Mark Alexander
Mark Alexander Abourizk, Sydney AU
Patent application number | Description | Published |
---|---|---|
20150196725 | FLOW GENERATOR MESSAGE SYSTEM - A flow generator for delivering breathable gas to a patient includes a processor coupled with operation sensors and a user interface. The processor is programmed to generate at least one of time-based or event-based messages relating to at least one of flow generator operation, flow generator service, flow generator use, patient health, peripheral devices and services, patient treatment, and reminders. Time-based messages are generated at predetermined time intervals based on either time of use or elapsed time. The event-based messages are generated based on signals from the operation sensors. The user interface is configured to deliver the messages to at least one of a display, a flow generator service provider, the patient and a physician. By this system, operation of the flow generator is facilitated and enhanced. | 07-16-2015 |
Mark Alexander Abourizk, Boronia Park AU
Patent application number | Description | Published |
---|---|---|
20090120437 | Flow Generator Message System - A flow generator for delivering breathable gas to a patient includes a processor coupled with operation sensors and a user interface. The processor is programmed to generate at least one of time-based or event-based messages relating to at least one of flow generator operation, flow generator service, flow generator use, patient health, peripheral devices and services, patient treatment, and reminders. Time-based messages are generated at predetermined time intervals based on either time of use or elapsed time. The event-based messages are generated based on signals from the operation sensors. The user interface is configured to deliver the messages to at least one of a display, a flow generator service provider, the patient and a physician. By this system, operation of the flow generator is facilitated and enhanced. | 05-14-2009 |
20130206143 | FLOW GENERATOR MESSAGE SYSTEM - A flow generator for delivering breathable gas to a patient includes a processor coupled with operation sensors and a user interface. The processor is programmed to generate at least one of time-based or event-based messages relating to at least one of flow generator operation, flow generator service, flow generator use, patient health, peripheral devices and services, patient treatment, and reminders. Time-based messages are generated at predetermined time intervals based on either time of use or elapsed time. The event-based messages are generated based on signals from the operation sensors. The user interface is configured to deliver the messages to at least one of a display, a flow generator service provider, the patient and a physician. By this system, operation of the flow generator is facilitated and enhanced. | 08-15-2013 |
Mark Alexander Furth, West Sussex GB
Patent application number | Description | Published |
---|---|---|
20110049396 | Multi-Leaf Collimators - A multi-leaf collimator for a radiotherapy apparatus comprises a plurality of elongate leaves mounted in a carriage, the carriage being mounted on a substrate, wherein the leaves are independently moveable relative to the carriage in a longitudinal direction, and the carriage is moveable in that direction relative to the substrate, and a control apparatus arranged to receive a signal representing leaf positions relative to the substrate and being arranged to control the leaf positions relative to the carriage and the carriage positions relative to the substrate so as to achieve those leaf positions relative to the substrate. By allowing the carriage to be driven concurrently with the leaves, the speed of movement of the carriage can be added to that of the leaves. In this way, where leaves are required to make a long traverse they can do so more quickly. Most MLCs have a means for sensing the current positions of the leaves relative to the substrate, such as an optical or mechanical positional feedback system. The control apparatus can therefore compare the current leaf positions to the signalled leaf positions, and move the leaves and the carriage accordingly. Each leaf can be moved according to a difference between the current leaf position and the signalled leaf position, and the carriage can be moved according to an average difference between the current leaf positions and the signalled leaf positions. A corresponding method is also disclosed. | 03-03-2011 |
Mark Alexander Furth, Crawley GB
Patent application number | Description | Published |
---|---|---|
20090262901 | Multi-leaf collimators - A multi-leaf collimator for a radiotherapy apparatus comprises at least one array of laterally-spaced elongate leaves, each leaf being driven by an associated motor connected to the leaf via a drive means so as to extend or retract the leaf in its longitudinal direction, the drive means comprising a sub-frame on which at least a subset of the motors are mounted, the sub-frame being mounted at a location spaced from the leaf array in a direction transverse to the lateral and longitudinal directions, and including a plurality of leadscrews disposed longitudinally, each being driven by a motor and being operatively connected to a leaf thereby to drive that leaf. | 10-22-2009 |
20110026683 | Multi-leaf collimators - A multi-leaf collimator for a radiotherapy apparatus comprises at least one array of laterally-spaced elongate leaves, each leaf being driven by an associated motor connected to the leaf via a drive means so as to extend or retract the leaf in its longitudinal direction, the drive means comprising a sub-frame on which at least a subset of the motors are mounted, the sub-frame being mounted at a location spaced from the leaf array in a direction transverse to the lateral and longitudinal directions, and including a plurality of threaded drives disposed longitudinally, each being driven by a motor and being operatively connected to a leaf thereby to drive that leaf. | 02-03-2011 |
Mark Alexander Knackstedt, Curtin AU
Patent application number | Description | Published |
---|---|---|
20110181701 | Image Data Processing - A method for processing image data of a sample is disclosed. The method comprises registering a first and a second images of at least partially overlapping spatial regions of the sample and processing data from the registered images to obtain integrated image data comprising information about the sample, said information being additional to that available from said first and second images. | 07-28-2011 |
20150104078 | Image Data Processing - A method for processing image data of a sample is disclosed. The method comprises registering a first and a second images of at least partially overlapping spatial regions of the sample and processing data from the registered images to obtain integrated image data comprising information about the sample, said information being additional to that available from said first and second images. | 04-16-2015 |
Mark Alexander Mcgloin, Killiney IE
Patent application number | Description | Published |
---|---|---|
20120005720 | Categorization Of Privacy Data And Data Flow Detection With Rules Engine To Detect Privacy Breaches - A runtime approach receives a request from a target location. Data elements are received from a data store. Privacy data type categories corresponding to retrieved data elements are identified. Data flow category is identified based on the target location. Privacy actions are performed modifying some data elements based on the identified privacy data type categories and the data flow category so that the modified data elements comply with one or more data privacy rules pertaining to the target location. A design-time approach retrieves data types included in a software application data design. Privacy categories are selected that correspond to the retrieved data types. Flow categorization data is retrieved that correspond to software application processes. Privacy categories and flow categorization data are compared to privacy rules. A user is informed if privacy rules are violated to facilitate software application modification in order to comply with the privacy rules. | 01-05-2012 |
20130324083 | Authentication Request Management - The different illustrative embodiments provide a method, computer program product, and apparatus for managing an authentication request. A determination is made whether additional authentication is to be performed responsive to receiving the authentication request to access an application from a mobile device. A phone number to call is sent to the mobile device responsive to a determination that the additional authentication is to be performed. A determination is made whether an incoming call to the phone number is from the mobile device and within a selected period of time. The authentication request to access the application from the mobile device is granted responsive to a determination that the incoming call to the phone number is from the mobile device and within the selected period of time. | 12-05-2013 |
20130324086 | Authentication Request Management - The different illustrative embodiments provide a method, computer program product, and apparatus for managing an authentication request. A determination is made whether additional authentication is to be performed responsive to receiving the authentication request to access an application from a mobile device. A phone number to call is sent to the mobile device responsive to a determination that the additional authentication is to be performed. A determination is made whether an incoming call to the phone number is from the mobile device and within a selected period of time. The authentication request to access the application from the mobile device is granted responsive to a determination that the incoming call to the phone number is from the mobile device and within the selected period of time. | 12-05-2013 |
Mark Alexander Mcgloin, Dublin 15 IE
Patent application number | Description | Published |
---|---|---|
20140059671 | Device identification for externalizing password from device coupled with user control of external password service - Information and data stored by a mobile device is protected by comprising applying password-protection to the locally-stored information without persistently storing the corresponding password locally. Rather, the corresponding password is stored by a remote password server. In response to a trigger event on the mobile device, such as an unlocking action by the user, a request is sent by the mobile device to the password server to retrieve the corresponding server, and the corresponding password is returned to the mobile device. The mobile device can then use the password to access the protected information. If the user determines that the mobile device is lost, stolen, or out of the user's physical control, the user may access the password server and disable the sending of the password to the mobile device, thereby thwarting attempts to access the protected data on the mobile device. | 02-27-2014 |
Mark Alexander Mcgloin, Dublin IE
Patent application number | Description | Published |
---|---|---|
20110289546 | Method and apparatus for protecting markup language document against cross-site scripting attack - A method for decomposing a web application into one or more domain sandboxes ensures that the contents of each sandbox are protected from attacks on the web application outside that sandbox. Sandboxing is achieved on a per-element basis by identifying content that should be put under protection, generating a secure domain name for the identified content, and replacing the identified content with a unique reference (e.g., an iframe) to the generated secure domain. The identified content is then served only from the generated secure domain. | 11-24-2011 |
20110289556 | Method and Apparatus for Serving Content Elements of a Markup Language Document Protected Against Cross-Site Scripting Attack - A web application decomposed into one or more domain sandboxes ensures that the contents of each sandbox are protected from attacks on the web application outside that sandbox. Sandboxing is achieved on a per-element basis by identifying content that should be put under protection, generating a secure domain name for the identified content, and replacing the identified content with a unique reference (e.g., an iframe) to the generated secure domain. The identified content is then served only from the generated secure domain using a content handler. | 11-24-2011 |
20120023394 | Method and apparatus for context-aware output escaping using dynamic content marking - A technique to provide runtime output sanitization filtering of web application content that contains multiple contexts in which dynamic output is included. To facilitate this operation, dynamically-generated content is prepared for sanitization in advance, preferably by being “marked” by the web application itself (or by middleware used by or associated with the application). Preferably, given dynamically-generated content is marked by enclosing it between dynamic content indicators. Then, after the document generation is completed but before it is output (delivered), the application-generated content is processed by a content sanitization filter. The filter uses the dynamic content identifiers to identify and locate the content that needs output escaping. The filter detects the appropriate context within which the dynamically-generated content has been placed, and it then applies the appropriate escaping. In this manner, the output content is fully prepared for escaping in advance even if it is being assembled from multiple input sources that do not operate in the same runtime environment. In this approach, escaping is added after all other application processing is finished and the complete document is ready for delivery to the requesting end user. | 01-26-2012 |
20120023395 | Method and apparatus for dynamic content marking to facilitate context-aware output escaping - A technique to provide runtime output sanitization filtering of web application content that contains multiple contexts in which dynamic output is included. To facilitate this operation, dynamically-generated content is prepared for sanitization in advance, preferably by being “marked” by the web application itself (or by middleware used by or associated with the application). Preferably, given dynamically-generated content is marked by enclosing it between dynamic content indicators. Then, after the document generation is completed but before it is output (delivered), the application-generated content is processed by a content sanitization filter. The filter uses the dynamic content identifiers to identify and locate the content that needs output escaping. The filter detects the appropriate context within which the dynamically-generated content has been placed, and it then applies the appropriate escaping. In this manner, the output content is fully prepared for escaping in advance even if it is being assembled from multiple input sources that do not operate in the same runtime environment. In this approach, escaping is added after all other application processing is finished and the complete document is ready for delivery to the requesting end user. | 01-26-2012 |
20120151568 | Method and system for authenticating a rich client to a web or cloud application - A rich client performs single sign-on (SSO) to access a web- or cloud-based application. According to the described SSO approach, the rich client delegates to its native application server the task of obtaining a credential, such as a SAML assertion. The native server, acting on behalf of the user, obtains an assertion from a federated identity provider (IdP) that is then returned to the rich client. The rich client provides the assertion to a cloud-based proxy, which presents the assertion to an identity manager to attempt to prove that the user is entitled to access the web- or cloud-based application using the rich client. If the assertion can be verified, it is exchanged with a signed token, such as a token designed to protect against cross-site request forgery (CSRF). The rich client then accesses the web- or cloud-based application making a REST call that includes the signed token. The application, which recognizes the request as trustworthy, responds to the call with the requested data. | 06-14-2012 |
20130014239 | Authenticating a rich client from within an existing browser session - A user authenticates to a Web- or cloud-based application from a browser-based client. The browser-based client has an associated rich client. After a session is initiated from the browser-based client (and a credential obtained), the user can discover that the rich client is available and cause it to obtain the credential (or a new one) for use in authenticating the user to the application (using the rich client) automatically, i.e., without additional user input. An application interface provides the user with a display by which the user can configure the rich client authentication operation, such as specifying whether the rich client should be authenticated automatically if it detected as running, whether and what extent access to the application by the rich client is to be restricted, if and when access to the application by the rich client is to be revoked, and the like. | 01-10-2013 |
20130179941 | Identifying guests in web meetings - A technique that identifies registered or guest users in web meetings of the type wherein users must follow a supplied URL to attend the meeting. Registered and guest users are provided different forms of the meeting invite URL. Each registered user receives a common web meeting link (a URL) that he must follow to join the meeting. This link forces the registered user to authenticate to the service when used. A guest user invitee receives a unique URL for the meeting that is generated with a nonce value associated with the guess user's contact information. The nonce value does not expose the contact information. To join the meeting, each registered user must follow the common web meeting link and authenticate to the service. True identities of the web meeting participants are displayed. | 07-11-2013 |
20140032921 | Protecting data on a mobile device - A password protection application is executed on a mobile device and provides an interface by which an authorized user can define and configure a “data protection profile” for the device. This profile defines at least one security event (criteria or condition) associated with the device, and at least one protection action that should occur to protect data on the device upon the triggering of the event. Once defined in a profile, the application monitors for the occurrence of the security event. Upon the occurrence of the specified event, the protection action is enforced on the device to protect the data. | 01-30-2014 |
20140033299 | Protecting data on a mobile device - A password protection application is executed on a mobile device and provides an interface by which an authorized user can define and configure a “data protection profile” for the device. This profile defines at least one security event (criteria or condition) associated with the device, and at least one protection action that should occur to protect data on the device upon the triggering of the event. Once defined in a profile, the application monitors for the occurrence of the security event. Upon the occurrence of the specified event, the protection action is enforced on the device to protect the data. | 01-30-2014 |
Mark Alexander Playford, Seneca Falls, NY US
Patent application number | Description | Published |
---|---|---|
20090231153 | COMPACT SELF-CONTAINED CONDITION MONITORING DEVICE - The present invention provides a new and unique method and apparatus for monitoring a device, such as a pump. The device may also include a fan, compressor, turbine or other rotating or reciprocating piece of machinery. In one embodiment, the method features sensing in a first device both a start-up vibration at a start-up time after the first device is affixed to a second device to be monitored and a subsequent vibration level at a subsequent time after the start-up time, and providing both a start-up vibration level signal containing information about the start-up vibration level of the second device, and a subsequent vibration level signal containing information about the subsequent vibration level of the second device; and monitoring in the first device the condition of operation of the second device based on a comparison of the start-up vibration level signal in relation to the subsequent vibration level signal. The apparatus may take the form of one or more modules and/or chipset for performing the steps and functionality of the aforementioned method. | 09-17-2009 |
Mark Alexander Popjoy, Lansdale, PA US
Patent application number | Description | Published |
---|---|---|
20110121526 | VERTICAL POSITION COMPENSATING DEVICE FOR A VEHICLE - A vertical position compensating device for a vehicle, a vehicle using the device, and a method for controlling the vertical position of a vehicle. The vehicle has a wheel set mounted on a chassis by a primary suspension system and a body mounted on the chassis through a secondary suspension system. The device is mounted on the body. As the vehicle is loaded or unloaded the device moves vertically with the body and also moves relative to the body in proportion to the deflection of the primary suspension system. The total motion of the device is used to adjust the vertical position of the body through the secondary suspension in a direction opposite to the deflection of the body to maintain the position of the body constant relative to a datum line. | 05-26-2011 |
Mark Alexander Shlimovich, Palo Alto, CA US
Patent application number | Description | Published |
---|---|---|
20140096022 | Method for Making Relevant Content Proposals based on Information Gleaned from an Image-Based Project Created in an Electronic Interface - A system for creating image and or text-based projects includes a server, the server having access to a processor, a data repository, and a non-transitory physical medium. Software running from the non-transitory physical medium provides a first function for establishing a server connection between the server and a computing appliance, a second function for initiating and maintaining a data session with a user, a third function for gathering information in a project, a fourth function for analyzing the information gathered and developing a list of keywords, a fifth function for searching one or more data sources for images and other assets using one or more of the primary keywords developed by the fourth function, and a sixth function for dynamically presenting one or more digital assets found in the search to the one or more users working on the project. | 04-03-2014 |
Mark Alexander Skawronski, Alberta CA
Patent application number | Description | Published |
---|---|---|
20100329823 | METHOD AND APPARATUS FOR DELIVERY OF A TUBULAR TO A DRILLING APPARATUS - A method for delivering a tubular to a well centered drill axis includes rotating a transfer arm to which a tubular is secured about a first axis from a horizontal position to a vertical position at which a center of gravity of the transfer arm and the tubular is disposed above the first axis; and rotating an upper link of the transfer arm about a second axis while oppositely rotating a clamp support beam about a third axis from the vertical position toward the drilling apparatus while a lower link remains in the vertical position. In delivering the tubular to a drilling apparatus, a tubular supply apparatus controls the speed and acceleration of the tubular without having actuators thereof change between compression and tension states or between rotational states. | 12-30-2010 |