Patent application number | Description | Published |
20130206157 | METHOD AND PRODUCT FOR ATTAINING A FRENCH MANICURE USING A DRY NAIL APPLIQUE - A dry nail tip appliqué for applying nail enamel to a nail tip. The nail tip appliqué is configured to conform to the size and shape of a respective nail tip and allows for a convenient and neat application of a French-style manicure. | 08-15-2013 |
20130220355 | METALLIC FOIL NAIL APPLIQUES - A multi-layered foil appliqué for decorating nails is cut from a laminated sheet having the following layers: a first adhesive layer residing on a releasable substrate; a base coat residing on the first adhesive layer; a UV-curable adhesive layer residing on the base coat; a foil layer residing on the UV-curable adhesive layer; and a top coat residing on the foil layer. The foil is applied to the UV-curable adhesive layer by contact between the metallic side of a metallized plastic sheet and the adhesive before the adhesive is cured. The bottom coat and top coat are formed from organic solvent-based nail enamels. Sufficient solvent remains in the appliqué to keep it stretchable before use. Residual solvent evaporates after the appliqué is applied to a user's nail. | 08-29-2013 |
20140020700 | DRY NAIL APPLIQUE PACKAGING SYSTEM - A package for nail polish appliqués includes a carton having a front wall defining an aperture therein, and an insert sized and shaped to fit inside the carton. The insert has a front wall and a window that projects outwardly from its front wall and through the aperture of the carton when the insert is inserted into the carton. The insert contains a packet of nail polish appliqués, and an object that displays a design corresponding to the design of the nail polish appliqués, wherein the object is displayed through the window. A method for assembling the package is also disclosed. | 01-23-2014 |
20140042341 | APPARATUSES AND METHODS FOR CURING UV FINGERNAIL GEL WITH MINIMAL UV EXPOSURE - A UV curing device that includes a UV light source, a lens positioned proximate the UV light source, control means for actuating the UV light source; and safety means for minimizing inadvertent pointing of a UV light beam from said UV curing device into an eye. The UV curing device is used to sequentially, separately and individually apply UV light to cure UV gel on each of a plurality of fingernails. | 02-13-2014 |
20140326266 | DOUBLE COLORED NAIL APPLIQUE HAVING A ULTRA-VIOLET CURED LAYER, METHOD OF MAKING AND USING - A double colored nail appliqué, method of manufacturing and using, the appliqué having two different decorations sequentially via the user removing the top coat of a second colored enamel layer to expose an underlying base coat with a different, first colored enamel layer. The base coat is covered by a UV adhesive layer that protects it during the removal of the top coat. The nail appliqué may further comprise a metallic foil layer directly above or below the UV layer; a design imprinted on the top or bottom coat of enamel; and, a clear coat of enamel covering the top coat. Removal of the top coat(s) by the user does not damage the underlying coats/layers. Therefore, one nail appliqué can be used to offer two different appearing manicures without having to apply a new nail appliqué. | 11-06-2014 |
Patent application number | Description | Published |
20080236603 | Method and Product for Attaining a French Manicure Using a Dry Nail Applique - A dry nail tip appliqué for applying nail enamel to a nail tip. The nail tip appliqué is configured to conform to the size and shape of a respective nail tip and allows for a convenient and neat application of a French-style manicure. | 10-02-2008 |
20080276951 | Method and Product for attaining a French Manicure Using a Dry Nail Polish Applique - A dry nail tip appliqué system for applying nail enamel to a nail tip. The nail tip appliqué comprises two distinct sections, a first section for coating the entire surface of a finger nail and a second section for applying dry nail polish to a nail tip. The two sections occupy distinct areas of an appliqué and each contains a handling tab. The nail polish material of the two sections are not contiguous with each other. This allows for a convenient and neat removal of the sections and for the application of the same. | 11-13-2008 |
20080283073 | Double-Ended Dry Nail Polish Applique for Coating a Wide Range of Fingernail Sizes - A nail appliqué product for applying dry nail polish to a fingernail. The appliqué has two ends—each of which is functionally useful for coating a fingernail. The two ends are each differently sized so that with each inventive appliqué a user is presented with two different choices of sizes to match to her particular fingernail. In one preferred embodiment, a buffer section also is provided to ensure that the functional and aesthetic integrity is preserved when the appliqué is removed from its backing. | 11-20-2008 |
20100047301 | Dry Nail Polish Applique Delivery System - A nail appliqué product for delivering nail additives to a fingernail. The appliqué has an adhesive layer that, in use, is in direct contact with a wearer's fingernail. The adhesive layer contains additives such as vitamins, minerals and/or drugs that are delivered to a fingernail after the appliqué is affixed thereto. The appliqué is flexible and conformable to a fingernail and it continues to deliver additive for an extended period of time. | 02-25-2010 |
20100212681 | Multi-Layered Color-Enhancing Nail Applique - A thy nail polish appliqué to be applied to a fingernail. The nail appliqué has several layers. A bottom layer hides the color of the natural nail upon which the appliqué is applied. A top layer of a different color is applied on top of the color-hiding layer. The color of the top layer is, as such, uninfluenced by the natural nail color and it therefore appears sharp and crisp. The top layer could be of a translucent quality such that the top layer and bottom layer visually combine to produce a unique appearance | 08-26-2010 |
20120103354 | Method and Apparatus for Enhancing UV Gel Nail Application - A method of applying a UV gel manicure to a fingernail and a method for achieving a UV gel fingernail extension. First a nail appliqué made of dry nail enamel is applied to a fingernail. A UV gel is then applied with a brush on top of nail appliqué and is cured using a UV lamp. The result is a UV manicure that applied faster than a conventional UV manicure and it is healthier for a nail. UV nail extensions are achieved by applying an appliqué which overhangs from a fingernail and applying and curing UV gel on top of the appliqué. | 05-03-2012 |
20120103865 | Pod Packaging System - A pod package for nail appliqués formed of enamel in which a pod is used to hold a number of nail appliqués stacked one on another. The pod is made of a well that is sealed in an airtight fashion. The pod is held in a rectangular container that is sized and shaped to fit on standard nail polish displays. | 05-03-2012 |
Patent application number | Description | Published |
20090209347 | START OF GAME DELAY VIA SPECTATOR FUNCTION FOR USE IN TELEVISION PRODUCTION - Systems, methods, and apparatuses for presenting video game contests via television. A system in accordance with one or more embodiments of the present invention comprises a network of gaming platforms, wherein the network of gaming platforms comprise at least one player platform and at least one spectator platform, each gaming platform in the network of gaming platforms having a video output, wherein the at least one spectator platform has a delayed start in the video game contest, a plurality of converters, each converter in the plurality of converters respectively coupled to the video outputs of the gaming platforms, a production facility, coupled to the plurality of converters, for viewing the video outputs of the gaming platforms via the plurality of converters and for selecting a chosen video output to be broadcast, and a broadcast system, coupled to the production facility, for distributing the chosen video output. | 08-20-2009 |
20090209348 | LIVE IN-GAME SPECTATOR FOR USE IN TELEVISION PRODUCTION - Systems, methods, and devices for presenting video game contests via television are presented. A system in accordance with one or more embodiments of the present invention comprises a network of gaming platforms, wherein the network of gaming platforms comprise at least one player platform and at least one spectator platform, the at least one spectator platform having a viewing perspective different from that of the at least one player platform, each gaming platform in the network of gaming platforms having a video output, a plurality of converters, each converter in the plurality of converters respectively coupled to the video outputs of the gaming platforms, a production facility, coupled to the plurality of converters, for viewing the video outputs of the gaming platforms via the plurality of converters and for selecting a chosen video output to be broadcast, and a broadcast system, coupled to the production facility, for distributing the chosen video output. | 08-20-2009 |
Patent application number | Description | Published |
20120197292 | PATENT FORAMEN OVALE CLOSURE METHOD - The present invention relates to devices for closing a passageway in a body, for example a patent foramen ovale (PFO) in a heart, and related methods of using such closure devices for closing the passageway. The method includes introducing a mechanical closure device into an atrium of the heart and transeptally deploying the closure device across the interatrial septum to provide proximation of the septum secundum and septum primum. | 08-02-2012 |
20130190787 | IMPLANTABLE FLOW CONNECTOR - A method of implanting and securing an implantable flow connector in a body of a patient for providing communication of a first space within the body of the patient with a second space within the body of the patient. The method includes providing a flow connector having a lumen having a first orifice and a second orifice, inserting a retention device into the first space within the body, subsequently inserting the flow connector through an opening in the retention device so the second portion of the flow connector extends into the first space within the body and placing the second space within the body over the retention device. | 07-25-2013 |
20130197546 | IMPLANTABLE FLOW CONNECTOR - A system for coupling a first space within the body of a patient with a second space within the body of the patient including a flow connector insertable into the first and second spaces within the body, the flow connector having a conduit having a lumen having a first orifice at a first portion of the conduit and a second orifice at a second portion of the conduit, the conduit providing communication between the first and second spaces within the body. A retention device retains the conduit with respect to the first space within the body and is engageable with the first space within the body. | 08-01-2013 |
20130296924 | PATENT FORAMEN OVALE CLOSURE DEVICE - A device and method for deploying a mechanical closure device for closing a passageway in a body, for example a patent foramen ovale (PFO) in a heart. The deployment device has a first tubular structure having proximal and distal ends. A second tubular structure is substantially coaxial to and slideably engaged within the first tubular structure. The second tubular structure has a first substantially linear shape when constrained within the first tubular structure, and a second curvilinear shape when telescopically extended from the distal end of the first tubular structure. A third tubular structure is substantially coaxial to and slideably engaged within the second tubular structure. The third tubular structure is configured to provide sufficient rigidity to push the mechanical closure device from the distal end of the second tubular structure, and provide sufficient flexibility to assume a curvilinear shape when deflected by the second tubular structure. | 11-07-2013 |
20150223817 | IMPLANTABLE FLOW CONNECTOR - A system for coupling a first space within the body of a patient with a second space within the body of the patient including a flow connector insertable into the first and second spaces within the body, the flow connector having a conduit having a lumen having a first orifice at a first portion of the conduit and a second orifice at a second portion of the conduit, the conduit providing communication between the first and second spaces within the body. A retention device retains the conduit with respect to the first space within the body and is engageable with the first space within the body. | 08-13-2015 |
Patent application number | Description | Published |
20090010509 | Method and system for detection of deformable structures in medical images - A method and system for detection of deformable structures in medical images is disclosed. Deformable structures can represent blood flow patterns in images such as Doppler echocardiograms. A probabilistic, hierarchical, and discriminant framework is used to detect such deformable structures. This framework integrates evidence from different primitive levels via a progressive detector hierarchy, including a series of discriminant classifiers. A target deformable structure is parameterized by a multi-dimensional parameter, and primitives or partial parameterizations of the parameter are determined. An input image is received, and a series of primitives are sequentially detected using the progressive detector hierarchy, in which each detector or classifier detects a corresponding primitive. The final detector detects configuration candidates for the deformable structure. | 01-08-2009 |
20090034808 | Automatic Cardiac View Classification of Echocardiography - A method for view classification includes providing a frame of an object of interest, detecting a region of interest within the object of interest for each of a plurality of detectors (e.g., binary classifiers), wherein each binary classifier corresponds to a different view, performing a global view classification using a multiview classifier for each view, outputting a classification for each view, fusing outputs of the multiview classifiers, and determining and outputting a classification of the frame based on a fused output of the multiview classifiers. | 02-05-2009 |
20090088640 | Automated View Classification With Echocardiographic Data For Gate Localization Or Other Purposes - A view represented by echocardiographic data is classified. A probabilistic boosting network is used to classify the view. The probabilistic boosting network may include multiple levels where each level has a multi-class local structure classifier and a plurality of local-structure detectors corresponding to the respective multiple classes. In each level, the local structure is classified as a particular view and then the local structure is detected to determine whether the currently selected local structure corresponds to the class. The view classification may be used to determine gate locations, such as a gate for spectral Doppler analysis. | 04-02-2009 |
20090310837 | Method and System for Automatic Detection and Measurement of Mitral Valve Inflow Patterns in Doppler Echocardiography - A method and system for segmentation of mitral valve inflow (MI) patterns in Doppler echocardiogram images is disclosed. Trained root detectors are used to detect left root candidates, right root candidates, and peak candidates in an input Doppler echocardiogram image. Two global structure detectors, a single triangle detector for non-overlapping E-waves and A-waves and a double triangle detector for overlapping E-waves and A-waves, are used to detect single triangle candidates and double triangle candidates based on the left root, right root, and peak candidates. A shape profile is used to determine a shape probability for each of the single triangle candidates and each of the double triangle candidates. The best single triangle candidate and the best double triangle candidate are selected based on shape probability and detection probability. One of the best single triangle candidate and the best double triangle candidate is selected as the final segmentation result based on a shape probability comparison. | 12-17-2009 |
20110021915 | Detection of Structure in Ultrasound M-Mode Imaging - Automated detection of structure is provided in ultrasound M-mode imaging. A coarse and fine search for structure is used. For example, a less noise susceptible initial position or range of positions for a given structure is determined. This position is then refined. The coarse positioning and/or the refined position may use machine-trained classifiers. The positions of other structure may be used in either coarse or fine positioning, such as using a Markov Random Field. The structure or structures may be identified in the M-mode image without user input of a location in the M-mode image or along the line. | 01-27-2011 |
Patent application number | Description | Published |
20090204143 | Distal Protection Filter with Improved Wall Apposition - In accordance with the present invention, a distal protection and embolic material retrieval device with improved apposition to both large and small vessel walls of varying geometries for enhancing the filtering of embolic material during intravascular procedures while allowing for the passage of blood is provided. The device includes a filter basket designed to maximize apposition of the filtering portion to that of the vessel wall and may include struts which provide circumferential support to the filtering membrane and thereby minimizing or eliminating in-folding of the filter basket. Thin film materials may also be utilized for the filtering membrane of the filter basket. In addition one can incorporate biological and/or pharmaceutical agents in combination with the present invention. | 08-13-2009 |
20090222077 | METHOD AND DEVICE FOR ATTACHING A STENT STRUCTURE TO AAA GRAFT MATERIAL - An aneurysmal repair system that utilizes a modified intraluminal scaffold apex and a delta stitch suture to secure graft material to the scaffold structure allows for no relative movement between the graft material and the scaffold structure. The absence of relative movement reduces the wear on the graft material. | 09-03-2009 |
20090270967 | STENT ATTACHMENT AND DEPLOYMENT MECHANISM - A stent attachment and deployment mechanism is utilized to prevent the distal end of an endoprosthesis comprising fixation barbs or other fixation mechanism from deploying prior to the remaining sections of the fixation device. With this stent attachment and deployment mechanism accurate deployment may be achieved. | 10-29-2009 |
20100312330 | TWISTED ANCHORING BARB FOR STENT OF ABDOMINAL AORTIC ANEURYSM (AAA) DEVICE - A stent is provided for an endoprosthesis having a main body portion and two leg portions, particularly suitable for treatment of an abdominal aortic aneurism. The stent includes barbs that are twisted and shaped set to point radially outward. Each barb, as formed, points substantially perpendicular relative to the longitudinal axis of the stent, even when in a non-deployed configuration. The motion to move the barb into a deployed configuration for gripping tissue is a twisting motion which moves the barb from being substantially aligned with the circumference of the stent to extending radially outwards from the stent. | 12-09-2010 |
20100318177 | TWISTED ANCHORING BARB FOR STENT OF ABDOMINAL AORTIC ANEURYSM (AAA) DEVICE - A stent is provided for an endoprosthesis having a main body portion and two leg portions, particularly suitable for treatment of an abdominal aortic aneurism. The stent includes barbs that are twisted and shaped set to point radially outward. Each barb, as formed, points substantially perpendicular relative to the longitudinal axis of the stent, even when in a non-deployed configuration. The motion to move the barb into a deployed configuration for gripping tissue is a twisting motion which moves the barb from being substantially aligned with the circumference of the stent to extending radially outwards from the stent. | 12-16-2010 |
20140222040 | Method and Device for Connecting a Conduit to a Hollow Organ - This invention provides an improved method for connecting a conduit to a hollow organ/structure and a unique device consisting of an expandable metallic mesh and a bio-compatible graft material. | 08-07-2014 |
20160096008 | IMPLANTABLE FLOW CONNECTOR - A system for coupling a first space within a body of a patient with a second space within the body of the patient including a flow connector insertable into the first and second spaces within the body and having a conduit having a wall forming a lumen therein and first and second orifices. A first retention member is engageable with a first portion of the first space within the body and has a first opening, and the flow connector is positioned within the first opening. A second retention member is engageable with the second space within the body, the second retention member has a second opening and the flow connector is positioned within the second opening. The second retention member interlocks with the first retention member. | 04-07-2016 |
Patent application number | Description | Published |
20130216184 | CONFIGURABLE PITCH REDUCING OPTICAL FIBER ARRAY - The inventive optical fiber coupler array is capable of providing a low loss, high-coupling coefficient interface with high accuracy and easy alignment between a plurality of optical fibers (or other optical devices) with a first channel-to-channel spacing, and an optical device having a plurality of closely-spaced waveguide interfaces with a second channel-to-channel spacing, where each end of the optical fiber coupler array is configurable to have different channel-to-channel spacing, each matched to a corresponding one of the first and second channel-to-channel spacing. The novel optical coupler array includes a plurality of waveguides (at least one of which may optionally be polarization maintaining), that comprises at least one gradually reduced vanishing core fiber, at least in part embedded within a common housing structure. Alternatively, the novel coupler array may be configured for utilization with at least one of an optical fiber amplifier and an optical fiber laser. | 08-22-2013 |
20130301991 | CONFIGURABLE PITCH REDUCING OPTICAL FIBER ARRAY - The inventive optical fiber coupler array is capable of providing a low loss, high-coupling coefficient interface with high accuracy and easy alignment between a plurality of optical fibers (or other optical devices) with a first channel-to-channel spacing, and an optical device having a plurality of closely-spaced waveguide interfaces with a second channel-to-channel spacing, where each end of the optical fiber coupler array is configurable to have different channel-to-channel spacing, each matched to a corresponding one of the first and second channel-to-channel spacing. The novel optical coupler array includes a plurality of waveguides (at least one of which may optionally be polarization maintaining), that comprises at least one gradually reduced vanishing core fiber, at least in part embedded within a common housing structure. Alternatively, the novel coupler array may be configured for utilization with at least one of an optical fiber amplifier and an optical fiber laser. | 11-14-2013 |
20140294345 | OPTICAL COMPONENT ASSEMBLY FOR USE WITH AN OPTICAL DEVICE - The inventive optical component assembly advantageously enables a multi-waveguide optical component (such as the inventive optical fiber coupler array, a multi-core optical fiber, etc.), to be coupled to at least one waveguide of an optical device at a predefined coupling angle. The optical component assembly of the present invention comprises a multi-waveguide optical component with an output end, a prism having an input surface, an output surface, and an internal reflective surface with a predefined reflection angle, and a GRIN lens, positioned between the component output end and the prism input surface, along a longitudinal axis of the multi-waveguide optical component. In accordance with the present invention, the length of the GRIN lens, and its refractive index gradient profile are optimized to form an optical image of the output end of the multi-waveguide optical component, at the output surface of the prism, thus enabling the output surface of the prism to be coupled to at least one waveguide of an optical device, with the predefined reflection angle corresponding to the angle at which the multi-waveguide optical component may be coupled to the optical device. | 10-02-2014 |
Patent application number | Description | Published |
20120093514 | BI-DIRECTIONAL CWDM (OR DWDM) TRANSMISSION SYSTEM USING SINGLE WAVELENGTH BI-DIRECTIONAL TRANSCEIVERS - The present invention provides a bi-directional CWDM (or DWDM) transmission system using SWBiDi transceivers for a continuous and simultaneous communication in both directions comprising an optical link fiber, first n CWDM (or DWDM) SWBiDi transceivers at a first end of the optical link fiber, second n CWDM (or DWDM) SWBiDi transceivers at a second end of the optical link fiber, a first optical CWDM (or DWDM) MUX/DEMUX between first n CWDM (or DWDM) SWBiDi transceivers and the optical link fiber, and a second optical CWDM (or DWDM) MUX/DEMUX between second n DWDM SWBiDi transceivers and the optical link fiber. | 04-19-2012 |
20130039652 | SCHEME OF REMOTE CONTROL OF THE SLICING LEVEL OF A RECEIVER IN A SMART TRANSCEIVER - A scheme is described of remote control of the slicing level of a receiver in a smart SFP (or SFP+, or XFP) duplex (or BiDi, or SWBiDi) transceiver in a communication system using an operating system with OAM and PP functions, an OAM, PP & Payload Processor, a transceiver, a BERT, and an optical link in the field. | 02-14-2013 |
20130039654 | SCHEME FOR REMOTE CONTROL OF THE OUTPUT POWER OF A TRANSMITTER IN A SMART SFP TRANSCEIVER - A scheme is described for remote control of the output power of a transmitter in a smart SFP (or SFP+, or XFP) duplex (or BiDi, or SWBiDi) transceiver in a communication system using an operating system with OAM and PP functions, an OAM, PP & Payload Processor, a transceiver, an optical power meter (optional), a BERT, and an optical link in the field. | 02-14-2013 |
20130071108 | SCHEME FOR REMOTE CONTROL OF THE WAVELENGTH OF A TUNABLE TRANSMITTER IN A SMART TRANSCEIVER - A scheme is described for remote control of the wavelength of a tunable transmitter in a smart SFP transceiver, a smart SFP+ transceiver, a smart XFP transceiver, a smart duplex transceiver, a smart BiDi transceiver, or a smart SWF BiDi transceiver in a communication system using an operating system with OAM and PP functions; an OAM, PP & Payload Processor; a transceiver; an optical spectrum analyzer; a BERT; and an optical link in the field. | 03-21-2013 |
20150139639 | SCHEME OF REMOTE CONTROL OF THE SLICING LEVEL OF A RECEIVER IN A SMART TRANSCEIVER - A scheme is described of remote control of the slicing level of a receiver in a smart SFP (or SFP+, or XFP) duplex (or BiDi, or SWBiDi) transceiver in a communication system using an operating system with OAM and PP functions, an OAM, PP & Payload Processor, a transceiver, a BERT, and an optical link in the field. | 05-21-2015 |
20150200728 | SCHEME FOR REMOTE CONTROL OF THE OUTPUT POWER OF A TRANSMITTER IN A SMART SFP TRANSCEIVER - A scheme is described for remote control of the output power of a transmitter in a smart SFP (or SFP+, or XFP) duplex (or BiDi, or SWBiDi) transceiver in a communication system using an operating system with OAM and PP functions, an OAM, PP & Payload Processor, a transceiver, an optical power meter (optional), a BERT, and an optical link in the field. | 07-16-2015 |
Patent application number | Description | Published |
20090074890 | Substituted Triazoles as Sodium Channel Blockers - Substituted triazole compounds represented by Formula I, II or III, or pharmaceutically acceptable salts thereof. Pharmaceutical compositions comprise an effective amount of the instant compounds, either alone, or in combination with one or more other therapeutically active compounds, and a pharmaceutically acceptable carrier. Methods of treating conditions associated with, or caused by, sodium channel activity, including, for example, acute pain, chronic pain, visceral pain, inflammatory pain, neuropathic pain, migraine, headache pain, migraine headache, epilepsy, irritable bowel syndrome, diabetic neuropathy, multiple sclerosis, manic depression and bipolar disorder, comprise administering an effective amount of the present compounds, either alone, or in combination with one or more other therapeutically active compounds. A method of administering local anesthesia comprises administering an effective amount of a compound of the instant invention, either alone, or in combination with one or more other therapeutically active compounds, and a pharmaceutically acceptable carrier (I), (II), (III). | 03-19-2009 |
20100087446 | 2-SUBSTITUTED INDOLE DERIVATIVES AS CALCIUM CHANNEL BLOCKERS - 2-Substituted indole derivatives represented by Formula I, or pharmaceutically acceptable salts thereof. Pharmaceutical compositions comprise an effective amount of the instant compounds, either alone, or in combination with one or more other therapeutically active compounds, and a pharmaceutically acceptable carrier. Methods of treating conditions associated with, or caused by, calcium channel activity, including, for example, acute pain, chronic pain, visceral pain, inflammatory pain, neuropathic pain, urinary incontinence, itchiness, allergic dermatitis, epilepsy, diabetic neuropathy, irritable bowel syndrome, depression, anxiety, multiple sclerosis, bipolar disorder and stroke, comprise administering an effective amount of the present compounds, either alone, or in combination with one or more other therapeutically active compounds. | 04-08-2010 |
20130317057 | ALDOSTERONE SYNTHASE INHIBITORS - The invention involves compounds of structural Formula (I) and the pharmaceutically acceptable salts thereof. The compounds of the invention are effective at selectively inhibiting CYP11B2, and are therefore useful for the treatment or prophylaxis of disorders that are associated with elevated aldosterone levels, including, but not limited to, hypertension and heart failure. | 11-28-2013 |
20140235667 | IMIDAZOPYRIDYL COMPOUNDS AS ALDOSTERONE SYNTHASE INHIBITORS - This invention relates to imidazopyridyl compounds of the structural formula: I or their pharmaceutically acceptable salts, wherein the variable are defined herein. The inventive compounds selectively inhibit aldosterone synthase. This invention also provides for pharmaceutical compositions comprising the compounds of Formula I or their salts as well as potentially to methods for the treatment, amelioration or prevention of conditions that could be treated by inhibiting aldosterone synthase. | 08-21-2014 |
20140288094 | PYRAZOLOPYRIDYL COMPOUNDS AS ALDOSTERONE SYNTHASE INHIBITORS - This invention relates to pyrazolopyridyl compounds of the structural formula: | 09-25-2014 |
20160031882 | IMIDAZOPYRIDYL COMPOUNDS AS ALDOSTERONE SYNTHASE INHIBITORS - This invention relates to imidazopyridyl compounds of the structural formula: | 02-04-2016 |
Patent application number | Description | Published |
20080227459 | METHODS AND APPARATUS FOR THE UTILIZATION OF CORE BASED NODES FOR STATE TRANSFER - Methods and apparatus for storing, manipulating, retrieving, and forwarding state, e.g., context and other information, used to support communications sessions with one or more end nodes, e.g., mobile devices, are described. Various features are directed to a mobile node controlling the transfer of state from a first access node to a second access node during a handoff operation thereby eliminating any need for state transfer messages to be transmitted between the second access node and the first access node during handoff. Other features of the invention are directed to the use of a core network node to store state information. State information stored in the core node can be accessed and used by access nodes in cases where a mobile node does not send a state transfer message during a handoff, e.g., because communication with the first access node is lost or because such messages are not supported. | 09-18-2008 |
20090270120 | METHOD AND APPARATUS FOR SUPPRESSING A RESPONSE FROM A TERMINAL OPERATING IN A GROUP COMMUNICATIONS SYSTEM - An apparatus and associated method, wherein the method provided for facilitating receiving a request that requires a reply within a first time, determining a first maximum time to reply using a first criteria, wherein the maximum time to reply is less than the first time, and selecting a reply time, wherein the reply time is not greater than the maximum time to reply. | 10-29-2009 |
20100027476 | METHODS AND APPARATUS FOR DOWNLINK MACRO-DIVERSITY IN CELLULAR NETWORKS - The invention described herein enables a form of downlink macro-diversity in packet-switched cellular networks. It allows packets to be selectively delivered from a network/internetwork to an end node, e.g., a wireless communication device or terminal, over a set of available link-layer connections to/from the end node, through one or more access nodes, e.g., base stations. Downlink macro-diversity is particularly important when the link-layer connections between the end node and the corresponding access node, e.g., the access links, are subject to independent or partially correlated time variations in signal strength and interference. In accordance with the invention, the end node dynamically selects the downlink to be used out of a set of available access links on a per packet basis subject to prevailing channel conditions, availability of air-link resources and other constraints. The invention improves the robustness and efficiency of communication, overall utilization of air-link resources, and quality of service experienced by the end node. | 02-04-2010 |
20120087312 | METHOD AND APPARATUS FOR END NODE ASSISTED NEIGHBOR DISCOVERY - Methods and apparatus for using end nodes, e.g., wireless terminals, to discover base stations and communicate information about discovered access nodes, e.g., base stations, to other access nodes in a system are described. As the wireless terminal roams in the system and new access nodes are encountered, one or more physically adjacent access nodes will be informed of the presence of the new access node as a result of communications with the wireless terminal. A message indicating an access node's inability to route a message to another access node which is known to a wireless terminal may trigger the wireless terminal to begin the process of updating access node routing and neighbor information. | 04-12-2012 |
20140112163 | SUPPRESSING WIRELESS BROADCAST/MULTICAST DATA TRANSMISSIONS - A method, an apparatus, and a computer program product for wireless communication are described. The apparatus wirelessly transmits a reservation signal intended for a plurality of receivers for scheduling a broadcast/multicast data transmission, monitors for a confirmation signal from at least one of the plurality of receivers, wirelessly transmits the broadcast/multicast data transmission to the plurality of receivers if the confirmation signal is received, and suppresses transmission of the broadcast/multicast data to the plurality of receivers if the confirmation signal is not received. In some embodiments, the apparatus further determines at least one of a number of received confirmation signals or a signal strength of a received confirmation signal from the at least one of the plurality of receivers, and suppresses transmission of the broadcast/multicast data based on the determined at least one of the number of received confirmation signals or the signal strength of the received confirmation signal. | 04-24-2014 |
20140119262 | COORDINATED TRANSMISSION RATE AND CHANNEL SCHEDULING FOR WIRELESS MULTICAST AND BROADCAST - A method, an apparatus, and a computer program product for wireless communication are provided. The apparatus receives indication of a transmission scheme for decoding multicast/broadcast data transmitted from a sender, receives a reservation signal for the multicast/broadcast data from the sender, determines whether the receiver is capable of decoding the multicast/broadcast data at the indicated transmission scheme, and transmits a confirmation signal for the multicast/broadcast data to the sender after determining that the receiver is capable of decoding the multicast/broadcast data at the indicated transmission scheme. The apparatus receives the multicast/broadcast data according to the transmission scheme after the confirmation signal is transmitted. Alternatively, the apparatus suppresses transmission of the confirmation signal when it is determined that the receiver is not capable of decoding the multicast/broadcast data at the indicated transmission scheme. | 05-01-2014 |
20140126453 | MULTICAST OVER WIRELESS NETWORK WITH THE ASSISTANCE OF POWER-EFFICIENT PEER GROUP DISCOVERY - A method, an apparatus, and a computer program product for wireless communication are provided. The apparatus may be a data source determining to send a multicast transmission for a multicast group having a multicast group identifier, wirelessly communicating an expression with at least one node in the multicast group, the expression based on the multicast group identifier, and sending the multicast transmission to the at least one node. The apparatus may a data receiver determining to receive a multicast transmission for a multicast group having a multicast group identifier, wirelessly communicating an expression with a data source in the multicast group, the expression based on the multicast group identifier, and receiving the multicast transmission from the data source. | 05-08-2014 |
Patent application number | Description | Published |
20140024378 | METHOD OF USING UE DISCOVERY FOR PAGING OPTIMIZATION - Methods and apparatus are described for refining, e.g., reducing, a paging area corresponding to a user equipment device, e.g., a cellular inactive UE device. Various embodiments are well suited for communications systems in which user equipment devices participate in peer to peer communications networks in which direct user device to user device communications are employed. A user equipment device participating in a peer to peer network transmits discovery signals. A femto base station and/or a cellular active UE device in the local vicinity of the UE device transmitting the peer to peer discovery signal eavesdrops on the peer discovery signaling and detects the presence of the cellular inactive UE device. The detection of the cellular inactive UE device is reported to a MME. The MME determines a paging area corresponding to the detected UE device based on the reported information and the location of the reporting device. | 01-23-2014 |
20140181245 | METHOD AND APPARATUS FOR CONTENT DELIVERY OVER A BROADCAST NETWORK - Techniques are provided for expedited Internet content delivery. For example, there is provided a method that involves receiving, at a communication device, a broadcast transmission outside of a spectrum allocated for Internet communications and outside of a spectrum allocated for real time programming content, wherein the broadcast transmission includes unsolicited content pushed to a group of such communication devices. The method may involve storing a portion of the unsolicited content, and receiving a request for content from a user. The method may involve providing the portion of the unsolicited content to the user, in response to the requested content matching the portion. The method nay involve determining whether the requested content is stored on another communication device of the group, in response to the requested content not matching the portion. | 06-26-2014 |
20140194130 | METHODS AND APPARATUS FOR EFFICIENT CO-EXISTENCE OF MACRO AND SMALL CELLS - A femto base station (BS) maintains two different timings: a femto BS downlink timing and a femto BS uplink timing. A femto base station's uplink reference timing is based on the macro uplink timing being used by one or more UE devices in the local vicinity of the femto BS. In some embodiments, the femto BS synchronizes its femto uplink timing to the macro uplink timing being used by the closest UE device transmitting uplink signals to the macro BS. In other embodiments, the femto BS determines its femto base station uplink timing based on one or more uplink signals from UE devices in its vicinity transmitting to the macro BS. In various embodiments, femto cell uplink signals and macro cell uplink signals are received at a femto cell BS in synchronization. This approach facilitates frequency division multiplexing (FDM) in the uplink between a macro cell and a femto cell. | 07-10-2014 |
20140254564 | METHODS AND APPARATUS TO CONTROL INTERFERENCE - Methods and apparatus for controlling interference with regard to important control signals, e.g., synchronization signals and broadcast channel signals, are described. A configurable base station monitors for and receives signals from other base stations in its local vicinity and determines the implemented frame timings corresponding to the other deployed base stations. If possible, the configurable base station selects to use a frame timing offset which is different from the frame timing offsets being used by the other base stations. In some embodiments, symbol level and subframe level synchronization are maintained between the base stations; however, frame level synchronization may, and sometimes does vary. Different adjacent base stations may, and sometimes do, intentionally offset their frame boundaries by multiples of a subframe. | 09-11-2014 |
20140256328 | COMMUNICATIONS METHODS AND APPARATUS THAT FACILITATE HANDOVER DECISIONS AND RELATED MEASUREMENTS - Methods and apparatus that facilitate handover related measurements and decision making in a communications system including user equipment (UE) devices, a macro base station and femto base stations (femtocells) are described. In some embodiments a UE device transmits pilots along with identification information using UE device selected transmission resources from a set of recurring UE pilot transmission resources dedicated by a macro base station for UE pilot signal and related device information transmission purposes. Femto base stations measure the UE transmitted pilot signals and report the signal strength measurement results and corresponding device identifiers to a handoff decision control entity, e.g., an eNodeB or control node, which makes handover decisions. By relying on UE transmitted pilots measured by multiple base stations, e.g., femto base stations, the need for femto cells to transmit pilots can be reduced while well informed UE handoff decisions still being possible. | 09-11-2014 |
20140269464 | COMMUNICATIONS METHODS AND APPARATUS THAT FACILITATE DISCOVERY OF SMALL COVERAGE AREA BASE STATIONS - A communications system includes a plurality of different types of small coverage area base stations, e.g., femto cell base stations, WiFi access points and Bluetooth access points within a macro cell. Different user equipment (UE) devices, e.g., different smartphones, include different capabilities. In order for UE devices and small coverage area base stations with compatible capabilities to efficiently discover one another, the various small coverage area base stations and various UE devices utilize the macro cell communications band and macro cell communication protocol to coordinate device discovery and exchange discovery information and control information which allows a UE device to access a compatible small coverage area base station and subsequently communicate user data, e.g., traffic data, with the UE device. | 09-18-2014 |
20140370928 | DYNAMIC POWER MANAGEMENT SCHEME IN WIRELESS NETWORKS BASED ON POWER OVER ETHERNET (POE) - A method, an apparatus, and a computer program product for managing power of a connection point in a wireless communication system are provided. A connection point may discover a mobile node, send to a gateway a request to increase an amount of power that the connection point can consume to service the discovered mobile node, and receive from the gateway a response related to the request to increase the amount of power. In an aspect, a gateway receives from a first connection point a request to change an amount of power that the first connection point is allowed to consume to service a discovered mobile node, determines whether to accept the request from the first connection point, and sends a first command to increase the amount of power that the first connection point is allowed to consume to service the discovered mobile node if the request is accepted. | 12-18-2014 |
20150208367 | METHOD AND APPARATUS FOR TIMING SOURCE SELECTION AND DESELECTION DISTRIBUTED DEVICE TO DEVICE SYNCHRONIZATION - A method, an apparatus, and a computer program product for wireless communication are provided in connection with enabling timing source selection and deselection in a decentralized manner for distributed D2D synchronization in densely populated communications systems. In an example, a communications device, functioning in a non-timing source (TS) mode, is equipped to receive a request for timing information during a synchronization channel. The communications device may further be equipped to determine whether to switch to a TS mode based on a selection utility metric value. In another example, a communications device, functioning in a TS mode, is equipped to transmit a TIB during a synchronization channel, and determine whether to switch to a non-TS mode based on a deselection utility metric value. In the TS mode, the UE is configured to transmit a TIB, while in the non-TS mode the UE is configured not to transmit the TIB. | 07-23-2015 |
20150208368 | METHOD AND APPARATUS FOR RESOURCE ALLOCATION FOR DISTRIBUTED DEVICE TO DEVICE SYNCHRONIZATION - A method, an apparatus, and a computer program product for wireless communication are provided in connection with improving resource allocation for distributed D2D synchronization in densely populated communications systems. In an example, a communications device is equipped to transmit a synchronization signal during a beacon period of a synchronization channel. In an aspect, the synchronization channel may include the beacon period, a paging period, and a TIB period. The communications device may further be equipped to monitor at least one of the beacon period, the paging period, or the TIB period of the synchronization channel for one or more signals from one or more UEs in a D2D network, and determine whether to transmit information during at least one of the beacon period, the paging period, or the TIB period based at least in part on the monitoring. | 07-23-2015 |
20150296403 | CONGESTION CONTROL SCHEME - A method, an apparatus, and a computer program product for congestion control are provided. The apparatus measures respective signal qualities in at least two regions of a resource block, compares the respective signal qualities to each other, and determines a network congestion level based on the comparison. In an aspect, the apparatus may further decide whether to use resources respectively included in the at least two regions based on the network congestion level. Alternatively, the apparatus may further identify at least one MTC device or UE to refrain from using resources respectively included in the at least two regions when the network congestion level is above a threshold, and transmit a congestion control signal to the at least one identified MTC device or identified UE when the network congestion level is above the threshold. | 10-15-2015 |
20150341873 | DISTRIBUTED DEVICE-TO-DEVICE SYNCHRONIZATION - Methods, systems, and devices are described that provide for D2D synchronization. The methods, systems, and/or devices may include tools and techniques that provide for synchronizing a mobile device based on detection of a reliability alarm. A reliability alarm may be used between mobile devices, which is transmitted and/or received on specific D2D resources. Since the resources are reserved for the reliability alarm, a mobile device which was previously isolated from network synchronization will be able to receive the reliability alarm that a reliable synchronization signal is close when it moves within range of a reliable device. Once a reliability alarm is received the mobile device may free other resources to allow it to receive synchronization signals from the reliable devices. The mobile device may then synchronize with the network based on the received synchronization signals and transmit its own reliability alarm for subsequent isolated devices to use. | 11-26-2015 |
20150382268 | HANDOVER WITH INTEGRATED ANTENNA BEAM TRAINING IN WIRELESS NETWORKS - A method, an apparatus, and a computer program product for sustaining a link with a wireless network are provided. The apparatus communicates data with the wireless network via a first link with a first base station, acquires a resource to perform a beam training sequence with a second base station, wherein the acquired resource allows the beam training sequence with the second base station to be performed while the data is communicated via the first link, performs the beam training sequence and exchanging signaling information with the second base station using the resource to establish a second link to the second base station, evaluates a link strength of the second link based on the beam training sequence, and determines whether to switch the data communication from the first link to the second link based on the evaluation. | 12-31-2015 |
20160088446 | METHOD AND APPARATUS FOR USING METADATA TO PROVIDE LOCATION INFORMATION - A method, an apparatus, and a computer program product for wireless communication are provided. In an aspect, method operations for broadcasting a first signal comprising a first expression code in association with availability of location information of a UE; determining the location information associated with the UE; determining a second expression code associated with the location information; and broadcasting a second signal comprising the second expression code and the location information, independent of the first signal. In another aspect, a method includes the operations of receiving, from a second UE, a first signal comprising a first expression code associated with the second UE; determining a second expression code based on the received first signal; receiving a second signal from the second UE, the second signal comprising the second expression code; and determining a location of the second UE based on the received second signal and the determined second expression code. | 03-24-2016 |
20160105848 | REGULARLY SCHEDULED SESSIONS IN A CELLULAR INTERNET OF THINGS SYSTEM - Methods, systems, and devices are described for wireless communication at a UE. A user equipment (UE) may perform an initial access procedure to establish a connection with a serving cell. The UE may then arrange a regular transmission schedule with the serving cell including a discontinuous transmission (DTX) cycle and an acknowledgement schedule. The UE may enter a low power mode and refrain from any transmission during the a sleep interval of the DTX cycle. The UE may then wake up and transmit a message to the serving cell after the sleep interval without performing another access procedure. The UE may perform another access procedure to transmit at times not covered by the regular transmission schedule. For example, if an acknowledgement (ACK) for the message isn't received, the UE may perform another access procedure for retransmission. | 04-14-2016 |
Patent application number | Description | Published |
20100104086 | SYSTEM AND METHOD FOR AUTOMATIC CALL SEGMENTATION AT CALL CENTER - A system and method for automatic call segmentation including steps and means for automatically detecting boundaries between utterances in the call transcripts; automatically classifying utterances into target call sections; automatically partitioning the call transcript into call segments; and outputting a segmented call transcript. A training method and apparatus for training the system to perform automatic call segmentation includes steps and means for providing at least one training transcript with annotated call sections; normalizing the at least one training transcript; and performing statistical analysis on the at least one training transcript. | 04-29-2010 |
20100104087 | System and Method for Automatically Generating Adaptive Interaction Logs from Customer Interaction Text - A system and method for providing an adaptive Interaction Logging functionality to help agents reduce the time spent documenting contact center interactions. In a preferred embodiment the system uses a pipeline comprising audio capture of a telephone conversation, automatic speech transcription, text normalization, transcript generation and candidate call log generation based on Real-time and Global Models. The contact center agent edits the candidate call log to create the final call log. The models are updated based on analysis of user feedback in the form of the editing of the candidate call log done by the contact center agents or supervisors. The pipeline yields a candidate call log which the agents can edit in less time than it would take them to generate a call log manually. | 04-29-2010 |
20100274618 | System and Method for Real Time Support for Agents in Contact Center Environments - A real-time method and system are described for automatically extracting text from the customer-agent interaction at a contact center, analyzing the extracted text to automatically identify one or more customer issues, and performing processing by contact-center agent buddies (CABs) to generate at least one response to the customer issues. | 10-28-2010 |
20100332287 | SYSTEM AND METHOD FOR REAL-TIME PREDICTION OF CUSTOMER SATISFACTION - A system and method for real-time prediction of contact center customer satisfaction including means and steps for capturing an interaction between a customer and a customer service agent, converting the captured interaction into transcribed text, analyzing the transcribed text to extract a plurality of unstructured features most closely related to customer satisfaction, combining the extracted features with a plurality of structured features obtained from other contact center data, generating a customer satisfaction score from the combination of extracted unstructured features and structured features, and presenting the customer satisfaction score to contact center personnel. | 12-30-2010 |
20120240238 | System and Method to Govern Data Exchange with Mobile Devices - Techniques for limiting the risk of loss of sensitive data from a mobile device are provided. In one aspect, a method for managing sensitive data on a mobile device is provided. The method includes the following steps. A sensitivity of a data item to be transferred to the mobile device is determined. It is determined whether an aggregate sensitivity of data items already present on the mobile device plus the data item to be transferred exceeds a current threshold sensitivity value for the mobile device. If the aggregate sensitivity exceeds the current threshold sensitivity value, measures are employed to ensure the aggregate sensitivity remains below the current threshold sensitivity value for the mobile device. Otherwise the data item is transferred to the mobile device. | 09-20-2012 |
20140153709 | System And Method For Automatically Generating Adaptive Interaction Logs From Customer Interaction Text - A system and method for providing an adaptive Interaction Logging functionality to help agents reduce the time spent documenting contact center interactions. In a preferred embodiment the system uses a pipeline comprising audio capture of a telephone conversation, automatic speech transcription, text normalization, transcript generation and candidate call log generation based on Real-time and Global Models. The contact center agent edits the candidate call log to create the final call log. The models are updated based on analysis of user feedback in the form of the editing of the candidate call log done by the contact center agents or supervisors. The pipeline yields a candidate call log which the agents can edit in less time than it would take them to generate a call log manually. | 06-05-2014 |
Patent application number | Description | Published |
20120246098 | Role Mining With User Attribution Using Generative Models - Applications of machine learning techniques such as Latent Dirichlet Allocation (LDA) and author-topic models (ATM) to the problems of mining of user roles to specify access control policies from entitlement as well as logs which contain record of the usage of these entitlements are provided. In one aspect, a method for performing role mining given a plurality of users and a plurality of permissions is provided. The method includes the following steps. At least one generative machine learning technique, e.g., LDA, is used to obtain a probability distribution θ for user-to-role assignments and a probability distribution β for role-to-permission assignments. The probability distribution θ for user-to-role assignments and the probability distribution β for role-to-permission assignments are used to produce a final set of roles, including user-to-role assignments and role-to-permission assignments. | 09-27-2012 |
20130097103 | Techniques for Generating Balanced and Class-Independent Training Data From Unlabeled Data Set - Techniques for creating training sets for predictive modeling are provided. In one aspect, a method for generating training data from an unlabeled data set is provided which includes the following steps. A small initial set of data is selected from the unlabeled data set. Labels are acquired for the initial set of data selected from the unlabeled data set resulting in labeled data. The data in the unlabeled data set is clustered using a semi-supervised clustering process along with the labeled data to produce data clusters. Data samples are chosen from each of the clusters to use as the training data. The selecting, presenting, clustering and choosing steps are repeated with one or more additional sets of data selected from the unlabeled data set until a desired amount of training data has been obtained, wherein at each iteration an amount of the labeled data is increased. | 04-18-2013 |
20140304199 | ESTIMATING ASSET SENSITIVITY USING INFORMATION ASSOCIATED WITH USERS - Automatically estimating a sensitivity level of an information technology (IT) asset in one aspect may obtain information about an asset. Characteristics of the asset assigned based on the information may be compared with stored characteristics of known sensitive assets. A sensitivity level of the asset may be determined based on the comparing. | 10-09-2014 |
20140304821 | ESTIMATING ASSET SENSITIVITY USING INFORMATION ASSOCIATED WITH USERS - Automatically estimating a sensitivity level of an information technology (IT) asset in one aspect may obtain information about an asset. Characteristics of the asset assigned based on the information may be compared with stored characteristics of known sensitive assets. A sensitivity level of the asset may be determined based on the comparing. | 10-09-2014 |
20140359692 | Techniques for Reconciling Permission Usage with Security Policy for Policy Optimization and Monitoring Continuous Compliance - In one aspect, a method for managing a security policy having multiple policy items includes the steps of: (a) mapping permissions to the policy items which apply to usage of the permissions so as to determine which of the permissions are granted to groups of users by each of the policy items; (b) identifying at least one of the policy items mapped in step (a) that is in violation of least privilege based on a comparison of an actual permission usage with the security policy; (c) identifying at least one of the policy items mapped in step (a) that increases operational risk; (d) verifying that policy constructs in the security policy are consistent with policy constructs inferred from the actual permission usage; and (e) identifying optimizations of the security policy based on output from one or more of steps (a)-(d). | 12-04-2014 |
20140359695 | Techniques for Reconciling Permission Usage with Security Policy for Policy Optimization and Monitoring Continuous Compliance - In one aspect, a method for managing a security policy having multiple policy items includes the steps of: (a) mapping permissions to the policy items which apply to usage of the permissions so as to determine which of the permissions are granted to groups of users by each of the policy items; (b) identifying at least one of the policy items mapped in step (a) that is in violation of least privilege based on a comparison of an actual permission usage with the security policy; (c) identifying at least one of the policy items mapped in step (a) that increases operational risk; (d) verifying that policy constructs in the security policy are consistent with policy constructs inferred from the actual permission usage; and (e) identifying optimizations of the security policy based on output from one or more of steps (a)-(d). | 12-04-2014 |
20150039617 | ESTIMATING DATA TOPICS OF COMPUTERS USING EXTERNAL TEXT CONTENT AND USAGE INFORMATION OF THE USERS - Automatically estimating content topics of inaccessible content in a computer system, in one aspect, may comprise gathering accessible content and analyzing the accessible content to estimate one or more topics of the inaccessible content. | 02-05-2015 |
20150039618 | ESTIMATING DATA TOPICS OF COMPUTERS USING EXTERNAL TEXT CONTENT AND USAGE INFORMATION OF THE USERS - Automatically estimating content topics of inaccessible content in a computer system, in one aspect, may comprise gathering accessible content and analyzing the accessible content to estimate one or more topics of the inaccessible content. | 02-05-2015 |
20150058273 | COMPOSITE PROPENSITY PROFILE DETECTOR - Detecting propensity profile for a person may comprise receiving artifacts associated with the person; detecting profile characteristics for the person based on the artifacts; receiving a plurality of predefined profiles comprising a plurality of characteristics and relationships between the characteristics over time, each of the plurality of predefined profiles specifying an indication of propensity; matching the profile characteristics for the person with one or more of the plurality of predefined profiles; and outputting one or more propensity indicators based on the matching, the propensity indicators comprising at least an expressed strength of a given propensity in the person at a given time. | 02-26-2015 |
20150067835 | Detecting Anomalous User Behavior Using Generative Models of User Actions - An apparatus for detecting abnormal behavior of users is disclosed. The apparatus identifies from a log of user activity, a first number of actions performed by a user over a first time period that match a pattern of user activity for a task associated with one or more roles of the users. The apparatus also identifies from the log of user activity, a second number of actions performed by the user over a second time period that match the pattern of user activity. The apparatus calculates an amount of deviation between the first number of actions and the second number of actions. The deviation identifies a difference between amounts of time spent in the one or more roles. The apparatus then determines whether the amount of deviation between the first number of actions and the second number of actions exceeds a threshold for abnormal behavior. | 03-05-2015 |
20150067845 | Detecting Anomalous User Behavior Using Generative Models of User Actions - A method for detecting abnormal behavior of users is disclosed. Processors identify from a log of user activity, a first number of actions performed by a user over a first time period that match a pattern of user activity for a task associated with one or more roles of the users. Processors also identify from the log of user activity, a second number of actions performed by the user over a second time period that match the pattern of user activity. Processors calculate an amount of deviation between the first number of actions and the second number of actions. The deviation identifies a difference between amounts of time spent in the one or more roles. Processors then determine whether the amount of deviation between the first number of actions and the second number of actions exceeds a threshold for abnormal behavior. | 03-05-2015 |
20150242486 | DISCOVERING COMMUNITIES AND EXPERTISE OF USERS USING SEMANTIC ANALYSIS OF RESOURCE ACCESS LOGS - Generating communities of users and discovering the expertise of those users are provided. Identifications of a plurality of users that accessed resources via a network, types of actions performed by the plurality of users on the resources, and names of the resources accessed by the plurality of users are extracted from retrieved resource access logs. The plurality of users are grouped into a plurality of different sets of users based on which resources were accessed and which type of actions were performed by each particular user within the plurality of users. The communities of users are generated based on each different set of users having a similarity with regard to the resources that were accessed and the types of actions that were performed by a particular set of users. | 08-27-2015 |
20150317309 | RERANKING SEARCH RESULTS USING DOWNLOAD TIME TOLERANCE - A method and system for ranking query results on an electronic device includes the steps of obtaining a plurality of search results using a computer based on a query initiated by a user using a communications device. A ranking is determined of the search results based on a ranking technique using the computer. The ranking technique is based on a download tolerance factor and a predicted download time of data for viewing by the user for each of the search results. The search results are ranked and sent to the communications device for display to the user. | 11-05-2015 |
20160006730 | CORRELATING COGNITIVE BIOMETRICS FOR CONTINUOUS IDENTIFY VERIFICATION - A technique is provided for continuous user authentication through real-time fusion and correlation of multiple factors. Monitored data is continuously obtained from a computer. The monitored data is related to user actions on the computer of a user. A server analyzes the monitored data of the computer to execute a windowing system event sequences modality, a network footprint modality, an application specific user actions modality, and/or a forensic linguistic analysis modality for the user. The user is authenticated on the computer based on a combination of the windowing system event sequences modality, the network footprint modality, the application specific user actions modality, and/or the forensic linguistic analysis modality. | 01-07-2016 |