Patent application number | Description | Published |
20140351446 | ELECTRONIC DEVICE USING LOGICAL CHANNELS FOR COMMUNICATION - An apparatus and method for providing one or more protocols for one or more electronic devices are provided. The method includes establishing, by an electronic device configured to provide a framework interface by executing instructions stored in a memory, one or more physical channels with an external electronic device, using one or more communication modules, executing, by the electronic device, two or more application programs to interface with the framework interface, and communicating, via the framework interface, data from the two or more application programs through the one or more physical channels to the external electronic device, using at least one logical channel or session for a respective one of the two or more application programs. | 11-27-2014 |
20140351832 | ELECTRONIC DEVICE USING FRAMEWORK INTERFACE FOR COMMUNICATION - An apparatus and method for providing one or more protocols for one or more electronic devices are provided. The method includes establishing, by an electronic device configured to provide a framework interface by executing instructions stored in a memory, one or more physical channels with an external electronic device, using one or more communication modules, executing, by the electronic device, two or more application programs to interface with the framework interface, and communicating, via the framework interface, data from the two or more application programs through the one or more physical channels to the external electronic device, using at least one logical channel or session for a respective one of the two or more application programs. | 11-27-2014 |
Patent application number | Description | Published |
20090254754 | LIGHTWEIGHT GEOGRAPHIC TRAJECTORY AUTHENTICATION VIA ONE-TIME SIGNATURES - A system and method for a vehicle-to-vehicle communications system that provide active safety applications employing lightweight geographic authentication using one-time signatures. The system and method require each vehicle to construct a discretized representation of its trajectory, which captures its kinematical history to a tunable degree of accuracy and to a tunable extent in the past. This trajectory information is then signed using a one-time signature. Thus, with every periodic message, the sending vehicle transmits the usual application payload, a signed version of the trajectory as described, and the digital signature over all of the fields. | 10-08-2009 |
20110066859 | FLEXIBLE BROADCAST AUTHENTICATION IN RESOURCE-CONSTRAINED SYSTEMS: PROVIDING A TRADEOFF BETWEEN COMMUNICATION AND COMPUTATIONAL OVERHEADS - A method for authenticating a message that is transmitted wirelessly. The method includes providing a set of private key values that define a private key and performing a key pair generation process that provides a key pair including the private key and a public key, where performing the key pair generation process includes applying one or more hash functions to the private key values, where a succeeding hash function provides a hash of a previous hash function. The scheme uses a signature generation process that generates a message digest by applying a hash function on the message to be signed and then separates the message digest into two parts including signing bits and selection bits and using the private key to sign the message. A receiver verifies the authenticity of the received message using the public key and a signature verification algorithm. | 03-17-2011 |
20110238997 | EFFICIENT TECHNIQUE TO ACHIEVE NON-REPUDIATION AND RESILIENCE TO DoS ATTACKS IN WIRELESS NETWORKS - A computationally efficient message verification strategy that achieves non-repudiation and resilience to computational denial of service attacks in conjunction with a broadcast authentication protocol that authenticates messages using a combination of a digital signature and a TESLA MAC. When messages are received at a receiver, the verification strategy separates the messages into messages with the same sender identification. The strategy then determines whether the TESLA MAC authenticator is valid for each message and discards those messages that do not have a valid TESLA MAC. The strategy collects the messages that have a valid TESLA MAC for each sender identification and performs a batch verification process on the group of messages to determine if the messages in the group have a valid digital signature. This strategy verifies each message in the group of messages if the batch verification process shows that the group of messages has a valid digital signature. | 09-29-2011 |
20110258435 | Threat Mitigation in a Vehicle-to-Vehicle Communication Network - A method is provided for obtaining a certificate revocation list (CRL) for a vehicle in a vehicle-to-vehicle communication system. A portable security unit is provided to access secured operations for the vehicle. The portable security unit is linked to a device having access to a communication network. The communication network is in communication with a certificate authority for issuing an updated CRL. The updated CRL is downloaded from the certificate authority to the portable security unit. At a later time, when a user enters the vehicle, a communication link is established between the portable security unit and a vehicle processor unit. Mutual authentication is exchanged between the portable security unit and the vehicle processing unit. The updated CRL stored in the portable security unit is downloaded to a memory of the vehicle communication system in response to a successful mutual authentication. | 10-20-2011 |
20110304425 | Systems and Methods for Efficient Authentication - A communication system is configured to operate in an ad hoc wireless network. The communication system includes a transmission device configured to send and receive a message, a signing module configured to generate a hierarchical signature using the message, and a verifying module configured to hierarchically verify a predetermined portion of a hierarchically signed message. | 12-15-2011 |
20140002276 | FRAMEWORK FOR PACKET PROCESSING FOR SECURE V2V APPLICATIONS ON RESOURCE-CONSTRAINED PLATFORMS | 01-02-2014 |
20140006615 | METHOD FOR EFFICIENT MESSAGE VERIFICATION ON RESOURCE-CONSTRAINED PLATFORMS FOR REAL-TIME TRACKING APPLICATIONS | 01-02-2014 |
Patent application number | Description | Published |
20110001535 | SEQUENTIAL CIRCUIT WITH DYNAMIC PULSE WIDTH CONTROL - A pulsed latch circuit with conditional shutoff prevents an input node, such as a node receiving data, of the pulsed latch circuit, from latching data based on a delayed input control signal, such as an internal clocking signal, and based on a feedback latch state transition detection signal indicating that a current state of input data is stored in the latch. As such, two control conditions are used to shut down the latch. In one example, a condition generator detects when the latch has captured data correctly and outputs a signal to disable the input node. In addition, a variable delay circuit is used to adjust the width of the allowable input signal to set a worst case shutoff time. If data is latched early, a feedback latch state transition detection signal causes the input node to be disabled. If data is not latched early, the maximum allowable latch time is set by the variable delay circuit. | 01-06-2011 |
20120030500 | Hysteresis Management in SOI Data Processing Circuits - Embodiments of systems and methods are described for reducing the effects of hysteresis in the operation of data processing circuitry. In this embodiment of the invention, adaptive control circuitry is used to reduce the effects of hysteresis. The embodiment disclosed herein provides significant reduction in the effects of hysteresis and, therefore, a significant reduction in the amount of guard band needed to compensate for hysteresis effects in SOI processes and thereby improving the performance/power characteristics of the circuit. | 02-02-2012 |
20120284680 | METHOD AND APPARATUS FOR DESIGNING AN INTEGRATED CIRCUIT - A method and apparatus for designing an integrated circuit to operate at a desired clock frequency range reduces process variation by estimating the value of removable pessimism from a static timing analysis. The pessimism includes, for example, at least one of the removable on-chip-variation (OCV) margin from clock paths, removable OCV margin from data paths, removable IR drop margin from clock paths, and removable interconnects margin. At the timing analysis stage of a design flow, the method and apparatus determines the value of pessimism in the timing critical paths based on timing correlation between adjacent timing critical paths. In response to the determination, the value of pessimism may be reduced in the static timing analysis of the adjacent timing critical paths to optimize the timing performance of the integrated circuit at its desired clock frequency range. | 11-08-2012 |
20150372802 | SOURCE SYNCHRONOUS BUS CLOCK GATING SYSTEM - Embodiments are described for a method of reducing power consumption in source synchronous bus systems by reducing signal transitions in the system. Instead of sending clock and data valid signals, only the start and end of valid data packets are marked by clock signal transitions, or only a number of clock pulses that corresponds to number of data words is sent, or only a number transitions on clock signals are sent. The clock signal transitions may comprise either clock pulses or exclusively rising edge or falling edge transitions of the clock signal. | 12-24-2015 |
Patent application number | Description | Published |
20100227301 | APPARATUS AND METHODS FOR OPERATOR TRAINING IN INFORMATION EXTRACTION - Disclosed are methods and apparatus for extracting information from one or more documents. A training and execution plan is received, and such plan specifies invocation of a trainer operator for initiating training of a trainee operator based on a set of training documents so as to generate a new trained operator that is to then be invoked so as to extract information from one or more unknown documents. The trainee operator is configured to extract information from one or more unknown documents, and each training document is associated with classified information. After receipt of the training and execution plan, the trainer operator is automatically executed to train the trainee operator based on the specified training documents so as to generate a new trained operator for extracting information from documents. The new trained operator is a new version of the trainee operator. After receipt of the training and execution plan, both the trainee operator are automatically retained for later use in extracting information from one or more unknown documents and the new trained operator for later use in extracting information from one or more unknown documents. After receipt of the training and execution plan, the new trained operator is automatically executed on one or more unknown documents so as to extract information from such one or more unknown documents. | 09-09-2010 |
20110087646 | Method and System for Form-Filling Crawl and Associating Rich Keywords - Techniques are provided for the efficient location, processing, and retrieval of local product information derived from web pages generally locatable through form queries submitted to web pages often referred to as the “deep” or “hidden” web. In an embodiment, information such as product information and dealer-location information is located on a web page form such as a dealer-locator form. After location of a suitable web page form, editorial wrapping is performed to create an automated information extraction process. Using the automated information extractor, deep-web crawling is performed. A grid-based extraction of individual business records is performed, and matching and ingestion are performed in conjunction with a business listing database. Finally, metadata tags are added to entries in the business listing database. Metadata tags also may be added to entries in other databases. | 04-14-2011 |
20110113063 | METHOD AND SYSTEM FOR BRAND NAME IDENTIFICATION - A method for identifying a brand name is described herein. The method involves obtaining category keywords associated with a category, designating a subgroup of the category keywords as brand name keywords for a particular brand name, receiving a search term, determining that the search term is a brand name keyword, and identifying the particular brand name corresponding to the brand name keyword. | 05-12-2011 |
20110153542 | OPINION AGGREGATION SYSTEM - A system is disclosed for obtaining and aggregating opinions generated by multiple sources with respect to one or more objects. The disclosed system uses observed variables associated with an opinion and a probabilistic model to estimate latent properties of that opinion. With those latent properties, the disclosed system may enable publishers to reliably and comprehensively present object information to interested users. | 06-23-2011 |
20110264648 | SELECTIVELY ADDING SOCIAL DIMENSION TO WEB SEARCHES - Embodiments are directed towards managing a display of search results by employing a query-classification for a search query to selectively display trust search results that are displayed distinct from non-trust search results. A search query is classified into a query-class. A search is then performed over non-trust sources, and selectively over trust data sources to obtain non-trust and trust search results, respectively. The trust search results are rank ordered based on various categories of search criteria, including, for example, explicit and implicit relationships. Based on the query-class, a different number of trust search results may be displayed. Further, a position for which the trust search results may be displayed may be based on the query-class. Moreover, the non-trust search results displayed distinct or separate from the trust search results to readily distinguish a type of source of the search results. | 10-27-2011 |
Patent application number | Description | Published |
20150205323 | LOW INSERTION DELAY CLOCK DOUBLER AND INTEGRATED CIRCUIT CLOCK DISTRIBUTION SYSTEM USING SAME - A clock doubler includes a first NAND gate having a first input for receiving a clock input signal and a second input, a second NAND gate having a first input and a second input for receiving a complement of the clock input signal, an output NAND gate having a first and second inputs coupled to outputs of the first and second NAND gates, respectively, and an output for providing a clock output signal, an inverter chain having an input for receiving the clock input signal and responsive to first and second control signals to selectively provide a first true output to the first input of the second NAND gate, and a second complementary output to the second input of the first NAND gate, and a control signal generation circuit providing the first and second control signals in response to the outputs of the first and second NAND gates. | 07-23-2015 |
20150222277 | SELF-ADJUSTING CLOCK DOUBLER AND INTEGRATED CIRCUIT CLOCK DISTRIBUTION SYSTEM USING SAME - In one form, a clock doubler includes a switched inverter, an exclusive logic circuit, and a control signal generation circuit. The switched inverter has first and second control inputs for respectively receiving first and second control signals, a signal input for receiving a clock input signal, and an output. The exclusive logic circuit has a first input for receiving the clock input signal, a second input coupled to the output of the switched inverter, and an output for providing a clock output signal. A control signal generation circuit provides the first and second control signals in response to the clock output signal. The clock doubler may be used in a clock distribution circuit for an integrated circuit that also includes a phase locked loop for providing the input clock signals, and a plurality of clock sub-domains each having one of the clock doublers. | 08-06-2015 |
Patent application number | Description | Published |
20100317827 | Method of Purifying a Peptide - The invention relates, interalia, to the field of purification of peptides, notably cyclic or non-cyclic peptides their analogs or derivatives thereof. More particularly, the invention relates to a simplified and optimized purification process of cyclic peptides from a composition comprising the said peptide and at least one related impurity by chromatographic procedures enabling high yields, selectivity and purity of the desired end product. The improved process is particularly useful for the preparation of eptifibatide, exenatide, atosiban, nesiritide and their respective derivatives and analogs. The polypeptides are prepared in high purity of at least about 96%, and preferably at least about 99%. | 12-16-2010 |
20110014664 | Fermentation Process for Higher Yield Coefficient of Lipase-Inhibitor with Respect to Consumed Fatty Acid - The invention provides a process for the production of lipase inhibitors via an improvised fermentation process characterized in that a combinatorial feeding of linoleic acid or its esters or salts thereof and an omega-9 fatty acid, preferably oleic acid and/or its derivatives is employed during said process resulting in an improved yield co-efficient, productivity further providing ease of operation. | 01-20-2011 |
20120123089 | PREPARATIVE NON-LINEAR GRADIENT BASED CHROMATOGRAPHIC METHOD AND PURIFIED PRODUCTS THEREOF - The instant disclosure provides a method for purification of peptides by chromatographic techniques. The proposed methodology will help in addressing the problems associated in purifying biological protein products emerging from the evolving biotechnology industry. | 05-17-2012 |
20120178900 | CHROMATOGRAPHIC PROCESSES AND PURIFIED COMPOUNDS THEREOF - The present disclosure demonstrates the utility of ion pairing agents in the preparative scale of purification. More particularly, the disclosure relates to the usage of ion pairing agents in RP preparative linear chromatography enabling high purity of the desired end product. The disclosure shows that ion-pairing agents have dramatic effect on desired purity of polypeptides. | 07-12-2012 |
20140051124 | METHODS FOR REDUCING ACCUMULATION OF LACTATE DURING CULTURING AND METHOD FOR PRODUCING POLYPEPTIDE - The present disclosure relates to methods of decreasing lactate production in cell culture using divalent transitional metallic salts. The present disclosure also relates to a method of producing polypeptide by adding divalent transitional metallic salt to the cell culture medium for reducing lactate accumulation followed by fermenting and recovering the polypeptide. | 02-20-2014 |
20140141467 | Fermentation Medias and Processes Thereof - The present invention demonstrates the utility of carbonic acid amides such as urea or its derivatives, carbamates, carbodiimides & thiocarbamides as nitrogenous supplements in fermentation media for production of recombinant proteins to achieve enhanced bioconversion rates and peptides like insulin and insulin analogues, exendin and enzymes such as lipase using methanol inducible fungal expression systems such as | 05-22-2014 |
20140199729 | Method for Reducing Heterogeneity of Antibodies and a Process of Producing the Antibodies Thereof - The present disclosure relates to a method of reducing heterogeneity in antibodies during culturing, wherein the heterogeneity is due to proportion of charge variant of the antibody. The disclosure also comprises a process of growing cells in a cell culture system that results in antibodies with the reduced heterogeneity. In one embodiment antibody heterogeneity is reduced by the addition of divalent transitional metal ions such as zinc (Zn | 07-17-2014 |
Patent application number | Description | Published |
20130339679 | METHOD AND APPARATUS FOR REDUCING AREA AND COMPLEXITY OF INSTRUCTION WAKEUP LOGIC IN A MULTI-STRAND OUT-OF-ORDER PROCESSOR - A computer system, a computer processor and a method executable on a computer processor involve placing each sequence of a plurality of sequences of computer instructions being scheduled for execution in the processor into a separate queue. The head instruction from each queue is stored into a first storage unit prior to determining whether the head instruction is ready for scheduling. For each instruction in the first storage unit that is determined to be ready, the instruction is moved from the first storage unit to a second storage unit. During a first processor cycle, each instruction in the first storage unit that is determined to be not ready is retained in the first storage unit, and the determining of whether the instruction is ready is repeated during the next processor cycle. Scheduling logic performs scheduling of instructions contained in the second storage unit. | 12-19-2013 |
20130339711 | METHOD AND APPARATUS FOR RECONSTRUCTING REAL PROGRAM ORDER OF INSTRUCTIONS IN MULTI-STRAND OUT-OF-ORDER PROCESSOR - A computer system, a processor in a computer and a computer-implemented method executable on a computer processor involve dividing a set of computer instructions arranged in a sequential program order into a plurality of instruction sequences. Instructions within each sequence are arranged according to the program order. An increment value is assigned to a preceding instruction in each sequence. The increment value is equal to a difference between a program order value of a subsequent instruction in the sequence and a program order value of the preceding instruction. The processor calculates the program order value of each subsequent instruction based on the program order value and the increment value of a corresponding preceding instruction in the same sequence. | 12-19-2013 |
20140208074 | INSTRUCTION SCHEDULING FOR A MULTI-STRAND OUT-OF-ORDER PROCESSOR - In one embodiment, a multi-strand system with a pipeline includes a front-end unit, an instruction scheduling unit (ISU), and a back-end unit. The front-end unit performs an out-of-order fetch of interdependent instructions queued using a front-end buffer. The ISU dedicates two hardware entries per strand for checking operand-readiness of an instruction and for determining an execution port to which the instruction is dispatched. The back-end unit receives instructions dispatched from the hardware device and stores the instructions until they are executed. Other embodiments are described and claimed. | 07-24-2014 |
20140317330 | TWO WIRE SERIAL VOLTAGE IDENTIFICATION PROTOCOL - In one embodiment a system comprises an integrated circuit, a plurality of voltage regulators; and a data bus coupled to the integrated circuit and the plurality of voltage regulators. In some embodiments the integrated circuit comprises logic to embed a timing signal on the data bus. Other embodiments may be described. | 10-23-2014 |
20150301831 | SELECT LOGIC FOR THE INSTRUCTION SCHEDULER OF A MULTI STRAND OUT-OF-ORDER PROCESSOR BASED ON DELAYED RECONSTRUCTED PROGRAM ORDER - A processing device comprises select logic to schedule a plurality of instructions for execution. The select logic calculates a reconstructed program order (RPO) value for each of a plurality of instructions that are ready to be scheduled for execution. The select logic creates an ordered list of instructions based on the delayed RPO values, the delayed RPO values comprising the calculated RPO values from a previous execution cycle, and dispatches instructions for scheduling based on the ordered list. | 10-22-2015 |
Patent application number | Description | Published |
20110237740 | BLEND OF SILYLATED POLYURETHANE CONTAINING POLYDIORGANOSILOXANE AND SILYLATED POLYURETHANE AND SUBSTRATES CONTAINING SAME AND PROCESS OF MAKING SAID SUBSTRATES - The present invention is directed to a composition having: (A) at least one silylated polyurethane resin containing polydiorganosiloxane; and, (B) at least one silylated polyurethane resin A. | 09-29-2011 |
20120219802 | Copolycarbonates, Their Derivatives and the Use Thereof in Silicone Hardcoat Compositions - Disclosed herein are novel copolycarbonates containing repeating units A and B respectively of the formulae: (A)—[R | 08-30-2012 |
20120219803 | Weatherable & Abrasion Resistant Coating Systems for Polymeric Substrates - Disclosed herein is a primer composition comprising an inorganic UV absorbing agent and a polymer selected from (i) a copolycarbonate, and (ii) a polyurethane obtained by reaction of a polyisocyanate and a copolycarbonate diol. Also disclosed is a coated article comprising a polymeric substrate, a primer layer disposed on at least one surface of said substrate, and an abrasion-resistant layer disposed on said primer layer, where the primer layer is made from the primer composition of the invention. | 08-30-2012 |
20130158159 | EPOXY-CONTAINING POLYSILOXANE OLIGOMER COMPOSITIONS, PROCESS FOR MAKING SAME AND USES THEREOF - The present invention relates to stable, zero or low VOC epoxy-containing polysiloxane oligomer compositions that provide for a high degree of chemical resistance to compositions containing organic resins, while at the same time, maintaining or improving the flexibility of these organic resin-containing compositions, to processes for preparing epoxy-containing polysiloxane oligomer compositions, and to uses in coatings, sealants, adhesives, and composites containing the same. | 06-20-2013 |
20140221531 | EPOXY-CONTAINING POLYSILOXANE OLIGOMER COMPOSITIONS, PROCESS FOR MAKING SAME AND USES THEREOF - The present invention relates to stable, zero or low VOC epoxy-containing polysiloxane oligomer compositions that provide for a high degree of chemical resistance to compositions containing organic resins, while at the same time, maintaining or improving the flexibility of these organic resin-containing compositions, to processes for preparing epoxy-containing polysiloxane oligomer compositions, and to uses in coatings, sealants, adhesives, and composites containing the same. | 08-07-2014 |
20150141586 | PHENYL-CONTAINING FUNCTIONAL POLYSILOXANES AND POLYCARBONATE-POLYSILOXANE COPOLYMERS MADE THEREFROM - The invention is directed to phenyl-containing functional polysiloxanes and polycarbonate-polysiloxane copolymer compositions made therefrom having improved optical clarity and better low temperature impact resistance. | 05-21-2015 |
20160002410 | ESTER-FUNCTIONAL POLYSILOXANES AND COPOLYMERS MADE THEREFROM - There is described a polysiloxane having the structure: | 01-07-2016 |
20160002412 | UV-ACTIVE CHROMOPHORE FUNCTIONALIZED POLYSILOXANES AND COPOLYMERS MADE THEREFROM - Disclosed herein is a polyorganosiloxane having the structure of Formula I: | 01-07-2016 |
Patent application number | Description | Published |
20110013527 | SYSTEM AND METHOD FOR DEEP PACKET INSPECTION - IP networks carry packets that consist of headers and payloads. Typical traffic analysis systems at layer 3 process packet headers in order to obtain as much information about the traffic as possible. However, performing of deep packet analysis requires the processing of packet payloads as well. Another important requirement of layer 3 processing is the need to process the payloads at wire speeds. A system and method for deep packet inspection at layer 3 involves (a) an approach for packet payload processing; (b) accounting for out of order arrival of packets; (c) an approach for partial match analysis so as to be able to analyze the traffic flows when only partial information is available; and (d) an approach for effective payload processing for attempting to achieve wire speed processing. | 01-20-2011 |
20110276508 | SYSTEM AND METHOD FOR AN INFLUENCE BASED STRUCTURAL ANALYSIS OF A UNIVERSITY - An educational institution (also referred as a university) is rich with multiple kinds of data: students, faculty members, departments, divisions, and at university level. Relating and correlating this data at and across various levels help in obtaining a perspective about the educational institution. A structural representation captures the essence of all of the relationships in a unified manner and an important aspect of the relationship is the so-called “influence factor.” This factor indicates influencing effect of an entity over another entity, wherein the entities are a part of the structural representation. Given such a structural representation, a system and method that propagates the influence factors of the entities to arrive at a stable representation from the point of view of influences is discussed. | 11-10-2011 |
20110276509 | SYSTEM AND METHOD FOR UNIVERSITY MODEL GRAPH BASED VISUALIZATION - An educational institution (also referred as a university) is rich with multiple kinds of data: students, faculty members, departments, divisions, and at university level. A structural representation that captures the essence of all of the relationships in a unified manner has concise information about the educational institution, and visualization is a way to bring out all this information in an explicit manner so that the various of the users of the educational institution system understand effectively their system. A system and method for visualization based on the structural representation of a university along a variety of dimensions is discussed. | 11-10-2011 |
20110320500 | SYSTEM AND METHOD FOR CONSTRUCTING A UNIVERSITY MODEL GRAPH - An educational institution (also referred as a university) is rich with multiple kinds of data: students, faculty members, departments, divisions, and at university level. Relating and correlating this data at and across various levels help in obtaining a perspective about the educational institution. A structural representation captures the essence of all of the relationships in a unified manner and an important aspect of the relationship is the so-called “influence factor.” This factor indicates influencing effect of an entity over another entity, wherein the entities are a part of the structural representation. A system and method for the construction of such a structural representation of an educational institution based on the educational institution specific information is discussed. | 12-29-2011 |
20120109718 | System and Method for What-If Analysis of a University Based on Their University Model Graph - An educational institution (also referred as a university) is structurally modeled using a university model graph. A key benefit of modeling of the educational institution is to help in an introspective analysis by the educational institute. Specifically, the model is quite beneficial for undertaking the analysis of the various issues faced by the educational institute. A what-if scenario requires the model to be suitably changed to address the issue under consideration and the changed model needs to be analyzed to determine how the issue could be handled. A system and method for what-if scenario analysis based on the university model graph is discussed. | 05-03-2012 |
20120130998 | System and Method for Comparing Universities Based on Their University Model Graphs - An educational institution (also referred as a university) is structurally modeled using a university model graph. Such a model helps compare educational institutions at various levels—university level, department level, faculty member level, or student level. One of the requirements of comparison is to normalize the similarities and identify and elaborate the differences across multiple educational institutions. A way to achieve this is to model the educational institutions using comparable elements; specifically, the university model graph allows for such comparison as multiple educational institutions are modeled based on the same set of concepts and notions. A system and method for comparing educational institutions based on their respective university model graphs is discussed. | 05-24-2012 |
20130124240 | System and Method for Student Activity Gathering in a University - An educational institution (also referred as a university) is structurally modeled using a university model graph. A key benefit of modeling of the educational institution is to help in an introspective analysis by the educational institute. In order to build an effective university model graph, it is required to gather and analyze the various activities performed on the university campus by the various entities of the university. A system and method for automated activity gathering that involves instrumented components, sub-systems, and networks is discussed. Specifically, the presented system allows for reliable identification of activities performed by a student of the university based on inputs received from multiple sources associated with the instrumented components, sub-systems, and networks. | 05-16-2013 |
20130138572 | System and Method for Generating Student Activity Flows in a University - An educational institution (also referred as a university) is structurally modeled using a university model graph. A key benefit of modeling of the educational institution is to help in an introspective analysis by the educational institute. In order to build an effective university model graph, it is required to gather and analyze the various activities performed on the university campus by the various entities of the university. A system and method for automated generation of activity flows involves analysis of multiple student specific sub-activities and correlating them from temporal and spatial points of view. Specifically, the presented system allows for reliable identification of activity flows accounting for duplicate and missing sub-activities. | 05-30-2013 |
20140108285 | SYSTEM AND METHOD FOR AN INFLUENCED BASED STRUCTURAL ANALYSIS OF A UNIVERSITY - An educational institution (also referred as a university) is rich with multiple kinds of data: students, faculty members, departments, divisions, and at university level. Relating and correlating this data at and across various levels help in obtaining a perspective about the educational institution. A structural representation captures the essence of all of the relationships in a unified manner and an important aspect of the relationship is the so-called “influence factor.” This factor indicates influencing effect of an entity over another entity, wherein the entities are a part of the structural representation. Given such a structural representation, a system and method that propagates the influence factors of the entities to arrive at a stable representation from the point of view of influences is discussed. | 04-17-2014 |
20140156358 | SYSTEM AND METHOD FOR UNIVERSITY MODEL GRAPH BASED VISUALIZATION - An educational institution (also referred as a university) is rich with multiple kinds of data: students, faculty members, departments, divisions, and at university level. A structural representation that captures the essence of all of the relationships in a unified manner has concise information about the educational institution, and visualization is a way to bring out all this information in an explicit manner so that the various of the users of the educational institution system understand effectively their system. A system and method for visualization based on the structural representation of a university along a variety of dimensions is discussed. | 06-05-2014 |
20140156551 | SYSTEM AND METHOD FOR CONSTRUCTING A UNIVERSITY MODEL GRAPH - An educational institution (also referred as a university) is rich with multiple kinds of data: students, faculty members, departments, divisions, and at university level. Relating and correlating this data at and across various levels help in obtaining a perspective about the educational institution. A structural representation captures the essence of all of the relationships in a unified manner and an important aspect of the relationship is the so-called “influence factor.” This factor indicates influencing effect of an entity over another entity, wherein the entities are a part of the structural representation. A system and method for the construction of such a structural representation of an educational institution based on the educational institution specific information is discussed. | 06-05-2014 |
20140172508 | System and Method For Generating Student Mirror Maps In A University - An educational institution (also referred as a university) is structurally modeled using a university model graph. A key benefit of modeling of the educational institution is to help in an introspective analysis by the educational institute. The analysis of the various activities performed on the university campus by the various entities (such as students) of the university leads to the generation of student specific activity maps. These maps play a role in counseling students in organizing and planning of their activities in the context of the university. A system and method for automated generation of mirror maps involves the combined analysis of a set of activity maps of a set of students to measure their similarities. Such similarities help, for example, in the process of formation of teams, and identification of meeting times and venues. | 06-19-2014 |
20140186815 | System and Method for What-If Analysis of a University Based On University Model Graph - An educational institution (also referred as a university) is structurally modeled using a university model graph. A key benefit of modeling of the educational institution is to help in an introspective analysis by the educational institute. Specifically, the model is quite beneficial for undertaking the analysis of the various issues faced by the educational institute. A what-if scenario requires the model to be suitably changed to address the issue under consideration and the changed model needs to be analyzed to determine how the issue could be handled. A system and method for what-if scenario analysis based on the university model graph is discussed. | 07-03-2014 |
Patent application number | Description | Published |
20090177758 | SYSTEMS AND METHODS FOR DETERMINING ATTRIBUTES OF MEDIA ITEMS ACCESSED VIA A PERSONAL MEDIA BROADCASTER - Systems, devices and methods are described for determining attributes identifying media items from other media items. A first video sequence of a first media item is received from a media source, the video sequence including one or more images having first banner information embedded therein. The attributes of the first media item are determined based on at least the first banner information extracted from the first video sequence. The determined attributes of the first media item can then be stored or otherwise processed as desired. | 07-09-2009 |
20100100915 | FAST-START STREAMING AND BUFFERING OF STREAMING CONTENT FOR PERSONAL MEDIA PLAYER - A personal media broadcasting system enables video distribution over a computer network and allows a user to view and control media sources over a computer network from a remote location. A personal broadcaster receives an input from one or more types of media sources, digitizes and compresses the content, and streams the compressed media over a computer network to a media player running on any of a wide range of client devices for viewing the media. The system may allow the user to issue control commands (e.g., “channel up”) from the media player to the broadcaster, causing the source device to execute the commands. The broadcaster and the media player may employ several techniques for buffering, transmitting, and viewing the content to improve the user's experience. | 04-22-2010 |
20110033168 | METHODS AND APPARATUS FOR FAST SEEKING WITHIN A MEDIA STREAM BUFFER - A method of seeking within a time shift buffer includes receiving a media stream from a remotely located media source over a network, and generating a time shift buffer associated with the media stream. The time shift buffer includes a number of frames with keyframes provided at a certain intervals. When a seek request associated with a desired time within the media stream is received, the system determines a nearest keyframe within the set of keyframes that is previous to and closest in time to the desired time, displays the nearest keyframe, then considers in turn each of the frames subsequent to the nearest keyframe until a desired frame corresponding to the desired time is reached displayed. The system cancels the previous examining step and determines a new nearest keyframe in the event a second seek request is received. | 02-10-2011 |
20110035669 | METHODS AND APPARATUS FOR SEEKING WITHIN A MEDIA STREAM USING SCENE DETECTION - A system uses generated scene transition frames to allow fast seeking within a media stream. A set of scene transition frames associated with the media stream are generated, then transmitted along with the media stream from a remotely located media source over a network. A subset of the scene transition frames are displayed, allowing a desired scene transition frame to be selected from a subset of the scene transition frames based on user input. The media source can then be displayed (e.g., played) starting from a frame corresponding to the desired scene transition frame. | 02-10-2011 |
20110185393 | FAST-START STREAMING AND BUFFERING OF STREAMING CONTENT FOR PERSONAL MEDIA PLAYER - Systems and methods allow playback of a media stream received via a network. The media stream is received and stored in a buffer prior to playback. Responsive to receiving the user command to change the content of the media stream, the buffer is flushed prior to receiving the changed content in the media stream. | 07-28-2011 |
20110196521 | CONNECTION PRIORITY SERVICES FOR DATA COMMUNICATION BETWEEN TWO DEVICES - A digital media player device includes, without limitation, a processor and a communication module coupled to the processor and configured to support data communication with a digital media place-shifting device. The processor and the communication module cooperate to attempt to establish data communication with the digital media place-shifting device in accordance with a connection mode sequence that identifies a plurality of different data communication modes supported by the digital media player device, until one of the plurality of different data communication modes can be used to initiate a data communication session between the digital media player device and the digital media place-shifting device. The processor and the communication module also cooperate to perform data communication with the digital media place-shifting device, using the one of the plurality of different data communication modes. | 08-11-2011 |
20120059914 | SYSTEMS AND METHODS FOR DETERMINING ATTRIBUTES OF MEDIA ITEMS ACCESSED VIA A PERSONAL MEDIA BROADCASTER - Systems, devices and methods are described for determining attributes identifying media items from other media items. A first video sequence of a first media item is received from a media source, the video sequence including one or more images having first banner information embedded therein. The attributes of the first media item are determined. The determined attributes of the first media item can then be stored or otherwise processed as desired. | 03-08-2012 |
20120106669 | DYNAMIC ENCODE SETTING ADJUSTMENT - A player decodes and renders encoded digital data received from an encoder. During processing, the player periodically monitors dropped frames as well as time spent. If the dropped frames are below a minimum, the player determines to signal the encoder to increase bit rate or frame rate by consulting a table. If the player determines to increase bit rate, the player signals accordingly. However, if the player determines to increase frame rate, the player first verifies that the spent time is below a minimum. To the contrary, if the dropped frames are both above the minimum and a first maximum but nota second maximum, the player determines to signal the encoder to decrease bit rate or frame rate by consulting the table and signaling accordingly. However, if the dropped frames are above the second maximum, the player signals the encoder to decrease the frame rate without consulting the table. | 05-03-2012 |
20140115642 | FAST-START STREAMING AND BUFFERING OF STREAMING CONTENT FOR PERSONAL MEDIA PLAYER - Systems and methods allow playback of a placeshifted media stream received via a network. The placeshifted media stream is received and stored in a buffer prior to playback. Responsive to receiving the user command to change the content of the media stream, the buffer is flushed prior to receiving the changed content in the placeshifted media stream. | 04-24-2014 |
20150319488 | FAST-START STREAMING AND BUFFERING OF STREAMING CONTENT FOR PERSONAL MEDIA PLAYER - Systems and methods allow playback of a media stream received via a network. The media stream is received and stored in a buffer prior to playback. Responsive to receiving the user command to change the content of the media stream, the buffer is flushed prior to receiving the changed content in the media stream. | 11-05-2015 |
Patent application number | Description | Published |
20110125825 | Event Processing - A method, a system and a computer program for parallel event processing in an event processing network (EPN) are disclosed. The EPN has at least one event processing agent (EPA). The method includes assigning an execution mode for the at least one EPA, the execution mode including a concurrent mode and a sequential mode. The execution mode for the at least one EPA is stored in the EPN metadata. The method also includes loading and initializing the EPN. The method further includes routing the event in the EPN and, when an EPA is encountered, depending on the execution mode of the encountered EPA, further processing of the event. Also disclosed are a system and a computer program for parallel event processing in an event processing network (EPN). | 05-26-2011 |
20110126201 | Event Processing Networks - A hybrid event processing network (EPN) having at least one event processing agent (EPA) consists of a first set of EPAs defined declaratively and a second set of EPAs defined dynamically at runtime via an interface. Deploying the hybrid EPN includes loading the hybrid EPN, constructing an EPN structure, and creating indexes of nodes of the EPN structure. Deploying the hybrid EPN further includes representing an event in a hybrid EPN, and, in response to the event occurrence at an event source, receiving a notification from the hybrid EPN based on the event, and publishing the notification in an event channel. Embodiments of the invention includes propagating the event received within the hybrid EPN, determining a subsequent EPA associated with the event within the hybrid EPN, and propagating the event to the subsequent EPA in the hybrid EPN until the last element of the hybrid EPN is reached. | 05-26-2011 |
20120192192 | EVENT PROCESSING - A method, a system and a computer program for parallel event processing in an event processing network (EPN) are disclosed. The EPN has at least one event processing agent (EPA). The method includes assigning an execution mode for the at least one EPA, the execution mode including a concurrent mode and a sequential mode. The execution mode for the at least one EPA is stored in the EPN metadata. The method also includes loading and initializing the EPN. The method further includes routing the event in the EPN and, when an EPA is encountered, depending on the execution mode of the encountered EPA, further processing of the event. Also disclosed are a system and a computer program for parallel event processing in an event processing network (EPN). | 07-26-2012 |
20130007835 | METHOD AND APPARATUS FOR SPECIFYING TIME-VARYING INTELLIGENT SERVICE-ORIENTED MODEL - A method and an apparatus for specifying a time-varying, intelligent service-oriented model are provided. A method implemented in a computer infrastructure having computer executable code embodied on a computer readable storage medium having programming instructions, includes defining information of a service which is to be provided to one or more users having access to a system storing the defined information. The method further includes defining policies associated with the defined information to allow and deny access to selected portions of the defined information, and exposing to a user of the one or more users the selected portions of the defined information based on the defined policies allowing access to the selected portions of the defined information. | 01-03-2013 |
20130238672 | SPECIFYING DATA IN A STANDARDS STYLE PATTERN OF SERVICE-ORIENTED ARCHITECTURE (SOA) ENVIRONMENTS - An approach for specifying data in a standards style pattern of Service-Oriented Architecture (SOA) environments is provided. The approach implemented in a computer infrastructure, includes defining an interface including one or more local data elements and one or more references to one or more common data elements, of a service, the one or more common data elements being defined in a library for a plurality of services. The approach further includes configuring a data definition file (DDF) which indicates whether each of the one or more local data elements and the one or more common data elements is mandatory for the service. The approach further includes validating one or more data elements from a consumer as mandatory for the service based on the configured DDF. | 09-12-2013 |
20150046974 | METHOD AND APPARATUS FOR SPECIFYING TIME-VARYING INTELLIGENT SERVICE-ORIENTED MODEL - A method and an apparatus for specifying a time-varying, intelligent service-oriented model are provided. A method implemented in a computer infrastructure having computer executable code embodied on a computer readable storage medium having programming instructions, includes defining information of a service which is to be provided to one or more users having access to a system storing the defined information. The method further includes defining policies associated with the defined information to allow and deny access to selected portions of the defined information, and exposing to a user of the one or more users the selected portions of the defined information based on the defined policies allowing access to the selected portions of the defined information. | 02-12-2015 |
20150254269 | MANAGING SERVICE ACCESS THROUGH SOCIAL CONTEXT - A tool for providing access control for an application. The tool registers, by one or more computer processors, an application. The tool determines, by one or more computer processors, a social platform receives an access request. The tool determines, by one or more computer processors, an access determination for the access request. The tool sends, by one or more computer processors, the access determination for the access request. | 09-10-2015 |
20160080407 | MANAGING OPERATIONS IN A CLOUD MANAGEMENT SYSTEM - Embodiments of the present invention provide methods, systems, and computer program products for managing operations in a cloud management system. In one embodiment, after a user submits a request to perform a cloud operation, a contextual security assessment of the requesting user and/or cloud resources on which the requested operation will be performed can be determined. An administrative user can review the contextual security assessments before approving or rejecting the cloud operation, which can help increase safety within the cloud computing environment. | 03-17-2016 |
20160080478 | MANAGING OPERATIONS IN A CLOUD MANAGEMENT SYSTEM - Embodiments of the present invention provide methods, systems, and computer program products for managing operations in a cloud management system. In one embodiment, after a user submits a request to perform a cloud operation, a contextual security assessment of the requesting user and/or cloud resources on which the requested operation will be performed can be determined. An administrative user can review the contextual security assessments before approving or rejecting the cloud operation, which can help increase safety within the cloud computing environment. | 03-17-2016 |
Patent application number | Description | Published |
20090217245 | METHOD AND IMPLEMENTATION FOR CONSTRUCTING OF CORRECTED JAVA NATIVE CODE - Method and system for constructing corrected Java native code are provided. Native source code that interfaces or integrates with Java code is analyzed and validated before the source code is compiled. One or more checks are performed on the native source code to verify that the native source correctly interfaces with the Java code, and the verification results from said one or more checks are reported. The method and system for constructing corrected Java native code can be implemented as a plug-in to a program development environment, wherein a developer may invoke the method and system while developing said native source code. | 08-27-2009 |
20120124193 | Identification of Critical Web Services and their Dynamic Optimal Relocation - A web service executing on a web server is monitored by detecting metadata generated for various performance characteristics of the web service. A relocation policy is consulted in response to detecting the performance characteristics exceeding a first predetermined threshold. The relocation policy specifies a target web server as a new location for the web, and instructions for relocating the web service to the target web server if the performance characteristics exceeding a second predetermined threshold. The web service is relocated to the target web server based on the relocation policy and without human intervention. | 05-17-2012 |
20130013774 | Identification of Critical Web Services and their Dynamic Optimal Relocation - A web service executing on a web server is monitored by detecting metadata generated for various performance characteristics of the web service. A relocation policy is consulted in response to detecting the performance characteristics exceeding a first predetermined threshold. The relocation policy specifies a target web server as a new location for the web, and instructions for relocating the web service to the target web server if the performance characteristics exceeding a second predetermined threshold. The web service is relocated to the target web server based on the relocation policy and without human intervention. | 01-10-2013 |
20150200941 | Providing context-based visibility of cloud resources in a multi-tenant environment - A secure tag generation service is associated with a cloud infrastructure. This service establishes a security context for a particular cloud tenant based on a tenant's security requirements, one or more cloud resource attributes, and the like. The security content is encoded into a data structure, such as a tag that uniquely identifies that security context. The tag is then encrypted. The encrypted tag is then propagated to one or more cloud management services, such as a logging service. When one or more cloud resources are then used, such use is associated with the encrypted security context tag. In this manner, the encrypted tag is used to monitor activities that are required to meet the security context. When it comes time to perform a security or compliance management task, any cloud system logs that reference the encrypted security context tag are correlated to generate a report for the security context. | 07-16-2015 |
20150200958 | Providing context-based visibility of cloud resources in a multi-tenant environment - A secure tag generation service is associated with a cloud infrastructure. This service establishes a security context for a particular cloud tenant based on a tenant's security requirements, one or more cloud resource attributes, and the like. The security content is encoded into a data structure, such as a tag that uniquely identifies that security context. The tag is then encrypted. The encrypted tag is then propagated to one or more cloud management services, such as a logging service. When one or more cloud resources are then used, such use is associated with the encrypted security context tag. In this manner, the encrypted tag is used to monitor activities that are required to meet the security context. When it comes time to perform a security or compliance management task, any cloud system logs that reference the encrypted security context tag are correlated to generate a report for the security context. | 07-16-2015 |
Patent application number | Description | Published |
20090326758 | WEBSERVICE ARCHITECTURE FOR VEHICLE HEALTH MAINTENANCE - A webservice architecture for vehicle health maintenance is provided. A core module is in communication with a webservice provider, a webservice consumer, and a webservice registry over an internet protocol (IP) backbone. The core module is adapted for registering and discovering the webservice provider using a universal description, discovery, and integration (UDDI) communications open standard, receiving a request from the webservice provider using a simple object access protocol (SOAP), the webservice provider accepting the request from the webservice consumer, and extracting a data structure based on the webservice request in a format according to the webservice registry using a web services description language (WDSL). | 12-31-2009 |
20090327325 | META MODELING IN DECISION SUPPORT SYSTEM - A method, system, and computer program product for providing troubleshooting data for reported fault conditions on equipment is provided. An engineering model is configured for the equipment. The engineering model includes at least one failure scenario and an associated symptom. The engineering model is stored in an equipment model database. A meta model representative of at least one relationship between the engineering model and a reported fault condition for the equipment is instantiated. A user input for the reported fault condition is stored in a decision support system (DSS) database. The DSS database forms a wrapper over the equipment model database based on the user input. The meta model is further instantiated using user input data from the DSS database. An optimal troubleshooting procedure for the equipment is determined based on the meta model as instantiated. | 12-31-2009 |
20090327796 | SERVICE ORIENTED ARCHITECTURE BASED DECISION SUPPORT SYSTEM - A service oriented architecture (SOA) based decision support system for a vehicle is provided. A database is provided for storing a workplan of the vehicle. A webservice provider is in communication with the database for integrating applications using a variety of open standards of an internet protocol backbone. A core is connected between the database and webservice provider. The core is adapted for analyzing fault conditions, creating the workplan to overcome the fault conditions, and generating a response for a webservice request. An enterprise service bus is connected to the webservice provider for providing loose connectivity between webservice enabled functions, a service customer, and the core. | 12-31-2009 |
20100082702 | DYNAMIC VEHICLE INFORMATION MANAGEMENT - A method for dynamically managing data changes to a vehicle health monitoring system (VHM) by a datacenter using an external agent is provided. The external agent is operational on, or in communication with, a vehicle. One of updating or modifying a vehicle configuration file is performed to add or delete vehicle information on the vehicle configuration file by the external agent. A dummy file is created on a disk by the external agent. The dummy file provides a signal to the datacenter that the vehicle information on the vehicle configuration file has changed. The disk is polled periodically by the datacenter to identify a presence of the dummy file. Responsive to identifying the presence of the dummy file, the configuration file is read into VHM memory by the datacenter. | 04-01-2010 |
20100161169 | VEHICLE HEALTH MONITORING ARCHITECTURE FOR DIAGNOSTICS AND PROGNOSTICS AS A SERVICE IN AN E-ENTERPRISE - A health monitoring system for a vehicle system includes a plurality of diagnostics systems and a bus. Each of the plurality of diagnostics and prognostics systems corresponding to a different sub-system of the vehicle system and configured to at least facilitate generating diagnostic and prognostic system output pertaining to the sub-system based at least in part on data, each of the plurality of diagnostics and prognostics systems comprises a diagnostics component comprising an analytics framework and a core. The analytics framework is configured to receive formatted data and to generate diagnostic determinations based at least in part thereon. The core is coupled to the analytics framework, and is configured to transform data into formatted data and provide the formatted data to the analytics framework. The bus is coupled to the plurality of diagnostics and prognostics systems, and is configured to at least facilitate providing the data thereto. | 06-24-2010 |
20100161678 | METHOD AND APPARATUS FOR UTILIZING MATLAB FUNCTIONALITY IN JAVA-ENABLED ENVIRONMENT - A Java-MATLAB bridge is provided for enabling utilization of MATLAB® functionality in an enterprise environment. The Java-MATLAB bridge includes a Java® wrapper and a MATLAB wrapper. The MATLAB wrapper is coupled to the Java wrapper and the Java wrapper provides an entry point for invoking the MATLAB functionality in the enterprise environment. | 06-24-2010 |
20120030501 | AUTOMATIC DETERMINATION OF SUCCESS OF USING A COMPUTERIZED DECISION SUPPORT SYSTEM - Methods and systems are provided for improving the repair efficacy of a repair action using inferred feedback. The method comprises downloading a repair procedure, which has a probability of success for correcting the fault code. Repair action data is input into to the computing device and is tracked and correlated with the downloaded procedure. The method then adjusts a probability of success of the repair procedure in clearing the fault code generated by the complex system based at least on the correlation. The system comprises a means for receiving repair data, a means for tracking repair action data taken, a means for correlating the tracked repair action and the repair data, and a means for updating a probability of success of the repair action based at least in part on the correlation of the repair data, the repair action data and the operating status of the complex system. | 02-02-2012 |
20130066924 | METHOD AND APPARATUS FOR UTILIZING MATLAB FUNCTIONALITY IN JAVA-ENABLED ENVIRONMENT - A Java-MATLAB bridge is provided for enabling utilization of MATLAB® functionality in an enterprise environment. The Java-MATLAB bridge includes a Java® wrapper and a MATLAB wrapper. The MATLAB wrapper is coupled to the Java wrapper and the Java wrapper provides an entry point for invoking the MATLAB functionality in the enterprise environment. | 03-14-2013 |
20140214286 | SYSTEM AND METHOD FOR TRANSMITTING HELICOPTER HEALTH AND LOCATION - A system and method combines integrated system health usage monitoring and flight tracking of a helicopter, and transmits the information to monitoring sites for managing flight operations in real time, thereby providing the functionality of both system health and flight tracking and reducing weight related constraints faced by helicopters. With enhanced availability of system health data, vital information for maintenance and flight position data-stream, operations, flight dispatch and maintenance can plan for required services more efficiently. | 07-31-2014 |
Patent application number | Description | Published |
20110236509 | TOPICAL COMPOSITION COMPRISING EXTRACTS OF A. INDICA AND M. CHARANTIA OR S. INDICUM - The invention relates to a topical composition and a method for reducing or preventing occurrence of acne on the skin. It is an object of the present invention to provide for a combination of herbal extracts that interact synergistically to provide a cosmetic composition for prevention, reduction or treatment of acne. The present invention provides for a topical composition comprising (i) an extract of a first active which is | 09-29-2011 |
20120177712 | ANTIMICROBIAL PARTICLE AND A PROCESS FOR PREPARING THE SAME - This invention relates to a bipolar antimicrobial particle for use in laundry detergent compositions, fabric conditioners, personal care and cosmetic compositions and a process for making the same. In view of the foregoing, it is an object of the present invention to provide a stabile antimicrobial agent immobilised on a carrier particle. It is a further objective to provide an antimicrobial particle with improved retention to the fabric so that larger amounts of antimicrobial will be available even after rinsing. Surprisingly it has been found that antimicrobial molecules tagged by surface reaction onto naturally occurring asymmetric clay surfaces, act as an antimicrobial particle with improved retention properties with improved stability. | 07-12-2012 |
20140343155 | ANTIMICROBIAL COMPOSITION - The present invention relates to a method of disinfecting a surface and to an antimicrobial composition. Essential oils, which are used as antimicrobial actives, are also known for their strong odour; using high amounts of these gives a strong smell to the product that is not always appreciated by the consumer. It is therefore an object of the invention to provide an antimicrobial composition, having good anti-microbial properties, at very low levels of essential oil actives. The present inventors have achieved this using a synergistic combination of select anti-microbial actives and select hydrotropes. | 11-20-2014 |