block that is symmetrically encrypted. The responder may return a response data packet to the requestor, where the response data packet can include at least a control block and a data block that are both symmetrically encrypted. The requestor and the responder may derive the keys for decrypting the encrypted portions of the request and response data packets based on some information only known to the requestor and the responder. The secure multi-party protocol forgoes the need to store and manage keys in a hardware security module.

Подробнее
05-06-2014 дата публикации

System and Method for Authenticating Transactions Through a Mobile Device

Номер: US20140156531A1
Принадлежит: SALT Technology Inc.

A user may claim to have not made or allowed a transaction and that the transaction was made in error. Where it appears the user has not authorized the transaction, the funds of the transaction are returned to the user, or are charged back. Systems and methods provide a way to confirm whether or not a transaction was actually authorized by the user, thereby settling a chargeback dispute for a previously executed transaction. The method comprises receiving the dispute regarding the transaction including associated transaction data, and retrieving a digital signature associated with the transaction data, the digital signature computed by signing the transaction data. The digital signature is then verified using a public key, wherein the public key corresponds to a private key stored on a mobile device. It is then determined whether or not the transaction is fraudulent based on a verification result of the digital signature. 1. A method for authenticating a transaction on a mobile device , the mobile device having stored thereon a mobile device ID , the method performed on the mobile device comprising:the mobile device receiving through a transaction GUI a supplemental ID for verifying a payment ID;the mobile device sending the supplemental ID and the mobile device ID to a payment gateway, the payment gateway having stored thereon the payment ID and the mobile device ID in association with each other; andthe mobile device receiving from the payment gateway a confirmation that the transaction is complete.2. The method of wherein the mobile device sends at least one of the supplemental ID and the payment ID without storing the supplemental ID and the payment ID on the mobile device.3. The method of further comprising a registration process for storing the mobile device ID on the mobile device claim 1 , the method further comprising:the mobile device receiving from a registration GUI at least the payment ID of a payment account and the supplemental ID, and transmitting ...

Подробнее
04-11-2008 дата публикации

Secure wireless authorization system

Номер: US0007447494B2

The invention relates to a secure wireless authorization system by which a user can employ a wireless device to authorize a request that is initiated by a remote third party and transmitted to the user by an authorization server. The system includes the authorization server that is linked to the third party by way of a communications connection and a wireless device that is adapted to securely store an encryption scheme and create a secure authorization from the user in response to the third party request and has the ability to establish a secure wireless connection over which the secure authorization is transmitted from the user's wireless device to the authorization server. Pre-authorization, real-time authorization and post-authorization methods are disclosed by which user authorized transactions can be completed by way of the authorization system of this invention.

Подробнее
25-08-2005 дата публикации

Secure wireless authorization system

Номер: US2005184145A1
Принадлежит:

The invention relates to a secure wireless authorization system by which a user can employ a wireless device to authorize a request that is initiated by a remote third party and transmitted to the user by an authorization server. The system includes the authorization server that is linked to the third party by way of a communications connection and a wireless device that is adapted to securely store an encryption scheme and create a secure authorization from the user in response to the third party request and has the ability to establish a secure wireless connection over which the secure authorization is transmitted from the user's wireless device to the authorization server. Pre-authorization, real-time authorization and post-authorization methods are disclosed by which user authorized transactions can be completed by way of the authorization system of this invention.

Подробнее
04-02-2021 дата публикации

SECURE AUTHENTICATION SYSTEM AND METHOD

Номер: US20210035107A1
Принадлежит: VISA INTERNATIONAL SERVICE ASSOCIATION

A method is disclosed. The method comprising: receiving, by an access control sewer via a directory sewer from an authentication requestor, an authentication request comprising an account identifier, and information regarding a prior authentication method on the account identifier and a current authentication method for the account identifier associated with a transaction; performing, by the access control server, a risk analysis for the transaction based at least in part on the information and a threshold; authenticating, by the access control server, the user of the account identifier using the information, the account identifier, and a result of the risk analysis; modifying, by the access control server, an authentication response to include an authentication indicator, and transmitting, by the access control sewer, the authentication response to the authentication requestor.

Подробнее
14-06-2012 дата публикации

SYSTEM AND METHOD FOR AUTHENTICATING TRANSACTIONS THROUGH A MOBILE DEVICE

Номер: US20120150748A1
Принадлежит: Xtreme Mobility Inc.

A user may claim to have not made or allowed a transaction and that the transaction was made in error. Where it appears the user has not authorized the transaction, the funds of the transaction are returned to the user, or are charged back. Systems and methods provide a way to confirm whether or not a transaction was actually authorized by the user, thereby settling a chargeback dispute for a previously executed transaction. The method comprises receiving the dispute regarding the transaction including associated transaction data, and retrieving a digital signature associated with the transaction data, the digital signature computed by signing the transaction data. The digital signature is then verified using a public key, wherein the public key corresponds to a private key stored on a mobile device. It is then determined whether or not the transaction is fraudulent based on a verification result of the digital signature. 1. A method for settling a dispute for a previously executed transaction , the method performed by a computing device , the method comprising:receiving the dispute regarding the transaction including associated transaction data;retrieving a digital signature associated with the transaction data, the digital signature computed by signing the transaction data;verifying the digital signature using a public key, the public key corresponding to a private key stored on a mobile device; anddetermining whether or not the transaction is fraudulent based on a verification result of the digital signature.2. The method in wherein the transaction is determined to be fraudulent if the verification result is unsuccessful.3. The method of wherein the transaction is determined to be not fraudulent if the verification result is successful.4. The method of wherein the computing device receives from the mobile device the digital signature claim 3 , the digital signature signed using the private key.5. The method of further comprising determining whether or not a ...

Подробнее
02-02-2021 дата публикации

Systems and methods for device push provisioning

Номер: US0010911456B2

Techniques for provisioning access data may include receiving, by a first application installed on a communication device, user input selecting an account to provision to a second application installed on the communication device. The first application may invoke the second application and send a session identifier (ID) to the second application. The second application may send a user ID associated with the second application, a device ID, and the session ID to the first application. The first application may then generate encrypted provisioning request data and send the encrypted provisioning request data to the second application. The second application may send the encrypted provisioning request data to a remote server computer to request access data that can be used to access a resource. The second application may receive the access data provided by the remote server computer based on validation of the encrypted provisioning request data.

Подробнее
08-09-2005 дата публикации

Central processing unit having a micro-code engine

Номер: US2005198482A1
Принадлежит:

A digital camera having a central processing unit with an embedded micro-code engine comprises a system memory capable of storing an instruction, at least one CPU execution unit electrically coupled with the system memory, and at least one micro-code engine electrically coupled with the CPU execution unit. The at least one CPU execution unit receive and decodes the instruction stored in the system memory. In response to the decoded instruction, the CPU execution unit sends commands and instruction parameters to at least one of an arithmetic logic unit of the CPU execution unit and the micro-code engine to execute the instruction. Typically the at least one CPU execution unit and the at least one micro-code engine operate in synchronization to execute the instruction.

Подробнее
19-07-2012 дата публикации

FORMING THROUGH-SILICON-VIAS FOR MULTI-WAFER INTEGRATED CIRCUITS

Номер: US20120181698A1

The present invention provides a method for forming a three-dimensional wafer stack having a single metallized stack via with a variable cross-sectional shape. The method uses at least first and silicon wafers. Each wafer has one or more integrated circuits formed thereon. One or more through-vias are formed in each silicon wafer followed by oxide formation on at least an upper and lower surface of the silicon wafer. The wafers are aligned such that each wafer through via is aligned with a corresponding through via in adjacent stacked wafers. Wafers are bonded to form a three-dimensional wafer stack having one or more stack vias formed from the alignment of individual wafer vias. Via metallization is performed by depositing a seed layer in each of the stack vias followed by copper electroplating to form a continuous and homogeneous metallization path through the three-dimensional wafer stack. 1. A method for vertically integrating plural semiconductor wafers , each semiconductor wafer including one or more integrated circuits , one or more through vias and a metal layer electrically connecting the integrated circuits with vias fabricated thereon comprising:aligning at least first and second silicon wafers such that a center of each of the one or more through vias of the first wafer aligns with a center of each of corresponding through vias in the second wafer;bonding at least the first and second silicon wafers to form a three-dimensional wafer stack having one or more stack vias formed from the alignment of via centers of at least the first and second wafers;forming a metal seed layer on at least a portion of each of the one or more stack vias;electroplating the stack via using the metal seed layer to form a continuous and homogeneous metallization path through the three-dimensional wafer stack; andforming individual three-dimensional semiconductor elements from the three-dimensional wafer stack.2. A method according to further comprising:etching trenches in the ...

Подробнее
26-07-2012 дата публикации

HIGH OPTICAL EFFICIENCY CMOS IMAGE SENSOR

Номер: US20120187462A1

High optical efficiency CMOS image sensors capable of sustaining pixel sizes less than 1.2 microns are provided. Due to high photodiode fill factors and efficient optical isolation, microlenses are unnecessary. Each sensor includes plural imaging pixels having a photodiode structure on a semiconductor substrate adjacent a light-incident upper surface of the image sensor. An optical isolation grid surrounds each photodiode structure and defines the pixel boundary. The optical isolation grid extends to a depth of at least the thickness of the photodiode structure and prevents incident light from penetrating through the incident pixel to an adjacent pixel. A positive diffusion plug vertically extends through a portion of the photodiode structure. A negative diffusion plug vertically extends into the semiconductor substrate for transferring charge generated in the photodiode to a charge collecting region within the semiconductor substrate. Pixel circuitry positioned beneath the photodiode controls charge transfer to image readout circuitry. 1. A high optical efficiency CMOS image sensor comprising:a plurality of imaging pixels, each pixel including a photodiode structure on a semiconductor substrate, the photodiode structure being positioned adjacent a light-incident upper surface of the image sensor to receive incident light and generate electrical charges from the received incident light;an isolation grid surrounding the photodiode structure and defining an imaging pixel boundary, the isolation grid extending to a depth of at least the thickness of the photodiode structure, the isolation grid being configured to prevent the light incident on the pixel from penetrating through the incident pixel to an adjacent pixel;a positive diffusion plug vertically extending through at least a portion of the photodiode structure; a negative diffusion plug vertically extending into the semiconductor substrate beneath the photodiode structure and electrically communicating with the ...

Подробнее
04-04-2013 дата публикации

SECURE BILLING SYSTEM AND METHOD FOR A MOBILE DEVICE

Номер: US20130085936A1
Принадлежит: Xtreme Mobility Inc.

A system and method are provided for scheduling the payments of bills. An authorization server is provided to be in communication with one or more payment servers and a mobile device. The authorization server receives bills from a billing account, and each of the payment servers can make payments to the billing account. A mobile billing manager, residing on at least the mobile device, detects a new bill and then displays a graphical user interface (GUI) on the mobile device. Through the GUI, selection inputs are received, the selection inputs being associated with paying a first amount at a first date from a first payment account. Based on the payment schedule, the mobile billing manager, through the authorization server, instructs the payment server to make payments. 1. A system for scheduling the payments of one or more bills comprising:an authorization server in communication with one or more payment servers and a mobile device, the authorization server configured to receive one or more bills from a billing account, and the one or more payment servers each configured to make one or more payments to the billing account;a mobile billing manager residing on at least the mobile device, the mobile billing manager configured to execute the following instructions:displaying a graphical user interface (GUI) on the mobile device to receive one or more selection inputs to activate and determine automatic payment settings associated with one or more payment accounts, one or amounts to be paid, and one or more respective payment dates associated with each of the one or more amounts to be paid;upon the mobile billing manager detecting the receipt of a bill, the mobile billing manager, through the authorization server, instructing the one or more payment servers to pay a first amount at a first predetermined date from a first payment account.2. The system according to wherein the mobile billing manager also resides on the authorization server.3. The system according to wherein ...

Подробнее
09-05-2013 дата публикации

Methods, Kits and Reagents for Diagnosing, Alding Diagnosis and/or Monitoring Progression of a Neurological Disorder

Номер: US20130116135A1

The present inventors have identified a panel of biomarkers present in a biological sample of an individual (e.g. blood, including serum or plasma) whose concentrations or levels are altered in individuals with a neurological disorder. Accordingly, changes in the level of any one or more of these biomarkers can be used to assess cognitive function, to diagnose or aid in the diagnosis of a neurological disorder and/or to monitor a neurological disorder in a patient (e.g., tracking disease progression in a patient and/or tracking the effect of medical or surgical therapy in the patient). Changes in the level of any one or more of these biomarkers can also be used to stratify a patient (i.e., sorting an individual with a probable diagnosis of a neurological disorder or diagnosed with a neurological disorder into different classes of the disorder) and diagnosing or aiding in the diagnosis of mild cognitive impairment (MCI) as well as diagnosing or aiding in the diagnosis of cognitive impairment. 148-. (canceled)49. A kit for use in diagnosing , aiding diagnosis and/or monitoring progression of a neurological disorder in an individual and/or stratifying an individual , the kit comprising at least one reagent specific for at least six biomarkers , wherein the at least six biomarkers are selected from a panel of markers consisting of:CortisolIGF.BP.2—insulin-like growth factor binding protein 2IL.17—interleukin—17Pancreatic PolypeptideApoE ECU—apolipoprotein EABeta 42VCAM−1—vascular cell adhesion molecule 1BLC—chemokine (C-X-C motif) ligandand naturally-occurring variants thereof.52. The kit of wherein the use in diagnosing claim 49 , aiding diagnosis and/or monitoring progression of a neurological disorder in an individual and/or stratifying an individual comprises comparing a measured level of the at least six biomarkers and naturally-occurring variants thereof in a biological sample from an individual to a reference level for the at least six biomarkers and naturally- ...

Подробнее
25-07-2013 дата публикации

INCREASED SURFACE AREA ELECTRICAL CONTACTS FOR MICROELECTRONIC PACKAGES

Номер: US20130187267A1

A multilayer microelectronic device package includes one or more vertical electrical contacts. At least one semiconductor material layer is provided having one or more electrical devices fabricated therein. An electrical contact pad can be formed on or in the semiconductor material layer. Another material layer is positioned adjacent to the semiconductor material layer and includes a conductive material stud embedded in or bonded to the layer. A via is formed through at least a portion of the semiconductor material layer and the electrical contact pad and into the adjacent layer conducting material stud. The via is constructed such that the via tip terminates within the conducting material stud, exposing the conducting material. A metallization layer is disposed in the via such that the metallization layer contacts both the electrical contact pad and the conducting material stud exposed by the via tip. 1. A microelectronic device package including one or more electrical contacts comprising:a semiconductor material layer having one or more electrical devices fabricated therein and having one or more electrical contact pads positioned therein;a layer positioned adjacent to the semiconductor material layer, the layer including one or more conducting material studs embedded in or formed on the layer or bonded to the layer, wherein the conducting material stud is positioned beneath and in electrical contact with the electrical contact pad;a via formed through at least a portion of the semiconductor material layer and through the electrical contact pad and into the conducting material stud, the tip of the via terminating in the conducting material stud such that the via tip exposes the conducting material of the stud, wherein the formed via terminates within the conductive material stud to ensure metallization of the electrical contact over a large region; anda metallization layer disposed in the via such that the metallization layer contacts the electrical contact pad ...

Подробнее
27-02-2014 дата публикации

Support pad for a drill head and method for designing and manufacturing a support pad

Номер: US20140056661A1
Автор: Simon LAWES, Tony Evans
Принадлежит: Sandvik Intellectual Property AB

A deep hole drill head support pad whose edge chamfers are formed in a continuous grinding operation so that there are no discontinuities in the angled side surface leading up to the outer surface thereof. A method of manufacturing the support pad includes generating a virtual guide metric including a curved travel path for a grinding surface around a support pad blank, and a plurality of control surfaces intersecting with the curved path at separate locations along its length, each control surface defining an angle of orientation of the grinding surface. A CNC grinding machine can interpret the virtual guide metric to change the angle of orientation of a grinding surface relative to a support pad blank as it moves between adjacent control surfaces in a continuous manner.

Подробнее
27-03-2014 дата публикации

METHOD FOR DETECTION OF A NEUROLOGICAL DISEASE

Номер: US20140086836A1
Принадлежит:

The present invention provides methods for predicting whether a subject will develop a disease capable of affecting cognitive function. More specifically, the present invention relates to the predictive detection of neurological diseases in a subject. The methods and systems provided enable a quantitative assessment and theoretical predictions of neocortical amyloid loading or amyloid beta levels based on the measurement of biomarkers in biological fluids that will provide an indication of whether a subject is likely to develop a neurological disease, such as Alzheimer's disease (AD). 1. A method for generating a set of relevant coefficients for predicting neocortical amyloid beta levels , comprising:a) applying a classification algorithm to a plurality of biomarker values from a plurality of predetermined validated samples; andb) applying the classification algorithm to a plurality of amyloid beta levels obtained from the same plurality of predetermined validated samples of step a);wherein applying the classification algorithm generates a set of relevant coefficients capable of predicting the amyloid beta levels by correlating biomarkers to amyloid beta levels.2. The method of claim 1 , wherein the classification algorithm is simultaneously applied to the plurality of biomarker values of step a) and the plurality of amyloid beta levels from step b).3. The method according to claim 1 , wherein the classification algorithm is selected from the group consisting of Random Forests claim 1 , Variable Importance Measures claim 1 , Linear Discriminant Analysis (LDA) claim 1 , Diagonal Linear Discriminant Analysis (DLDA) claim 1 , Diagonal Quadratic Discriminant Analysis (DQDA) claim 1 , Support Vector Machines (SVM) claim 1 , Support Vector Regression (SVR) Neural Network claim 1 , Analysis of Covariance (ANCOVA) and k-Nearest Neighbour method.4. The method according to claim 1 , wherein the plurality of predetermined validated samples comprises samples clinically ...

Подробнее
25-01-2018 дата публикации

BOOTSTRAPPING THE DATA LAKE AND GLOSSARIES WITH 'DATASET JOINS' METADATA FROM EXISTING APPLICATION PATTERNS

Номер: US20180025061A1
Принадлежит:

A method to search for at least one relationship pattern in a plurality of runtime artifacts is provided. The method may include detecting at least one data manipulation statement in the plurality of runtime artifacts. The method may also include extracting at least one relationship clause from the detected at least one data manipulation statement. The method may further include parsing the extracted at least one relationship clause. The method may include generating at least one normalized syntax tree based on the parsed at least one relationship clause. The method may also include performing a classification and a snippet discovery on the generated at least one normalized syntax tree. 1. A method to search for at least one relationship pattern in a plurality of runtime artifacts , the method comprising:detecting at least one data manipulation statement in the plurality of runtime artifacts;extracting at least one relationship clause from the detected at least one data manipulation statement;parsing the extracted at least one relationship clause; andgenerating at least one normalized syntax tree based on the parsed at least one relationship clause.2. The method of claim 1 , further comprising:performing a classification and a snippet discovery on the generated at least one normalized syntax tree;clustering a plurality of common relationship clauses according to a plurality of linkages that link a plurality of data sources together; andstoring the plurality of common relationship clauses and the plurality of linkages.3. The method of claim 2 , wherein the plurality of common relationship clauses and the plurality of linkages are stored according to at least one of a class claim 2 , a cluster or a syntax tree.4. The method of claim 2 , further comprising:proposing a list comprising the clustered common relationship clauses to a user for validation; andproviding a search capability to retrieve at least one probable relationship between at least one of a plurality of ...

Подробнее
30-01-2020 дата публикации

DATA FORECASTING BASED ON MACHINE LEARNING ANALYSIS OF DATA ACCESS STATISTICS

Номер: US20200034330A1
Принадлежит:

Methods and systems may provide for technology to conduct a machine learning analysis of data access statistics with respect to a plurality of separate datasets and determine a time-dependent access pattern based on the machine learning analysis, wherein the time-dependent access pattern includes an expert access trend, a curation access trend and a knowledgebase access trend. The technology may also generate one or more data management recommendations with response to the plurality of separate datasets based on the time-dependent access pattern.

Подробнее
15-05-2014 дата публикации

THROUGH-SILICON VIA STRUCTURE WITH PATTERNED SURFACE, PATTERNED SIDEWALL AND LOCAL ISOLATION

Номер: US20140131882A1

This invention discloses a through-silicon via (TSV) structure for providing an electrical path between a first-side surface and a second-side surface of a silicon chip, and a method for fabricating the structure. In one embodiment, the TSV structure comprises a via penetrated through the chip from the first-side surface to the second-side surface, providing a first end on the first-side surface and a second end on the second-side surface. A local isolation layer is deposited on the via's sidewall and on a portion of the first-side surface surrounding the first end. The TSV structure further comprises a plurality of substantially closely-packed microstructures arranged to form a substantially non-random pattern and fabricated on at least the portion of the first-side surface covered by the local isolation layer for promoting adhesion of the local isolation layer to the chip. A majority of the microstructures has a depth of at least 1 μm. 1. A through-silicon via structure for providing an electrical path between a first side and a second side of a silicon chip , the first side having a first-side surface and the second side having a second-side surface , the via structure comprising:a via penetrated through the chip from the first-side surface to the second-side surface, having a first end on the first-side surface and a second end on the second-side surface;a local isolation layer deposited on the via's sidewall and on a portion of the first-side surface surrounding the first end; anda plurality of substantially closely-packed microstructures arranged to form a substantially non-random pattern and fabricated on at least the portion of the first-side surface covered by the local isolation layer for promoting adhesion of the local isolation layer to the chip, wherein a majority of the microstructures has a depth of at least 1 μm.2. The via structure of claim 1 , wherein a majority of the microstructures has a width between 2 μm and 4 μm.3. The via structure of claim ...

Подробнее
02-04-2015 дата публикации

Deep hole drill tool

Номер: US20150093207A1
Автор: HOUT Jason, LAWES Simon
Принадлежит:

The present disclosure relates to a deep hole drill tool of the type that includes a basic body, a cutting insert having a cutting edge, which is formed between a chip surface and a clearance surface. The chip surface includes a chamfer surface adjacent to the cutting edge and the clearance surface, the chamfer surface having a width of at least 0.2 mm defined between two boundary lines, and which, in each infinitesimal part along the cutting edge, forms an angle (γ) of at least 25° and at most 50° with a reference plane extending perpendicular to the center or rotation axis of the tool. 1. A deep hole drill tool comprising:a basic body having a center axis, toward which an imaginary reference plane extends at a right angle; anda cutting insert of a material that is harder than a material of the basic body, the cutting insert including a front side, a back side, and a cutting edge formed between a chip surface included in the front side and a clearance surface, extending from the chip surface toward the back side, the cutting edge running inward from a peripherally outer end situated along the basic body to an inner end, wherein the chip surface includes a chamfer surface in connection to the cutting edge and the clearance surface, the chamfer surface having a width of at least 0.2 mm defined between two boundary lines, and which, in each infinitesimal part along the cutting edge, forming an angle of at least 25° and at most 50° with said reference plane.2. A deep hole drill tool according to claim 1 , wherein the width of the chamfer surface is at most 0.5 mm.3. A deep hole drill tool according to claim 1 , wherein the chamfer surface has a uniform width along its entire length extension.4. A deep hole drill tool according to claim 1 , wherein the basic body has three seats one corresponding to a peripheral cutting insert claim 1 , a center insert claim 1 , and an intermediate insert claim 1 , and a central hollow space for the internal evacuation of chips from the ...

Подробнее
19-06-2014 дата публикации

Vibration damper for hole machining apparatus

Номер: US20140169900A1
Принадлежит: Sandvik Intellectual Property AB

A vibration damper for a drill tube of a hole machining apparatus includes a closed loop bi-directional adjustment mechanism, which operates from a single side of the damper. The closed loop mechanism ensures that the position of the clamping sleeve has a one-to-one relationship with the adjustment mechanism, which enables controlled adjustment of the clamping force to be performed. Locating the adjustment mechanism at one side of the clamping sleeve facilitates re-tooling, e.g. replacing the clamping sleeve if a larger diameter drill tube is to be used. 1. A vibration damper for a drill tube of a hole machining apparatus , the vibration damper comprising:a damper carriage for mounting around the drill tube;an inertial mass rotatably mounted in the damper carriage;a clamping sleeve mounted in the damper carriage, the clamping sleeve having a bore for receiving the drill tube and being axially movable relative to the damper carriage to provide frictional engagement between the drill tube and inertial mass;an adjustment element connected to the clamping sleeve to move axially with the clamping sleeve and to rotate freely relative to the clamping sleeve, anda bi-directional drive mechanism arranged to drive the clamping sleeve forwards and backwards along its axis via the adjustment element, wherein the bi-directional drive mechanism includes a drive member in self-locking engagement with the adjustment element.2. A vibration damper according to claim 1 , wherein the axial position of the inertial mass in the damper carriage is fixed claim 1 , and the self-locking engagement between the adjustment element and the drive member forms a closed loop mechanism.3. A vibration damper according to claim 1 , wherein the clamping sleeve is tapered such that axial movement thereof relative to the inertial mass causes radial compression or expansion of the clamping sleeve.4. A vibration damper according to claim 1 , wherein the adjustment element is connected to the clamping ...

Подробнее
05-05-2022 дата публикации

DEVICE AND SYSTEMS FOR STRONG IDENTITY AND STRONG AUTHENTICATION

Номер: US20220138298A1
Принадлежит:

Verifying identity of a person using remote communication (e.g., Internet) is difficult because images of identity documents can be fraudulent or copied and distributed to adversaries without the person's permission. A user device and a server use facial scanning to verify identity of a person and to provide strong authentication. The user device captures a scanned image of an identity document (e.g., a driver license, a passport, a credential document, etc.) extracts the photo of the person from the identity document. The user device also captures an image of the person's face (e.g., a selfie photo) and compares this image with the extracted photo from the identity document. If the faces match, then the person's identity is verified. The verification of the identity and a related action (e.g., registration of the person, logging into a system, etc.) are authenticated using strong authentication such as Fast Identity Online (FIDO) authentication.

Подробнее
14-05-2015 дата публикации

Systems and methods for facilitating a transaction using a virtual card on a mobile device

Номер: US20150134540A1

Systems and methods are provided for facilitating contactless payment using cloud-based wallet containing payment credentials (e.g. Visa, Mastercard, American Express) using a near field communication (NFC)-capable device and payment gateway servers. A user can use their existing payment card, herein referred to as a funding card, for contactless payments. A second payment card, herein referred to as a virtual card, is generated. The virtual card is associated with the funding card on a payment gateway server. The virtual card is used on a NFC-enabled mobile device. When a payment is initiated, the virtual card data is sent through the NFC system from a point of sale terminal. This information is sent to the payment gateway server, which retrieves the funding card to make the payment. The funding card, not the virtual card, is used to transfer the money to make payment.

Подробнее
14-05-2020 дата публикации

Data processing

Номер: US20200151172A1
Принадлежит: International Business Machines Corp

A method and associated system. Multiple virtual triples for an entity of multiple entities identified within a first data source are generated. Each virtual triple consists of a subject, a predicate, and an object. The subject is the entity. The predicate is a relationship between the entity and other entities identified within the first data source. The object is associated with an attribute of the entity. The subject, the predicate, and the object are each identified within the first data source. A degree of similarity between two entities of the two or more entities is identified by comparing the respective frequency metrics of the two entities. The two entities within the data structure are associated in response to a determination that an identified degree of similarity between the two entities exceeds a first predetermined threshold.

Подробнее
30-07-2015 дата публикации

IMAGE CAPTURING DEVICE AND METHOD FOR CALIBRATING IMAGE DEFORMATION THEREOF

Номер: US20150215607A1
Принадлежит:

A method for calibrating image deformation of an image capturing device having a first and second lens, a focusing actuator, and a prestored first focusing step-to-focusing distance relation includes the following steps. A plurality of image sets are captured by the first and second lens, where each of the image sets includes a first and second image, and the images sets include a reference image set. It is detected whether the reference image set is deformed. When the reference image set is detected to be deformed, the first focusing step-to-focusing distance relation is calibrated according to a focusing step and a focusing distance corresponding to each of the image sets, where the focusing step corresponding to each of the image sets is the number of steps that the focusing actuator is required to move the first and second lens to a focusing position to generate each of the image sets. 1. A method for calibrating image deformation , adapted to an image capturing device having a first lens , a second lens , a focusing actuator , and a pre-stored first focusing step-to-focusing distance relation , comprising:capturing a plurality of image sets by utilizing the first lens and the second lens, wherein each of the image sets comprises a first image corresponding to the first lens and a second image corresponding to the second lens, and the image sets comprise a reference image set including a first reference image corresponding to the first lens and a second reference image corresponding to the second lens;detecting whether the reference image set is deformed; andwhen the reference image set is detected to be deformed, calibrating the first focusing step-to-focusing distance relation according to a focusing step and a focusing distance corresponding to a focus target in each of the image sets, wherein the focusing step corresponding to the focus target in each of the image sets is the number of steps that the focusing actuator is required to move the first lens and ...

Подробнее
30-07-2015 дата публикации

IMAGE CAPTURING DEVICE AND METHOD FOR CALIBRATING IMAGE DEFECTION THEREOF

Номер: US20150215615A1
Принадлежит:

A method for calibrating image defection of an image capturing device having a first and second lens, a focusing actuator, and a prestored first focusing step-to-focusing distance relation includes the following steps. A plurality of image sets are captured by the first and second lens, where each of the image sets includes a first and second image, and the images sets include a reference image set. It is detected whether the reference image set is defective. When the reference image set is detected to be defective, the first focusing step-to-focusing distance relation is calibrated according to a focusing step and a focusing distance corresponding to each of the image sets, where the focusing step corresponding to each of the image sets is the number of steps that the focusing actuator is required to move the first and second lens to a focusing position to generate each of the image sets. 1. A method for calibrating image defection , adapted to an image capturing device having a first lens , a second lens , a focusing actuator , and a pre-stored first focusing step-to-focusing distance relation , comprising:capturing a plurality of image sets by utilizing the first lens and the second lens, wherein each of the image sets comprises a first image corresponding to the first lens and a second image corresponding to the second lens, and the image sets comprise a reference image set including a first reference image corresponding to the first lens and a second reference image corresponding to the second lens;detecting whether the reference image set is defective; andwhen the reference image set is detected to be defective, calibrating the first focusing step-to-focusing distance relation according to a focusing step and a focusing distance corresponding to a focus target in each of the image sets, wherein the focusing step corresponding to the focus target in each of the image sets is the number of steps that the focusing actuator is required to move the first lens and ...

Подробнее
19-08-2021 дата публикации

SECURE MULTI-PARTY PROTOCOL

Номер: US20210258288A1
Принадлежит:

A requestor and a responder may conduct secure communication by making API calls based on a secure multi-party protocol. The requestor may send a request data packet sent in a API request to the responder, where the request data packet can include at least a control block that is asymmetrically encrypted and a data block that is symmetrically encrypted. The responder may return a response data packet to the requestor, where the response data packet can include at least a control block and a data block that are both symmetrically encrypted. The requestor and the responder may derive the keys for decrypting the encrypted portions of the request and response data packets based on some information only known to the requestor and the responder. The secure multi-party protocol forgoes the need to store and manage keys in a hardware security module. 120.-. (canceled)21. A method for securing communications between a first computer and a second computer , the method comprising:securing a communication connection over a communications network at least in part by:encrypting, by the first computer, a first data block with a cryptographic key;generating, by the first computer, an encrypted first control block by encrypting a first control block;generating, by the first computer, a request data packet of the communication connection, the request data packet including the encrypted first control block and the encrypted first data block;sending, by the first computer, the request data packet to the second computer over the communications network, wherein the second computer generates a response data packet comprising an encrypted second control block and an encrypted second data block;receiving, by the first computer, the response data packet of the communication connection from the second computer over the communications network;generating, by the first computer, a second symmetric key using a predetermined algorithm;decrypting, by the first computer, the encrypted second control ...

Подробнее
29-09-2016 дата публикации

BOOTSTRAPPING THE DATA LAKE AND GLOSSARIES WITH 'DATASET JOINS' METADATA FROM EXISTING APPLICATION PATTERNS

Номер: US20160283569A1
Принадлежит:

A method to search for at least one relationship pattern in a plurality of runtime artifacts is provided. The method may include detecting at least one data manipulation statement in the plurality of runtime artifacts. The method may also include extracting at least one relationship clause from the detected at least one data manipulation statement. The method may further include parsing the extracted at least one relationship clause. The method may include generating at least one normalized syntax tree based on the parsed at least one relationship clause. The method may also include performing a classification and a snippet discovery on the generated at least one normalized syntax tree. 1. A method to search for at least one relationship pattern in a plurality of runtime artifacts , the method comprising:detecting at least one data manipulation statement in the plurality of artifacts;extracting at least one relationship clause from the detected at least one data manipulation statement;parsing the extracted at least one relationship clause;generating at least one normalized syntax tree based on the parsed at least one relationship clause; andperforming a classification and a snippet discovery on the generated at least one normalized syntax tree.2. The method of claim 1 , further comprising:clustering a plurality of common relationship clauses according to a plurality of linkages that link a plurality of data sources together; andstoring the plurality of common relationship clauses and the plurality of linkages.3. The method of claim 2 , wherein the plurality of common relationship clauses and the plurality of linkages are stored according to at least one of a class claim 2 , a cluster or a syntax tree.4. The method of claim 2 , further comprising:proposing a list comprising the clustered common relationship clauses to a user for validation; andproviding a search capability to retrieve at least one probable relationship between at least one of a plurality of data ...

Подробнее
05-10-2017 дата публикации

DATA PROCESSING

Номер: US20170286489A1
Принадлежит:

A method and associated system. Entities within a first data source are identified. For each entity identified within the first data source, attributes of the entity identified within the first data source and/or relationships between the entity identified within the first data source and other entities identified within the first data source are identified. The attributes and/or relationships identified within the first data source are associated with a first entity identified within a data structure. For each entity identified within the first data source, a frequency metric characterizing the entity identified within the first data source is generated. The frequency metric is based on a frequency at which each attribute and/or relationship identified within the first data source is associated with the entity identified within the first data source. A degree of similarity between two entities of the entities is identified, by comparing the frequency metrics of the two entities. 1. A method , said method comprising:identifying, by one or more processors of a computer system, a plurality of entities within a first data source;for each entity identified within the first data source, said one or more processors identifying within the first data source attributes of the entity identified within the first data source and/or relationships between the entity identified within the first data source and other entities identified within the first data source, and associating the attributes and/or relationships identified within the first data source with a first entity identified within a data structure;said one or more processors generating, for each entity identified within the first data source, a frequency metric characterizing the entity identified within the first data source, said frequency metric based on a frequency at which each attribute and/or relationship identified within the first data source is associated with the entity identified within the first data ...

Подробнее
15-12-2016 дата публикации

Support pad for a drill head and method for designing and manufacturing a support pad

Номер: US20160361794A1
Автор: EVANS Tony, LAWES Simon
Принадлежит:

A deep hole drill head support pad whose edge chamfers are formed in a continuous grinding operation so that there are no discontinuities in the angled side surface leading up to the outer surface thereof. A method of manufacturing the support pad includes generating a virtual guide metric including a curved travel path for a grinding surface around a support pad blank, and a plurality of control surfaces intersecting with the curved path at separate locations along its length, each control surface defining an angle of orientation of the grinding surface. A CNC grinding machine can interpret the virtual guide metric to change the angle of orientation of a grinding surface relative to a support pad blank as it moves between adjacent control surfaces in a continuous manner. 1. (canceled)2. (canceled)3. (canceled)4. (canceled)5. A method of manufacturing a support pad for the drill head of a deep hole drilling machine , the method comprising the steps of:generating a virtual guide metric, the virtual guide metric including a curved path for defining a direction of travel of a grinding surface around a leading side surface and front surface of a support pad blank and a plurality of control surfaces intersecting with the path at separate discrete locations along its length, each control surface defining an angle of orientation of the grinding surface at each discrete location on the path;instructing a computer numerical control (CNC) grinding machine to associate the virtual guide metric with a support pad blank held in a workpiece holder of the CNC grinding machine;causing relative movement between a grinding surface of the CNC grinding machine and the support pad blank held in the workpiece holder according to the virtual guide metric; andduring the relative movement, changing the angle of orientation of the grinding surface between adjacent control surfaces in a continuous manner.6. A method according to claim 5 , wherein the curved path comprises a U-shaped path for ...

Подробнее
24-03-2005 дата публикации

Nucleic acid amplification and detection

Номер: US20050064432A1
Принадлежит: Linden Technologies Inc

Disclosed is a substrate that includes a promoter primer that can be extended to form a transcribable template nucleic acid; and a capture probe. Typically, the promoter primer and the capture probe are non-complementary, and the capture probe can specifically bind to a target nucleic acid. The substrate can be used to amplify and detect one or more target nucleic acids.

Подробнее
05-08-2005 дата публикации

Secure wireless authorization system

Номер: CA2495949A1
Принадлежит: Daniel Tse, Jimmy Law, Pasan Hapuarachchi, Simon Law

The invention relates to a secure wireless authorization system by which a user can employ a wireless device to authorize a request that is initiated by a remote third party and transmitted to the user by an authorization server. The system includes the authorization server that is linked to the third party by way of a communications connection and a wireless device that is adapted to securely store an encryption scheme and create a secure authorization from the user in response to the third party request and has the ability to establish a secure wireless connection over which the secure authorization is transmitted from the user's wireless device to the authorization server. Pre-authorization, real-time authorization and post-authorization methods are disclosed by which user authorized transactions can be completed by way of the authorization system of this invention.

Подробнее
04-12-1997 дата публикации

Data decoding device

Номер: DE69126198T2
Принадлежит: Xerox Corp

Подробнее
11-01-2011 дата публикации

Rna replication and amplification

Номер: TWI335938B
Автор: W Law Simon
Принадлежит:

Подробнее
20-02-2003 дата публикации

Method, computer program and system for style sheet generation

Номер: US20030037076A1
Принадлежит: International Business Machines Corp

Device-type-specific XSLT style sheets (or equivalent) are generated from page layout files or ‘presentation skeleton’ files which define a Web page layout including abstract component references that can be mapped to complex, device-specific or repeated style sheet components and are more easily constructed than XSLT style sheets. The presentation skeleton files use and extend existing mark-up languages. One presentation skeleton file can be used to generate XSLT style sheets for many devices that use the same mark-up language. In addition, presentation skeleton files can be produced directly from storyboard files to demonstrate Web sites statically before constructing them for real. This provides a route from initial Web site design to final implementation for multiple output devices.

Подробнее
21-03-2000 дата публикации

Method of building an adaptive huffman codeword tree

Номер: US6040790A
Автор: Simon M. Law
Принадлежит: Xerox Corp

Many compression algorithms require the compressor to generate trees (tables) for encoding purposes. To generate the optimum tree for a set of Huffman symbols either takes too much time or requires too much hardware. This invention proposes to separate the symbols into groups according to the symbol's occurring frequency. With these groups of symbols available, subsequent code length assignment of these groups can be done without a complete sorting of all the symbols and their parents. During code length assignment, some relocation of individual symbols from one group to another can also be performed to optimize the Huffman table. In most of the cases this technique can achieve a compression ratio within 5% of the optimum Huffman table, while requiring less hardware or software overhead.

Подробнее
28-11-2013 дата публикации

Method for detection of a neurological disease

Номер: AU2012250496A1

The present invention provides methods for predicting whether a subject will develop a disease capable of affecting cognitive function. More specifically, the present invention relates to the predictive detection of neurological diseases in a subject. The methods and systems provided enable a quantitative assessment and theoretical predictions of neocortical amyloid loading or amyloid beta levels based on the measurement of biomarkers in biological fluids that will provide an indication of whether a subject is likely to develop a neurological disease, such as Alzheimer's disease (AD).

Подробнее
19-07-2012 дата публикации

Methods, kits and reagents for diagnosing, aiding diagnosis and/or monitoring progression of a neurological disorder

Номер: AU2010324527A1

The present inventors have identified a panel of biomarkers present in a biological sample of an individual (e.g. blood, including serum or plasma) whose concentrations or levels are altered in individuals with a neurological disorder. Accordingly, changes in the level of any one or more of these biomarkers can be used to assess cognitive function, to diagnose or aid in the diagnosis of a neurological disorder and/or to monitor a neurological disorder in a patient (e.g., tracking disease progression in a patient and/or tracking the effect of medical or surgical therapy in the patient). Changes in the level of any one or more of these biomarkers can also be used to stratify a patient (i.e., sorting an individual with a probable diagnosis of a neurological disorder or diagnosed with a neurological disorder into different classes of the disorder) and diagnosing or aiding in the diagnosis of mild cognitive impairment (MCI) as well as diagnosing or aiding in the diagnosis of cognitive impairment.

Подробнее
14-01-2010 дата публикации

Secure wireless deposit system and method

Номер: WO2010003239A1
Принадлежит: Xtreme Mobility Inc.

A system and method is provided for registering a user or a wireless device and executing a transaction of funds from a third party account to a prepaid account. The wireless device is in secure communication with an administrating server over a network. The administrating server is in communication with a third party entity, via a third party entity server, as well as with a prepaid server. In the initial registration process, the user provides the credentials for accessing the third party account using the wireless device. The credentials are stored on the wireless device, administrating server, or both. In subsequent transactions, the user enters in the amount to be deposited into the prepaid account and the credentials are automatically retrieved from storage for authentication. If authenticated, the transaction is executed by the administrating server.

Подробнее
01-03-2007 дата публикации

Peer computer system

Номер: US20070050486A1
Принадлежит: International Business Machines Corp

A first peer computer system operable in a peer to peer network, comprising: means for accessing a first piece of information, means for creating a first entity (e.g. a “token”), means for associating the first entity with the first piece of information (e.g. attaching the first piece of information to the entity) and wherein the first entity is associated with a topic of the information.

Подробнее
04-10-2018 дата публикации

Static token systems and methods for representing dynamic real credentials

Номер: WO2018183260A1
Принадлежит: VISA INTERNATIONAL SERVICE ASSOCIATION

Systems and methods are provided for pre-provisioning a first device with a token. The token on the first device may be linked to any real credential using an application on a second device. Because the token may be maintained using the second device, the first device may be a "dumb" device while the second device is a "smart" device. The real credential may be changed and updated on the second device, such that the same token is linked to different real credentials at different times. An identifier may be assigned to the first device and stored in association with its provisioned token in a token vault. The identifier may be used by a user to register and activate the token with the application on the second device.

Подробнее
04-06-1998 дата публикации

Novel low density lipoprotein binding proteins and their use in diagnosing and treating atherosclerosis

Номер: CA2272243A1

Isolated polynucleotides encoding novel polypeptides which are capable of binding to native and methylated LDL (low density lipoprotein), the isolated polypeptides, called LBPs (LDL binding proteins), and biologically active fragments and analogs thereof, are described. Also described are methods for determining if an animal is at risk for atherosclerosis, methods for evaluating an agent for use in treating atherosclerosis, methods for treating atherosclerosis, and methods for treating a cell having an abnormality in structure or metabolism of LBP. Pharmaceutical compositions and vaccine compositions are also provided.

Подробнее
13-12-2022 дата публикации

Systems and methods for device push provisioning

Номер: CA3009659C
Принадлежит: VISA INTERNATIONAL SERVICE ASSOCIATION

Techniques for provisioning access data may include receiving, by a first application installed on a communication device, user input selecting an account to provision to a second application installed on the communication device. The first application may invoke the second application and send a session identifier (ID) to the second application. The second application may send a user ID associated with the second application, a device ID, and the session ID to the first application. The first application may then generate encrypted provisioning request data and send the encrypted provisioning request data to the second application. The second application may send the encrypted provisioning request data to a remote server computer to request access data that can be used to access a resource. The second application may receive the access data provided by the remote server computer based on validation of the encrypted provisioning request data.

Подробнее
21-06-2023 дата публикации

Authenticating transactions using a mobile device identifier

Номер: EP2652688B1
Принадлежит: SALT TECHNOLOGY Inc

Подробнее
15-07-2004 дата публикации

Nucleic acid amplification

Номер: US20040137439A1
Принадлежит: Linden Technologies Inc

Disclosed is a method of producing replicates of sample nucleic acids. The method can include providing an insoluble support comprising attached oligonucleotides, annealing sample nucleic acids to the attached oligonucleotides; constructing template nucleic acids by extending the attached oligonucleotides using a polymerase; and transcribing the template nucleic acids to produce RNA replicates of the sample nucleic acids The attached oligonucleotides comprise a promoter sequence and a target annealing sequence, and (2) the proximal end of the promoter sequence is spaced from the insoluble support by a predetermined distance.

Подробнее
19-01-2023 дата публикации

User device gated secure authentication computing systems and methods

Номер: US20230020611A1
Принадлежит: Login ID Inc

A system is provided that allows users to execute a secure transaction that is authenticated by their user device. Personally identifiable information (PII), such as, but not limited to, biometric authentication data, is locally stored on the user's device so as to protect the PII. A user device private key is associated with the particular user device and the user, and the corresponding public key is registered with a User Device Authentication Alliance server (UDAAS) system. In an online transaction, a LoginID server or an Access Control server interact with the UDAAS to confirm the user is authentic and has confirmed the transaction.

Подробнее
28-02-2023 дата публикации

Secure token distribution

Номер: US11595373B2
Автор: Kim R. Wagner, Simon Law
Принадлежит: VISA INTERNATIONAL SERVICE ASSOCIATION

A method for utilizing a registration authority to facilitate a certificate signing request is disclosed. In at least one embodiment, a registration authority computer may receive a certificate signing request associated with a token requestor. The registration authority may authenticate the identity of the token requestor and forward the certificate signing request to a certificate authority computer. A token requestor ID and a signed certificate may be provided by the certificate authority computer and forwarded to the token requestor. The token requestor ID may be utilized by the token requestor to generate digital signatures for subsequent token-based transactions.

Подробнее
08-01-2004 дата публикации

Nucleic acid amplification

Номер: WO2003070877A3
Автор: Simon W Law
Принадлежит: Linden Technologies Inc, Simon W Law

Disclosed is a method of amplifying nucleic acids by appending a promoter sequence on an oligonucleotide and transcribing the nucleic acid. The oligonucleotide can attached to a solid phase, e. g. , a chip. In one example, nucleic acids are amplified by a method that includes: providing a first solid support having 5’ attached oligonucleotide; annealing a complex sample that comprises sample nucleic acids to the solid support; and producing template nucleic acids immobilized on the solid support that each include at least a segment of the sample nucleic acids, such that the immobilized templates represent the composition of the sample nucleic acids.

Подробнее
18-06-2020 дата публикации

Decentralized computing systems and methods for performing actions using stored private data

Номер: WO2020123926A1
Принадлежит: Login Id Inc.

A distributed computing system is used to form a login network to perform an action for a user, using private data. The login network executes the verification using blockchain computing architecture, which is decentralized. The private data is stored on the blockchain in an obfuscated form. In order to compute the private data from the obfuscated form, multiple distributed private key shares are required to generate multiple decryption shares, which are combined to compute a One Time Pad (OTP). In turn, the OTP is used to obtain the private data from the obfuscated form.

Подробнее
28-03-2024 дата публикации

Systems and methods for facilitating a transaction using a virtual card on a mobile device

Номер: US20240104548A1
Принадлежит: StickyIo Inc

Systems and methods are provided for facilitating contactless payment using cloud-based wallet containing payment credentials (e.g. Visa, Mastercard, American Express) using a near field communication (NFC)-capable device and payment gateway servers. A user can use their existing payment card, herein referred to as a funding card, for contactless payments. A second payment card, herein referred to as a virtual card, is generated. The virtual card is associated with the funding card on a payment gateway server. The virtual card is used on a NFC-enabled mobile device. When a payment is initiated, the virtual card data is sent through the NFC system from a point of sale terminal. This information is sent to the payment gateway server, which retrieves the funding card to make the payment. The funding card, not the virtual card, is used to transfer the money to make payment.

Подробнее
02-11-2023 дата публикации

Secure remote token release with online authentication

Номер: US20230353360A1
Автор: Simon Law
Принадлежит: VISA INTERNATIONAL SERVICE ASSOCIATION

A system and techniques are described herein for providing authentication. The technique includes registering user authentication data such as biometrics data with a communication device. The authentication data is linked to an account or service provider, and is used to verify the identity of the user when accessing the account. The communication device may obtain a public/private key pair, for which the public key may be stored on a secure remote server. When the user attempts to access the account or service provider, the user may provide the authentication data to authenticate the user to the communication device. Thereafter, the communication device may sign an authentication indicator using the private key and send the authentication indicator to the secure remote server. Upon verification of the signature using the public key, the secure remote server may grant access to the user, for example, by releasing a token.

Подробнее
23-10-2023 дата публикации

Autenticación de transacciones usando un identificador de dispositivo móvil

Номер: ES2951585T3
Принадлежит: Salt Tech Inc

Se proporcionan sistemas y métodos para autenticar una transacción a través de un dispositivo móvil. Durante el registro, el dispositivo móvil recibe una ID de pago de una cuenta de pago y una ID suplementaria para verificar la ID de pago, y la transmite a una pasarela de pago. La pasarela de pago envía la identificación de pago y la identificación complementaria a un módulo de verificación para verificar las identificaciones. Después de que la pasarela de pago recibe un resultado de verificación, se genera una ID de dispositivo móvil y se almacena en el dispositivo móvil y se almacena en la pasarela de pago en asociación con la ID de pago. En una transacción, un usuario solo necesita ingresar la ID suplementaria en el dispositivo móvil, ya que la ID suplementaria y la ID del dispositivo móvil se pueden enviar a la pasarela de pago para recuperar la ID de pago asociada. Esta información es suficiente para autenticar y ejecutar la transacción. (Traducción automática con Google Translate, sin valor legal)

Подробнее
02-01-2024 дата публикации

Secure token distribution

Номер: US11863545B2
Автор: Kim R. Wagner, Simon Law
Принадлежит: VISA INTERNATIONAL SERVICE ASSOCIATION

A method for utilizing a registration authority computer to facilitate a certificate signing request is provided. A registration authority computer may receive a certificate signing request associated with a token requestor. The registration authority computer may authenticate the identity of the token requestor and forward the certificate signing request to a certificate authority computer. A token requestor ID and a signed certificate may be provided by the certificate authority computer and forwarded to the token requestor. The token requestor ID may be utilized by the token requestor to generate digital signatures for subsequent token-based transactions.

Подробнее
01-05-2009 дата публикации

Central processing unit having a micro-code engine

Номер: TWI309378B
Принадлежит: Altek Corp

Подробнее
05-12-2023 дата публикации

Systems and methods for facilitating a transaction using a virtual card on a mobile device

Номер: US11836706B2
Принадлежит: StickyIo Inc

Systems and methods are provided for facilitating contactless payment using cloud-based wallet containing payment credentials (e.g. Visa, Mastercard, American Express) using a near field communication (NFC)-capable device and payment gateway servers. A user can use their existing payment card, herein referred to as a funding card, for contactless payments. A second payment card, herein referred to as a virtual card, is generated. The virtual card is associated with the funding card on a payment gateway server. The virtual card is used on a NFC-enabled mobile device. When a payment is initiated, the virtual card data is sent through the NFC system from a point of sale terminal. This information is sent to the payment gateway server, which retrieves the funding card to make the payment. The funding card, not the virtual card, is used to transfer the money to make payment.

Подробнее
24-08-2023 дата публикации

Secure multi-party protocol

Номер: US20230269241A1
Принадлежит: VISA INTERNATIONAL SERVICE ASSOCIATION

A requestor and a responder may conduct secure communication by making API calls based on a secure multi-party protocol. The requestor may send a request data packet sent in a API request to the responder, where the request data packet can include at least a control block that is asymmetrically encrypted and a data block that is symmetrically encrypted. The responder may return a response data packet to the requestor, where the response data packet can include at least a control block and a data block that are both symmetrically encrypted. The requestor and the responder may derive the keys for decrypting the encrypted portions of the request and response data packets based on some information only known to the requestor and the responder. The secure multi-party protocol forgoes the need to store and manage keys in a hardware security module.

Подробнее
01-08-1995 дата публикации

Toy with a movable figure

Номер: AU7117994A
Принадлежит: Thinkway Trading Corp

Подробнее
21-06-2023 дата публикации

Authenticating transactions using a mobile device identifier

Номер: EP2652688C0
Принадлежит: Salt Tech Inc, SALT TECHNOLOGY Inc

Подробнее
13-07-1995 дата публикации

Toy with a movable figure

Номер: WO1995018658A1
Принадлежит: Thinkway Trading Corporation

A toy with movable figures in a toy scene. The toy includes a housing, a scene board with a hole in it mounted in the housing and a movable figure loosely suspended in the hole. The upper body of the figure is larger than the hole and an end of the figure projects downwardly through the hole below the scene board. A spring driven motor is mounted in the housing below the scene board and has a shaft projecting upwardly. The housing contains a covering or a case and the winding of the spring is activated by the opening and closing of the case. An eccentric cam is connected to the shaft of the motor and a cam follower plate moves back and forth below the scene board in response to rotation of the cam. A projection, which may be a ramp, on the upper surface of the cam follower plate contacts the lower end of the figure, causing it to move up and down in the hole. There may be several figures with respective holes and respective ramps on the cam follower. The ramps can be aligned in opposite directions so that, on movement of the cam follower in a first direction, only some of the figures rise in their holes while others fall. Additional figures can be connected to the cam follower such that they move back and forth on the scene board in linear motion. The cam follower can project up through the scene board into the body of an animal figure, so that the rotational motion of the cam can be translated to the head or tail of the animal for further and more realistic movement of a figure in the scene.

Подробнее
13-01-2021 дата публикации

Secure remote token release with online authentication

Номер: EP3762844A1
Автор: Simon Law
Принадлежит: VISA INTERNATIONAL SERVICE ASSOCIATION

A system and techniques are described herein for providing authentication. The technique includes registering user authentication data such as biometrics data with a communication device. The authentication data is linked to an account or service provider, and is used to verify the identity of the user when accessing the account. The communication device may obtain a public/private key pair, for which the pubic key may be stored on a secure remote server. When the user attempts to access the account or service provider, the user may provide the authentication data to authenticate the user to the communication device. Thereafter, the communication device may sign an authentication indicator using the private key and send the authentication indicator to the secure remote server. Upon verification of the signature using the public key, the secure remote server may grant access to the user, for example, by releasing a token.

Подробнее
01-01-2012 дата публикации

Forming through-silicon-vias for multi-wafer integrated circuits

Номер: TW201201323A
Принадлежит: Hk Applied Science & Tech Res

Подробнее
14-06-2022 дата публикации

Método de fabricação de uma guia de apoio

Номер: BR102013021444B1
Автор: EVANS Tony, LAWES Simon
Принадлежит: botek Präzisionsbohrtechnik GmbH

guia de apoio para uma cabeça de broca e método para modelar e fabricar uma guia de apoio a presente invenção está correlacionada a uma guia de apoio (50) de cabeça de broca de furo profundo, cujos chanfros de aresta (36, 38, 40) são formados em uma operação contínua de polimento, de modo que não existam descontinuidades na superfície do lado angulado que se estende até na superfície externa (34) da guia de apoio (50). um método de fabricação da guia de apoio (50) inclui a geração de um. guia. métrico virtual, compreendendo um percurso de trajeto curvo para uma superfície de polimento, em torno de uma peça de partida de uma guia de apoio, e uma pluralidade de superfícies de controle que se interceptam com o percurso curvo em locais separados ao longo de sua extensão, cada superfície de controle definindo um ângulo de orientação da superfície de polimento. uma máquina de polimento de controle numérico por computador (cnc) pode interpretar o guia métrico virtual, para mudar o ângulo de orientação de uma superfície de polimento em relação a uma peça de partida de uma guia de apoio, na medida em que a mesma se movimenta entre superfícies de controle adjacentes de uma maneira contínua.

Подробнее
05-04-2016 дата публикации

guia de apoio para uma cabeça de broca e método para modelar e fabricar uma guia de apoio

Номер: BR102013021444A2
Автор: EVANS Tony, LAWES Simon
Принадлежит: Sandvik Intellectual Property

“guia de apoio para uma cabeça de broca.e método pra modelar e fabricar uma guia de apoio” a presente invenção está correlacionada a uma guia (ka apoio (50) (ka cabeça (ka broca de iiuxa profundo, cujos chanfros de aresta (36, 38, 40) são formados em uma operação contínua de polimento, de modo que não existam descontinuidades na superfície do lado angulado que se estende até ea superficie externa (34) ck1 guia (ka apoio (50). um método de fabricação da guia de apoio (50) inclui a geração de um. guia. métrico virtual, compreendendo um percurso de trajeto curvo para uma superficie de polimento, em torno de uma peça de partida de uma guia de apoio, e uma pluralidade (ka superfícies cha controle cpna se interceptam cxxn o percurso curvo e?n locais separados ao longo (ka sua extensão, cada superfícüe de controle definindo um ângulo cms orientação ck; superficie <ka polimento. ihma máquina ck; polimento (ke controle :numérico zum: computador' (cnc) jpode interpretar o guia métrico virtual, para mudar o ângulo de orientação de uma superficie de polimento em relação a uma peça de partida de uma guia de apoio, na medida em que a mesma se movimenta entre superfícies de controle adjacentes de uma maneira contínua.

Подробнее
01-08-2015 дата публикации

影像擷取裝置及其影像形變校正方法

Номер: TW201530243A
Принадлежит: Altek Semiconductor Corp

一種影像擷取裝置的影像形變校正方法,適用於具有第一鏡頭、第二鏡頭、對焦致動器以及預存第一對焦步數與對焦距離的對應關係的影像擷取裝置,包括下列步驟。利用第一鏡頭以及第二鏡頭擷取多組影像,其中各所述組影像分別包括第一影像以及第二影像,所述組影像包括參考組影像。偵測參考組影像是否發生影像形變。當偵測到參考組影像發生影像形變時,根據各所述組影像所對應的對焦步數以及對焦距離,校正第一對焦步數與對焦距離的對應關係,其中各所述組影像所對應的對焦步數為對焦致動器移動第一鏡頭與第二鏡頭至對焦位置而產生各所述組影像所需的步數。

Подробнее
24-11-2015 дата публикации

amortecedor de vibração para dispositivo de usinagem de furo

Номер: BR102013032328A2
Принадлежит: Sandvik Intellectual Property

amortecedor de vibração para dispositivo de usinagem de furo. a presente invençao está correlacionada a um amortecedor de vibração para um tubo de perfuração de um dispositivo de usinagem de furo. o amortecedor compreende um mecanismo de ajuste bidirecional de circuito fechado, que opera a partir de um único lado do amortecedor. o mecanismo de circuito fechado garante que a posição da luva de aperto tenha uma relação de um para um com o mecanismo de ajuste, o que possibilita o ajuste controlado da força de aperto a ser executada. o posicionamento do mecanismo de ajuste em um lado da luva de aperto facilita uma nova disposição da ferramenta, por exemplo, a substituição da luva de aperto se um tubo de perfuração de maior diâmetro for usado.

Подробнее
27-01-2022 дата публикации

User device gated secure authentication computing systems and methods

Номер: US20220029823A1
Принадлежит: Login ID Inc

A system is provided that allows users to execute a secure transaction that is authenticated by their user device. Personally identifiable information (PII), such as, but not limited to, biometric authentication data, is locally stored on the user's device so as to protect the PII. A user device private key is associated with the particular user device and the user, and the corresponding public key is registered with a User Device Authentication Alliance server (UDAAS) system. In an online transaction, a LoginID server or an Access Control server interact with the UDAAS to confirm the user is authentic and has confirmed the transaction.

Подробнее
03-02-2022 дата публикации

User device gated secure authentication computing systems and methods

Номер: WO2022026377A1
Принадлежит: Login Id Inc.

A system is provided that allows users to execute a secure transaction that is authenticated by their user device. Personally identifiable information (PII), such as, but not limited to, biometric authentication data, is locally stored on the user's device so as to protect the PII. A user device private key is associated with the particular user device and the user, and the corresponding public key is registered with a User Device Authentication Alliance server (UDAAS) system. In an online transaction, a LoginID server or an Access Control server interact with the UDAAS to confirm the user is authentic and has confirmed the transaction.

Подробнее
07-06-2023 дата публикации

User device gated secure authentication computing systems and methods

Номер: EP4189628A1
Принадлежит: Login ID Inc

A system is provided that allows users to execute a secure transaction that is authenticated by their user device. Personally identifiable information (PII), such as, but not limited to, biometric authentication data, is locally stored on the user's device so as to protect the PII. A user device private key is associated with the particular user device and the user, and the corresponding public key is registered with a User Device Authentication Alliance server (UDAAS) system. In an online transaction, a LoginID server or an Access Control server interact with the UDAAS to confirm the user is authentic and has confirmed the transaction.

Подробнее
08-09-2005 дата публикации

Shift register engine

Номер: US20050198090A1
Принадлежит: Altek Corp

A micro-code engine with a linear shift register comprises at least one shift register and an execution unit. The shift registers contain a plurality of data cells, each of which store at least one data value. The shift register is operable to shift the data values from a first data cell to a second data cell as new data is input into the shift register. The execution unit is electrically coupled to the linear shift register such that when the execution unit performs an algorithm, the execution unit uses the data value stored in the second data cell as an operand. After the execution unit substantially completes the algorithm, the linear shift register shifts a new data value into the second data cell. In response to the linear shift register shifting new data into the second data cell, the execution unit re-performs the algorithm.

Подробнее
21-10-2015 дата публикации

電子器件封裝及製造電子器件封裝之方法

Номер: TWI505427B
Принадлежит: Hk Applied Science & Tech Res

Подробнее
30-06-2014 дата публикации

孔加工装置の振動ダンパ

Номер: JP2014119116A
Принадлежит: Sandvik Intellectual Property AB

【課題】本発明は孔加工装置のドリルチューブのための振動ダンパに関する。 【解決手段】ダンパは、ダンパの一方の側から操作される閉ループ両方向調節機構(両方向駆動機構)を備える。この閉ループ機構は、クランピング・スリーブの位置が調節機構と一対一の関係になり、それによりクランピング力のコントロールされた調節を行うことが可能になるように保証している。クランピング・スリーブの一方の側に調節機構を配置することにより、工具の交換、例えば大きな直径のドリルチューブを使用しようとする場合、クランピング・スリーブを交換すること、が容易になる。 【選択図】図1

Подробнее
19-12-2002 дата публикации

Novel low density lipoprotein binding proteins and their use in diagnosing and treating atherosclerosis

Номер: US20020194633A1
Принадлежит: Boston Heart Foundation Inc

Isolated polynucleotides encoding novel polypeptides which are capable of binding to native and methylated LDL (low density lipoprotein), the isolated polypeptides, called LBPs (LDL binding proteins), and biologically active fragments and analogs thereof, are described. Also described are methods for determining if an animal is at risk for atherosclerosis, methods for evaluating an agent for use in treating atherosclerosis, methods for treating atherosclerosis, and methods for treating a cell having an abnormality in structure or metabolism of LBP. Pharmaceutical compositions and vaccine compositions are also provided.

Подробнее
26-02-2004 дата публикации

Novel low density lipoprotein binding proteins and their use in diagnosing and treating atherosclerosis

Номер: US20040040049A1
Принадлежит: Boston Heart Foundation Inc

Isolated polynucleotides encoding novel polypeptides which are capable of binding to native and methylated LDL (low density lipoprotein), the isolated polypeptides, called LBPs (LDL binding proteins), and biologically active fragments and analogs thereof, are described. Also described are methods for determining if an animal is at risk for atherosclerosis, methods for evaluating an agent for use in treating atherosclerosis, methods for treating atherosclerosis, and methods for treating a cell having an abnormality in structure or metabolism of LBP. Pharmaceutical compositions and vaccine compositions are also provided.

Подробнее
11-12-2002 дата публикации

Low density liprotein binding proteins and their use in diagnosing and treating atherosclerosis

Номер: EP1263954A2
Принадлежит: Boston Heart Foundation Inc

Isolated polynucleotides encoding novel polypeptides which are capable of binding to native and methylated LDL (low density lipoprotein), the isolated polypeptides, called LBPs (LDL binding proteins), and biologically active fragments and analogs thereof, are described. Also described are methods for determining if an animal is at risk for atherosclerosis, methods for evaluating an agent for use in treating atherosclerosis, methods for treating atherosclerosis, and methods for treating a cell having an abnormality in structure or metabolism of LBP. Pharmaceutical compositions and vaccine compositions are also provided.

Подробнее
14-02-2002 дата публикации

Low density liprotein binding proteins and their use in diagnosing and treating atherosclerosis

Номер: WO2001064874A3

Isolated polynucleotides encoding polypeptides which are capable of binding to native and methylated LDL (low density lipoprotein), the isolated polypeptides, called LBPs (LDL binding proteins), and biologically active fragments and analogs thereof, are described. Also described are methods for determining if an animal is at risk for atherosclerosis, methods for evaluating an agent for use in treating atherosclerosis, methods for treating atherosclerosis, and methods for treating a cell having an abnormality in structure or metabolism of LBP. Pharmaceutical compositions and vaccine compositions are also provided.

Подробнее