Patent application number | Description | Published |
20110191767 | CONTROLLED USE MEDICAL APPLICATON - In an example, a virtualized medical application container can be created, including creating an image of a clean version of an operating system, installing a medical application on the image, and initializing the medical application on the image. | 08-04-2011 |
20110191821 | CONTROLLED USE MEDICAL APPLICATION - In an example, a client application can be implemented, including controlling access of a medical application to a client operating system resource; receiving medical data according to a first medical standard, and providing information to the medical application using the received medical data. | 08-04-2011 |
20110191822 | CONTROLLED USE MEDICAL APPLICATION - In an example, a plurality of virtualized medical application containers can be stored on one or more servers, wherein each server includes a memory, and wherein each virtualized medical application container includes a virtualized operating system, separate from a client operating system and a medical application executable installed on the virtualized operating system. | 08-04-2011 |
20150033363 | CONTROLLED USE MEDICAL APPLICATION - Various systems, machine-readable media, and methods for controlled use of medical applications using virtualization are described herein. In various embodiments, a virtualized medical application container can be created, including creating an image of a clean version of an operating system, installing a medical application on the image, and initializing the medical application on the image. Various embodiments include receiving an indication of a request for metered use of the medical application; requesting permission for metered use of the medical application, wherein the metered use includes at least one of a single use, a defined number of uses, unlimited use, or timed use; executing at least a portion of the medical application; and controlling usage of the medical application to comply with at least one of medical informatics standards and medical informatics regulations. | 01-29-2015 |
Patent application number | Description | Published |
20100287887 | TISSUE MARKER FOR MULTIMODALITY RADIOGRAPHIC IMAGING - An implantable tissue marker incorporates a contrast agent sealed within a chamber in a container formed from a solid material. The contrast agent is selected to produce a change, such as an increase, in signal intensity under magnetic resonance imaging (MRI). An additional contrast agent may also be sealed within the chamber to provide visibility under another imaging modality, such as computed tomographic (CT) imaging or ultrasound imaging. | 11-18-2010 |
20140187911 | TISSUE MARKER FOR MULTIMODALITY RADIOGRAPHIC IMAGING - An implantable tissue marker incorporates a contrast agent scaled within a chamber in a container formed from a solid material. The contrast agent is selected to produce a change, such as an increase, in signal intensity under magnetic resonance imaging (MRI). An additional contrast agent may also be sealed within the chamber to provide visibility under another imaging modality, such as computed tomographic (CT) imaging or ultrasound imaging. | 07-03-2014 |
20150173848 | IMAGING FIDUCIAL MARKERS AND METHODS - An implantable tissue marker incorporates a contrast agent sealed within a chamber in a container formed from a solid material. The contrast agent is selected to produce a change, such as an increase, in signal intensity under magnetic resonance imaging (MRI). An additional contrast agent may also be sealed within the chamber to provide visibility under another imaging modality, such as computed tomographic (CT) imaging or ultrasound imaging. | 06-25-2015 |
20160051337 | TISSUE MARKER FOR MULTIMODALITY RADIOGRAPHIC IMAGING - A radiographic marker containing a sensing medium that initially includes a gas and liquid mixture for producing increased signal intensity in a first imaging modality. The radiographic marker can have a permeable portion allowing the exchange of the gases or liquids of the sensing medium to be changed or exchanged for at least a second fluid in the surrounding tissue to reduce the bubbles or air pockets created by the gas portion of the sensing medium. The change or exchange of gas for the second liquid in the radiographic marker produces a detectable signal intensity of the radiographic marker in a second imaging modality different from the first imaging modality. | 02-25-2016 |
20160100910 | IMAGING FIDUCIAL MARKERS AND METHODS - An implantable tissue marker incorporates a contrast agent sealed within a chamber in a container formed from a solid material. The contrast agent is selected to produce a change, such as an increase, in signal intensity under magnetic resonance imaging (MRI). An additional contrast agent may also be sealed within the chamber to provide visibility under another imaging modality, such as computed tomographic (CT) imaging or ultrasound imaging. | 04-14-2016 |
Patent application number | Description | Published |
20090175562 | Imaging system - A method and apparatus for reconstruction of a region of interest for an object is provided. The reconstruction of the object may be based on chords which may fill a part, all, or more than all of the region of interest. Using chords for reconstruction may allow for reducing data acquired and/or processing for reconstructing a substantially exact image of the ROI. Moreover, various methodologies may be used in reconstructing the image, such as backprojection-filtration, and modified filtration backprojection. | 07-09-2009 |
20110170757 | Imaging System - A method and apparatus for reconstruction of a region of interest for an object is provided. The reconstruction of the object may be based on chords which may fill a part, all, or more than all of the region of interest. Using chords for reconstruction may allow for reducing data acquired and/or processing for reconstructing a substantially exact image of the ROI. Moreover, various methodologies may be used in reconstructing the image, such as backprojection-filtration, and modified filtration backprojection. | 07-14-2011 |
20120215090 | IMAGING SYSTEM - A method and apparatus for reconstruction of a region of interest for an object is provided. The reconstruction of the object may be based on chords which may fill a part, all, or more than all of the region of interest. Using chords for reconstruction may allow for reducing data acquired and/or processing for reconstructing a substantially exact image of the ROI. Moreover, various methodologies may be used in reconstructing the image, such as backprojection-filtration, and modified filtration backprojection. | 08-23-2012 |
20150022209 | Method and Apparatus for Resonator Signal Production and Measurement - Techniques provide for passive Q switching in a bimodal resonator environment, where magnetic resonators are coupled for power transfer. A passive Q switch is responsive to a driving power from one magnetic resonator coupled to another magnetic resonator. After the driving power reaches a threshold, the passive Q switch shunts the receiving magnetic resonator, at least partially, to reduce the Q of that second resonator, which allows faster detection operation of the second resonator in some applications. The technique allows for fast Q switching in a bimodal resonator system, especially one having resonators having magnetic fields that are orthogonal to one another. | 01-22-2015 |
Patent application number | Description | Published |
20120155442 | Method and System for Efficient Homeless MPLS Micro-Mobility - A method performed by a network element for providing micro-mobility in a network to a mobile node including the steps of receiving a registration request message at the mobility anchor point from an access router that is currently coupled to the mobile node, wherein the registration request message includes an endpoint identifier of the mobile node and a local care-of address of the mobile node, establishing a label switch path (LSP) between the mobility anchor point and the access router, storing the endpoint identifier in a binding entry along with the local care-of address, a regional care-of address, the label switch path and an egress interface, advertising the endpoint identifier with associated regional or local care-of address of the mobile node, and forwarding data packets, received at the mobility anchor point from a corresponding node that have the regional or local care-of address, to the mobile node using the LSP. | 06-21-2012 |
20120176904 | APPLYING A TABLE-LOOKUP APPROACH TO LOAD SPREADING IN FORWARDING DATA IN A NETWORK - A method to provide load distribution that selects one of a set equal cost paths for each flow that minimizes imbalance in the distribution of flows across the set of equal cost paths, the method including calculating the set of equal cost paths to each destination node, generating a set of next hop discriminators for the set of equal cost paths, each next hop discriminator in the set of next hop discriminators to uniquely identify one of the equal cost next hops, populating the load distribution table by storing, according to a distribution mechanism, in each load distribution table entry one of the next hop discriminators from the set of next hop discriminators, receiving a first PDU from a first flow and performing a lookup of one of the next hop discriminators in the load distribution table by using values at the bit locations of the first PDU directly as an index into a CAM. | 07-12-2012 |
20120179800 | SYSTEM AND METHOD FOR VARIABLE-SIZE TABLE CONSTRUCTION APPLIED TO A TABLE-LOOKUP APPROACH FOR LOAD-SPREADING IN FORWARDING DATA IN A NETWORK - A network element disposed in a network, where the network element implements a process to manage load distribution across a plurality of network interfaces of the network. The network element redirects traffic flow directed toward the plurality of network interfaces in response to changes in configuration of the plurality of network interfaces, where each traffic flow is a set of protocol data units (PDUs), having an ordered delivery requirement, and where the PDUs are transmitted across the network between a source node and a destination node. The redirection process minimizes data traffic flow disruption when the load distribution is determined using a set of load distribution tables instead of a hashing algorithm. | 07-12-2012 |
20120182936 | METHOD AND APPARATUS FOR MANAGING THE MOBILITY OF MOBILE NETWORKS - In response to a Mobile Access Router (MAR) initially attaching to a Multi-Protocol Label Switching (MPLS) domain through a first Access Router (AR) in the domain, a Mobility Anchor Point (MAP) in the MPLS domain establishes a plurality of Label Switched Paths (LSPs) for the MAR. For example, the MAP establishes an active LSP to the MAR through the AR to which the MAR has initially attached, and further establishes an inactive LSP for the MAR to each of one or more other ARs in the MPLS domain. An inactive LSP established at a given AR for a given MAR is activated when/if that MAR attaches to the AR. Correspondingly, the present invention includes method and apparatus teachings related to the MAP, ARs and the MAR, as regards establishing inactive LSPs, activating inactive LSPs, and extending an activated LSP to the MAR. | 07-19-2012 |
20120287932 | Label Switched Routing To Connect Low Power Network Domains - A network element is described. In one embodiment includes receiving a packet from the host in the first domain at the network element in the first domain, the packet including a destination address to the host in the second domain, the destination address being formed by replacing an Interface Identifier of an IP address by a second domain label and a shortened Media Access Control (MAC) address, the second domain label identifying the second domain. A routing label and the shortened MAC address are attached to the received packet, and the packet is sent on a label switched path indicated by the label to the second domain. | 11-15-2012 |
20120331542 | PREVENTING NEIGHBOR-DISCOVERY BASED DENIAL OF SERVICE ATTACKS - A method is provided for preventing denial-of-service attacks on hosts attached to a subnet, where the attacks are initiated by a remote node over an external network. The method is performed by a router which forwards packets between the external network and the subnet. The router receives a packet for forwarding to a destination address in an address space of the subnet according to the IPv6 protocol and looks up the destination address in a Neighbor Discovery (ND) table. The ND table is populated by operations on the subnet that were completed prior to receipt of the packet. Entries in the ND table store address information of the hosts that have been verified by the router to be active. The router forwards the packet to the destination address if the destination address is stored in the ND table. Otherwise, the packet is discarded. | 12-27-2012 |
20130091254 | Providing Virtualized Visibility Through Routers - A method implemented by a network element to track IPv6 addresses of devices in a home network, wherein the network element provides DHCPv6 service to the home network and a home network router on the home network assigns IPv6 address to the devices using a prefix provided by the DHCPv6 service, the method including receiving a DHCPv6 request for a prefix delegation from a home network router, sending a DHCPv6 message including an assigned prefix to the home network router, the DHCPv6 message including a request for notification of configured IPv6 addresses, receiving a first ICMP message from the home network router, including a MAC address and corresponding IPv6 address for a configured device, and sending the home network router a second ICMP message to acknowledge recording the IPv6 address for the configured device, enabling the network element to provide services and forward traffic directly to the configured device. | 04-11-2013 |
20130091279 | Architecture for Virtualized Home IP Service Delivery - A method implemented by a network element of an Internet service provider to provide network access through a visited network associated with a visited network owner to a device of a visiting user connecting to the visited networker. The visited network owner is a customer of the Internet service provider. The network element configures the visited network to provide access to resources of a remote home network to the device of the visiting user. The remote home network is in communication with the visited network over a wide area network. Connecting to a virtual gateway controller of the remote home network to obtain configuration information to establish a connection between the device and the remote home network. Establishing a connection between the device of the visiting user and a second access point. Providing access to the resource of the remote home network through the second access point. | 04-11-2013 |
20130346788 | METHOD AND SYSTEM TO ENABLE RE-ROUTING FOR HOME NETWORKS UPON CONNECTIVITY FAILURE - A method implemented by a Broadband Network Gateway (BNG) of an Internet service provider to provide accessibility to a wide area network for a Residential Gateway (RG) upon a failure of a wireline connectivity between the BNG and the RG, the method including receiving a failure detect message indicating a connectivity failure at the BNG from the RG, deciding whether to re-route traffic by the BNG, sending a failure acknowledge message by the BNG to the RG notifying the RG that re-routing has been initiated, sending a traffic re-route request message by the BNG to a Packet Data Network Gateway (PDN GW) of a Long-Term Evolution (LTE) network requesting the PDN GW to re-route traffic, receiving a traffic re-route acknowledgement by the BNG from the PDN GW, and re-routing traffic between the RG and the BNG through the PDN GW by the BNG. | 12-26-2013 |
20140016474 | DELAYED BASED TRAFFIC RATE CONTROL IN NETWORKS WITH CENTRAL CONTROLLERS - A process is performed by a controller in a split-architecture network. The controller monitors congestion of traffic groups across the split-architecture network and executes the process to provide delay based data rate control to alleviate congestion of the traffic groups. The process includes configuring an ingress switch and egress switch for each traffic group to collect delay measurement data for data packets of each traffic group as they arrive at the ingress switch and egress switch. The delay measurement data is received from the ingress switch and egress switch of each traffic group. A check is made whether a minimum data packet delay for any traffic group exceeds a defined threshold value. A throttling rate is calculated for each traffic group in the split-architecture network, in response to the defined threshold value being exceeded. | 01-16-2014 |
20140112139 | METHOD AND SYSTEM OF PACKET BASED IDENTIFIER LOCATOR NETWORK PROTOCOL (ILNP) LOAD BALANCING AND ROUTING - A method to provide load balancing and routing for a plurality of end systems in a network. The network contains a load balancer (LB) and the method comprises receiving a request packet with Internet Protocol version 6 (IPv6) addresses specified. A destination address is associated with a set of target end systems and presence of a nonce information indicates the requesting correspondent node is Identifier Locator Network Protocol (ILNP) capable. The method further comprises directing the request packet to a specific end system from the set of target end systems that share a load balanced address, wherein each target end system has a unique direct path locator prefix. The method also comprises overwriting a common IPv6 locator prefix with the unique direct path locator prefix, forwarding the request packet to the specific end system, and notifying a requesting correspondent node the direct path locator prefix for the specific end system. | 04-24-2014 |
20140115135 | METHOD AND SYSTEM OF FRAME BASED IDENTIFIER LOCATOR NETWORK PROTOCOL (ILNP) LOAD BALANCING AND ROUTING - A method to provide load balancing and routing for a plurality of end systems in a network. The network contains a load balancer (LB) and the method comprises receiving a request frame with Internet Protocol version 6 (IPv6) addresses specified. A destination address is associated with a set of target end systems and presence of a nonce option indicates the requesting correspondent node is Identifier Locator Network Protocol (ILNP) capable. The method further comprises directing the request frame to a specific end system from the set of target end systems that share a load balanced address, wherein each target end system has a unique Media Access Control (MAC) address, and wherein each end system of the set of target end systems is uniquely addressable using a unique direct path locator prefix and common identifier combination. The request frame is then forwarded to the specific end system. | 04-24-2014 |
20140129687 | ADDING DEVICE-WIDE CAPABILITIES AND PARAMETERS TO SPLIT-ARCHITECTURE DEVICES - A network element and process determines and configures capabilities of network element components. The network element components include a set of control elements where the set of control elements determine capabilities of each of a set of forwarding elements. The method includes initiating communication with a forwarding element in the set of forwarding elements by a control element. The control element requests that the forwarding element to provide a set of logical function block identifiers of supported logical function blocks for the forwarding element. The set of logical function block identifiers is then received from the forwarding element in response to the request. The set of logical function block identifiers are matched with known forwarding element capabilities to determine capabilities of the forwarding element. A forwarding element capability model is then updated with the capabilities of the forwarding element. | 05-08-2014 |
20140189160 | METHODS AND SYSTEMS FOR SEAMLESS NETWORK COMMUNICATIONS BETWEEN DEVICES RUNNING INTERNET PROTOCOL VERSION 6 AND INTERNET PROTOCOL VERSION 4 - Systems are provided including at least one identifier locator network protocol (ILNP) enabled mobile node running Internet protocol version 6 (IPv6). The mobile node is attached to an IPv6 network in an IPv6 domain. The system includes a virtual root server configured to receive a binding identifiers create (BIC) message from a domain name system 64 (DNS64) server associated with the IPv6 network. The BIC message includes an ILNP address of the mobile node running IPv6, a fake ILNP address of a destination device running IPv4 assigned by the DNS64 server and an ILNP address of the DNS64 server. The fake ILNP address includes a full real address of the destination device. The virtual root server is further configures to create a binding between the ILNP address of the mobile node and the fake ILNP address of the destination device; store the binding; and send a binding identifier acknowledgement (BIA) message to the DNS64 server. | 07-03-2014 |
20140258376 | Mist Networks - A method is implemented by a nano-box for providing processing resources to support application execution to a set of devices connected to a network of the nano-box. The method includes receiving application data for an application for a mobile or fixed device. The application is executed using the application data of the mobile or fixed device to generate an output. A handoff notification is received indicating that the root controller has reassigned the application to another nano-box in the set of nano-boxes based on best resource availability and minimum latency. In response, the nano-box updates the application data with a current state of the application and transmits the updated application data over the network to be provided to the other nano-box. | 09-11-2014 |
20140286348 | ARCHITECTURE FOR VIRTUALIZED HOME IP SERVICE DELIVERY - A method implemented by a network element of an Internet service provider to provide network access through a visited network associated with a visited network owner to a device of a visiting user connecting to the visited network. The visited network owner is a customer of the Internet service provider. The network element configures the visited network to provide access to resources of a remote home network to the device of the visiting user. The remote home network is in communication with the visited network over a wide area network. Connecting to a virtual gateway controller of the remote home network to obtain configuration information to establish a connection between the device and the remote home network. Establishing a connection between the device of the visiting user and a second access point. Providing access to the resource of the remote home network through the second access point. | 09-25-2014 |
20140321330 | CONTROLLER PLACEMENT FOR FAST FAILOVER IN THE SPLIT ARCHITECTURE - A method implemented by a network topology design system, the network topology design system including a processing device. The method to determine placement of a controller within a network with a split architecture where control plane components of the split architecture network are executed by a controller and the control plane components are separate from data plane components of the split architecture network. The placement of the controller is selected to minimize disruption of the split architecture network caused by a link failure, a switch failure or a connectivity loss between the controller and the data plane components. | 10-30-2014 |
20140328161 | ENHANCING A MOBILE BACKUP CHANNEL TO ADDRESS A NODE FAILURE IN A WIRELINE NETWORK - A method performed by a slave network edge node (e.g., a Broadband Network Gateway BNG2) for enhancing a Long Term Evolution (LTE) backup channel in the event of a failure of a master network edge node (e.g., BNG1) in a wireline network. When BNG2 detects the failure of BNG1, BNG2 sends a failure update message to a Packet Data Network Gateway (PDN GW) of an LTE network. The PDN GW provides a backup channel for the CPE to reach the wide area network over a mobile tunnel. Before the failure the mobile tunnel has an end point at BNG1, and the failure update message notifies the PDN GW that the end point of the mobile tunnel has changed from BNG1 to BNG2. After BNG2 receives a failure acknowledgement message from the PDN GW, BNG2 routes the traffic from the PDN GW over the mobile tunnel to the wide area network. | 11-06-2014 |
20140341029 | ENCODING A PAYLOAD HASH IN THE DA-MAC TO FACILITATE ELASTIC CHAINING OF PACKET PROCESSING ELEMENTS - A method is implemented in a network element of a service network. The network element executes a packet processing element (PPE) of a plurality of PPEs, where each PPE in the plurality of PPEs executes a stage of packet processing for the service network and where the plurality of PPEs are connected to one another by a plurality of switch fabrics. The PPEs self-select a subset of a set of equivalent service chains to service with each service chain defining a subset and sequence of the plurality of PPEs. Each PPE self-selects the subset of equivalent service chains to process based upon knowledge of the plurality of PPEs servicing that stage of the full set of service chains such that there is spreading of load across all available PPEs in that stage. There is no single point of failure and minimal reassignment of PPEs for a set of equivalent data flows traversing the plurality of PPEs of the service network for changes in topography of the plurality of PPEs in the service network. | 11-20-2014 |
20150163155 | DELAY-BASED TRAFFIC RATE CONTROL IN NETWORKS WITH CENTRAL CONTROLLERS - A process is performed by a controller in a split-architecture network. The controller monitors congestion of traffic groups across the split-architecture network and executes the process to provide delay based data rate control to alleviate congestion of the traffic groups. The process includes configuring an ingress switch and egress switch for each traffic group to collect delay measurement data for data packets of each traffic group as they arrive at the ingress switch and egress switch. The delay measurement data is received from the ingress switch and egress switch of each traffic group. A check is made whether a minimum data packet delay for any traffic group exceeds a defined threshold value. At least one traffic group is then identified in the split architecture network to discard in response to the threshold value being exceeded. | 06-11-2015 |
20150180705 | CONTROLLER PLACEMENT FOR FAST FAILOVER IN THE SPLIT ARCHITECTURE - A method implemented by a network topology design system, the network topology design system including a processing device. The method to determine placement of a controller within a network with a split architecture where control plane components of the split architecture network are executed by a controller and the control plane components are separate from data plane components of the split architecture network. The placement of the controller is selected to minimize disruption of the split architecture network caused by a link failure, a switch failure or a connectivity loss between the controller and the data plane components. | 06-25-2015 |
20160050131 | PASSIVE REACHABILITY MEASUREMENT FOR INLINE SERVICE CHAINING - A method is implemented by a computing device in communication with a network having a plurality of switches. The method performs path correctness testing where the path defines a service chain associated with a flow of data. The method configures the plurality of switches using a flow control protocol. The method includes the steps of selecting a switch from the path to configure path correctness testing, sending a configuration request to the selected switch to instate at least one rule for testing path correctness, receiving copies of flow packets from at least one switch in the path, and comparing the copies of flow packets with a service chain configuration of the flow to confirm path correctness. | 02-18-2016 |
Patent application number | Description | Published |
20120171141 | EMULSIONS CONTAINING A MICRONIZED WAX - The invention relates to a composition comprising at least one micronized wax which, if desired, can be processed at room temperature. | 07-05-2012 |
20120171142 | COMPOSITIONS CONTAINING A MICRONIZED WAX - The invention relates to a composition comprising at least one oil-dispersible micronized wax which, if desired, can be processed at room temperature. | 07-05-2012 |
20120301415 | COMPOSITIONS HAVING ENHANCED COSMETIC PROPERTIES - A cosmetic composition and process which provides enhanced wear, comfort and feel, the composition containing: (a) at least one polypropylsilsesquioxane film forming resin; (b) at least one polymer chosen from a polyorganosiloxane copolymer and a silicone acrylate copolymer; (c) at least one solvent; and (d) optionally, at least one colorant. | 11-29-2012 |
20130129649 | SUNSCREEN COMPOSITIONS HAVING SYNERGISTIC COMBINATION FO UV FILTERS - The disclosure relates to sunscreen compositions having a synergistic combination of ultraviolet light (UV) filtering agents that provide a high sun protection factor (SPF). Compositions according to the disclosure have high SPF values without requiring high overall amounts of UV filtering agents. Furthermore, the disclosure relates to methods of using the described compositions for protecting keratinous substances such as skin and hair from UV radiation. | 05-23-2013 |
20140004069 | COMPOSITION COMPRISING A POLYOL AND A OIL-SOLUBLE HIGH CARBON POLAR MODIFIED POLYMER | 01-02-2014 |
20140037565 | COMPOSITION COMPRISING A POLYOL AND A OIL-SOLUBLE POLAR MODIFIED POLYMER - The invention relates to a composition comprising a oil-soluble polar modified polymer and a hyperbranched polyol. | 02-06-2014 |
20140170093 | SUNSCREEN COMPOSITIONS HAVING SYNERGISTIC COMBINATION OF UV FILTERS - The disclosure relates to sunscreen compositions having a synergistic combination of ultraviolet light (UV) filtering agents that provide a high sun protection factor (SPF). Compositions according to the disclosure have high SPF values without requiring high overall amounts of UV filtering agents. Furthermore, the disclosure relates to methods of using the described compositions for protecting keratinous substances such as skin and hair from UV radiation. | 06-19-2014 |
20140170094 | SUNSCREEN COMPOSITIONS HAVING SYNERGISTIC COMBINATION OF UV FILTERS - The disclosure relates to sunscreen compositions having a synergistic combination of ultraviolet light (UV) filtering agents that provide a high sun protection factor (SPF). Compositions according to the disclosure have high SPF values without requiring high overall amounts of UV filtering agents. Furthermore, the disclosure relates to methods of using the described compositions for protecting keratinous substances such as skin and hair from UV radiation. | 06-19-2014 |
20140170095 | SUNSCREEN COMPOSITIONS HAVING SYNERGISTIC COMBINATION OF UV FILTERS - The disclosure relates to sunscreen compositions having a synergistic combination of ultraviolet light (UV) filtering agents that provide a high sun protection factor (SPF). Compositions according to the disclosure have high SPF values without requiring high overall amounts of UV filtering agents. Furthermore, the disclosure relates to methods of using the described compositions for protecting keratinous substances such as skin and hair from UV radiation. | 06-19-2014 |
20140170192 | SUNSCREEN COMPOSITIONS - The instant disclosure relates to sunscreen compositions. The sunscreen compositions include (a) at least one UV filter (b) at least one booster, (c) at least one thermosensitive polymer, and (d) at least one wetting agent. Sunscreen compositions comprising components (a)-(d) exhibit a surprisingly high sun protection factor (SPF). The disclosure further relates to methods of using the sunscreen compositions for protecting keratinous substances such as skin and hair from UV radiation. | 06-19-2014 |
20140186411 | LOW VISCOSITY META-STABLE PHOTOPROTECTION COMPOSITION - A meta-stable photoprotective composition, a product including the meta-stable composition, and a method of protecting a keratinous substrate from UV radiation by applying the product are provided. The meta-stable photoprotective composition includes at least one water-in-oil emulsifier having a hydrophilic-lipophilic balance (HLB) of less than 6, at least one non-ionic oil-in-water emulsifier having an HLB of greater than 9, at least one ionic surfactant, and at least one sunscreen active ingredient. The weight ratio of the at least one non-ionic oil-in-water emulsifier to the at least one water-in-oil emulsifier is about 0.2 to about 2.0. The meta-stable composition converts from an oil-in-water (O/W) emulsion to a water-in-oil (W/O) emulsion upon rubbing. | 07-03-2014 |
20140194534 | REFRESHING CREAM FOUNDATION IN GEL FORM - The present invention is directed to a cosmetic composition includes (a) at least one compound selected from a sugar silicone surfactant, a gelling agent, a polyamine and a hyperbranched polyol; and (b) at least one polar modified polymer. | 07-10-2014 |
20150352016 | META-STABLE COSMETIC OR SKIN CARE COMPOSITION - A meta-stable composition, a product including the meta-stable composition, and a method of protecting a keratinous substrate from UV radiation by applying the product are provided. The meta-stable cosmetic composition includes at least one water-in-oil emulsifier having a hydrophilic-lipophilic balance (HLB) of less than 6, at least one non-ionic oil-in-water emulsifier having an HLB of greater than 9, at least one ionic surfactant, and at least one skin care active ingredient. The weight ratio of the at least one non-ionic oil-in-water emulsifier to the at least one water-in-oil emulsifier is about 0.02 to about 2.0. The meta-stable cosmetic composition converts from an oil-in-water (O/W) emulsion to a water-in-oil (W/O) emulsion upon rubbing. | 12-10-2015 |