Patent application number | Description | Published |
20080269110 | NON-BASIC MELANIN CONCENTRATING HORMONE RECEPTOR-1 ANTAGONISTS - The present application provides compounds, including all stereoisomers, solvates, prodrugs and pharmaceutically acceptable forms thereof according to Formula I. Additionally, the present application provides pharmaceutical compositions containing at least one compound according to Formula I and optionally at least one additional therapeutic agent. Finally, the present application provides methods for treating a patient suffering from an MCHR-1 modulated disease or disorder such as, for example, obesity, diabetes, depression or anxiety by administration of a therapeutically effective dose of a compound according to Formula I | 10-30-2008 |
20110034375 | NON-BASIC MELANIN CONCENTRATING HORMONE RECEPTOR-1 ANTAGONISTS - The present application provides compounds, including all stereoisomers, solvates, prodrugs and pharmaceutically acceptable forms thereof according to Formula I. Additionally, the present application provides pharmaceutical compositions containing at least one compound according to Formula I and optionally at least one additional therapeutic agent. Finally, the present application provides methods for treating a patient suffering from an MCHR-1 modulated disease or disorder such as, for example, obesity, diabetes, depression or anxiety by administration of a therapeutically effective dose of a compound according to Formula I. | 02-10-2011 |
20110319449 | PYRIDONE ANALOGS USEFUL AS MELANIN CONCENTRATING HORMONE RECEPTOR-1 ANTAGONISTS - MCHR1 antagonists are provided having the following Formula I: | 12-29-2011 |
20140142139 | DIHYDROPYRAZOLE GPR40 MODULATORS - The present invention provides compounds of Formula (I): | 05-22-2014 |
Patent application number | Description | Published |
20080249884 | POS-centric digital imaging system - A POS-centric digital imaging system for installation at a retail point of sale (POS) station having a countertop surface. The POS-centric digital imaging system includes a system housing having at least one imaging window, and providing a cashier side and a customer side for the POS-centric digital imaging system. An omni-directional digital image capturing and processing subsystem is disposed in the system housing, for generating a 3D imaging volume adjacent the imaging window. A cashier/customer terminal is integrated within the system housing, for simultaneously supporting (i) cashier product scanning/imaging and checkout operations on said cashier side, and (ii) customer payment and other services on said customer side. | 10-09-2008 |
20080283611 | Digital image capture and processing systems for supporting 3D imaging volumes in retail point-of-sale environments - Digital image capture and processing systems and methods for generating and projecting coplanar illumination and imaging planes and/or coextensive area-type illumination and imaging zones, through one or more imaging windows, and into a 3D imaging volume in a retail POS environments, while employing automatic object motion and/or velocity detection, real-time image analysis and other techniques to capture and processing high-quality digital images of objects passing through the 3D imaging volume, and intelligently controlling and/or managing the use of visible and invisible forms of illumination, during object illumination and imaging operations, that might otherwise annoy or disturb human operators and/or customers working and/or shopping in such retail environments. | 11-20-2008 |
20090065584 | Pos-based digital image capturing and processing system employing automatic object motion detection and spectral-mixing based illumination techniques - A POS-based digital image capturing and processing system for illuminating objects using automatic object detection and spectral-mixing illumination technique. The system comprises an area-type illumination and imaging station for projecting a coextensive area-type illumination and imaging field (i.e. zone) into a 3D imaging volume during object illumination and imaging operations. The area-type illumination and imaging station includes an illumination subsystem for producing a first field of visible illumination from an array of visible LEDs, and producing a second field of invisible illumination from an array of infrared (IR) LEDs. wherein the first and second fields of illumination spatially overlap and intermix with each other and are substantially coextensive with the FOV of the image sensing array. An automatic object motion detection subsystem automatically detects the motion of an object moving through the 3D imaging volume, while an illumination control subsystem controls the relative power ratio (VIS/IR) of visible illumination and invisible illumination during system operation so as to minimize the amount of visible illumination energy required to capture sufficiently high-contrast images of said objects and successfully process the same. | 03-12-2009 |
20090101718 | Digital image capturing and processing system employing automatic object detection and spectral-mixing based illumination techniques - A digital image capturing and processing system for illuminating objects using automatic object detection and spectral-mixing illumination technique. The system comprises an area-type illumination and imaging module for projecting a coextensive area-type illumination and imaging field (i.e. zone) into a 3D imaging volume during object illumination and imaging operations. The area-type illumination and imaging module includes a spectral-mixing based illumination subsystem for producing a first field of visible illumination from an array of visible LEDs, and producing a second field of invisible illumination from an array of infrared (IR) LEDs, wherein the first and second fields of illumination spatially overlap and intermix with each other and produce a composite illumination field that is at least substantially coextensive with the FOV of the image sensing array. An automatic object detection subsystem automatically detects an object moving through the 3D imaging volume, while an illumination control subsystem controls the relative power ratio (VIS/IR) of visible illumination and invisible illumination during system operations so as to achieve sufficient image contrast in captured digital images to ensure satisfactory image processing. | 04-23-2009 |
20090101719 | Digital image capturing and processing system for automatically recognizing graphical intelligence graphically represented in digital images of objects - A digital image capturing and processing system including a system housing having an imaging window; illumination and imaging stations for generating and projecting illumination and imaging planes or zones through the imaging window, and into a 3D imaging volume definable relative to the imaging window, for digital imaging an object passing through the 3D imaging volume, and generating digital linear images of the object as the object intersects the illumination and imaging planes or zones during system operation. A digital image processor processes the digital images and automatically recognizes graphical intelligence (e.g. bar code symbols, alphanumeric characters etc) graphically represented in the digital images. | 04-23-2009 |
20120193416 | METHOD AND APPARATUS FOR READING OPTICAL INDICIA USING A PLURALITY OF DATA SOURCES - A system for decoding an encoded symbol character associated with a product is provided. The system includes a bioptic scanning apparatus comprising a first scan source disposed within a housing, and a second scan source disposed within the housing. The second scan source comprises an operating technology distinct from an operating technology of the first scan source. The first scan source is adapted to output a first scan data set, and the second scan source is adapted to output a second scan data set. | 08-02-2012 |
20130062409 | SCANNER WITH WAKE-UP MODE - An indicia reader system includes an indicia reader provided at a point of transaction; a controller for controlling power to the indicia reader; a detector for detecting a customer, item or shopping cart at the point of transaction and providing an indication signal to the controller of the presence of customer, item or shopping cart at the point of transaction; wherein the controller interrupts power to the indicia reader during a power save mode and resumes power to the indicia reader upon receiving the indication signal. | 03-14-2013 |
20130062413 | INDIVIDUALIZED SCANNER - A method of operating a reader system includes: providing a reader for reading information data carriers; an operator loading a configuration overlay onto the configuration settings of the reader upon successful logging, wherein the configuration overlay is specific to the operator; and reading information data carriers utilizing the configuration overlay. | 03-14-2013 |
20130233915 | ENCODED INFORMATION READING TERMINAL IN COMMUNICATION WITH PERIPHERAL POINT-OF-SALE DEVICES - An encoded information reading (EIR) terminal can comprise a processor, a memory, and at least one EIR device provided by a bar code reading device, an RFID reading device, an NFC reading device, or a magnetic card reading device. The EIR device can be configured to output raw message data containing an encoded message and/or output decoded message data corresponding to an encoded message. The EIR terminal can further comprise at least one communication interface, a display provided by a built-in display and/or an external display, and a user input device provided by a built-in keyboard and/or an external keyboard. The EIR terminal can be configured to transmit the raw message data and/or the decoded message data to an external computer. | 09-12-2013 |
20140070005 | SCANNER WITH WAKE-UP MODE - An indicia reader system includes an indicia reader provided at a point of transaction; a controller for controlling power to the indicia reader; a detector for detecting a customer, item or shopping cart at the point of transaction and providing an indication signal to the controller of the presence of customer, item or shopping cart at the point of transaction; wherein the controller interrupts power to the indicia reader during a power save mode and resumes power to the indicia reader upon receiving the indication signal. | 03-13-2014 |
Patent application number | Description | Published |
20090262923 | METHOD FOR DISPATCHING SERVICE REQUESTS - Techniques for dispatching one or more services requests to one or more agents are provided. The techniques include obtaining one or more attributes of each service request, obtaining one or more attributes of each agent, obtaining feedback from each of one or more agent queues, and using the one or more attributes of each service request, the one or more attributes of each agent and the feedback from each of the one or more agent queues to determine one or more suitable agents to receive a dispatch for each of the one or more service requests. Techniques are also provided for generating a database of one or more attributes of one or more service requests and one or more attributes of one or more agents. | 10-22-2009 |
20100010790 | SYSTEM & METHOD FOR DYNAMIC STRUCTURING OF PROCESS ANNOTATIONS - A plurality of base templates are generated. Each of the base templates models a corresponding process. A plurality of instances of each of the base templates are instantiated. Each of the plurality of instances corresponds to an application of the corresponding process to a particular environment. Each of the instances of each of the base templates is annotated, based, in each case, upon observation of functioning of the instance in the particular environment. | 01-14-2010 |
20110247059 | Methods and Apparatus for Role-Based Shared Access Control to a Protected System Using Reusable User Identifiers - Methods and apparatus are provided for role-based shared access control to a protected system using reusable user identifiers while maintaining individual accountability. Role-based access control is provided for a protected system by receiving a request from an end user to access a given protected system; determining a role of the end user for the access to the given protected system; receiving a privileged reusable user identifier and password for the given protected system and role; and providing the privileged reusable user identifier and password to the given protected system on behalf of the end user. Role-based access control is also provided for a protected system by receiving a request to verify an end user requesting access to a given protected system; determining a role of the end user for the access to the given protected system; and providing a privileged reusable user identifier and password for the given protected system and role. A status of the privileged reusable user identifier and password can optionally be maintained. One or more events associated with the privileged reusable user identifier and password can be logged and investigated. | 10-06-2011 |
20130111583 | SYSTEM AND METHOD FOR HYBRID ROLE MINING | 05-02-2013 |
20130198827 | SERVICE COMPLIANCE ENFORCEMENT USING USER ACTIVITY MONITORING AND WORK REQUEST VERIFICATION - Auditing system logs of a remote client device is provided. Login session information entered at a workstation device accessing the remote client device to perform an activity associated with a work request is received. An access token is generated based on the login session information and information associated with the work request on the remote client device. The access token is compared with an audit log report of the remote client device that includes the activity associated with the work request performed by the workstation device on the remote client device. It is determined whether information in the access token matches information in the audit log report of the remote client device. In response to determining that the information in the access token does not match the information in the audit log report of the remote client device, an action alert is sent. | 08-01-2013 |
20130275579 | SERVICE COMPLIANCE ENFORCEMENT USING USER ACTIVITY MONITORING AND WORK REQUEST VERIFICATION - A computer implemented method, data processing system, and computer program product control point in time access to a remote client device and auditing system logs of the remote client device by an auditing server device to determine whether monitored user activity on the remote client device associated with a work request was in compliance with one or more regulations. | 10-17-2013 |
20130291127 | ENTERPRISE-LEVEL DATA PROTECTION WITH VARIABLE DATA GRANULARITY AND DATA DISCLOSURE CONTROL WITH HIERARCHICAL SUMMARIZATION, TOPICAL STRUCTURING, AND TRAVERSAL AUDIT - Access is obtained to a plurality of intermediately transformed electronic documents (with a plurality of sections and subsections) which have been transformed, by topical analysis and text summarization techniques, from a plurality of original electronic documents comprising at least some unstructured electronic documents. Audit and retrieval agent code is appended to the sections and subsections to create a plurality of finally transformed electronic documents. Users are allowed to access the finally transformed electronic documents. The users are provided with accountability reminders contemporaneous with the access. The access of the users to the sections and subsections of the finally transformed electronic documents is logged. An audit report is provided based on the logging. Also provided is a cloud service for enterprise-level sensitive data protection with variable data granularity, using one or more one guest virtual machine images. | 10-31-2013 |
20130311220 | EVALUATING DEPLOYMENT READINESS IN DELIVERY CENTERS THROUGH COLLABORATIVE REQUIREMENTS GATHERING - A method and data processing system for determining deployment readiness of a service is disclosed. A computer identifies tasks that must be performed to address requirements associated with categories of complexity for deploying the service in one or more locations. The computer assigns the identified tasks to experts based on skill and availability of the experts. The computer verifies whether the assigned tasks have been completed. The computer then provides an indication that the service is ready to be deployed in one or more locations responsive to the verification that the tasks have been completed. | 11-21-2013 |
20130311221 | EVALUATING DEPLOYMENT READINESS IN DELIVERY CENTERS THROUGH COLLABORATIVE REQUIREMENTS GATHERING - A data processing system for determining deployment readiness of a service is disclosed. A computer identifies tasks that must be performed to address requirements associated with categories of complexity for deploying the service in one or more locations. The computer assigns the identified tasks to experts based on skill and availability of the experts. The computer verifies whether the assigned tasks have been completed. The computer then provides an indication that the service is ready to be deployed in one or more locations responsive to the verification that the tasks have been completed. | 11-21-2013 |
20130311653 | SERVICE COMPLIANCE ENFORCEMENT USING USER ACTIVITY MONITORING AND WORK REQUEST VERIFICATION - A computer implemented method, data processing system, and computer program product control point in time access to a remote client device and auditing system logs of the remote client device by an auditing server device to determine whether monitored user activity on the remote client device associated with a work request was in compliance with one or more regulations. | 11-21-2013 |
20140165154 | USING DATA ANALYTICS AND CROWDSOURCING TO DETERMINE ROLES FOR A COMPUTER SYSTEM - In an embodiment of the invention, wherein users must be able to access a computer system to perform respective functions, initial data is acquired from data sources, some of the initial data pertaining to previously granted system access rights. The initial data is used to create a crowdsourcing task, which is executed to acquire crowdsourced data from SMEs in an SME population, wherein the crowdsourced data comprises additional data pertaining to previously granted system access. The crowdsourced data is used to create a set of role definitions, wherein the role definitions determine which of the users are assigned to be members of a particular role associated with the system, and further determine the access rights that are granted to each member of the particular role. | 06-12-2014 |
20140165188 | USING DATA ANALYTICS AND CROWDSOURCING TO DETERMINE ROLES FOR A COMPUTER SYSTEM - In an embodiment of the invention, wherein users must be able to access a computer system to perform respective functions, initial data is acquired from data sources, some of the initial data pertaining to previously granted system access rights. The initial data is used to create a crowdsourcing task, which is executed to acquire crowdsourced data from SMEs in an SME population, wherein the crowdsourced data comprises additional data pertaining to previously granted system access. The crowdsourced data is used to create a set of role definitions, wherein the role definitions determine which of the users are assigned to be members of a particular role associated with the system, and further determine the access rights that are granted to each member of the particular role. | 06-12-2014 |
20150074784 | USING SERVICE REQUEST TICKET FOR MULTI-FACTOR AUTHENTICATION - In an environment wherein a front end system receives a service request, and a back end system responds to the request, a user of a target endpoint must be authenticated. A ticket ID is assigned to the service request, and responsive to an initiating action of the user, a virtual token is generated that has a specified relationship with the ticket ID. The virtual token is delivered to the user, and the user is prompted to present the token to a validating component associated with one of the front end or back end systems, wherein the validating component is configured to verify the token validity. If the token is found to be valid, the user is authenticated to access the specified target endpoint. | 03-12-2015 |
20150074785 | USING SERVICE REQUEST TICKET FOR MULTI-FACTOR AUTHENTICATION - In an environment wherein a front end system receives a service request, and a back end system responds to the request, a user of a target endpoint must be authenticated. A ticket ID is assigned to the service request, and responsive to an initiating action of the user, a virtual token is generated that has a specified relationship with the ticket ID. The virtual token is delivered to the user, and the user is prompted to present the token to a validating component associated with one of the front end or back end systems, wherein the validating component is configured to verify the token validity. If the token is found to be valid, the user is authenticated to access the specified target endpoint. | 03-12-2015 |
20150371547 | PROVIDING TARGETED AND PERSONALIZED EDUCATION TO PREVENT HUMAN ERRORS - An embodiment comprises a method associated with a computer system activity comprising one or more tasks, carried out by one or more users. The method comprises the step of furnishing a knowledge database with one or more knowledge teachings, wherein each knowledge teaching corresponds to one of the tasks. The method further comprises implementing a procedure at selected intervals, to determine whether any user in a group of users lacks specified knowledge related to one of the tasks. Responsive to determining that a particular user lacks specified knowledge related to a particular task, a knowledge teaching is presented to the particular user which corresponds to the particular task, and includes at least some of the specified knowledge which the particular user has been determined to lack. Feedback sent from the particular user, in response to receiving the presented knowledge teaching, is then selectively evaluated. | 12-24-2015 |